<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyberattack | ConsulThink</title>
	<atom:link href="https://www.consulthink.it/category/cyberattack/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.consulthink.it</link>
	<description>IT consulting</description>
	<lastBuildDate>Wed, 07 Aug 2024 11:10:26 +0000</lastBuildDate>
	<language>it-IT</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.consulthink.it/wp-content/uploads/2020/02/logo-icon-87x87.ico</url>
	<title>Cyberattack | ConsulThink</title>
	<link>https://www.consulthink.it</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Rustware Part 2: Process Enumeration Development</title>
		<link>https://www.consulthink.it/rustware-part-2-process-enumeration-development/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=rustware-part-2-process-enumeration-development</link>
		
		<dc:creator><![CDATA[Consulthink]]></dc:creator>
		<pubDate>Mon, 06 Nov 2023 12:18:11 +0000</pubDate>
				<category><![CDATA[Cyberattack]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[ExperThinkers]]></category>
		<category><![CDATA[Offensive Security]]></category>
		<category><![CDATA[Red Team]]></category>
		<category><![CDATA[Malware]]></category>
		<guid isPermaLink="false">https://www.consulthink.it/?p=10303</guid>

					<description><![CDATA[<p>In the previous blog post we have seen how to develop a Shellcode Process Injection in Rust; the described Process Injection flow relies on several WinAPIs: OpenProcess used to open a handle to the target process, then the VirtualAllocEx was used to allocate a new readable and writable region of memory into the target process, ...</p>
<p>The post <a href="https://www.consulthink.it/rustware-part-2-process-enumeration-development/">Rustware Part 2: Process Enumeration Development</a> first appeared on <a href="https://www.consulthink.it">ConsulThink</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Fenomeno Qishing: la truffa tramite QR Code</title>
		<link>https://www.consulthink.it/fenomeno-qishing-la-truffa-tramite-qr-code/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=fenomeno-qishing-la-truffa-tramite-qr-code</link>
		
		<dc:creator><![CDATA[Consulthink]]></dc:creator>
		<pubDate>Fri, 20 Oct 2023 09:43:06 +0000</pubDate>
				<category><![CDATA[Cyberattack]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[ExperThinkers]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Trend]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[Qishing]]></category>
		<category><![CDATA[QR]]></category>
		<category><![CDATA[Truffe]]></category>
		<guid isPermaLink="false">https://www.consulthink.it/?p=10176</guid>

					<description><![CDATA[<p>Nell&#8217;ultimo periodo gli esperti di sicurezza di tutto il mondo attenzionano il diffondersi di una nuova tecnica fraudolenta chiamata Qishing: una pratica sempre più comune che consiste nell&#8217;utilizzare codici QR malevoli per sottrarre alle vittime credenziali, dati sensibili, e addirittura denaro. L’espressione QR Code ovvero “Quick Response Code” significa “codice a risposta veloce” e rappresenta ...</p>
<p>The post <a href="https://www.consulthink.it/fenomeno-qishing-la-truffa-tramite-qr-code/">Fenomeno Qishing: la truffa tramite QR Code</a> first appeared on <a href="https://www.consulthink.it">ConsulThink</a>.</p>]]></description>
		
		
		
			</item>
	</channel>
</rss>
