{"id":31818,"date":"2024-02-10T11:00:05","date_gmt":"2024-02-10T10:00:05","guid":{"rendered":"https:\/\/zeroedge.ch\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\/"},"modified":"2024-07-25T11:04:06","modified_gmt":"2024-07-25T09:04:06","slug":"rapporto-sulle-minacce-globali-di-crowdstrike-2024","status":"publish","type":"post","link":"https:\/\/zeroedge.ch\/it\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\/","title":{"rendered":"Rapporto sulle minacce globali di CrowdStrike 2024"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"31818\" class=\"elementor elementor-31818 elementor-30968\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c7a137f e-flex e-con-boxed e-con e-parent\" data-id=\"c7a137f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3fd2718 elementor-widget elementor-widget-softconic_heading\" data-id=\"3fd2718\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"softconic_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        \n        \n                    <div class=\"section-title-5\">\n                                    <span>Scoprire gli avversari che si nascondono in bella vista<\/span>\n                                                    <h2>Rapporto sulle minacce globali per il 2024<\/h2>\n                            <\/div>\n        \n        \n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d7654e elementor-widget elementor-widget-text-editor\" data-id=\"1d7654e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Tracciando pi\u00f9 di 230 avversari e notando un tempo di evasione dell&#8217;eCrime record, il Rapporto sulle minacce globali 2024 svela un allarmante aumento delle attivit\u00e0 segrete e un panorama delle minacce informatiche dominato dalla furtivit\u00e0. I significativi aumenti delle minacce nel furto di dati, nelle violazioni del cloud e negli attacchi senza malware dimostrano che, nonostante i progressi della tecnologia di rilevamento, gli avversari continuano ad adattarsi.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6f64684 e-flex e-con-boxed e-con e-parent\" data-id=\"6f64684\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d8ac42 elementor-widget elementor-widget-softconic_heading\" data-id=\"2d8ac42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"softconic_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        \n        \n                    <div class=\"section-title-5\">\n                                                    <h2>Informazioni chiave sul rapporto<\/h2>\n                            <\/div>\n        \n        \n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-69d0abc e-flex e-con-boxed e-con e-parent\" data-id=\"69d0abc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2ba990c e-con-full e-flex e-con e-child\" data-id=\"2ba990c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa07cd6 elementor-widget elementor-widget-softconic_heading\" data-id=\"fa07cd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"softconic_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        \n        \n                    <div class=\"section-title-5\">\n                                                    <h2>La velocit\u00e0 e la furtivit\u00e0 portano ad attacchi pi\u00f9 efficaci<\/h2>\n                            <\/div>\n        \n        \n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e40431 elementor-widget elementor-widget-text-editor\" data-id=\"8e40431\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Gli avversari operano con una furtivit\u00e0 senza precedenti e gli attacchi odierni richiedono solo pochi minuti per avere successo. Si nascondono dal rilevamento utilizzando credenziali valide e strumenti legittimi, rendendo pi\u00f9 difficile per i difensori rilevare una violazione della sicurezza.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f5a3669 e-con-full e-flex e-con e-child\" data-id=\"f5a3669\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-947defa elementor-widget elementor-widget-image\" data-id=\"947defa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"240\" src=\"https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2_01-300x240.jpg\" class=\"attachment-medium size-medium wp-image-31567\" alt=\"\" srcset=\"https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2_01-300x240.jpg 300w, https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2_01.jpg 500w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-18e71ed e-flex e-con-boxed e-con e-parent\" data-id=\"18e71ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-32e71e9 e-con-full e-flex e-con e-child\" data-id=\"32e71e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b9dd37e elementor-widget elementor-widget-image\" data-id=\"b9dd37e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"240\" src=\"https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2_02-300x240.jpg\" class=\"attachment-medium size-medium wp-image-31568\" alt=\"\" srcset=\"https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2_02-300x240.jpg 300w, https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2_02.jpg 500w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e228c3 e-con-full e-flex e-con e-child\" data-id=\"3e228c3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0087764 elementor-widget elementor-widget-softconic_heading\" data-id=\"0087764\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"softconic_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        \n        \n                    <div class=\"section-title-5\">\n                                                    <h2>Gli attacchi basati sull&#039;identit\u00e0 continuano ad aumentare<\/h2>\n                            <\/div>\n        \n        \n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7bbab08 elementor-widget elementor-widget-text-editor\" data-id=\"7bbab08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Le minacce all&#8217;identit\u00e0 sono esplose nel 2023. Con l&#8217;aiuto dell&#8217;intelligenza artificiale generativa, gli avversari come SCATTERED SPIDER utilizzano nuove tecniche per entrare pi\u00f9 rapidamente, come il phishing, social engineeringe l&#8217;acquisto di credenziali legittime dai broker di accesso. Si stanno diffondendo tattiche come lo scambio di SIM, l&#8217;aggiramento dell&#8217;MFA e l&#8217;utilizzo di chiavi API rubate per ottenere l&#8217;accesso iniziale.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6668661 e-flex e-con-boxed e-con e-parent\" data-id=\"6668661\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c711d0e e-con-full e-flex e-con e-child\" data-id=\"c711d0e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a2a53f elementor-widget elementor-widget-softconic_heading\" data-id=\"5a2a53f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"softconic_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        \n        \n                    <div class=\"section-title-5\">\n                                                    <h2>Gli aggressori dominano nel cloud<\/h2>\n                            <\/div>\n        \n        \n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5a4f85 elementor-widget elementor-widget-text-editor\" data-id=\"b5a4f85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Gli avversari stanno sfruttando l&#8217;adozione del cloud a livello globale, rendendo il cloud un campo di battaglia privilegiato. Gli avversari consapevoli del cloud, in particolare gli agenti della criminalit\u00e0 elettronica, utilizzano credenziali valide per accedere agli ambienti cloud delle vittime e poi usano strumenti legittimi per eseguire i loro attacchi, rendendo difficile distinguere tra la normale attivit\u00e0 degli utenti e una violazione.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc99d06 e-con-full e-flex e-con e-child\" data-id=\"dc99d06\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-013bb8d elementor-widget elementor-widget-image\" data-id=\"013bb8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"240\" src=\"https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2_03-300x240.jpg\" class=\"attachment-medium size-medium wp-image-31569\" alt=\"\" srcset=\"https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2_03-300x240.jpg 300w, https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2_03.jpg 500w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-557b850 e-flex e-con-boxed e-con e-parent\" data-id=\"557b850\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e8bc92a e-con-full e-flex e-con e-child\" data-id=\"e8bc92a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61f30bb elementor-widget elementor-widget-image\" data-id=\"61f30bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"240\" src=\"https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2_04-300x240.jpg\" class=\"attachment-medium size-medium wp-image-31570\" alt=\"\" srcset=\"https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2_04-300x240.jpg 300w, https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2_04.jpg 500w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ea81f2c e-con-full e-flex e-con e-child\" data-id=\"ea81f2c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8a55900 elementor-widget elementor-widget-softconic_heading\" data-id=\"8a55900\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"softconic_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        \n        \n                    <div class=\"section-title-5\">\n                                                    <h2>Sfruttare le relazioni apre l&#039;accesso a pi\u00f9 vittime<\/h2>\n                            <\/div>\n        \n        \n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43a9404 elementor-widget elementor-widget-text-editor\" data-id=\"43a9404\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Gli avversari stanno massimizzando il loro ritorno sull&#8217;investimento (ROI) prendendo di mira le relazioni fornitore-cliente, creando un unico punto di accesso per colpire pi\u00f9 organizzazioni in diversi settori verticali e regionali. Sfruttando l&#8217;accesso ai fornitori IT e compromettendo la catena di fornitura del software, utilizzano il software affidabile per diffondere strumenti dannosi.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-022abaa e-flex e-con-boxed e-con e-parent\" data-id=\"022abaa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-51dbcb5 e-con-full e-flex e-con e-child\" data-id=\"51dbcb5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c6e9d63 elementor-widget elementor-widget-softconic_heading\" data-id=\"c6e9d63\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"softconic_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        \n        \n                    <div class=\"section-title-5\">\n                                                    <h2>L&#039;AI generativa determina nuovi rischi avversari<\/h2>\n                            <\/div>\n        \n        \n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5526498 elementor-widget elementor-widget-text-editor\" data-id=\"5526498\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L&#8217;abuso dell&#8217;AI generativa da parte degli attaccanti solleva preoccupazioni riguardo a campagne di social engineering convincenti e alla creazione di software, strumenti e risorse dannosi per condurre attacchi pi\u00f9 incisivi. Le tendenze del 2023 dimostrano gi\u00e0 che l&#8217;AI \u00e8 stata spesso utilizzata per il social engineering, e la potenza dell&#8217;AI crea infinite possibilit\u00e0 per gli avversari di diventare ancora pi\u00f9 sofisticati.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b415664 e-con-full e-flex e-con e-child\" data-id=\"b415664\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e89293 elementor-widget elementor-widget-image\" data-id=\"7e89293\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"240\" src=\"https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2_05-300x240.jpg\" class=\"attachment-medium size-medium wp-image-31571\" alt=\"\" srcset=\"https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2_05-300x240.jpg 300w, https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2_05.jpg 500w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aff8ac1 e-flex e-con-boxed e-con e-parent\" data-id=\"aff8ac1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d274401 elementor-widget elementor-widget-softconic_heading\" data-id=\"d274401\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"softconic_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        \n        \n                    <div class=\"section-title-5\">\n                                                    <h2>Conoscerli. Trovarli. Fermarli.<\/h2>\n                            <\/div>\n        \n        \n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9f2e38 elementor-widget elementor-widget-text-editor\" data-id=\"b9f2e38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tEsplora gli <a href=\"https:\/\/www.crowdstrike.com\/adversaries\" target=\"_blank\" rel=\"noopener\">avversari<\/a> per scoprire come i threat actors pi\u00f9 pericolosi al mondo prendono di mira organizzazioni come la vostra.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2dc5cf4 e-flex e-con-boxed e-con e-parent\" data-id=\"2dc5cf4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e93ee1e elementor-widget elementor-widget-softconic_service\" data-id=\"e93ee1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"softconic_service.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        \n\n        <!-- Start Service one Section -->\n                <!-- End Service one Section -->\n\n\n        <!-- Start Service two section -->\n                <!-- End Service two section -->\n\n\n        <!-- Start Service three section -->\n                    <div class=\"home5-services-section\">\n                <div class=\"row g-4 justify-content-center\">\n                                            <div class=\"col-xl-4 col-md-6 col-sm-10\">\n                            <div class=\"solution-card magnetic-item\">\n                                <div class=\"icon\">\n                                    <div class=\"icon-bg\">\n                                        <svg width=\"122\" height=\"122\" viewBox=\"0 0 122 122\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <g opacity=\"0.7\" filter=\"url(#filter0_f_1886_2042)\">\n                                                <circle cx=\"61\" cy=\"61\" r=\"23\" fill=\"url(#paint0_linear_1886_2042)\" \/>\n                                            <\/g>\n                                            <defs>\n                                                <filter id=\"filter0_f_1886_2042\" x=\"0\" y=\"0\" width=\"122\" height=\"122\" filterUnits=\"userSpaceOnUse\" color-interpolation-filters=\"sRGB\">\n                                                    <feFlood flood-opacity=\"0\" result=\"BackgroundImageFix\" \/>\n                                                    <feBlend mode=\"normal\" in=\"SourceGraphic\" in2=\"BackgroundImageFix\" result=\"shape\" \/>\n                                                    <feGaussianBlur stdDeviation=\"19\" result=\"effect1_foregroundBlur_1886_204\" \/>\n                                                <\/filter>\n                                                <linearGradient id=\"paint0_linear_1886_2042\" x1=\"61\" y1=\"38\" x2=\"61\" y2=\"84\" gradientUnits=\"userSpaceOnUse\">\n                                                    <stop offset=\"0\" stop-color=\"#06D889 \" stop-opacity=\"0\" \/>\n                                                    <stop offset=\"1\" stop-color=\"#06D889 \" \/>\n                                                <\/linearGradient>\n                                            <\/defs>\n                                        <\/svg>\n                                    <\/div>\n                                    <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"351.67\" height=\"330.72\" viewBox=\"0 0 351.665 330.719\"><path d=\"m170.87 149.95v15.312c-14.146 2.938-20.875 15.625-16.812 29.688l-13 7.625c-55.688-75.083-163.86-14.417-132.02 71.417-29.667-68.667 18.5-132.67 74.583-139.42-21.916-58.584 13.417-126.42 81.063-133.69-87.312 15.603-86.479 138.44 6.188 149.06z\"><\/path><path d=\"m145.05 210.44 13.261-7.656c9.617 10.783 23.97 10.266 34.116-0.283l13.104 7.445c-37.181 85.769 69.441 149.11 127.86 78.625-44.634 60.025-124.14 50.312-158.03 5.117-39.777 48.273-116.19 51.591-156.31-3.357 57.168 67.813 163.13 5.675 126-79.891z\"><\/path><path d=\"m210.76 202.17-13.262-7.656c4.529-13.72-3.094-25.891-17.303-29.403l-0.104-15.071c92.869-10.686 94.413-134.69 4.162-150.04 74.301 8.642 105.64 82.355 83.446 134.3 61.694 10.312 102.77 74.827 75.246 137.05 30.144-83.416-76.649-144.11-132.18-69.173z\"><\/path><path d=\"m120.25 112.88 16.75 16.938c22.938-17.5 57.688-13.75 77.188-0.438l15.875-16.5c-30.438-24.729-76.772-24.729-109.81 0z\"><\/path><path d=\"m268.16 177.75-23.043 6.038c3.687 28.614-16.936 56.833-38.215 67.065l6.352 21.998c36.634-13.996 59.801-54.121 54.906-95.101z\"><\/path><path d=\"m138.18 272.6 6.293-22.976c-26.624-11.113-40.751-43.083-38.973-66.627l-22.227-5.498c-6.196 38.724 16.971 78.85 54.907 95.101z\"><\/path><\/svg>                                <\/div>\n                                <div class=\"solution-content\">\n                                    <h4><a href=\"https:\/\/www.crowdstrike.com\/adversaries\/scattered-spider\/\">SCATTERED SPIDER<\/a><\/h4>\n                                    <p>Famoso per il social engineering e per gli attacchi cloud-conscious.<\/p>\n\n                                    <div class=\"learn-btn\">\n                                        <a class=\"primary-btn8\" href=\"https:\/\/www.crowdstrike.com\/adversaries\/scattered-spider\/\">\n                                            Scopri di pi\u00f9                                            <svg width=\"12\" height=\"12\" viewBox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                                <path d=\"M0 1H12M12 1V13M12 1L0.5 12\"><\/path>\n                                            <\/svg>\n                                        <\/a>\n                                    <\/div>\n                                <\/div>\n                            <\/div>\n                        <\/div>\n                                            <div class=\"col-xl-4 col-md-6 col-sm-10\">\n                            <div class=\"solution-card magnetic-item\">\n                                <div class=\"icon\">\n                                    <div class=\"icon-bg\">\n                                        <svg width=\"122\" height=\"122\" viewBox=\"0 0 122 122\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <g opacity=\"0.7\" filter=\"url(#filter0_f_1886_2042)\">\n                                                <circle cx=\"61\" cy=\"61\" r=\"23\" fill=\"url(#paint0_linear_1886_2042)\" \/>\n                                            <\/g>\n                                            <defs>\n                                                <filter id=\"filter0_f_1886_2042\" x=\"0\" y=\"0\" width=\"122\" height=\"122\" filterUnits=\"userSpaceOnUse\" color-interpolation-filters=\"sRGB\">\n                                                    <feFlood flood-opacity=\"0\" result=\"BackgroundImageFix\" \/>\n                                                    <feBlend mode=\"normal\" in=\"SourceGraphic\" in2=\"BackgroundImageFix\" result=\"shape\" \/>\n                                                    <feGaussianBlur stdDeviation=\"19\" result=\"effect1_foregroundBlur_1886_204\" \/>\n                                                <\/filter>\n                                                <linearGradient id=\"paint0_linear_1886_2042\" x1=\"61\" y1=\"38\" x2=\"61\" y2=\"84\" gradientUnits=\"userSpaceOnUse\">\n                                                    <stop offset=\"0\" stop-color=\"#06D889 \" stop-opacity=\"0\" \/>\n                                                    <stop offset=\"1\" stop-color=\"#06D889 \" \/>\n                                                <\/linearGradient>\n                                            <\/defs>\n                                        <\/svg>\n                                    <\/div>\n                                    <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"351.67\" height=\"330.72\" viewBox=\"0 0 351.665 330.719\"><path d=\"m170.87 149.95v15.312c-14.146 2.938-20.875 15.625-16.812 29.688l-13 7.625c-55.688-75.083-163.86-14.417-132.02 71.417-29.667-68.667 18.5-132.67 74.583-139.42-21.916-58.584 13.417-126.42 81.063-133.69-87.312 15.603-86.479 138.44 6.188 149.06z\"><\/path><path d=\"m145.05 210.44 13.261-7.656c9.617 10.783 23.97 10.266 34.116-0.283l13.104 7.445c-37.181 85.769 69.441 149.11 127.86 78.625-44.634 60.025-124.14 50.312-158.03 5.117-39.777 48.273-116.19 51.591-156.31-3.357 57.168 67.813 163.13 5.675 126-79.891z\"><\/path><path d=\"m210.76 202.17-13.262-7.656c4.529-13.72-3.094-25.891-17.303-29.403l-0.104-15.071c92.869-10.686 94.413-134.69 4.162-150.04 74.301 8.642 105.64 82.355 83.446 134.3 61.694 10.312 102.77 74.827 75.246 137.05 30.144-83.416-76.649-144.11-132.18-69.173z\"><\/path><path d=\"m120.25 112.88 16.75 16.938c22.938-17.5 57.688-13.75 77.188-0.438l15.875-16.5c-30.438-24.729-76.772-24.729-109.81 0z\"><\/path><path d=\"m268.16 177.75-23.043 6.038c3.687 28.614-16.936 56.833-38.215 67.065l6.352 21.998c36.634-13.996 59.801-54.121 54.906-95.101z\"><\/path><path d=\"m138.18 272.6 6.293-22.976c-26.624-11.113-40.751-43.083-38.973-66.627l-22.227-5.498c-6.196 38.724 16.971 78.85 54.907 95.101z\"><\/path><\/svg>                                <\/div>\n                                <div class=\"solution-content\">\n                                    <h4><a href=\"https:\/\/www.crowdstrike.com\/adversaries\/bitwise-spider\/\">BITWISE SPIDER<\/a><\/h4>\n                                    <p>L'avversario pi\u00f9 attivo\nsul dark web.<\/p>\n\n                                    <div class=\"learn-btn\">\n                                        <a class=\"primary-btn8\" href=\"https:\/\/www.crowdstrike.com\/adversaries\/bitwise-spider\/\">\n                                            Scopri di pi\u00f9                                            <svg width=\"12\" height=\"12\" viewBox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                                <path d=\"M0 1H12M12 1V13M12 1L0.5 12\"><\/path>\n                                            <\/svg>\n                                        <\/a>\n                                    <\/div>\n                                <\/div>\n                            <\/div>\n                        <\/div>\n                                            <div class=\"col-xl-4 col-md-6 col-sm-10\">\n                            <div class=\"solution-card magnetic-item\">\n                                <div class=\"icon\">\n                                    <div class=\"icon-bg\">\n                                        <svg width=\"122\" height=\"122\" viewBox=\"0 0 122 122\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <g opacity=\"0.7\" filter=\"url(#filter0_f_1886_2042)\">\n                                                <circle cx=\"61\" cy=\"61\" r=\"23\" fill=\"url(#paint0_linear_1886_2042)\" \/>\n                                            <\/g>\n                                            <defs>\n                                                <filter id=\"filter0_f_1886_2042\" x=\"0\" y=\"0\" width=\"122\" height=\"122\" filterUnits=\"userSpaceOnUse\" color-interpolation-filters=\"sRGB\">\n                                                    <feFlood flood-opacity=\"0\" result=\"BackgroundImageFix\" \/>\n                                                    <feBlend mode=\"normal\" in=\"SourceGraphic\" in2=\"BackgroundImageFix\" result=\"shape\" \/>\n                                                    <feGaussianBlur stdDeviation=\"19\" result=\"effect1_foregroundBlur_1886_204\" \/>\n                                                <\/filter>\n                                                <linearGradient id=\"paint0_linear_1886_2042\" x1=\"61\" y1=\"38\" x2=\"61\" y2=\"84\" gradientUnits=\"userSpaceOnUse\">\n                                                    <stop offset=\"0\" stop-color=\"#06D889 \" stop-opacity=\"0\" \/>\n                                                    <stop offset=\"1\" stop-color=\"#06D889 \" \/>\n                                                <\/linearGradient>\n                                            <\/defs>\n                                        <\/svg>\n                                    <\/div>\n                                    <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"351.67\" height=\"330.72\" viewBox=\"0 0 351.665 330.719\"><path d=\"m170.87 149.95v15.312c-14.146 2.938-20.875 15.625-16.812 29.688l-13 7.625c-55.688-75.083-163.86-14.417-132.02 71.417-29.667-68.667 18.5-132.67 74.583-139.42-21.916-58.584 13.417-126.42 81.063-133.69-87.312 15.603-86.479 138.44 6.188 149.06z\"><\/path><path d=\"m145.05 210.44 13.261-7.656c9.617 10.783 23.97 10.266 34.116-0.283l13.104 7.445c-37.181 85.769 69.441 149.11 127.86 78.625-44.634 60.025-124.14 50.312-158.03 5.117-39.777 48.273-116.19 51.591-156.31-3.357 57.168 67.813 163.13 5.675 126-79.891z\"><\/path><path d=\"m210.76 202.17-13.262-7.656c4.529-13.72-3.094-25.891-17.303-29.403l-0.104-15.071c92.869-10.686 94.413-134.69 4.162-150.04 74.301 8.642 105.64 82.355 83.446 134.3 61.694 10.312 102.77 74.827 75.246 137.05 30.144-83.416-76.649-144.11-132.18-69.173z\"><\/path><path d=\"m120.25 112.88 16.75 16.938c22.938-17.5 57.688-13.75 77.188-0.438l15.875-16.5c-30.438-24.729-76.772-24.729-109.81 0z\"><\/path><path d=\"m268.16 177.75-23.043 6.038c3.687 28.614-16.936 56.833-38.215 67.065l6.352 21.998c36.634-13.996 59.801-54.121 54.906-95.101z\"><\/path><path d=\"m138.18 272.6 6.293-22.976c-26.624-11.113-40.751-43.083-38.973-66.627l-22.227-5.498c-6.196 38.724 16.971 78.85 54.907 95.101z\"><\/path><\/svg>                                <\/div>\n                                <div class=\"solution-content\">\n                                    <h4><a href=\"https:\/\/www.crowdstrike.com\/adversaries\/cascade-panda\/\">CASCADE PANDA<\/a><\/h4>\n                                    <p>Avversario Cina-nexus che sfrutta le relazioni di fiducia.<\/p>\n\n                                    <div class=\"learn-btn\">\n                                        <a class=\"primary-btn8\" href=\"https:\/\/www.crowdstrike.com\/adversaries\/cascade-panda\/\">\n                                            Scopri di pi\u00f9                                            <svg width=\"12\" height=\"12\" viewBox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                                <path d=\"M0 1H12M12 1V13M12 1L0.5 12\"><\/path>\n                                            <\/svg>\n                                        <\/a>\n                                    <\/div>\n                                <\/div>\n                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n                <!-- End Service three section -->\n\n\n\n        <!-- Start Service Four section -->\n                <!-- End Service Four section -->\n\n\n        <!-- Start Service archive section -->\n                <!-- End Service archive section -->\n\n\n        <!-- Start Service archive Two section -->\n                <!-- End Service archive Two section -->\n\n\n\n\n\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45d31637 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"45d31637\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1930598b\" data-id=\"1930598b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6bbed533 elementor-widget elementor-widget-softconic_button\" data-id=\"6bbed533\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"softconic_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t                                    <div class=\"btn-align\">\n                    <a href=\"https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/03\/GlobalThreatReport2024.pdf\" target=\"_blank\" rel=\"nofollow\" class=\"primary-btn3\">\n                        Scarica il report                    <\/a>\n                <\/div>\n                    \n        \n\n        \n\n        \n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-0548b96 e-flex e-con-boxed e-con e-parent\" data-id=\"0548b96\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1085bb2 e-con-full e-flex e-con e-child\" data-id=\"1085bb2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-639ae13 elementor-widget elementor-widget-image\" data-id=\"639ae13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"53\" src=\"https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Crowdstrike_Trans-300x53.png\" class=\"attachment-medium size-medium wp-image-31515\" alt=\"\" srcset=\"https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Crowdstrike_Trans-300x53.png 300w, https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Crowdstrike_Trans-768x137.png 768w, https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Crowdstrike_Trans.png 962w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb6ff7f e-con-full e-flex e-con e-child\" data-id=\"eb6ff7f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-568da24 elementor-widget elementor-widget-author-box\" data-id=\"568da24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"author-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-author-box\">\n\t\t\t\n\t\t\t<div class=\"elementor-author-box__text\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.crowdstrike.com\/global-threat-report\/\">\n\t\t\t\t\t\t<h4 class=\"elementor-author-box__name\">\n\t\t\t\t\t\t\tFonte\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-author-box__bio\">\n\t\t\t\t\t\t<p>CrowdStrike 2024 Global Threat Report Article<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Scoprire gli avversari che si nascondono in bella vista Rapporto sulle minacce globali per il 2024 Tracciando pi\u00f9 di 230 avversari e notando un tempo di evasione dell&#8217;eCrime record, il Rapporto sulle minacce globali 2024 svela un allarmante aumento delle attivit\u00e0 segrete e un panorama delle minacce informatiche dominato dalla furtivit\u00e0. I significativi aumenti delle [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":31566,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[61],"tags":[],"class_list":["post-31818","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-it"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Rapporto sulle minacce globali di CrowdStrike 2024 - Zeroedge<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/zeroedge.ch\/it\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rapporto sulle minacce globali di CrowdStrike 2024 - Zeroedge\" \/>\n<meta property=\"og:description\" content=\"Scoprire gli avversari che si nascondono in bella vista Rapporto sulle minacce globali per il 2024 Tracciando pi\u00f9 di 230 avversari e notando un tempo di evasione dell&#8217;eCrime record, il Rapporto sulle minacce globali 2024 svela un allarmante aumento delle attivit\u00e0 segrete e un panorama delle minacce informatiche dominato dalla furtivit\u00e0. I significativi aumenti delle [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/zeroedge.ch\/it\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"Zeroedge\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=100085177954404\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-10T10:00:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-25T09:04:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2Head.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Webmaster\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Webmaster\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\\\/\"},\"author\":{\"name\":\"Webmaster\",\"@id\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/#\\\/schema\\\/person\\\/f17d7bab318c3046c5ec389d945346c1\"},\"headline\":\"Rapporto sulle minacce globali di CrowdStrike 2024\",\"datePublished\":\"2024-02-10T10:00:05+00:00\",\"dateModified\":\"2024-07-25T09:04:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\\\/\"},\"wordCount\":481,\"publisher\":{\"@id\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zeroedge.ch\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Article2Head.png\",\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\\\/\",\"url\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\\\/\",\"name\":\"Rapporto sulle minacce globali di CrowdStrike 2024 - Zeroedge\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zeroedge.ch\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Article2Head.png\",\"datePublished\":\"2024-02-10T10:00:05+00:00\",\"dateModified\":\"2024-07-25T09:04:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/zeroedge.ch\\\/it\\\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\\\/#primaryimage\",\"url\":\"https:\\\/\\\/zeroedge.ch\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Article2Head.png\",\"contentUrl\":\"https:\\\/\\\/zeroedge.ch\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Article2Head.png\",\"width\":1920,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Rapporto sulle minacce globali di CrowdStrike 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/#website\",\"url\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/\",\"name\":\"Zeroedge\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/#organization\",\"name\":\"Zeroedge\",\"url\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/zeroedge.ch\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/cropped-Logo-Zeroedge_trasparent_v.1.1.png\",\"contentUrl\":\"https:\\\/\\\/zeroedge.ch\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/cropped-Logo-Zeroedge_trasparent_v.1.1.png\",\"width\":1080,\"height\":196,\"caption\":\"Zeroedge\"},\"image\":{\"@id\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/profile.php?id=100085177954404\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/inntechch\\\/\",\"https:\\\/\\\/www.instagram.com\\\/_inn.tech_\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@Inn-TechUpSagl\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/#\\\/schema\\\/person\\\/f17d7bab318c3046c5ec389d945346c1\",\"name\":\"Webmaster\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a38c2e3b6eec9e5546aa9e5c4ff38a8175a214285f6d1e4fab087d7ecae74abd?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a38c2e3b6eec9e5546aa9e5c4ff38a8175a214285f6d1e4fab087d7ecae74abd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a38c2e3b6eec9e5546aa9e5c4ff38a8175a214285f6d1e4fab087d7ecae74abd?s=96&d=mm&r=g\",\"caption\":\"Webmaster\"},\"url\":\"https:\\\/\\\/zeroedge.ch\\\/it\\\/author\\\/webmaster\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rapporto sulle minacce globali di CrowdStrike 2024 - Zeroedge","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/zeroedge.ch\/it\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\/","og_locale":"it_IT","og_type":"article","og_title":"Rapporto sulle minacce globali di CrowdStrike 2024 - Zeroedge","og_description":"Scoprire gli avversari che si nascondono in bella vista Rapporto sulle minacce globali per il 2024 Tracciando pi\u00f9 di 230 avversari e notando un tempo di evasione dell&#8217;eCrime record, il Rapporto sulle minacce globali 2024 svela un allarmante aumento delle attivit\u00e0 segrete e un panorama delle minacce informatiche dominato dalla furtivit\u00e0. I significativi aumenti delle [&hellip;]","og_url":"https:\/\/zeroedge.ch\/it\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\/","og_site_name":"Zeroedge","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=100085177954404","article_published_time":"2024-02-10T10:00:05+00:00","article_modified_time":"2024-07-25T09:04:06+00:00","og_image":[{"width":1920,"height":800,"url":"https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2Head.png","type":"image\/png"}],"author":"Webmaster","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Webmaster","Tempo di lettura stimato":"4 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/zeroedge.ch\/it\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\/#article","isPartOf":{"@id":"https:\/\/zeroedge.ch\/it\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\/"},"author":{"name":"Webmaster","@id":"https:\/\/zeroedge.ch\/it\/#\/schema\/person\/f17d7bab318c3046c5ec389d945346c1"},"headline":"Rapporto sulle minacce globali di CrowdStrike 2024","datePublished":"2024-02-10T10:00:05+00:00","dateModified":"2024-07-25T09:04:06+00:00","mainEntityOfPage":{"@id":"https:\/\/zeroedge.ch\/it\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\/"},"wordCount":481,"publisher":{"@id":"https:\/\/zeroedge.ch\/it\/#organization"},"image":{"@id":"https:\/\/zeroedge.ch\/it\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2Head.png","articleSection":["Cyber Security"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/zeroedge.ch\/it\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\/","url":"https:\/\/zeroedge.ch\/it\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\/","name":"Rapporto sulle minacce globali di CrowdStrike 2024 - Zeroedge","isPartOf":{"@id":"https:\/\/zeroedge.ch\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/zeroedge.ch\/it\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\/#primaryimage"},"image":{"@id":"https:\/\/zeroedge.ch\/it\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2Head.png","datePublished":"2024-02-10T10:00:05+00:00","dateModified":"2024-07-25T09:04:06+00:00","breadcrumb":{"@id":"https:\/\/zeroedge.ch\/it\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/zeroedge.ch\/it\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/zeroedge.ch\/it\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\/#primaryimage","url":"https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2Head.png","contentUrl":"https:\/\/zeroedge.ch\/wp-content\/uploads\/2024\/02\/Article2Head.png","width":1920,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/zeroedge.ch\/it\/rapporto-sulle-minacce-globali-di-crowdstrike-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/zeroedge.ch\/it\/"},{"@type":"ListItem","position":2,"name":"Rapporto sulle minacce globali di CrowdStrike 2024"}]},{"@type":"WebSite","@id":"https:\/\/zeroedge.ch\/it\/#website","url":"https:\/\/zeroedge.ch\/it\/","name":"Zeroedge","description":"","publisher":{"@id":"https:\/\/zeroedge.ch\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/zeroedge.ch\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/zeroedge.ch\/it\/#organization","name":"Zeroedge","url":"https:\/\/zeroedge.ch\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/zeroedge.ch\/it\/#\/schema\/logo\/image\/","url":"https:\/\/zeroedge.ch\/wp-content\/uploads\/2023\/12\/cropped-Logo-Zeroedge_trasparent_v.1.1.png","contentUrl":"https:\/\/zeroedge.ch\/wp-content\/uploads\/2023\/12\/cropped-Logo-Zeroedge_trasparent_v.1.1.png","width":1080,"height":196,"caption":"Zeroedge"},"image":{"@id":"https:\/\/zeroedge.ch\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=100085177954404","https:\/\/www.linkedin.com\/company\/inntechch\/","https:\/\/www.instagram.com\/_inn.tech_\/","https:\/\/www.youtube.com\/@Inn-TechUpSagl"]},{"@type":"Person","@id":"https:\/\/zeroedge.ch\/it\/#\/schema\/person\/f17d7bab318c3046c5ec389d945346c1","name":"Webmaster","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/a38c2e3b6eec9e5546aa9e5c4ff38a8175a214285f6d1e4fab087d7ecae74abd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a38c2e3b6eec9e5546aa9e5c4ff38a8175a214285f6d1e4fab087d7ecae74abd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a38c2e3b6eec9e5546aa9e5c4ff38a8175a214285f6d1e4fab087d7ecae74abd?s=96&d=mm&r=g","caption":"Webmaster"},"url":"https:\/\/zeroedge.ch\/it\/author\/webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/zeroedge.ch\/it\/wp-json\/wp\/v2\/posts\/31818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zeroedge.ch\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zeroedge.ch\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zeroedge.ch\/it\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/zeroedge.ch\/it\/wp-json\/wp\/v2\/comments?post=31818"}],"version-history":[{"count":7,"href":"https:\/\/zeroedge.ch\/it\/wp-json\/wp\/v2\/posts\/31818\/revisions"}],"predecessor-version":[{"id":32463,"href":"https:\/\/zeroedge.ch\/it\/wp-json\/wp\/v2\/posts\/31818\/revisions\/32463"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zeroedge.ch\/it\/wp-json\/wp\/v2\/media\/31566"}],"wp:attachment":[{"href":"https:\/\/zeroedge.ch\/it\/wp-json\/wp\/v2\/media?parent=31818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zeroedge.ch\/it\/wp-json\/wp\/v2\/categories?post=31818"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zeroedge.ch\/it\/wp-json\/wp\/v2\/tags?post=31818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}