u/EkRafz

La Repubblica broke this yesterday. The target was Sistemi Informativi, an IBM-owned company that runs IT infrastructure for Italian ministries, INPS, INAIL, national cloud, and several PNRR (EU recovery fund) projects. Essentially a single point of failure for a large chunk of Italy's public sector.

IBM confirmed the incident. This looks like intelligence gathering. Services are reportedly restored but scope of exfiltration is unknown.

Attribution to a Chinese state-linked group is being reported by Italian media but hasn't been formally confirmed by government or a major threat intel vendor yet.

Sources: https://www.repubblica.it/tecnologia/2026/05/03/news/esclusivo_pa_italiana_e_non_solo_attaccata_da_un_gruppo_di_hacker_cinesi-425320702/
https://securityaffairs.com/191638/apt/salt-typhoon-breach-ibm-subsidiary-in-italy-a-warning-for-europes-digital-defenses.html

u/EkRafz — 11 days ago

I'm learning cybersecurity and recently completed Bandit on OverTheWire, a platform where you solve terminal-based challenges to learn Linux fundamentals and security concepts.

So I wrote a structured walkthroughs that explain why each command works, where to find the information (man pages, flags, etc.), and what the key takeaways are(not just what to type).

I haven't put any passwords in the repo in compliance to the OverTheWire rules.

Bandit (Levels 0–33) is fully covered. I'm actively working through the other wargames.

Here is the link: https://github.com/EkRafz/OverTheWire---Walkthroughs

PS: If you spot any errors, typos, or anything that could be explained better, please point it out.

u/EkRafz — 12 days ago