{"id":61465,"date":"2025-11-11T01:54:15","date_gmt":"2025-11-11T00:54:15","guid":{"rendered":"https:\/\/virtual-routes.org\/?page_id=61465"},"modified":"2025-11-17T23:01:13","modified_gmt":"2025-11-17T22:01:13","slug":"ai-nei-reati-informatici","status":"publish","type":"page","link":"https:\/\/virtual-routes.org\/it\/ai-nel-kit-di-strumenti-per-la-cybersicurezza\/ai-nei-reati-informatici\/","title":{"rendered":"AI nel reato informatico"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"61465\" class=\"elementor elementor-61465\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cd3475c e-flex e-con-boxed e-con e-parent\" data-id=\"cd3475c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b8e312b e-con-full e-flex e-con e-child\" data-id=\"b8e312b\" data-element_type=\"container\">\n\t\t\t\t<div data-dce-title-color=\"#0E093A\" class=\"elementor-element elementor-element-d308a14 elementor-widget elementor-widget-heading\" data-id=\"d308a14\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">AI in Reati informatici<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28d5968 elementor-widget elementor-widget-text-editor\" data-id=\"28d5968\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Come l'AI cambia la catena di morte informatica<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a22df6 elementor-absolute dce_masking-none elementor-invisible elementor-widget elementor-widget-image\" data-id=\"4a22df6\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_animation&quot;:&quot;slideInRight&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img alt=\"\" loading=\"lazy\" decoding=\"async\" width=\"767\" height=\"773\" src=\"https:\/\/virtual-routes.org\/wp-content\/uploads\/2024\/11\/white-stair.svg\" class=\"attachment-full size-full wp-image-10938\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5623314 e-flex e-con-boxed e-con e-parent\" data-id=\"5623314\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<a class=\"elementor-element elementor-element-e2d9d41 e-con-full e-flex e-con e-child\" data-id=\"e2d9d41\" data-element_type=\"container\" href=\"https:\/\/virtual-routes.org\/it\/ai-nel-kit-di-strumenti-per-la-cybersicurezza\/\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d2cc5d elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"5d2cc5d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Casa<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<a class=\"elementor-element elementor-element-946b325 e-con-full e-flex e-con e-child\" data-id=\"946b325\" data-element_type=\"container\" href=\"https:\/\/virtual-routes.org\/it\/ai-nel-kit-di-strumenti-per-la-cybersicurezza\/ai-nella-difesa-cibernetica\/\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7fe1f36 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"7fe1f36\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">AI in Difesa informatica<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<a class=\"elementor-element elementor-element-b9b3aea e-con-full e-flex e-con e-child\" data-id=\"b9b3aea\" data-element_type=\"container\" href=\"https:\/\/virtual-routes.org\/it\/ai-nel-kit-di-strumenti-per-la-cybersicurezza\/ai-nei-reati-informatici\/\">\n\t\t\t\t<div class=\"elementor-element elementor-element-974b42a elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"974b42a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">AI in Reati informatici<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b71c35f pb-0 e-flex e-con-boxed e-con e-child\" data-id=\"b71c35f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-24b2a66 elementor-widget elementor-widget-text-editor\" data-id=\"24b2a66\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Le operazioni informatiche offensive sono azioni deliberate condotte nel cyberspazio per infiltrarsi, interrompere o distruggere i sistemi avversari nel perseguimento di obiettivi strategici. Sono comunemente inquadrate come <a href=\"https:\/\/www.lockheedmartin.com\/en-us\/capabilities\/cyber\/cyber-kill-chain.html\">Catena di morte informatica<\/a>, un framework originariamente sviluppato da Lockheed Martin. Il framework suddivide un attacco in una sequenza strutturata di fasi, tracciando la progressione dell'avversario dalla ricognizione iniziale alle azioni finali intraprese per raggiungere gli obiettivi (ad esempio, l'esfiltrazione o la distruzione dei dati).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e291fba e-flex e-con-boxed e-con e-parent\" data-id=\"e291fba\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5478c95 e-con-full e-flex e-con e-child\" data-id=\"5478c95\" data-element_type=\"container\">\n\t\t<a class=\"elementor-element elementor-element-4051d4d e-con-full reconnaissance clickable-dark e-flex e-con e-child\" data-id=\"4051d4d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-4d7b78e e-con-full elementor-hidden-mobile no-change e-flex e-con e-child\" data-id=\"4d7b78e\" data-element_type=\"container\" data-settings=\"{&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bc0a058 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"bc0a058\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93f5cbf elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"93f5cbf\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0b9ef1 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"a0b9ef1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ricognizione<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff13cb9 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"ff13cb9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Raccolta di indirizzi e-mail, informazioni sulle conferenze, ecc.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<div class=\"elementor-element elementor-element-a490117 e-con-full e-flex e-con e-child\" data-id=\"a490117\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-521c000 e-con-full elementor-hidden-desktop elementor-hidden-tablet e-flex e-con e-child\" data-id=\"521c000\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a97a2cb elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"a97a2cb\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6f6e01 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"f6f6e01\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0fde48b e-con-full e-flex e-con e-child\" data-id=\"0fde48b\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b37efcb e-con-full e-flex e-con e-child\" data-id=\"b37efcb\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d19a8f0 e-con-full elementor-hidden-mobile no-change e-flex e-con e-child\" data-id=\"d19a8f0\" data-element_type=\"container\" data-settings=\"{&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e57db50 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"e57db50\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9fbfb3 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"a9fbfb3\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1a7f2ca e-con-full elementor-hidden-desktop elementor-hidden-tablet e-flex e-con e-child\" data-id=\"1a7f2ca\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f091e08 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"f091e08\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-548a777 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"548a777\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f139cdd e-con-full weaponisation clickable-dark e-flex e-con e-child\" data-id=\"f139cdd\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-241064a elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"241064a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Armamento<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d8587b elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"0d8587b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Accoppiamento dell'exploit con la backdoor in un payload consegnabile<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-22c3eb7 e-con-full e-flex e-con e-child\" data-id=\"22c3eb7\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-266e8c3 e-con-full delivery clickable-dark e-flex e-con e-child\" data-id=\"266e8c3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cd1ee7b elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"cd1ee7b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Consegna<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2265759 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"2265759\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Consegna di bundle armati alla vittima via e-mail, web, USB, ecc.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c0f1525 e-con-full elementor-hidden-mobile no-change e-flex e-con e-child\" data-id=\"c0f1525\" data-element_type=\"container\" data-settings=\"{&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-51cf4d6 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"51cf4d6\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd8f3eb elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"cd8f3eb\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c6f362 e-con-full e-flex e-con e-child\" data-id=\"3c6f362\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-046f14f e-con-full elementor-hidden-desktop elementor-hidden-tablet e-flex e-con e-child\" data-id=\"046f14f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b9160f0 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"b9160f0\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9dbf064 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"9dbf064\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7190e1b e-con-full e-flex e-con e-child\" data-id=\"7190e1b\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a418990 e-con-full e-flex e-con e-child\" data-id=\"a418990\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-dda60ad e-con-full elementor-hidden-mobile no-change e-flex e-con e-child\" data-id=\"dda60ad\" data-element_type=\"container\" data-settings=\"{&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0ecb5ae elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"0ecb5ae\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e51bfb elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"0e51bfb\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c8da279 e-con-full elementor-hidden-desktop elementor-hidden-tablet e-flex e-con e-child\" data-id=\"c8da279\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eb64ec5 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"eb64ec5\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea0a199 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"ea0a199\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1e8b3fb e-con-full exploitation clickable-dark e-flex e-con e-child\" data-id=\"1e8b3fb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8c00d03 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"8c00d03\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sfruttamento<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb9e26d elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"fb9e26d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Sfruttamento di una vulnerabilit\u00e0 per eseguire codice sul sistema della vittima<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb54ba3 e-con-full e-flex e-con e-child\" data-id=\"eb54ba3\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d3f7623 e-con-full installation clickable-dark e-flex e-con e-child\" data-id=\"d3f7623\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc61083 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"fc61083\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Installazione<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5eb018e elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"5eb018e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Installazione di malware sulla risorsa<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9b57827 e-con-full elementor-hidden-mobile no-change e-flex e-con e-child\" data-id=\"9b57827\" data-element_type=\"container\" data-settings=\"{&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d00bfd elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"2d00bfd\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">5<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ab455b elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"6ab455b\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cea69d5 e-con-full e-flex e-con e-child\" data-id=\"cea69d5\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-da0d75e e-con-full elementor-hidden-desktop elementor-hidden-tablet e-flex e-con e-child\" data-id=\"da0d75e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52b2b68 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"52b2b68\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">5<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c1333e elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"7c1333e\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-114a689 e-con-full e-flex e-con e-child\" data-id=\"114a689\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-72e6d56 e-con-full e-flex e-con e-child\" data-id=\"72e6d56\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-dbe50ae e-con-full elementor-hidden-mobile no-change e-flex e-con e-child\" data-id=\"dbe50ae\" data-element_type=\"container\" data-settings=\"{&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a92878 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"6a92878\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">6<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3413010 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"3413010\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-940ba19 e-con-full elementor-hidden-desktop elementor-hidden-tablet e-flex e-con e-child\" data-id=\"940ba19\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b65b5b elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"7b65b5b\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">6<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b7dbae elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"9b7dbae\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-07e9823 e-con-full command-control clickable-dark e-flex e-con e-child\" data-id=\"07e9823\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3f59dcf elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"3f59dcf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Comando e controllo (C2)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99e3f54 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"99e3f54\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Canale di comando per la manipolazione a distanza della vittima<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0caa49e e-con-full e-flex e-con e-child\" data-id=\"0caa49e\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-68ddc2b e-con-full action-objectives clickable-dark e-flex e-con e-child\" data-id=\"68ddc2b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8338aa8 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"8338aa8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Azioni sugli obiettivi<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f916562 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"f916562\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Con l'accesso \"mani sulla tastiera\", gli intrusi raggiungono i loro obiettivi originari<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-73d4aa1 e-con-full elementor-hidden-mobile no-change e-flex e-con e-child\" data-id=\"73d4aa1\" data-element_type=\"container\" data-settings=\"{&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d6b7deb elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"d6b7deb\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">7<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a2c5a5 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"8a2c5a5\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f36f1e2 e-con-full e-flex e-con e-child\" data-id=\"f36f1e2\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e33ebb5 e-con-full elementor-hidden-desktop elementor-hidden-tablet e-flex e-con e-child\" data-id=\"e33ebb5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a182956 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"a182956\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">7<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0df5f49 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"0df5f49\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b4b9d8c e-flex e-con-boxed e-con e-parent\" data-id=\"b4b9d8c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd68367 elementor-widget elementor-widget-html\" data-id=\"dd68367\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script>\n\/\/ Script to handle click simulation based on class-to-ID matching\ndocument.addEventListener('DOMContentLoaded', function() {\n    \/\/ Add click event listener to the document (event delegation)\n    document.addEventListener('click', function(event) {\n        let currentElement = event.target;\n        \n        \/\/ Traverse up the DOM tree to find an element with a class matching an ID\n        while (currentElement && currentElement !== document.body) {\n            \/\/ Get all classes from the current element\n            const classes = currentElement.classList;\n            \n            \/\/ Check each class to see if there's a matching ID element\n            for (let className of classes) {\n                \/\/ Check if an element exists with an ID matching this class\n                const matchingElement = document.getElementById(className);\n                \n                if (matchingElement) {\n                    \/\/ Find the tab-activator container\n                    const tabActivator = document.getElementById('tab-activator');\n                    \n                    if (tabActivator) {\n                        \/\/ Scroll to the tab-activator container smoothly\n                        tabActivator.scrollIntoView({ \n                            behavior: 'smooth', \n                            block: 'start' \n                        });\n                        \n                        \/\/ Wait a bit for scroll to complete, then simulate click\n                        setTimeout(function() {\n                            \/\/ Simulate click on the element with ID matching the class\n                            if (matchingElement) {\n                                matchingElement.click();\n                            }\n                        }, 300); \/\/ Small delay to allow scroll to complete\n                    } else {\n                        \/\/ If tab-activator doesn't exist, just click the matching element\n                        matchingElement.click();\n                    }\n                    \n                    \/\/ Only process the first matching class to avoid multiple clicks\n                    return;\n                }\n            }\n            \n            \/\/ Move up to the parent element\n            currentElement = currentElement.parentElement;\n        }\n    });\n});\n\n\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e16f543 pt-0 pb-0 e-flex e-con-boxed e-con e-child\" data-id=\"e16f543\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ed398cb elementor-widget elementor-widget-text-editor\" data-id=\"ed398cb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Negli ultimi anni, le operazioni informatiche offensive si sono intensificate sia in termini di volume che di complessit\u00e0. <a href=\"https:\/\/www.consilium.europa.eu\/en\/policies\/top-cyber-threats\/\">I cyberattacchi globali non solo sono in forte aumento, ma si stanno anche diversificando per tipologia<\/a>: nel 2022, <a href=\"https:\/\/secure-iss.com\/wp-content\/uploads\/2023\/02\/IBM-Security-X-Force-Threat-Intelligence-Index-2023.pdf\">27% dei cyberattacchi globali sono stati basati su estorsioni, 21% hanno coinvolto backdoor e 17% ransomware.<\/a>. L'intelligenza artificiale (AI) sta svolgendo un ruolo importante in questa escalation e diversificazione, consentendo nuove forme di attacco come deepfakes o swarm malware, rafforzando al contempo vettori tradizionali come il phishing o lo sfruttamento delle vulnerabilit\u00e0. Secondo il <a href=\"https:\/\/www.cfo.com\/news\/cybersecurity-attacks-generative-ai-security-ransom\/692176\/\">Sondaggio globale CFO<\/a>Un numero impressionante di 85% di professionisti della sicurezza informatica attribuisce l'aumento degli attacchi all'utilizzo di armi generative AI. A Bengaluru, in India, un <a href=\"https:\/\/timesofindia.indiatimes.com\/city\/bengaluru\/rs-938-crore-lost-to-cybercrooks-since-jan\/articleshow\/122075324.cms\">rapporto statale<\/a> ha confermato questa tendenza: all'inizio del 2025, 80% di e-mail di phishing erano generate da AI.<\/p><p>L'AI sta trasformando la stessa Cyber Kill Chain e ha il <a href=\"https:\/\/cset.georgetown.edu\/publication\/a-national-security-research-agenda-for-cybersecurity-and-artificial-intelligence\/\">potenziale di potenziare ogni fase delle campagne informatiche offensive.<\/a>. La velocit\u00e0 e la scala con cui l'AI rimodella questa catena \u00e8 diventata una preoccupazione pressante per la sicurezza nazionale.<\/p><p>Questo kit di strumenti si concentra specificamente sull'AI come fattore di abilitazione all'attacco, esplorando come trasforma le diverse fasi della Cyber Kill Chain.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2ada6a6 e-flex e-con-boxed e-con e-parent\" data-id=\"2ada6a6\" data-element_type=\"container\" id=\"tab-activator\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-dce-background-color=\"#FFFFFF00\" class=\"elementor-element elementor-element-65c1cb4f e-con-full e-flex e-con e-child\" data-id=\"65c1cb4f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4bbf7813 e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"4bbf7813\" data-element_type=\"widget\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"1270839315\" aria-label=\"Schede. Aprire gli elementi con Invio o Spazio, chiuderli con Esc e navigare con i tasti freccia.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"reconnaissance\" data-tab-title-id=\"e-n-tab-title-12708393151\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-12708393151\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tRicognizione\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"weaponisation\" data-tab-title-id=\"e-n-tab-title-12708393152\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-12708393152\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tArmamento\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"delivery\" data-tab-title-id=\"e-n-tab-title-12708393153\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-12708393153\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tConsegna\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"exploitation\" data-tab-title-id=\"e-n-tab-title-12708393154\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-12708393154\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tSfruttamento\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"installation\" data-tab-title-id=\"e-n-tab-title-12708393155\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-12708393155\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tInstallazione\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"command-control\" data-tab-title-id=\"e-n-tab-title-12708393156\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-12708393156\" style=\"--n-tabs-title-order: 6;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tComando e controllo\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"action-objectives\" data-tab-title-id=\"e-n-tab-title-12708393157\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-12708393157\" style=\"--n-tabs-title-order: 7;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAzione sugli obiettivi\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-12708393158\" data-tab-title-id=\"e-n-tab-title-12708393158\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"8\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-12708393158\" style=\"--n-tabs-title-order: 8;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tDomande di discussione\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-12708393159\" data-tab-title-id=\"e-n-tab-title-12708393159\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"9\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-12708393159\" style=\"--n-tabs-title-order: 9;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tBibliografia\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-12708393151\" role=\"tabpanel\" aria-labelledby=\"reconnaissance\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-2d27c8ca e-con-full e-flex e-con e-child\" data-id=\"2d27c8ca\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5baa7993 e-con-full e-flex e-con e-child\" data-id=\"5baa7993\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-560ac75e elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"560ac75e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ricognizione<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57c87746 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"57c87746\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16ddacd7 elementor-widget elementor-widget-text-editor\" data-id=\"16ddacd7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L'attaccante raccoglie informazioni sull'obiettivo, come i dati dei dipendenti, le e-mail o i dati di sistema, per pianificare l'attacco.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e5f8c33 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"1e5f8c33\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Come l'AI cambia la ricognizione: <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71790fb7 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"71790fb7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>AI automatizza e velocizza la raccolta di informazioni open-source elaborando grandi volumi di dati pubblici (social media, siti aziendali, documenti trapelati) ed estraendo artefatti strutturati come sottodomini, probabili intervalli IP e profili di dipendenti. Inoltre, abbassa la barriera delle competenze per l'ingegneria sociale mirata, producendo profili concisi di vittime adatti allo spear-phishing.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-474c6e15 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"474c6e15\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Entit\u00e0 dell'impatto: elevata. L'OSINT automatizzata riduce notevolmente il tempo e le competenze necessarie.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-61463a86 e-con-full e-flex e-con e-child\" data-id=\"61463a86\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-339af12c elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"339af12c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caso evidenziato: ChatGPT come assistente di ricognizione<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36e47179 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"36e47179\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nel 2024, <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2307.06391\">ricercatore di cybersicurezza Sheetal Tamara<\/a> ha pubblicato un documento che dimostra come modelli linguistici di grandi dimensioni come ChatGPT possano accelerare notevolmente la fase di ricognizione di un attacco. Invece di passare ore a scrivere script e a raccogliere manualmente informazioni open-source, il ricercatore ha utilizzato una breve serie di prompt conversazionali, ad esempio: \"Elenca tutti i sottodomini che riesci a trovare per examplecompany.com\", \"Riassumi la topologia di rete dell'azienda sulla base delle informazioni pubblicamente disponibili\" e \"Identifica quali sistemi operativi e servizi sono molto probabilmente in esecuzione su questi server\".<\/p><p>In pochi minuti, il modello ha prodotto materiale utile per la ricognizione, tra cui:<\/p><ul><li>un elenco di domini e sottodomini associati all'azienda target<\/li><li>probabili intervalli di indirizzi IP<\/li><li>note sulle configurazioni SSL\/TLS, sulle porte potenzialmente aperte e sui servizi pi\u00f9 comuni<\/li><li>informazioni pubbliche sui dipendenti (da LinkedIn e comunicati stampa) che potrebbero essere utilizzate per lo spear-phishing.<\/li><\/ul><p>Laddove la raccolta di OSINT richiederebbe normalmente ore o giorni di lavoro manuale, l'esperimento ha ridotto il compito a un flusso di lavoro conversazionale che richiede molte meno competenze tecniche. Lo studio sottolinea quindi come i modelli generativi possano abbassare la barriera della ricognizione automatizzata, con chiare implicazioni per la pratica difensiva e la modellazione delle minacce.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-26ac9bf e-con-full e-flex e-con e-child\" data-id=\"26ac9bf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b14c2b elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"9b14c2b\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"9b14c2b\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tUlteriori letture\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-9b14c2b\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-9b794e4 e-con-full e-flex e-con e-child\" data-id=\"9b794e4\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-9b14c2b\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-b0d0a56 e-con-full e-flex e-con e-child\" data-id=\"b0d0a56\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a8553f0 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a8553f0\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Strumenti di scansione automatica <a href=\"https:\/\/doi.org\/10.1145\/3726122.3726164\">\"Weaponizing AI in Cyberattacks A Comparative Study of AI powered Tools for Offensive Security\" (Annis &amp; Hamoudeh 2025)<\/a><br> Lo studio comparativo mostra come gli strumenti automatizzati (ad esempio, WebCopilot, Sublist3r, RustScan+Nmap) accelerino la scansione della rete e l'enumerazione dei sottodomini. I risultati evidenziano come AI potrebbe automatizzare ulteriormente le attivit\u00e0 offensive, come la simulazione di scenari di attacco e l'adattamento dinamico alle difese, aprendo la strada a operazioni di sicurezza offensive completamente automatizzate.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">AI strumenti per la ricognizione <a href=\"https:\/\/doi.org\/10.1016\/j.cose.2022.103006\">\"La minaccia dell'offensiva AI per le organizzazioni\" (Mirsky et al. 2023)<\/a><br> L'indagine mette in evidenza 32 strumenti offensivi AI che utilizzano deep learning, reinforcement learning e NLP per automatizzare il rilevamento degli entry-point, la creazione di persone e la selezione dei bersagli. Questi strumenti migliorano l'OSINT, consentono di realizzare deepfakes realistici per il phishing e permettono anche agli attaccanti inesperti di pianificare e lanciare campagne di maggiore impatto.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Raccolta di informazioni e sfruttamento automatico. <a href=\"https:\/\/doi.org\/10.1016\/j.jisa.2020.102722\">\"AI armato per attacchi informatici\" (Yamin et al. 2021)<\/a><br> La ricerca analizza i recenti attacchi informatici che hanno utilizzato tecniche basate su AI e identifica le relative strategie di mitigazione. Evidenzia vari strumenti AI (ad esempio, GyoiThon, Deep Exploit) che possono aiutare a raccogliere dati sul sistema, sui possibili obiettivi e sulle misure di difesa.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-12708393152\" role=\"tabpanel\" aria-labelledby=\"weaponisation\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-44a1fe92 e-con-full e-flex e-con e-child\" data-id=\"44a1fe92\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3278110 e-con-full e-flex e-con e-child\" data-id=\"3278110\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39e25539 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"39e25539\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Armamento<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6bb599ab elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6bb599ab\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d2ae45 elementor-widget elementor-widget-text-editor\" data-id=\"1d2ae45\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L'attaccante utilizza le informazioni scoperte durante la ricognizione per costruire o personalizzare un carico utile dannoso (ad esempio, malware o exploit) e sfruttare le debolezze dell'obiettivo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72aa9443 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"72aa9443\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Come l'AI cambia l'armamento: <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92d733a elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"92d733a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI semplifica la creazione e la messa a punto di payload dannosi generando o modificando il codice e testando le varianti rispetto ai modelli di rilevamento. In questo modo \u00e8 possibile produrre payload pi\u00f9 discreti, adattivi e mirati, comprese le varianti polimorfiche che modificano il loro aspetto a ogni esecuzione. I test avversari possono essere utilizzati per perfezionare i payload prima della distribuzione.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-13802cf2 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"13802cf2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Entit\u00e0 dell'impatto: elevata. L'automazione accelera e scala lo sviluppo del carico utile.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-2e12c99b e-con-full e-flex e-con e-child\" data-id=\"2e12c99b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39c13f1b elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"39c13f1b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caso evidenziato: Il dropper malware generato da AI in natura<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5464f8f9 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"5464f8f9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nel 2024, <a href=\"https:\/\/www.securityweek.com\/ai-generated-malware-found-in-the-wild\/\">analisti di cybersicurezza<\/a> ha identificato una campagna di phishing che inizialmente sembrava di routine: una serie di e-mail che distribuivano un payload di malware convenzionale. Tuttavia, un'ispezione pi\u00f9 attenta del dropper (ovvero il piccolo programma responsabile dell'installazione e dell'attivazione del malware primario) ha rivelato una caratteristica insolita.<\/p><p>La struttura e la sintassi del dropper indicano che \u00e8 stato generato da un modello linguistico di grandi dimensioni piuttosto che da un programmatore umano. Sebbene funzionasse come un semplice wrapper, il dropper prodotto da AI era al contempo raffinato ed efficace, dimostrando la capacit\u00e0 di eludere i metodi di rilevamento tradizionali. Ha aggirato con successo le firme antivirus di base e ha consegnato il malware come previsto.<\/p><p>Questa scoperta \u00e8 stata degna di nota in quanto uno dei primi casi confermati di diffusione di codice maligno generato da AI. Sebbene il malware sottostante non fosse nuovo, l'esternalizzazione di parte del processo di armamento a AI ha rappresentato uno sviluppo significativo. Ha dimostrato come gli aggressori possano scalare le operazioni, ridurre i costi di sviluppo e adattarsi pi\u00f9 rapidamente, complicando al contempo gli sforzi di rilevamento e risposta.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-89461aa e-con-full e-flex e-con e-child\" data-id=\"89461aa\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-82605aa elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"82605aa\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"82605aa\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tUlteriori letture\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-82605aa\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-a304515 e-con-full e-flex e-con e-child\" data-id=\"a304515\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-82605aa\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-bf93a33 e-con-full e-flex e-con e-child\" data-id=\"bf93a33\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-413326b elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"413326b\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Malware polimorfo potenziato con AI. <a href=\"https:\/\/cardinalops.com\/blog\/polymorphic-ai-malware-detection\/\">\"Malware polimorfo AI: Un POC del mondo reale e una procedura di rilevamento\" (Itkin 2025)<\/a><br> L'articolo propone un proof-of-concept di malware polimorfo alimentato da AI che riscrive dinamicamente il proprio codice in fase di esecuzione per eludere il rilevamento, costruito come un keylogger che genera payload offuscati per ogni esecuzione.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Modelli linguistici di grandi dimensioni per la generazione di codice - <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2503.01245\">\"Modelli linguistici di grandi dimensioni per la generazione di codice: A Comprehensive Survey of Challenges, Techniques, Evaluation, and Applications\" (Huynh &amp; Lin 2025)<\/a><br> L'indagine mostra come gli LLM (ad esempio, CodeLlama, Copilot) possano generare automaticamente codice eseguibile dal linguaggio naturale, abbassando la barriera per la creazione di malware, lo sviluppo di exploit e l'adattamento dei payload da parte degli aggressori.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Tecniche di offuscamento inedite generate da AI. <a href=\"https:\/\/doi.org\/10.1109\/IJCNN52387.2021.9534016\">\"ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator\" (Sewak et al. 2021)<\/a><br> L'articolo presenta ADVERSARIALuscator, un AI in grado di riscrivere automaticamente il codice del malware per creare molte versioni e avere un aspetto sempre diverso per evitare il rilevamento da parte dei sistemi di sicurezza. Nei test, circa un terzo di queste varianti \u00e8 stato in grado di aggirare i sistemi di sicurezza avanzati.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Malware \"vibro-codificatore\" guidato da AI. <a href=\"https:\/\/www.itpro.com\/security\/hackers-are-using-ai-to-dissect-threat-intelligence-reports-and-vibe-code-malware\">\"Gli hacker utilizzano l'AI per analizzare i rapporti di intelligence sulle minacce e il malware 'vibe code'\" (Kelly 2025)<\/a><br> In questo articolo, i ricercatori di sicurezza hanno riferito che gli hacker utilizzano la tecnica generativa AI per leggere e interpretare i rapporti di intelligence sulle minacce, per poi produrre automaticamente malware funzionante. Chiamata \"vibe-coding\", questa tecnica traduce le analisi leggibili dall'uomo in codice, consentendo agli avversari di armare rapidamente la ricerca pubblica sulla sicurezza informatica in exploit.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-12708393153\" role=\"tabpanel\" aria-labelledby=\"delivery\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\"elementor-element elementor-element-4560a88 e-con-full e-flex e-con e-child\" data-id=\"4560a88\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-daeb10d e-con-full e-flex e-con e-child\" data-id=\"daeb10d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7483ed68 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"7483ed68\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Consegna<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-324ad489 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"324ad489\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-738150b7 elementor-widget elementor-widget-text-editor\" data-id=\"738150b7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L'aggressore sferra l'attacco trasmettendo il payload dannoso all'obiettivo, spesso tramite e-mail di phishing, siti web falsi o reti insicure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44da5f2f elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"44da5f2f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Come l'AI cambia la consegna: <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f09cc5c elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"1f09cc5c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI adatta e temporizza i meccanismi di consegna per massimizzare il successo. Automatizza la generazione di contenuti di phishing convincenti, deepfakes in tempo reale, interazioni di chat adattive e pagine web fraudolente realistiche, e utilizza i dati di ricognizione per scegliere il momento e il canale ottimali per la consegna. Questo riduce la necessit\u00e0 di competenze umane nell'esecuzione delle campagne.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-54532f31 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"54532f31\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Entit\u00e0 dell'impatto: elevata. L'AI aumenta notevolmente la persuasivit\u00e0 e l'automazione della consegna.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-17b62d02 e-con-full e-flex e-con e-child\" data-id=\"17b62d02\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5b6ae149 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"5b6ae149\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caso evidenziato: Truffa del Deepfake CEO ad Arup<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7db17db2 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"7db17db2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nel 2024, il personale del <a href=\"https:\/\/www.thetimes.com\/business-money\/technology\/article\/deepfake-fraudsters-impersonate-ftse-chief-executives-z9vvnz93l\">Lo studio di ingegneria britannico Arup<\/a> ha ricevuto quella che sembrava essere una videochiamata legittima dal proprio amministratore delegato regionale. Il dirigente chiedeva urgentemente il trasferimento di fondi in relazione a una transazione riservata. L'individuo sullo schermo ha replicato l'aspetto, la voce e i modi di fare dell'amministratore delegato con notevole precisione.<\/p><p>In realt\u00e0, l'interlocutore non era il dirigente ma un deepfake generato tramite AI, progettato per imitarlo in tempo reale. Convinto dell'autenticit\u00e0 dell'interazione, il personale ha autorizzato una sequenza di trasferimenti per quasi 25 milioni di dollari.<\/p><p>Questo incidente \u00e8 uno dei pi\u00f9 grandi casi riportati di social engineering abilitato da AI durante la fase di consegna di un cyberattacco. Questo dimostra che il phishing non deve pi\u00f9 dipendere da e-mail mal confezionate o da link dubbi. Al contrario, l'AI consente ora di utilizzare imitazioni audio e video altamente realistiche che eludono non solo i controlli tecnici, ma anche il giudizio e la fiducia dell'uomo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-20b7d9b e-con-full e-flex e-con e-child\" data-id=\"20b7d9b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9cfb8f7 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"9cfb8f7\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"9cfb8f7\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tUlteriori letture\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-9cfb8f7\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-c57bc4f e-con-full e-flex e-con e-child\" data-id=\"c57bc4f\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-9cfb8f7\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-0ba0c4a e-con-full e-flex e-con e-child\" data-id=\"0ba0c4a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c4115e1 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c4115e1\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">LLM per l'ingegneria sociale e il phishing su scala. <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2409.07587\">\"Esplorazione degli LLM per il rilevamento di malware: Revisione, progettazione del quadro e approcci alle contromisure\" (Al-Karaki &amp; Khan 2024)<\/a><br> L'articolo descrive come gli LLM possano essere utilizzati per automatizzare i contenuti di phishing, generare malware polimorfo e creare input avversari.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ingegneria sociale alimentata da AI. <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2407.15912\">\"L'ombra della frode: Il pericolo emergente dell'ingegneria sociale alimentata da AI e la sua possibile cura\" (Yu et al. 2024).<\/a><br> L'indagine mostra come i modelli di diffusione e gli LLM rendano il phishing e l'impersonificazione pi\u00f9 personalizzati e convincenti. L'indagine classifica l'ingegneria sociale abilitata dall'AI in \"fasi 3E\" (Enlarging, Enriching, Emerging), evidenziando come gli aggressori possano scalare le campagne, introdurre nuovi vettori e sfruttare nuove minacce, rendendo pi\u00f9 efficace l'invio di payload malevoli.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Frode vocale \/ phishing generato da AI. <a href=\"https:\/\/www.businessinsider.com\/bank-account-scam-deepfakes-ai-voice-generator-crime-fraud-2025-5\">\"Ho truffato la mia banca\" (Hoover 2025)<\/a><br> Un esperimento giornalistico che smaschera la voce deepfake generata da AI e utilizzata per truffare i conti bancari.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-12708393154\" role=\"tabpanel\" aria-labelledby=\"exploitation\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\"elementor-element elementor-element-1fe6dd33 e-con-full e-flex e-con e-child\" data-id=\"1fe6dd33\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-58088b81 e-con-full e-flex e-con e-child\" data-id=\"58088b81\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7202206e elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"7202206e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sfruttamento<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-364919c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"364919c\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a28d96b elementor-widget elementor-widget-text-editor\" data-id=\"6a28d96b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L'aggressore attiva il payload per sfruttare una vulnerabilit\u00e0 e ottenere un accesso non autorizzato al sistema di destinazione. Dopo essersi infiltrato nell'organizzazione, l'aggressore utilizza questo accesso per spostarsi lateralmente tra i sistemi per trovare informazioni rilevanti (ad esempio, dati sensibili, ulteriori vulnerabilit\u00e0, server di posta elettronica, ecc.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50a656da elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"50a656da\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Come AI cambia lo sfruttamento: <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3841535f elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"3841535f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI assiste gli aggressori nell'identificazione, nella comprensione e nello sfruttamento delle debolezze del sistema, automatizzando la scoperta delle vulnerabilit\u00e0 (ad esempio, fuzzing intelligente e scansione guidata), costruendo alberi di attacco e proponendo percorsi di sfruttamento. Pu\u00f2 anche generare input avversari che aggirano gli strumenti di sicurezza o sfruttano le difese.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-219b8b7 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"219b8b7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Entit\u00e0 dell'impatto: Medio. AI migliora la velocit\u00e0 e l'efficacia della scoperta, soprattutto nei confronti di sistemi complessi.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-4a020351 e-con-full e-flex e-con e-child\" data-id=\"4a020351\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d3c9708 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"3d3c9708\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caso evidenziato: Il verme Morris II AI<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c8400e4 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"7c8400e4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nel 2024, <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2403.02817\">ricercatori<\/a> ha dimostrato una nuova forma di worm autopropagante che non si basa sullo sfruttamento di vulnerabilit\u00e0 software convenzionali. Al contrario, prendeva di mira gli stessi sistemi generativi AI.<\/p><p>Nominato <em>Morris II<\/em> In riferimento al noto Morris Worm del 1988, questo attacco proof-of-concept utilizzava prompt avversari per manipolare i modelli AI affinch\u00e9 riproducessero e distribuissero istruzioni dannose. Una volta \"infettato\" un sistema, il worm poteva generare autonomamente altri prompt che inducevano l'AI a replicare l'attacco e a trasmetterlo ad altri modelli.<\/p><p>A differenza dei worm tradizionali, che in genere sfruttano codice non patchato, <em>Morris II<\/em> sfruttando l'apertura e l'imprevedibilit\u00e0 del comportamento del AI generativo. La dimostrazione ha sottolineato che, man mano che le organizzazioni incorporano sempre pi\u00f9 AI generativi nei flussi di lavoro operativi, possono esporre nuove superfici di attacco in cui la vulnerabilit\u00e0 non risiede nel codice sorgente ma nei dati di addestramento e nelle risposte del modello.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a4daae e-con-full e-flex e-con e-child\" data-id=\"6a4daae\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-826da44 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"826da44\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"826da44\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tUlteriori letture\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-826da44\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-3ac993a e-con-full e-flex e-con e-child\" data-id=\"3ac993a\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-826da44\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-19642f4 e-con-full e-flex e-con e-child\" data-id=\"19642f4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-758fc8a elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"758fc8a\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Avversario e offensivo AI - <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2506.12519\">\"Sfruttare l'AI per gli attacchi: On the Interplay between Adversarial AI and Offensive AI\" (Shr\u00f6er &amp; Pajola 2025)<\/a><br> Lo studio illustra come gli aggressori possano sfruttare le vulnerabilit\u00e0 dei sistemi AI attraverso input avversari, o armare l'AI stesso per lanciare exploit pi\u00f9 efficaci contro obiettivi tradizionali, evidenziando il duplice ruolo dell'AI come strumento e bersaglio dei cyberattacchi.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Binari di malware avversari - <a href=\"https:\/\/doi.org\/10.48550\/arXiv.1803.04173\">\"Binari di malware adversariali: Evading Deep Learning for Malware Detection in Executables\" (Kolosnjarski et al. 2018)<\/a><br> Lo studio mostra attacchi basati sul gradiente che modificano meno di 1% di byte negli eseguibili preservandone la funzionalit\u00e0, riuscendo a eludere i rilevatori di malware con apprendimento profondo addestrati sui byte grezzi.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-12708393155\" role=\"tabpanel\" aria-labelledby=\"installation\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\"elementor-element elementor-element-2c90b1ab e-con-full e-flex e-con e-child\" data-id=\"2c90b1ab\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6fd93ff2 e-con-full e-flex e-con e-child\" data-id=\"6fd93ff2\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d214575 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"2d214575\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Installazione<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f00d68 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8f00d68\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-737642f6 elementor-widget elementor-widget-text-editor\" data-id=\"737642f6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L'attaccante installa malware o backdoor per mantenere l'accesso e il controllo persistente (nascosto) all'interno del sistema di destinazione.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66c771ef elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"66c771ef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Come l'AI cambia l'installazione: <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a16f72a elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"4a16f72a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L'AI pu\u00f2 produrre tecniche di persistenza adattive e suggerire i vettori di installazione pi\u00f9 efficaci analizzando i dati delle fasi precedenti, ma la piena automazione della fase di installazione, ricca di sfumature e di decisioni, rimane limitata. Se applicato, AI consente al malware di modificare il comportamento per evitare il rilevamento e di selezionare i tempi e i punti di ingresso ottimali.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-7636ef22 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"7636ef22\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Entit\u00e0 dell'impatto: Medio. L'AI migliora la persistenza e la furtivit\u00e0, ma l'automazione completa rimane limitata perch\u00e9 l'installazione richiede decisioni contestuali.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-10ffcb38 e-con-full e-flex e-con e-child\" data-id=\"10ffcb38\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2962cf elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"2962cf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caso evidenziato: Un ransomware che impara a nascondersi<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24cb8f40 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"24cb8f40\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nel 2024, <a href=\"https:\/\/doi.org\/10.1109\/LCN58197.2023.10223320\">ricercatori<\/a> ha introdotto un sistema noto come <em>EGAN<\/em>, un modello AI sviluppato per esplorare come il ransomware possa utilizzare strategie di apprendimento per eludere il rilevamento. A differenza del tradizionale malware statico, che viene identificato o ignorato, <em>EGAN<\/em> operata attraverso una sperimentazione iterativa.<\/p><p>Il sistema ha modificato ripetutamente il codice del ransomware, testando varianti successive fino a produrne una in grado di aggirare le difese antivirus pur mantenendo la piena funzionalit\u00e0. In effetti, il malware ha \"imparato\" a eludere i meccanismi di rilevamento basati sulle anomalie, normalmente efficaci nell'identificare comportamenti sospetti.<\/p><p>Anche se creato in un ambiente di ricerca, <em>EGAN<\/em> ha dimostrato come i meccanismi di persistenza guidati da AI possano rendere il ransomware significativamente pi\u00f9 difficile da rilevare ed eliminare una volta distribuito. Piuttosto che dipendere da tecniche di evasione predefinite, il malware si \u00e8 adattato dinamicamente, creando la prospettiva di un software maligno quasi \"non uccidibile\".<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9857ded e-con-full e-flex e-con e-child\" data-id=\"9857ded\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-00dff06 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"00dff06\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"00dff06\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tUlteriori letture\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-00dff06\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-6a4687e e-con-full e-flex e-con e-child\" data-id=\"6a4687e\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-00dff06\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-4d98524 e-con-full e-flex e-con e-child\" data-id=\"4d98524\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b746c7 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"1b746c7\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Evasione del malware basata su RL <a href=\"https:\/\/doi.org\/10.48550\/arXiv.1801.08917\">\"Imparare a eludere i modelli di malware statici PE Machine Learning tramite l'apprendimento per rinforzo\" (Anderson et al. 2018).<\/a><br> Lo studio mostra come gli agenti di apprendimento per rinforzo possano modificare iterativamente il malware Windows PE con modifiche che preservano la funzionalit\u00e0 per eludere i rilevatori statici di malware ad apprendimento automatico, consentendo l'installazione adattiva e completamente black-box di malware persistente.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-12708393156\" role=\"tabpanel\" aria-labelledby=\"command-control\" data-tab-index=\"6\" style=\"--n-tabs-title-order: 6;\" class=\"elementor-element elementor-element-6662cff9 e-con-full e-flex e-con e-child\" data-id=\"6662cff9\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-694a2f5 e-con-full e-flex e-con e-child\" data-id=\"694a2f5\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4477c8e5 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"4477c8e5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Comando e controllo<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2eb87b1c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2eb87b1c\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35519003 elementor-widget elementor-widget-text-editor\" data-id=\"35519003\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dopo aver ottenuto il controllo di pi\u00f9 sistemi, l'aggressore crea un centro di controllo per sfruttarli da remoto. L'aggressore stabilisce una comunicazione remota con il sistema compromesso, attraverso diversi canali (ad esempio, Web, DNS o e-mail) per controllare le operazioni ed eludere il rilevamento. L'aggressore utilizza diverse tecniche, come l'offuscamento per coprire le proprie tracce ed evitare il rilevamento, o attacchi denial-of-service (DoS) per distrarre i professionisti della sicurezza dai loro veri obiettivi.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43c5bb2c elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"43c5bb2c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Come l'AI cambia il comando e il controllo (C2): <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6af9a732 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"6af9a732\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L'AI consente comunicazioni C2 pi\u00f9 occulte generando traffico che simula attivit\u00e0 legittime, progettando algoritmi di generazione di domini evasivi e orchestrando botnet decentralizzate e adattive. Pu\u00f2 anche mettere a punto il comportamento C2 per eludere i rilevatori di anomalie.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-6c51d41 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"6c51d41\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Entit\u00e0 dell'impatto: Medio. L'AI aumenta la sofisticazione e la resilienza del C2, ma i vincoli operativi ne limitano l'adozione diffusa.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-120f33eb e-con-full e-flex e-con e-child\" data-id=\"120f33eb\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-45aaa304 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"45aaa304\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caso evidenziato: Botnet coordinate da AI, sciami con una mente propria<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73081ded elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"73081ded\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nel 2023, <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2304.03669\">ricercatori<\/a> ha dimostrato una nuova forma di botnet alimentata da AI. Le reti bot convenzionali si basano in genere su un server centrale di comando e controllo (C2) attraverso il quale un singolo hub impartisce istruzioni che le macchine compromesse, o \"bot\", eseguono. Questa architettura, tuttavia, pu\u00f2 essere spesso interrotta una volta che i difensori identificano e disattivano il server centrale.<\/p><p>La botnet abilitata da AI ha adottato un modello diverso. Ogni nodo della rete ha impiegato l'apprendimento per rinforzo per determinare autonomamente quando iniziare gli attacchi, quali obiettivi perseguire e come adattare le tattiche in risposta alle misure difensive. Invece di attendere istruzioni centralizzate, i bot collaboravano in modo decentralizzato, funzionando come una forma di alveare auto-organizzato.<\/p><p>Questo design ha reso la rete bot pi\u00f9 resiliente e pi\u00f9 difficile da rilevare. Anche se alcuni nodi venivano neutralizzati, gli altri potevano adattarsi e continuare a operare. Per i difensori, il compito non era pi\u00f9 limitato all'interruzione di un singolo server, ma era necessario contrastare uno sciame distribuito e adattivo di macchine compromesse.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-28402c5 e-con-full e-flex e-con e-child\" data-id=\"28402c5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f65a6ad elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"f65a6ad\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"f65a6ad\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tUlteriori letture\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-f65a6ad\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-7271655 e-con-full e-flex e-con e-child\" data-id=\"7271655\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-f65a6ad\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-1a63973 e-con-full e-flex e-con e-child\" data-id=\"1a63973\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-766c383 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"766c383\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Manomissione dei registri e occultamento delle tracce basati su AI. <a href=\"https:\/\/www.hackthebox.com\/blog\/anti-forensics-techniques\">\"5 tecniche anti-forensi per ingannare gli investigatori (+ esempi e suggerimenti per il rilevamento)\" (CyberJunkie 2023)<\/a><br> I rapporti del 2024-2025 hanno descritto come l'AI potrebbe essere usato per cancellare o alterare i registri digitali per nascondere gli attacchi agli investigatori, anche se gli esempi reali sono ancora rari.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Bypassare i sistemi di rilevamento delle intrusioni di rete basati su GAN. <a href=\"https:\/\/doi.org\/10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00020\">\"NAttack! Attacchi avversari per aggirare un classificatore basato su GAN addestrato a rilevare intrusioni di rete\" (Piplai et al. 2020)<\/a><br> Lo studio mostra come gli attacchi avversari possano eludere con successo i sistemi di rilevamento delle intrusioni addestrati da GAN, consentendo agli aggressori di mascherare il traffico C2 come normale attivit\u00e0 di rete.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-12708393157\" role=\"tabpanel\" aria-labelledby=\"action-objectives\" data-tab-index=\"7\" style=\"--n-tabs-title-order: 7;\" class=\"elementor-element elementor-element-31db6098 e-con-full e-flex e-con e-child\" data-id=\"31db6098\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-48f13215 e-con-full e-flex e-con e-child\" data-id=\"48f13215\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a164973 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"6a164973\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Azione sugli obiettivi<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8d028b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c8d028b\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d6c5949 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"7d6c5949\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L'attaccante realizza il suo obiettivo finale, come l'esfiltrazione dei dati, la crittografia o la distruzione dei dati.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-661b3117 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"661b3117\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Come l'AI cambia l'azione sugli obiettivi: <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c2e30b3 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"2c2e30b3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L'AI accelera e perfeziona i compiti finali di un attacco: esfiltrazione automatizzata dei dati, definizione delle priorit\u00e0 degli asset di alto valore, messaggistica estorsiva su misura e generazione di contenuti su larga scala per la disinformazione o l'interruzione. Le decisioni strategiche finali spesso richiedono ancora il giudizio umano, ma AI accorcia il percorso verso tali decisioni.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-12ffc0a0 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"12ffc0a0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Entit\u00e0 dell'impatto: Medio. L'AI accelera e scala le attivit\u00e0 orientate agli obiettivi, ma non sostituisce completamente l'intento umano.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-eebb40a e-con-full e-flex e-con e-child\" data-id=\"eebb40a\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-532b1aea elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"532b1aea\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caso evidenziato: PromptLocker, un'orchestrazione di ransomware guidata da AI<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1af21cf6 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"1af21cf6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nel 2024, <a href=\"https:\/\/www.tomshardware.com\/tech-industry\/cyber-security\/ai-powered-promptlocker-ransomware-is-just-an-nyu-research-project-the-code-worked-as-a-typical-ransomware-selecting-targets-exfiltrating-selected-data-and-encrypting-volumes\">ricercatori della New York University hanno introdotto <em>PromptLocker<\/em><\/a>, un sistema ransomware proof-of-concept controllato da un modello linguistico di grandi dimensioni. A differenza dei ransomware tradizionali, che seguono comportamenti predefiniti, <em>PromptLocker<\/em> ha preso decisioni in tempo reale e ha automatizzato diverse fasi del ciclo di vita dell'attacco. Durante la dimostrazione il modello ha agito autonomamente:<\/p><ul><li>ha selezionato gli obiettivi pi\u00f9 preziosi all'interno di un sistema compromesso,<\/li><li>esfiltrare i dati sensibili prima della crittografia, aumentando l'influenza sulle vittime,<\/li><li>volumi e file crittografati per negare l'accesso.<\/li><li>ha generato note di riscatto su misura, adattando il tono e le richieste al profilo della vittima (ad esempio, alla capacit\u00e0 finanziaria e al settore).<\/li><\/ul><p>Anche se il lavoro \u00e8 stato svolto in un ambiente di ricerca controllato, <em>PromptLocker<\/em> ha illustrato come la AI generativa possa automatizzare e scalare compiti che in precedenza richiedevano una pianificazione umana, accelerando cos\u00ec la capacit\u00e0 degli aggressori di raggiungere i propri obiettivi e di adattarsi a circostanze mutevoli.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8112707 e-con-full e-flex e-con e-child\" data-id=\"8112707\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eff1db0 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"eff1db0\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"eff1db0\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tUlteriori letture\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-eff1db0\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-b3c5f7b e-con-full e-flex e-con e-child\" data-id=\"b3c5f7b\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-eff1db0\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-cc562f2 e-con-full e-flex e-con e-child\" data-id=\"cc562f2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-256dbcb elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"256dbcb\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">La disinformazione generata dall'AI su scala - <a href=\"https:\/\/www.wired.com\/story\/pro-russia-disinformation-campaign-free-ai-tools\/\">\"Una campagna di disinformazione pro-Russia sta usando gli strumenti AI gratuiti per alimentare una 'esplosione di contenuti'\" (Gilbert 2025)<\/a><br> L'articolo spiega come la campagna Operation Overload (2023-2025), legata alla Russia, utilizzi strumenti AI per produrre in massa immagini, video e clip clonati di personaggi pubblici. Questo materiale si diffonde ampiamente attraverso reti di bot sui social media per spingere narrazioni divisive.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">AI ha creato profili sociali falsi per l'amplificazione. <a href=\"https:\/\/doi.org\/10.54501\/jots.v2i4.197\">\"Caratteristiche e prevalenza di profili falsi sui social media con volti generati da AI\" (Yang et al. 2024)<\/a><br> L'indagine ha rilevato oltre 1400 account Twitter che utilizzano immagini di profilo generate da AI, organizzati in reti per promuovere truffe e messaggi a sfondo politico, con migliaia di account attivi quotidianamente.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">documenti e notizie false create da AI (psyops). <a href=\"https:\/\/www.foreignaffairs.com\/united-states\/lies-russia-tells-itself\">\"Le bugie che la Russia racconta a se stessa I propagandisti del Paese prendono di mira l'Occidente, ma ingannano anche il Cremlino\" (Rid 2024)<\/a><br> L'articolo spiega come una campagna di Doppelg\u00e4nger in corso abbia creato versioni contraffatte convincenti di siti web di notizie legittime e pubblicato articoli generati da AI per promuovere narrazioni pro-russi in tutto l'Occidente.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-12708393158\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-12708393158\" data-tab-index=\"8\" style=\"--n-tabs-title-order: 8;\" class=\"elementor-element elementor-element-b4ce08a e-flex e-con-boxed e-con e-child\" data-id=\"b4ce08a\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83a6060 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"83a6060\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Domande di discussione<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c35b6f4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c35b6f4\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26bb7a0 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"26bb7a0\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Quale fase della Cyber Kill Chain sar\u00e0 probabilmente pi\u00f9 trasformata dall'AI in futuro, e perch\u00e9? E attualmente, in quale fase l'AI offre i risultati pi\u00f9 promettenti per gli aggressori? In quale fase l'implementazione dell'AI sembra meno efficace e promettente? <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">L'AI fa pendere il vantaggio nel cyberspazio pi\u00f9 verso gli attaccanti o i difensori?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">L'accesso diffuso all'AI liveller\u00e0 il campo di gioco per i dilettanti, o potenzier\u00e0 soprattutto gli avversari dotati di buone risorse?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">In che modo la capacit\u00e0 di AI di automatizzare e accelerare la cyber kill chain cambia la natura dei cyberattacchi?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">L'AI potrebbe rendere gli attacchi cos\u00ec veloci e adattivi da rendere obsolete le strutture di difesa tradizionali?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Chi \u00e8 responsabile quando i modelli AI vengono utilizzati in modo improprio per i cyberattacchi: gli sviluppatori, gli implementatori o gli attaccanti?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Come possono i politici regolamentare le AI offensive senza soffocare l'innovazione nelle applicazioni difensive o civili?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">L'AI spinger\u00e0 i conflitti informatici verso una guerra pi\u00f9 autonoma, \"macchina contro macchina\"?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">L'AI potrebbe cambiare radicalmente il modello della cyber kill chain in qualcosa di non lineare e continuamente adattivo?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-12708393159\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-12708393159\" data-tab-index=\"9\" style=\"--n-tabs-title-order: 9;\" class=\"elementor-element elementor-element-90d1350 e-flex e-con-boxed e-con e-child\" data-id=\"90d1350\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b71da80 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"b71da80\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Bibliografia<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d053a6e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d053a6e\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c752cfb elementor-widget elementor-widget-text-editor\" data-id=\"c752cfb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">'Una campagna di disinformazione pro-Russia sta usando strumenti AI gratuiti per alimentare una \"esplosione di contenuti\" | WIRED'. Accesso al 19 settembre 2025. https:\/\/www.wired.com\/story\/pro-russia-disinformation-campaign-free-ai-tools\/.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Il Ransomware PromptLocker alimentato da AI \u00e8 solo un progetto di ricerca dell'Universit\u00e0 di New York: il codice ha funzionato come un tipico Ransomware, selezionando gli obiettivi, esfiltrare i dati selezionati e crittografare i volumi. Accesso al 19 settembre 2025. https:\/\/www.tomshardware.com\/tech-industry\/cyber-security\/ai-powered-promptlocker-ransomware-is-just-an-nyu-research-project-the-code-worked-as-a-typical-ransomware-selecting-targets-exfiltrating-selected-data-and-encrypting-volumes.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Al-Karaki, Jamal, Muhammad Al-Zafar Khan e Marwan Omar. 'Esplorazione degli LLM per il rilevamento di malware: Review, Framework Design, and Countermeasure Approaches'. arXiv:2409.07587. Versione 1. Preprint, arXiv, 11 settembre 2024. https:\/\/doi.org\/10.48550\/arXiv.2409.07587.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Anderson, Hyrum S., Anant Kharkar, Bobby Filar, David Evans e Phil Roth. 'Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning'. arXiv:1801.08917. Preprint, arXiv, 30 gennaio 2018. https:\/\/doi.org\/10.48550\/arXiv.1801.08917.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Anis, Fatima e Mohammad Hammoudeh. Weaponizing AI in Cyberattacks A Comparative Study of AI Powered Tools for Offensive Security\". <\/span><i><span style=\"font-weight: 400;\">Atti dell'8a Conferenza internazionale sulle reti e i sistemi distribuiti del futuro<\/span><\/i><span style=\"font-weight: 400;\">, ACM, 11 dicembre 2024, 283-90. https:\/\/doi.org\/10.1145\/3726122.3726164.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Buchanan, Ben. Un'agenda di ricerca sulla sicurezza nazionale per la sicurezza informatica e l'intelligenza artificiale\". <\/span><i><span style=\"font-weight: 400;\">Centro per la sicurezza e le tecnologie emergenti<\/span><\/i><span style=\"font-weight: 400;\">, 2020. https:\/\/cset.georgetown.edu\/publication\/a-national-security-research-agenda-for-cybersecurity-and-artificial-intelligence\/.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Cohen, Stav, Ron Bitton e Ben Nassi. Arriva il worm AI: Unleashing Zero-Click Worms That Target GenAI-Powered Applications'. arXiv:2403.02817. Versione 1. Preprint, arXiv, 5 marzo 2024. https:\/\/doi.org\/10.48550\/arXiv.2403.02817.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Commey, Daniel, Benjamin Appiah, Bill K. Frimpong, Isaac Osei, Ebenezer N. A. Hammond e Garth V. Crosby. EGAN: Evolutional GAN for Ransomware Evasion\". <\/span><i><span style=\"font-weight: 400;\">2023 IEEE 48a Conferenza sulle reti locali di computer (LCN)<\/span><\/i><span style=\"font-weight: 400;\">, 2 ottobre 2023, 1-9. https:\/\/doi.org\/10.1109\/LCN58197.2023.10223320.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Cyber Kill Chain\u00ae | Lockheed Martin'. Accesso al 19 settembre 2025. https:\/\/www.lockheedmartin.com\/en-us\/capabilities\/cyber\/cyber-kill-chain.html.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Minacce informatiche nell'UE: Fatti e cifre - Consilium\". Accesso al 22 settembre 2025. https:\/\/www.consilium.europa.eu\/en\/policies\/top-cyber-threats\/.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">I truffatori di Deepfake si spacciano per amministratori delegati di FTSE\". Accesso al 19 settembre 2025. https:\/\/www.thetimes.com\/business-money\/technology\/article\/deepfake-fraudsters-impersonate-ftse-chief-executives-z9vvnz93l.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Hack The Box. '5 tecniche anti-forensi per ingannare gli investigatori (+ esempi e suggerimenti per il rilevamento)'. Accesso al 19 settembre 2025. https:\/\/www.hackthebox.com\/blog\/anti-forensics-techniques.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Gli hacker usano l'AI per analizzare i rapporti sull'intelligence delle minacce e il malware \"Vibe Code\" - IT Pro\". Accesso al 19 settembre 2025. https:\/\/www.itpro.com\/security\/hackers-are-using-ai-to-dissect-threat-intelligence-reports-and-vibe-code-malware.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Hoover, Amanda. 'La nuova truffa intelligente che la vostra banca non riesce a fermare'. Business Insider. Consultato il 19 settembre 2025. https:\/\/www.businessinsider.com\/bank-account-scam-deepfakes-ai-voice-generator-crime-fraud-2025-5.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Huynh, Nam e Beiyu Lin. Modelli linguistici di grandi dimensioni per la generazione di codice: A Comprehensive Survey of Challenges, Techniques, Evaluation, and Applications'. arXiv:2503.01245. Preprint, arXiv, 2 aprile 2025. https:\/\/doi.org\/10.48550\/arXiv.2503.01245.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><i><span style=\"font-weight: 400;\">Indice di intelligence sulle minacce di IBM Security X-Force 2023<\/span><\/i><span style=\"font-weight: 400;\">. n.d.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Kolosnjaji, Bojan, Ambra Demontis, Battista Biggio, et al. 'Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables'. arXiv:1803.04173. Preprint, arXiv, 12 marzo 2018. https:\/\/doi.org\/10.48550\/arXiv.1803.04173.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Li, Haoyuan, Hao Jiang, Tao Jin, et al. 'DATE: Domain Adaptive Product Seeker for E-Commerce'. arXiv:2304.03669. Preprint, arXiv, 7 aprile 2023. https:\/\/doi.org\/10.48550\/arXiv.2304.03669.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Mirsky, Yisroel, Ambra Demontis, Jaidip Kotak, et al. \"La minaccia dell'offensiva AI alle organizzazioni\". <\/span><i><span style=\"font-weight: 400;\">Computer e sicurezza<\/span><\/i><span style=\"font-weight: 400;\"> 124 (gennaio 2023): 103006. https:\/\/doi.org\/10.1016\/j.cose.2022.103006.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Piplai, Aritran, Sai Sree Laya Chukkapalli e Anupam Joshi. NAttack! Adversarial Attacks to Bypass a GAN Based Classifier Trained to Detect Network Intrusion\". <\/span><i><span style=\"font-weight: 400;\">2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) e IEEE Intl Conference on Intelligent Data and Security (IDS)<\/span><\/i><span style=\"font-weight: 400;\">, maggio 2020, 49-54. https:\/\/doi.org\/10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00020.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Malware polimorfo AI: A Real-World POC and Detection Walkthrough - CardinalOps\". Accesso al 19 settembre 2025. https:\/\/cardinalops.com\/blog\/polymorphic-ai-malware-detection\/.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Rid, Thomas. Le bugie che la Russia si racconta\". <\/span><i><span style=\"font-weight: 400;\">Affari esteri<\/span><\/i><span style=\"font-weight: 400;\">, 30 settembre 2024. https:\/\/www.foreignaffairs.com\/united-states\/lies-russia-tells-itself.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">'938 crore di rupie perse dai cybercriminali da gennaio | Bengaluru News - Times of India'. Accesso al 22 settembre 2025. https:\/\/timesofindia.indiatimes.com\/city\/bengaluru\/rs-938-crore-lost-to-cybercrooks-since-jan\/articleshow\/122075324.cms.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Schr\u00f6er, Saskia Laura, Luca Pajola, Alberto Castagnaro, Giovanni Apruzzese e Mauro Conti. Sfruttare l'AI per gli attacchi: On the Interplay between Adversarial AI and Offensive AI'. arXiv:2506.12519. Versione 1. Preprint, arXiv, 14 giugno 2025. https:\/\/doi.org\/10.48550\/arXiv.2506.12519.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Sewak, Mohit, Sanjay K. Sahay e Hemant Rathore. ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator'. <\/span><i><span style=\"font-weight: 400;\">2021 Conferenza internazionale congiunta sulle reti neurali (IJCNN)<\/span><\/i><span style=\"font-weight: 400;\">, 18 luglio 2021, 1-9. https:\/\/doi.org\/10.1109\/IJCNN52387.2021.9534016.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Temara, Sheetal. 'Massimizzare il successo dei test di penetrazione con tecniche di ricognizione efficaci utilizzando ChatGPT'. arXiv:2307.06391. Preprint, arXiv, 20 marzo 2023. https:\/\/doi.org\/10.48550\/arXiv.2307.06391.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Townsend, Kevin. 'Malware generato da AI trovato in natura'. <\/span><i><span style=\"font-weight: 400;\">SecurityWeek<\/span><\/i><span style=\"font-weight: 400;\">, 24 settembre 2024. https:\/\/www.securityweek.com\/ai-generated-malware-found-in-the-wild\/.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Yamin, Muhammad Mudassar, Mohib Ullah, Habib Ullah e Basel Katt. AI armato per gli attacchi informatici\". <\/span><i><span style=\"font-weight: 400;\">Giornale della sicurezza e delle applicazioni dell'informazione<\/span><\/i><span style=\"font-weight: 400;\"> 57 (marzo 2021): 102722. https:\/\/doi.org\/10.1016\/j.jisa.2020.102722.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Yang, Kai-Cheng, Danishjeet Singh e Filippo Menczer. Caratteristiche e prevalenza di profili falsi sui social media con volti generati da AI\". <\/span><i><span style=\"font-weight: 400;\">Giornale della fiducia e della sicurezza online<\/span><\/i><span style=\"font-weight: 400;\"> 2, no. 4 (2024). https:\/\/doi.org\/10.54501\/jots.v2i4.197.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Yu, Jingru, Yi Yu, Xuhong Wang, et al. 'The Shadow of Fraud: The Emerging Danger of AI-Powered Social Engineering and Its Possible Cure\". arXiv:2407.15912. Preprint, arXiv, 22 luglio 2024. https:\/\/doi.org\/10.48550\/arXiv.2407.15912.\u00a0<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>AI in Cyber Offence Come l'AI cambia la Cyber Kill Chain Home AI in Cyber Defence AI in Cyber Offence Le operazioni informatiche offensive sono azioni deliberate condotte nel cyberspazio per infiltrarsi, interrompere o distruggere i sistemi avversari nel perseguimento di obiettivi strategici. Sono comunemente inquadrate attraverso la Cyber Kill Chain, un quadro originariamente sviluppato da [...]<\/p>","protected":false},"author":1,"featured_media":55699,"parent":61455,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","inline_featured_image":false,"footnotes":""},"class_list":["post-61465","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/virtual-routes.org\/it\/wp-json\/wp\/v2\/pages\/61465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/virtual-routes.org\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/virtual-routes.org\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/it\/wp-json\/wp\/v2\/comments?post=61465"}],"version-history":[{"count":21,"href":"https:\/\/virtual-routes.org\/it\/wp-json\/wp\/v2\/pages\/61465\/revisions"}],"predecessor-version":[{"id":68302,"href":"https:\/\/virtual-routes.org\/it\/wp-json\/wp\/v2\/pages\/61465\/revisions\/68302"}],"up":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/it\/wp-json\/wp\/v2\/pages\/61455"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/it\/wp-json\/wp\/v2\/media\/55699"}],"wp:attachment":[{"href":"https:\/\/virtual-routes.org\/it\/wp-json\/wp\/v2\/media?parent=61465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}