{"id":300,"date":"2022-06-28T22:07:12","date_gmt":"2022-06-28T22:07:12","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=300"},"modified":"2022-06-28T22:07:12","modified_gmt":"2022-06-28T22:07:12","slug":"gta-gruppo-pubblica-risultati-su-hermit-malware","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/it\/attacchi-informatici\/gta-gruppo-pubblica-risultati-su-hermit-malware\/","title":{"rendered":"Il Gruppo GTA pubblica i risultati del malware Hermit"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Il Google Threat Analysis Group (TAG) ha recentemente pubblicato risultati su un spyware altamente sofisticato noto come Hermit. RCS Laboratories, un fornitore italiano di spyware, ha distribuito il malware con l'aiuto di diversi fornitori di servizi Internet (ISP), prendendo di mira principalmente smartphone iOS e Android in Kazakistan e Italia.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Che cos'\u00e8 il malware Hermit?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Hermit Malware \u00e8 una forma sofisticata di malware che offre agli aggressori il controllo completo del dispositivo della vittima. Una volta installato, pu\u00f2 rubare informazioni sensibili, origliare le conversazioni e tracciare la posizione della vittima.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Come funziona il malware Hermit?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">I siti web fraudolenti diffondono malware che sfruttano le falle del browser web sui dispositivi mobili iOS e Android. L'aggressore reindirizza gli utenti a un server controllato, dove scarica il malware nel dispositivo della vittima.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Una volta infettato, il malware Hermit stabilisce una connessione remota al server dell'aggressore, dove pu\u00f2 ricevere comandi dal suo operatore. Questi comandi consentono all'aggressore di accedere da remoto a qualsiasi dato memorizzato sul dispositivo della vittima, compresi messaggi di testo, e-mail, foto e video.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Chi \u00e8 colpito dal malware Hermit?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Gli hacker hanno utilizzato il malware Hermit principalmente per colpire persone in Kazakistan e in Italia. Tuttavia, data la natura sofisticata del malware, gli aggressori potrebbero averlo utilizzato per colpire altri individui in altri Paesi.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Quali sono i risultati del malware Hermit?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">I risultati pubblicati da Google TAG forniscono un'analisi dettagliata del malware Hermit e delle sue capacit\u00e0. Il rapporto include anche informazioni su come il malware viene distribuito e su come colpisce le vittime.<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">Le scoperte di Google TAG sul malware Hermit<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">Le scoperte di TAG sul malware Hermit si basano su un'indagine condotta in collaborazione con diverse societ\u00e0 di sicurezza, tra cui Lookout, Zimperium, ESET e Kaspersky.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Il malware Hermit \u00e8 un malware avanzato che offre all'intruso il controllo completo del sistema. Pu\u00f2 origliare le conversazioni e osservare le attivit\u00e0 della vittima dopo l'installazione.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Perch\u00e9 questi risultati sono significativi?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">I risultati di Google TAG sono fondamentali perch\u00e9 forniscono informazioni sulle capacit\u00e0 del malware Hermit e sul modo in cui gli hacker lo utilizzano per colpire le persone. I risultati del Google TAG possono essere utilizzati per proteggere le potenziali vittime e per contribuire allo sviluppo di contromisure contro questo tipo di malware.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Come posso proteggermi da Hermit Malware?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Ci sono alcune cose che potete fare per proteggervi dal malware Hermit:<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-Mantenere il sistema operativo e il software aggiornati: gli aggressori sfruttano spesso le vulnerabilit\u00e0 che sono gi\u00e0 state patchate per infettare i dispositivi con il malware. Mantenere il dispositivo aggiornato pu\u00f2 ridurre le possibilit\u00e0 di essere colpiti da tali attacchi.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-Evitare di visitare\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.webtitan.com\/blog\/how-to-identify-a-malicious-website\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">siti web dannosi<\/span><\/a><span data-preserver-spaces=\"true\">: Gli hacker utilizzano spesso siti web dannosi per distribuire malware. Evitare questi siti pu\u00f2 ridurre le possibilit\u00e0 di infezione del dispositivo.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-Installare un software di sicurezza affidabile: Il software di sicurezza pu\u00f2 aiutare a proteggere il dispositivo dalle minacce informatiche. Assicuratevi di installare una soluzione di sicurezza affidabile e di tenerla aggiornata.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-Installa plugin o estensioni di sicurezza che eseguono scansioni costanti per prevenire attacchi di malware sul tuo computer.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Seguendo questi suggerimenti, \u00e8 possibile proteggersi dal malware Hermit e da altre minacce simili. Tuttavia, \u00e8 essenziale ricordare che nessuna singola misura \u00e8 100% efficace e che \u00e8 sempre consigliato avere pi\u00f9 livelli di sicurezza.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">In conclusione<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Hermit \u00e8 un sofisticato tipo di malware che offre agli aggressori il controllo completo del dispositivo della vittima. Gli aggressori possono usarlo per rubare dati sensibili, ascoltare le conversazioni e tracciare i movimenti della vittima. \u00c8 possibile proteggersi da questo pericolo adottando alcune semplici strategie. Tuttavia, \u00e8 fondamentale ricordare che nessuna misura \u00e8 perfetta e che gli esperti consigliano sempre di avere pi\u00f9 livelli di sicurezza nei dispositivi.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Il Threat Analysis Group (TAG) di Google ha recentemente pubblicato i risultati di uno spyware altamente sofisticato noto come Hermit. RCS Laboratories, un fornitore italiano di spyware, ha distribuito il malware con l'aiuto di diversi... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/it\/attacchi-informatici\/gta-gruppo-pubblica-risultati-su-hermit-malware\/\">Continue reading <span class=\"screen-reader-text\">Il Gruppo GTA pubblica i risultati del malware Hermit<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":301,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,14,21],"tags":[],"class_list":["post-300","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","category-cyber-threats","category-malware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>GTA Group Publishes Findings on Hermit Malware | Security Briefing<\/title>\n<meta name=\"description\" content=\"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/it\/attacchi-informatici\/gta-gruppo-pubblica-risultati-su-hermit-malware\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GTA Group Publishes Findings on Hermit Malware | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/it\/attacchi-informatici\/gta-gruppo-pubblica-risultati-su-hermit-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-28T22:07:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"795\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"GTA Group Publishes Findings on Hermit Malware\",\"datePublished\":\"2022-06-28T22:07:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\"},\"wordCount\":610,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"articleSection\":[\"Cyber Attacks\",\"Cyber Threats\",\"Malware\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\",\"name\":\"GTA Group Publishes Findings on Hermit Malware | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"datePublished\":\"2022-06-28T22:07:12+00:00\",\"description\":\"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"width\":1000,\"height\":795,\"caption\":\"GTA-Group-Publishes-Findings-on-Hermit-Malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"GTA Group Publishes Findings on Hermit Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/it\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Il Gruppo GTA Pubblica Risultati sul Malware Hermit | Briefing sulla Sicurezza","description":"Le ultime scoperte sul sofisticato malware Hermit, che si \u00e8 scoperto essere stato distribuito da RCS Laboratories.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/it\/attacchi-informatici\/gta-gruppo-pubblica-risultati-su-hermit-malware\/","og_locale":"it_IT","og_type":"article","og_title":"GTA Group Publishes Findings on Hermit Malware | Security Briefing","og_description":"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.","og_url":"https:\/\/securitybriefing.net\/it\/attacchi-informatici\/gta-gruppo-pubblica-risultati-su-hermit-malware\/","og_site_name":"Security Briefing","article_published_time":"2022-06-28T22:07:12+00:00","og_image":[{"width":1000,"height":795,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"C\u00e9sar Daniel Barreto","Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"GTA Group Publishes Findings on Hermit Malware","datePublished":"2022-06-28T22:07:12+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/"},"wordCount":610,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","articleSection":["Cyber Attacks","Cyber Threats","Malware"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/","name":"Il Gruppo GTA Pubblica Risultati sul Malware Hermit | Briefing sulla Sicurezza","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","datePublished":"2022-06-28T22:07:12+00:00","description":"Le ultime scoperte sul sofisticato malware Hermit, che si \u00e8 scoperto essere stato distribuito da RCS Laboratories.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","width":1000,"height":795,"caption":"GTA-Group-Publishes-Findings-on-Hermit-Malware"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"GTA Group Publishes Findings on Hermit Malware"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Briefing sulla sicurezza","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Briefing sulla sicurezza","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"Cesare Daniele Barreto","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto \u00e8 uno stimato scrittore ed esperto di cybersecurity, noto per la sua conoscenza approfondita e la capacit\u00e0 di semplificare argomenti complessi di sicurezza informatica. Con una vasta esperienza nel campo della sicurezza di rete e della protezione dei dati, contribuisce regolarmente con articoli e analisi approfondite sulle ultime tendenze della cybersecurity, educando sia i professionisti che il pubblico.","url":"https:\/\/securitybriefing.net\/it\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/posts\/300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/comments?post=300"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/posts\/300\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/media\/301"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/media?parent=300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/categories?post=300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/tags?post=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}