<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://technocratico.it/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://technocratico.it/2023/05/le-scuole-americane-riconsiderano-chatgpt-dalla-condanna-allopportunita-educativa/</loc><lastmod>2026-03-05T15:18:02+00:00</lastmod></url><url><loc>https://technocratico.it/2023/05/il-malware-guerrilla-infetta-quasi-9-milioni-di-dispositivi-android-in-tutto-il-mondo/</loc><lastmod>2026-03-05T15:18:02+00:00</lastmod></url><url><loc>https://technocratico.it/2023/05/hashtag-instagram-down-uninterruzione-di-servizio-su-scala-mondiale/</loc><lastmod>2026-03-05T15:18:02+00:00</lastmod></url><url><loc>https://technocratico.it/2024/07/conflitto-ucrania-fallimento-tecnologico-nel-cyberwarfare-le-glsdb-respinte-dal-fronte-ucraino/</loc><lastmod>2026-03-05T15:18:01+00:00</lastmod></url><url><loc>https://technocratico.it/2024/07/allarme-cybersicurezza-leuropa-di-fronte-alla-crescente-minaccia-degli-attacchi-hacker/</loc><lastmod>2026-03-05T15:18:01+00:00</lastmod></url><url><loc>https://technocratico.it/2024/07/aggiornamenti-microsoft-luglio-2024-42-vulnerabilita-tra-cui-quattro-zero-day-di-cui-due-gia-attivamente-sfruttate/</loc><lastmod>2026-03-05T15:18:01+00:00</lastmod></url><url><loc>https://technocratico.it/2024/07/insider-analisi-tecnica-della-violazione-dei-sistemi-di-openai-nel-2023/</loc><lastmod>2026-03-05T15:18:00+00:00</lastmod></url><url><loc>https://technocratico.it/2024/07/analisi-approfondita-dellattacco-informatico-a-nato-tide-implicazioni-cybersecurity-e-geopolitiche/</loc><lastmod>2026-03-05T15:17:16+00:00</lastmod></url><url><loc>https://technocratico.it/2024/07/crypto-archeologia-come-due-hacker-hanno-recuperato-3-milioni-di-dollari-in-bitcoin-sfruttando-una-vulnerabilita-di-11-anni-fa/</loc><lastmod>2026-03-05T15:17:16+00:00</lastmod></url><url><loc>https://technocratico.it/2024/07/teamviewer-e-stato-attaccato-ed-hackerato-preoccupazioni-per-i-dati-e-lintegrita-di-oltre-600-000-clienti-globali/</loc><lastmod>2026-03-05T15:17:15+00:00</lastmod></url><url><loc>https://technocratico.it/2024/09/i-rischi-nascosti-dellintelligenza-artificiale-analisi-tecnica/</loc><lastmod>2026-03-05T15:17:14+00:00</lastmod></url><url><loc>https://technocratico.it/2024/09/direttiva-nis2-nuove-frontiere-della-cybersicurezza-europea-e-le-sfide-tecniche-per-le-aziende/</loc><lastmod>2026-03-05T15:17:14+00:00</lastmod></url><url><loc>https://technocratico.it/2024/09/auto-elettriche-cinesi-privacy-e-rischi-cyber/</loc><lastmod>2026-03-05T15:17:15+00:00</lastmod></url><url><loc>https://technocratico.it/2024/10/panorama-delle-minacce-informatiche-nella-sicurezza-globale/</loc><lastmod>2026-03-05T15:17:14+00:00</lastmod></url><url><loc>https://technocratico.it/2024/09/cybersicurezza-e-settore-bancario-minacce-e-strategie-di-difesa/</loc><lastmod>2026-03-05T15:17:15+00:00</lastmod></url><url><loc>https://technocratico.it/2024/10/cve-2024-3094-analisi-della-vulnerabilita-zero-click-che-minaccia-700-000-router-draytek/</loc><lastmod>2026-03-05T15:17:14+00:00</lastmod></url><url><loc>https://technocratico.it/2024/10/t-mobile-e-la-sfida-della-cybersicurezza-lezioni-dalla-sanzione-record-della-fcc-e-il-futuro-della-protezione-dati-nelle-telecomunicazioni/</loc><lastmod>2026-03-05T15:17:13+00:00</lastmod></url><url><loc>https://technocratico.it/2024/10/sequestro-di-107-domini-russi-un-colpo-alla-cybercriminalita-di-stato/</loc><lastmod>2026-03-05T15:17:13+00:00</lastmod></url><url><loc>https://technocratico.it/2024/10/attacco-mirato-a-gmail-e-microsoft-hacker-bypassano-lautenticazione-a-due-fattori-con-piattaforme-di-phishing/</loc><lastmod>2026-03-05T15:17:13+00:00</lastmod></url><url><loc>https://technocratico.it/2024/10/capire-lattacco-hacker-che-ha-colpito-i-media-statali-russi-durante-il-compleanno-di-putin/</loc><lastmod>2026-03-05T15:17:13+00:00</lastmod></url><url><loc>https://technocratico.it/2024/10/zero-day-alert-tre-vulnerabilita-critiche-ivanti-csa-attivamente-sfruttate/</loc><lastmod>2026-03-05T15:17:13+00:00</lastmod></url><url><loc>https://technocratico.it/2024/10/data-breach-allinternet-archive-compromette-31-milioni-di-utenti/</loc><lastmod>2026-03-05T15:17:12+00:00</lastmod></url><url><loc>https://technocratico.it/2024/10/la-doppia-faccia-della-cyber-guerra-nelle-architetture-scada-supervisory-control-and-data-acquisition/</loc><lastmod>2026-03-05T15:17:12+00:00</lastmod></url><url><loc>https://technocratico.it/2024/10/larma-a-doppio-taglio-nella-guerra-informatica-il-caso-marriott/</loc><lastmod>2026-03-05T15:17:12+00:00</lastmod></url><url><loc>https://technocratico.it/2024/10/due-persone-comunicano-nei-loro-sogni-gli-scienziati-raggiungono-un-traguardo-mondiale/</loc><lastmod>2026-03-05T15:17:12+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/un-ritorno-al-contenuto-puro-perche-ho-scelto-di-eliminare-le-immagini-dal-mio-blog/</loc><lastmod>2026-03-05T15:17:11+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/cisa-nuove-direttive-per-la-sicurezza-del-cloud-federale-nuova-direttiva-binding-operational-directive-bod-24-01/</loc><lastmod>2026-03-05T15:17:11+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/crescita-esponenziale-delle-attivita-di-hacking-legate-alla-corea-del-nord-il-61-delle-criptovalute-rubate-nel-2024/</loc><lastmod>2026-03-05T15:16:50+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/cisa-pubblica-a-dicembre-2024-la-bozza-del-national-cyber-incident-response-plan-un-avanzamento-strategico-nella-resilienza-cibernetica/</loc><lastmod>2026-03-05T15:16:50+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/cyberattacchi-tra-cina-e-stati-uniti-nuove-accuse-e-analisi-tecnica/</loc><lastmod>2026-03-05T15:16:50+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/fortinet-segnala-una-vulnerabilita-critica-in-fortiwlm-rischio-di-accesso-amministrativo-non-autorizzato/</loc><lastmod>2026-03-05T15:16:50+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/gli-attacchi-russi-ai-sistemi-rdp-unanalisi-accademica-avanzata/</loc><lastmod>2026-03-05T15:16:50+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/mut-1244-un-attacco-mirato-ai-ricercatori-di-sicurezza-con-implicazioni-su-aws-wordpress-e-furto-di-dati/</loc><lastmod>2026-03-05T15:16:49+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/backdoor-php-glutton-una-nuova-arma-dellapt41-per-attacchi-mirati/</loc><lastmod>2026-03-05T15:16:49+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/grave-vulnerabilita-in-apache-struts-cve-2024-53677-rischi-e-implicazioni-per-la-sicurezza/</loc><lastmod>2026-03-05T15:16:49+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/attacco-a-microsoft-teams-e-azure-devops-vulnerabilita-sfruttate-dai-cybercriminali/</loc><lastmod>2026-03-05T15:16:49+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/uac-0125-la-nuova-frontiera-degli-attacchi-cyber-sfrutta-cloudflare-workers-per-infrastrutture-malevole/</loc><lastmod>2026-03-05T15:16:49+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/aumento-degli-attacchi-hacker-nel-settore-delle-criptovalute-perdite-finanziarie-stimate-in-22-miliardi-di-dollari/</loc><lastmod>2026-03-05T15:16:49+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/possibile-ban-dei-router-tp-link-negli-stati-uniti-le-implicazioni-di-sicurezza/</loc><lastmod>2026-03-05T15:16:49+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/apple-avvisa-gli-utenti-di-iphone-nuovi-attacchi-spyware-in-corso/</loc><lastmod>2026-03-05T15:16:48+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/nuove-regole-di-disclosure-della-sec-incremento-del-60-negli-incidenti-di-cybersecurity-segnalati/</loc><lastmod>2026-03-05T15:16:48+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/la-nuova-era-della-cybersecurity-sfruttare-il-potere-dellintelligenza-artificiale-generativa/</loc><lastmod>2026-03-05T15:16:48+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/falla-di-sicurezza-in-cisco-dati-aziendali-compromessi-e-pubblicati-su-breach-forums/</loc><lastmod>2026-03-05T15:16:48+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/ray-ban-meta-design-elegante-ma-importanti-questioni-su-privacy-sicurezza-dei-dati-e-conformita-normativa/</loc><lastmod>2026-03-05T15:16:48+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/la-guardia-di-finanza-adotta-siti-esca-per-contrastare-la-pirateria-iptv/</loc><lastmod>2026-03-05T15:16:48+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/lia-contro-i-captcha-sfide-e-prospettive-per-la-sicurezza-online/</loc><lastmod>2026-03-05T15:16:47+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/chatgpt-e-la-grande-interruzione-del-26-dicembre-2024-analisi-chiara-ed-avanzata-dellincidente/</loc><lastmod>2026-03-05T15:16:47+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/lockbit-developer-rostislav-panev-accusato-negli-stati-uniti-per-danni-globali-da-ransomware/</loc><lastmod>2026-03-05T15:16:16+00:00</lastmod></url><url><loc>https://technocratico.it/2024/12/cyberhaven-estensione-chrome-di-unazienda-di-cybersecurity-compromessa-e-usata-per-rubare-dati-utente/</loc><lastmod>2026-03-05T15:16:16+00:00</lastmod></url><url><loc>https://technocratico.it/2026/02/moltbook-gli-agenti-di-intelligenza-artificiale-possono-ribellarsi/</loc><lastmod>2026-03-05T15:16:16+00:00</lastmod></url><url><loc>https://technocratico.it/2026/02/iphone-sotto-attacco-quando-una-semplice-immagine-puo-compromettere-tutto/</loc><lastmod>2026-03-05T15:16:16+00:00</lastmod></url><url><loc>https://technocratico.it/2026/02/controlli-veri-o-teatro-della-sicurezza-ora-puoi-scegliere/</loc><lastmod>2026-03-05T15:16:15+00:00</lastmod></url><url><loc>https://technocratico.it/2026/02/hacking-ia-nessun-dorma-pochi-secondi-per-entrare-due-minuti-per-prendere-il-controllo-tutto-pochi-istanti-dopo-la-pubblicazione-della-vulnerabilita/</loc><lastmod>2026-03-05T15:16:15+00:00</lastmod></url><url><loc>https://technocratico.it/2026/02/quando-la-scansione-trimestrale-diventa-un-rituale-vuoto/</loc><lastmod>2026-03-05T15:16:15+00:00</lastmod></url><url><loc>https://technocratico.it/2026/02/laccesso-che-resta-aperto-la-vera-fragilita-nascosta-dietro-iso-27001/</loc><lastmod>2026-03-05T15:16:15+00:00</lastmod></url><url><loc>https://technocratico.it/2026/02/vulnerabilita-note-incidenti-annunciati-cosa-chiede-davvero-nis2/</loc><lastmod>2026-03-05T15:16:15+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/la-checklist-che-rassicura-e-quella-che-governa/</loc><lastmod>2026-03-05T15:16:14+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/quando-un-robot-aspirapolvere-diventa-una-falla-sistemica/</loc><lastmod>2026-03-05T15:16:14+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/quand-un-robot-aspirateur-devient-une-faille-systemique/</loc><lastmod>2026-03-06T08:05:39+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/lambito-che-nessuno-misura-il-perimetro-di-sicurezza/</loc><lastmod>2026-03-05T15:16:14+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/il-rischio-che-non-dichiari-e-quello-che-ti-colpira/</loc><lastmod>2026-03-05T15:16:14+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/%f0%9f%87%ae%f0%9f%87%b9-cyber-warfare-usa-vs-iran/</loc><lastmod>2026-03-05T15:16:13+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/%f0%9f%87%ab%f0%9f%87%b7-cyber-warfare-usa-vs-iran/</loc><lastmod>2026-03-06T08:04:46+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/la-difference-entre-se-proteger-et-paraitre-protege/</loc><lastmod>2026-03-06T08:05:15+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/la-differenza-tra-proteggersi-e-sembrare-protetti/</loc><lastmod>2026-03-05T15:16:13+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/implementazione-di-dora-una-timeline-della-resilienza-digitale-europea/</loc><lastmod>2026-03-05T15:16:13+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/mise-en-oeuvre-de-dora-une-chronologie-de-la-resilience-numerique-europeenne/</loc><lastmod>2026-03-06T08:03:59+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/quando-il-numero-non-basta-la-differenza-tra-metrica-e-governo/</loc><lastmod>2026-03-06T08:07:10+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/quand-le-nombre-ne-suffit-pas-la-difference-entre-metrique-et-gouvernance/</loc><lastmod>2026-03-06T08:03:17+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/il-ciso-as-a-service-quando-la-sicurezza-diventa-infrastruttura-strategica/</loc><lastmod>2026-03-06T15:33:10+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/le-ciso-as-a-service-quand-la-securite-devient-une-infrastructure-strategique/</loc><lastmod>2026-03-06T15:40:23+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/ciso-as-a-service-when-security-becomes-strategic-infrastructure/</loc><lastmod>2026-03-06T16:10:20+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/quando-il-cielo-cade-su-teheran-cyberguerra-dipendenze-infrastrutturali-e-il-campo-di-battaglia-invisibile-che-nessuno-sta-guardando/</loc><lastmod>2026-03-09T16:24:53+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/when-the-sky-falls-on-tehran-cyberwar-infrastructure-dependencies-and-the-invisible-battlefield-nobody-is-watching/</loc><lastmod>2026-03-09T16:44:55+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/cuando-el-cielo-cae-sobre-teherancuando-el-cielo-cae-sobre-teheran-ciberguerra-dependencias-de-infraestructura-y-el-campo-de-batalla-invisible-que-nadie-esta-mirando/</loc><lastmod>2026-03-10T18:07:44+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/%f0%9f%87%ab%f0%9f%87%b7-quand-le-ciel-tombe-sur-teheran-cyberguerre-dependances-infrastructurelles-et-le-champ-de-bataille-invisible-que-personne-ne-regarde/</loc><lastmod>2026-03-09T16:40:50+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/the-death-of-the-ciso/</loc><lastmod>2026-03-10T18:11:58+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/la-morte-del-ciso/</loc><lastmod>2026-03-10T18:11:01+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/la-mort-du-ciso/</loc><lastmod>2026-03-10T18:10:38+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/la-muerte-del-ciso/</loc><lastmod>2026-03-10T18:09:59+00:00</lastmod></url><url><loc>https://technocratico.it/2026/03/when-systems-obey-stryker-handala-and-the-collapse-of-the-cybersecurity-illusion/</loc><lastmod>2026-03-18T14:30:28+00:00</lastmod></url></urlset>
