{"id":7485,"date":"2016-02-12T10:50:35","date_gmt":"2016-02-12T10:50:35","guid":{"rendered":"https:\/\/kasperskydaily.com\/italy\/?p=7485"},"modified":"2017-11-13T17:05:32","modified_gmt":"2017-11-13T15:05:32","slug":"sas-top-tweets","status":"publish","type":"post","link":"https:\/\/www.kaspersky.it\/blog\/sas-top-tweets\/7485\/","title":{"rendered":"SAS 2016: la TOP 10 da Twitter"},"content":{"rendered":"<p>Il SAS \u00e8 ormai giunto al termine. Molte sono state le informazioni utili divulgate, compresi gli approfondimenti su <a href=\"https:\/\/www.kaspersky.it\/blog\/poseidon-apt-boutique\/7441\/\" target=\"_blank\" rel=\"noopener\">Poseidon<\/a>, <a href=\"https:\/\/www.kaspersky.it\/blog\/adwind-rat\/7428\/\" target=\"_blank\" rel=\"noopener\">Adwind<\/a> e <a href=\"https:\/\/www.kaspersky.it\/blog\/metel-gcman-carbanak\/7418\/\" target=\"_blank\" rel=\"noopener\">Metel<\/a>. Siamo tornati alla realt\u00e0, ma vogliamo riassumere l\u2019evento con alcuni dei migliori tweet (in ordine sparso) che abbiamo letto durante il congresso. Fateci sapere nei commenti se ce ne siamo persi qualcuno.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">All set;) <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <a href=\"https:\/\/t.co\/d4CmEhou2S\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/d4CmEhou2S<\/a><\/p>\n<p>\u2014 Dasha Diaz (@dariaski) <a href=\"https:\/\/twitter.com\/dariaski\/status\/695337544309846016?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 4, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>I nostri esperti di GReAT sono stati entusiasti di arrivare a Tenerife perch\u00e9 tutto fosse pronto per il grandioso congresso.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Opening <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> surprise appearance by <a href=\"https:\/\/twitter.com\/RAPst4r?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@RAPst4r<\/a>, who has better stage presence than most infosec presenters. <a href=\"https:\/\/t.co\/Ax9420t4XX\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/Ax9420t4XX<\/a><\/p>\n<p>\u2014 Chris Eng (@chriseng) <a href=\"https:\/\/twitter.com\/chriseng\/status\/696639450634395648?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 8, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Parole piuttosto forti da parte di Chris Eng di Veracode sulla presentazione d\u2019apertura di Reuben Paul. Se volete dare un\u2019occhiata e giudicare da soli, cliccate sul link al nostro Periscope dal tweet di Stefan.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Did you know <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> is live on Periscope? <a href=\"https:\/\/t.co\/KcmvAx4DlL\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/KcmvAx4DlL<\/a> Follow along now <a href=\"https:\/\/twitter.com\/hashtag\/netsec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#netsec<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/cybersecurity?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#cybersecurity<\/a><\/p>\n<p>\u2014 Stefan Tanase (@stefant) <a href=\"https:\/\/twitter.com\/stefant\/status\/696650226464124928?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 8, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">\u201cMagic debit card\u201d found \u2013 each time makes a cash withdraw, it\u2019s refunded immediately <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Metel?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Metel<\/a> <a href=\"https:\/\/t.co\/rh0PQbzpWw\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/rh0PQbzpWw<\/a><\/p>\n<p>\u2014 Dmitry Bestuzhev (@dimitribest) <a href=\"https:\/\/twitter.com\/dimitribest\/status\/696681319154249728?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 8, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>A nessuno piace questo tipo di magia. L\u2019articolo completo su <a href=\"https:\/\/securelist.com\/blog\/research\/73638\/apt-style-bank-robberies-increase-with-metel-gcman-and-carbanak-2-0-attacks\/\" target=\"_blank\" rel=\"noopener\">Metel.<\/a><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Hackers Steal Money from Banks via APT-Style Attacks <a href=\"https:\/\/t.co\/GbBMtrIVEl\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/GbBMtrIVEl<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a><\/p>\n<p>\u2014 SecurityWeek (@SecurityWeek) <a href=\"https:\/\/twitter.com\/SecurityWeek\/status\/696749020245553152?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 8, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Altro ancora su Metel e\u00a0 su come gli hackers stiano rubando denaro.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Poseidon APT \u2013 First boutique malware from Brazil, operating since at least 2005. <a href=\"https:\/\/twitter.com\/hashtag\/thesas2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#thesas2016<\/a> <a href=\"https:\/\/t.co\/zpGKHHpa5v\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/zpGKHHpa5v<\/a><\/p>\n<p>\u2014 Marc Rogers (@marcwrogers) <a href=\"https:\/\/twitter.com\/marcwrogers\/status\/696998709251461120?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 9, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Com\u2019era prevedibile, <a href=\"https:\/\/securelist.com\/blog\/research\/73673\/poseidon-group-a-targeted-attack-boutique-specializing-in-global-cyber-espionage\/\" target=\"_blank\" rel=\"noopener\">Poseidon<\/a> \u00e8 stato un argomento molto dibattuto. Il gruppo APT \u00e8 in circolazione da almeno un decennio.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Encryption games here at <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <br>Try to decrypt my own message I leave for you \ud83d\ude42 <a href=\"https:\/\/t.co\/fNUecJ97WU\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/fNUecJ97WU<\/a><\/p>\n<p>\u2014 Dmitry Bestuzhev (@dimitribest) <a href=\"https:\/\/twitter.com\/dimitribest\/status\/696408884353880064?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 7, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Riuscite a decriptare il messaggio di Dmitry? Io no, quindi se ce la fate voi, scrivetelo nei commenti in basso.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Nice! I think this is the first time I've seen an ANALOG exploit presented, by <a href=\"https:\/\/twitter.com\/Marmusha?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@Marmusha<\/a> &amp; <a href=\"https:\/\/twitter.com\/dark_k3y?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@dark_k3y<\/a> @ <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <a href=\"https:\/\/t.co\/wnym30MP5h\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/wnym30MP5h<\/a><\/p>\n<p>\u2014 Joe Fitz (@securelyfitz) <a href=\"https:\/\/twitter.com\/securelyfitz\/status\/697035009362890752?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 9, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Nascosto nell\u2019analogico.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">\"I hate hospitals\" <a href=\"https:\/\/twitter.com\/61ack1ynx?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@61ack1ynx<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <a href=\"https:\/\/t.co\/K7PBQjKfp5\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/K7PBQjKfp5<\/a><\/p>\n<p>\u2014 Andrey Nikishin (@andreynikishin) <a href=\"https:\/\/twitter.com\/andreynikishin\/status\/697020347628064769?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 9, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Sono certo che chiunque condivida l\u2019opinione di cui sopra. Per leggere la storia completa sull\u2019attacco all\u2019ospedale, potete cliccare <a href=\"https:\/\/threatpost.com\/medical-device-health-care-security-continues-to-ail\/116228\/\" target=\"_blank\" rel=\"noopener nofollow\">qui<\/a> e <a href=\"https:\/\/www.kaspersky.it\/blog\/hacked-hospital\/7469\/\" target=\"_blank\" rel=\"noopener\">qui<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">3D printed homemade robot bartender at <a href=\"https:\/\/twitter.com\/hashtag\/thesas2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#thesas2016<\/a> <a href=\"https:\/\/t.co\/VJMhMc7Fxh\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/VJMhMc7Fxh<\/a><\/p>\n<p>\u2014 Dennis (@DennisF) <a href=\"https:\/\/twitter.com\/DennisF\/status\/697047843450834944?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 9, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u201cWork hard, play hard\u201d, giusto? E chi se l\u2019aspettava che la tecnologia potesse creare dei drink squisiti?<\/p>\n<h3>Extra: tramonto in chiusura<\/h3>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Peace out Tenerife. <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <a href=\"https:\/\/t.co\/1nHbnsEZPq\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/1nHbnsEZPq<\/a><\/p>\n<p>\u2014 Chris (@brokenfuses) <a href=\"https:\/\/twitter.com\/brokenfuses\/status\/697779749603713025?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 11, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>Extra: tutte le foto<\/h3>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"pt\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> photos <a href=\"https:\/\/t.co\/0XAz2i0fa2\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/0XAz2i0fa2<\/a><\/p>\n<p>\u2014 Fabio Assolini (@assolini) <a href=\"https:\/\/twitter.com\/assolini\/status\/697738750936399872?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 11, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The SAS 2016 si \u00e8 ormai concluso. Rivediamo i migliori tweet per rivivere la magia del congresso.<\/p>\n","protected":false},"author":636,"featured_media":7486,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2641,12,2642],"tags":[358,22,638,1814,1839,1828,106],"class_list":{"0":"post-7485","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-news","9":"category-special-projects","10":"tag-cybersicurezza","11":"tag-malware-2","12":"tag-minacce","13":"tag-sas-2016","14":"tag-tenerife","15":"tag-thesas2016","16":"tag-twitter"},"hreflang":[{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/sas-top-tweets\/7485\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/sas-top-tweets\/6694\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/sas-top-tweets\/6763\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/sas-top-tweets\/6671\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/sas-top-tweets\/7724\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/sas-top-tweets\/11301\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/sas-top-tweets\/6993\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/sas-top-tweets\/11301\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/sas-top-tweets\/11301\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.it\/blog\/tag\/cybersicurezza\/","name":"cybersicurezza"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/posts\/7485","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/comments?post=7485"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/posts\/7485\/revisions"}],"predecessor-version":[{"id":14553,"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/posts\/7485\/revisions\/14553"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/media\/7486"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/media?parent=7485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/categories?post=7485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/tags?post=7485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}