Event JSON
{
"id": "29a54eacedada5a28cebaad95d05bfe7fb1c4e4820d762d9af7d313521242876",
"pubkey": "516ac7811d9cee7e7349da83712faa5f1cd99a2302fe8d7cf81702f3dc0cf4c5",
"created_at": 1731656861,
"kind": 1,
"tags": [
[
"t",
"redhotcyber"
],
[
"t",
"hacking"
],
[
"t",
"cti"
],
[
"t",
"ai"
],
[
"t",
"online"
],
[
"t",
"it"
],
[
"t",
"cybercrime"
],
[
"t",
"cybersecurity"
],
[
"t",
"technology"
],
[
"t",
"news"
],
[
"t",
"cyberthreatintelligence"
],
[
"t",
"innovation"
],
[
"t",
"privacy"
],
[
"t",
"engineering"
],
[
"t",
"intelligence"
],
[
"t",
"intelligenzaartificiale"
],
[
"t",
"informationsecurity"
],
[
"t",
"ethicalhacking"
],
[
"t",
"dataprotection"
],
[
"t",
"CyberSecurityAwareness"
],
[
"t",
"cybersecuritytraining"
],
[
"t",
"CyberSecurityNews"
],
[
"t",
"infosecurity"
],
[
"proxy",
"https://mastodon.bida.im/users/redhotcyber/statuses/113485864043015532",
"activitypub"
]
],
"content": "“Algoritmo Criminale”: Il nuovo libro di Pierguido Iezzi che Svela i Segreti del Cybercrime\n\nhttps://www.redhotcyber.com/post/algoritmo-criminale-il-nuovo-libro-di-pierguido-iezzi-che-svela-i-segreti-del-cybercrime/\n\n#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy #engineering #intelligence #intelligenzaartificiale #informationsecurity #ethicalhacking #dataprotection #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #infosecurity",
"sig": "c992a215f4f5004f26b3a0b0c4bcd75f7f31c4d3eee091897e92ad6cf9e7849c03cf2a87cfae0951bd5702a3e93b6d0810923efddd72d6d306be6387d0554d2c"
}