<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Canal Hacker: Resumos semanais]]></title><description><![CDATA[Apanhado do que ocorreu na última semana]]></description><link>https://www.canalhacker.com.br/s/resumos-semanais</link><image><url>https://substackcdn.com/image/fetch/$s_!HPGb!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec97aec-607e-405a-8e2c-b37d5b7817ad_820x820.png</url><title>Canal Hacker: Resumos semanais</title><link>https://www.canalhacker.com.br/s/resumos-semanais</link></image><generator>Substack</generator><lastBuildDate>Wed, 08 Apr 2026 12:01:37 GMT</lastBuildDate><atom:link href="https://www.canalhacker.com.br/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Ricardo]]></copyright><language><![CDATA[pt-br]]></language><webMaster><![CDATA[canalhacker@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[canalhacker@substack.com]]></itunes:email><itunes:name><![CDATA[Ricardo Maganhati]]></itunes:name></itunes:owner><itunes:author><![CDATA[Ricardo Maganhati]]></itunes:author><googleplay:owner><![CDATA[canalhacker@substack.com]]></googleplay:owner><googleplay:email><![CDATA[canalhacker@substack.com]]></googleplay:email><googleplay:author><![CDATA[Ricardo Maganhati]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Resumo da semana - 02/12 a 05/12]]></title><description><![CDATA[Confira o que rolou na semana passada!]]></description><link>https://www.canalhacker.com.br/p/resumo-da-semana-0211-a-0511</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/resumo-da-semana-0211-a-0511</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Mon, 09 Dec 2024 15:08:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!TeDN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffea21dc3-a782-4cf2-ad4f-520fb25544b8_1920x1080.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TeDN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffea21dc3-a782-4cf2-ad4f-520fb25544b8_1920x1080.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TeDN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffea21dc3-a782-4cf2-ad4f-520fb25544b8_1920x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!TeDN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffea21dc3-a782-4cf2-ad4f-520fb25544b8_1920x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!TeDN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffea21dc3-a782-4cf2-ad4f-520fb25544b8_1920x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!TeDN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffea21dc3-a782-4cf2-ad4f-520fb25544b8_1920x1080.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TeDN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffea21dc3-a782-4cf2-ad4f-520fb25544b8_1920x1080.jpeg" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fea21dc3-a782-4cf2-ad4f-520fb25544b8_1920x1080.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:399059,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TeDN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffea21dc3-a782-4cf2-ad4f-520fb25544b8_1920x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!TeDN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffea21dc3-a782-4cf2-ad4f-520fb25544b8_1920x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!TeDN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffea21dc3-a782-4cf2-ad4f-520fb25544b8_1920x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!TeDN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffea21dc3-a782-4cf2-ad4f-520fb25544b8_1920x1080.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://store.playstation.com/pt-br/product/UB0465-CUSA50403_00-0350258928097432</figcaption></figure></div><p>Bom dia, boa tarde e boa noite!</p><p>Confira mais um resumo semanal! Curta e compartilhe!</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;bcd2d577-31ec-425c-9788-74f5b22d02f9&quot;,&quot;caption&quot;:&quot;A hist&#243;ria da tecnologia &#233; marcada por ondas de inova&#231;&#227;o que, inicialmente recebidas com entusiasmo e r&#225;pida ado&#231;&#227;o, posteriormente se consolidam em ferramentas essenciais para o sucesso empresarial.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Resili&#234;ncia Digital: Como as Empresas Enfrentam os Desafios da Era Moderna&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:55689803,&quot;name&quot;:&quot;Iza Turatti&quot;,&quot;bio&quot;:&quot;A vida &#233; meramente ilustrativa de uma ilus&#227;o paralela !!! Desde pequena, sou apaixonada pelo mundo da tecnologia. Escritora contribuinte do https://canalhacker.substack.com&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ee3ca6bc-b1a9-4079-bb1f-0eda062a781d_1239x1239.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-12-02T16:11:10.702Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feaccda33-4824-4bd8-bfcd-77a1e6b475e1_1766x1095.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.canalhacker.com.br/p/resiliencia-digital-como-as-empresas&quot;,&quot;section_name&quot;:&quot;Tecnologia&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:152362999,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Canal Hacker&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec97aec-607e-405a-8e2c-b37d5b7817ad_820x820.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;6978507c-562b-4874-b16b-901604f805c0&quot;,&quot;caption&quot;:&quot;S&#225;bado, 08:00PM.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Di&#225;rio de um Hacker #02&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:96506759,&quot;name&quot;:&quot;Ricardo Maganhati&quot;,&quot;bio&quot;:&quot;Atuo como Especialista em Seguran&#231;a da Informa&#231;&#227;o e criador de conte&#250;do do Canal Hacker, onde gosto de falar sobre coisas do universo tecnol&#243;gico e da ciberseguran&#231;a (fala-se \&quot;saiberseguran&#231;a\&quot; hehe).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b321cb5-cf5f-4dc6-8aaa-8e845150e6da_800x800.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-12-03T05:29:38.977Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5525171a-9cf2-4279-84d0-ca2e09fe51d5_1200x800.webp&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.canalhacker.com.br/p/diario-de-um-hacker-02&quot;,&quot;section_name&quot;:&quot;Di&#225;rio de um Hacker&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:152483172,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Canal Hacker&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec97aec-607e-405a-8e2c-b37d5b7817ad_820x820.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;e4ec0cdc-75c0-4676-8f45-33a348699948&quot;,&quot;caption&quot;:&quot;Nos &#250;ltimos dias, mais precisamente no in&#237;cio do final de semana, l&#225; pelo dia 30 de Novembro de 2024, come&#231;ou a popular em alguns f&#243;runs de discuss&#227;o, algumas ocorr&#234;ncias envolvendo o ICP-Brasil, formalm&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;ICP-Brasil emitiu um certificado SSL em nome de google.com?&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:96506759,&quot;name&quot;:&quot;Ricardo Maganhati&quot;,&quot;bio&quot;:&quot;Atuo como Especialista em Seguran&#231;a da Informa&#231;&#227;o e criador de conte&#250;do do Canal Hacker, onde gosto de falar sobre coisas do universo tecnol&#243;gico e da ciberseguran&#231;a (fala-se \&quot;saiberseguran&#231;a\&quot; hehe).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b321cb5-cf5f-4dc6-8aaa-8e845150e6da_800x800.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-12-03T11:03:07.966Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10cda4ef-12f1-47e0-b7f5-9683c9f23cb8_1024x768.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.canalhacker.com.br/p/icp-brasil-emitiu-um-certificado&quot;,&quot;section_name&quot;:&quot;Ciberseguran&#231;a&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:152429993,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Canal Hacker&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec97aec-607e-405a-8e2c-b37d5b7817ad_820x820.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d3194c6a-40b4-4aa3-aece-ddbb63cf7120&quot;,&quot;caption&quot;:&quot;Mundos dist&#243;picos sempre me fascinaram, mas os que est&#227;o relacionados com a cultura cyberpunk, ah... esses t&#234;m um lugar especial na minha mente. Espero que voc&#234; tamb&#233;m goste!&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Projeto Cryoshell, uma hist&#243;ria em um futuro cyberpunk - Parte 1&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:96506759,&quot;name&quot;:&quot;Ricardo Maganhati&quot;,&quot;bio&quot;:&quot;Atuo como Especialista em Seguran&#231;a da Informa&#231;&#227;o e criador de conte&#250;do do Canal Hacker, onde gosto de falar sobre coisas do universo tecnol&#243;gico e da ciberseguran&#231;a (fala-se \&quot;saiberseguran&#231;a\&quot; hehe).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b321cb5-cf5f-4dc6-8aaa-8e845150e6da_800x800.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-12-05T16:22:03.214Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfb32005-750e-4014-81f0-1b23d8f9f62f_900x506.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.canalhacker.com.br/p/projeto-cryoshell-uma-historia-em&quot;,&quot;section_name&quot;:&quot;Cryoshell&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:152618464,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Canal Hacker&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec97aec-607e-405a-8e2c-b37d5b7817ad_820x820.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;7a0ec3d7-4359-454c-89b3-c7764d1e35d5&quot;,&quot;caption&quot;:&quot;Uma empresa dos EUA com opera&#231;&#245;es na China foi hackeada no in&#237;cio deste ano, como dito pela empresa de seguran&#231;a Symentec. Acredita-se que a empreitada foi cometida por hackers chineses, que mantiverem acesso &#224; rede da empresa por pelo &#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Hackers chineses invadiram empresa dos EUA e mantiveram acesso por meses&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:96506759,&quot;name&quot;:&quot;Ricardo Maganhati&quot;,&quot;bio&quot;:&quot;Atuo como Especialista em Seguran&#231;a da Informa&#231;&#227;o e criador de conte&#250;do do Canal Hacker, onde gosto de falar sobre coisas do universo tecnol&#243;gico e da ciberseguran&#231;a (fala-se \&quot;saiberseguran&#231;a\&quot; hehe).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b321cb5-cf5f-4dc6-8aaa-8e845150e6da_800x800.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-12-06T16:41:43.775Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1cf4232-c741-4e09-a117-cc8cbf174dfb_1920x1080.webp&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.canalhacker.com.br/p/hackers-chineses-invadiram-dos-eua&quot;,&quot;section_name&quot;:&quot;Ciberseguran&#231;a&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:152666029,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Canal Hacker&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec97aec-607e-405a-8e2c-b37d5b7817ad_820x820.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Valeu por voc&#234; estar aqui!</p><p>Recomende o Canal Hacker para quem voc&#234; puder e ajude esta comunidade a crescer ainda mais no segmento de seguran&#231;a da informa&#231;&#227;o brasileiro no Substack!</p><p>#HackThePlanet</p>]]></content:encoded></item><item><title><![CDATA[Resumo da semana - 25/11 a 30/11]]></title><description><![CDATA[O que rolou na &#250;ltima semana]]></description><link>https://www.canalhacker.com.br/p/resumo-da-semana</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/resumo-da-semana</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Sun, 01 Dec 2024 13:00:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ULOf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35a3ffb8-9920-472f-bf27-68c4871ff8ea_2309x1299.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ULOf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35a3ffb8-9920-472f-bf27-68c4871ff8ea_2309x1299.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ULOf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35a3ffb8-9920-472f-bf27-68c4871ff8ea_2309x1299.webp 424w, https://substackcdn.com/image/fetch/$s_!ULOf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35a3ffb8-9920-472f-bf27-68c4871ff8ea_2309x1299.webp 848w, https://substackcdn.com/image/fetch/$s_!ULOf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35a3ffb8-9920-472f-bf27-68c4871ff8ea_2309x1299.webp 1272w, https://substackcdn.com/image/fetch/$s_!ULOf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35a3ffb8-9920-472f-bf27-68c4871ff8ea_2309x1299.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ULOf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35a3ffb8-9920-472f-bf27-68c4871ff8ea_2309x1299.webp" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/35a3ffb8-9920-472f-bf27-68c4871ff8ea_2309x1299.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:127418,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ULOf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35a3ffb8-9920-472f-bf27-68c4871ff8ea_2309x1299.webp 424w, https://substackcdn.com/image/fetch/$s_!ULOf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35a3ffb8-9920-472f-bf27-68c4871ff8ea_2309x1299.webp 848w, https://substackcdn.com/image/fetch/$s_!ULOf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35a3ffb8-9920-472f-bf27-68c4871ff8ea_2309x1299.webp 1272w, https://substackcdn.com/image/fetch/$s_!ULOf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35a3ffb8-9920-472f-bf27-68c4871ff8ea_2309x1299.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos: https://www.tecmundo.com.br/seguranca/260559-conheca-grupos-hackers-perigosos-mundo.htm</figcaption></figure></div><p>Semana foi corrida hein pessoal!</p><p>Confira a seguir o que publicamos nesta semana que passou.</p><p>Hack the Planet!</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;c94e0d83-21a3-4a1d-991d-b63b440c3230&quot;,&quot;caption&quot;:&quot;Esta &#233; uma dica de leitura para um fim de semana qualquer. &#201; um livro que voc&#234; pode ler em uma ou duas idas ao banheiro. Certeza.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Livro: Cowboys do Ciberespa&#231;o&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:96506759,&quot;name&quot;:&quot;Ricardo Maganhati&quot;,&quot;bio&quot;:&quot;Atuo como Especialista em Seguran&#231;a da Informa&#231;&#227;o e criador de conte&#250;do do Canal Hacker, onde gosto de falar sobre coisas do universo tecnol&#243;gico e da cyberseguran&#231;a.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b321cb5-cf5f-4dc6-8aaa-8e845150e6da_800x800.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-11-30T14:54:11.544Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59017321-5d17-4299-9a41-f41cdd7e9a07_453x673.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.canalhacker.com.br/p/livro-cowboys-do-ciberespaco&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:152362225,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Canal Hacker&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec97aec-607e-405a-8e2c-b37d5b7817ad_820x820.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;590ca4ab-afe1-4e52-9fd3-cabe7cf16196&quot;,&quot;caption&quot;:&quot;Vivemos em uma &#233;poca conectada, onde dependemos da tecnologia (e depositamos a confian&#231;a nela) para praticamente tudo. Quando fazemos o pagamento no supermercado, mediante a apresenta&#231;&#227;o de um cart&#227;o, informa&#231;&#245;es trafegam por v&#225;rios servidores at&#233; chegar ao seu banco,&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cyberstorm, um livro de tirar o f&#244;lego!&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:96506759,&quot;name&quot;:&quot;Ricardo Maganhati&quot;,&quot;bio&quot;:&quot;Atuo como Especialista em Seguran&#231;a da Informa&#231;&#227;o e criador de conte&#250;do do Canal Hacker, onde gosto de falar sobre coisas do universo tecnol&#243;gico e da cyberseguran&#231;a.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b321cb5-cf5f-4dc6-8aaa-8e845150e6da_800x800.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-11-29T11:02:21.141Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad74a6a4-4a9b-46de-bfaa-f5c1f8cd5caa_1600x1066.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.canalhacker.com.br/p/cyberstorm-um-livro-de-tirar-o-folego&quot;,&quot;section_name&quot;:&quot;Hackers &amp; Cultura&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:152302349,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Canal Hacker&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec97aec-607e-405a-8e2c-b37d5b7817ad_820x820.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;a37041e5-72c2-4080-8087-1e8a3f67dbea&quot;,&quot;caption&quot;:&quot;Hoje estou anunciando uma novidade ao Substack: o chat de assinantes do Canal Hacker.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Junte-se ao novo chat de assinantes&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:96506759,&quot;name&quot;:&quot;Ricardo Maganhati&quot;,&quot;bio&quot;:&quot;Atuo como Especialista em Seguran&#231;a da Informa&#231;&#227;o e criador de conte&#250;do do Canal Hacker, onde gosto de falar sobre coisas do universo tecnol&#243;gico e da cyberseguran&#231;a.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b321cb5-cf5f-4dc6-8aaa-8e845150e6da_800x800.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-11-28T19:35:27.202Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0f63c9a-2296-4c96-a2f9-52648999bb00_2000x1000.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.canalhacker.com.br/p/junte-se-ao-novo-chat-de-assinantes&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:152297349,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Canal Hacker&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec97aec-607e-405a-8e2c-b37d5b7817ad_820x820.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;f80aa133-967b-469e-be8b-aff6fb684892&quot;,&quot;caption&quot;:&quot;Grupos de Hackers. Muitas pessoas s&#227;o curiosas sobre a forma como eles atuam. Grande parte dessa curiosidade surge por conta de cenas criadas em filmes e seriados, al&#233;m de livros de fic&#231;&#227;o: Grupos an&#244;nimos, reunidos em algum local desconhecido, cada me&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Como atuam os grupos de Hackers na Darknet?&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:96506759,&quot;name&quot;:&quot;Ricardo Maganhati&quot;,&quot;bio&quot;:&quot;Atuo como Especialista em Seguran&#231;a da Informa&#231;&#227;o e criador de conte&#250;do do Canal Hacker, onde gosto de falar sobre coisas do universo tecnol&#243;gico e da cyberseguran&#231;a.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b321cb5-cf5f-4dc6-8aaa-8e845150e6da_800x800.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-11-28T19:17:52.095Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F468d4eca-6462-44d8-ac83-512574c7e097_1000x480.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.canalhacker.com.br/p/como-atuam-os-grupos-de-hackers-na&quot;,&quot;section_name&quot;:&quot;Hackers &amp; Cultura&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:152296996,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Canal Hacker&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec97aec-607e-405a-8e2c-b37d5b7817ad_820x820.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;90ffdffc-ccfe-4c58-9376-c949791b838e&quot;,&quot;caption&quot;:&quot;A primeira planta industrial do mundo que utiliza o calor solar para produzir combust&#237;vel foi inaugurada a recentemente na Alemanha. Utilizando uma vasta gama de espelhos que concentram o calor do sol em uma torre, o criador da tecnologia, a empresa Synhelion, planeja utilizar o seu processo para produzir &#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Combust&#237;vel: Ser&#225; poss&#237;vel produzir &#224; partir da energia solar?&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:96506759,&quot;name&quot;:&quot;Ricardo Maganhati&quot;,&quot;bio&quot;:&quot;Atuo como Especialista em Seguran&#231;a da Informa&#231;&#227;o e criador de conte&#250;do do Canal Hacker, onde gosto de falar sobre coisas do universo tecnol&#243;gico e da cyberseguran&#231;a.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b321cb5-cf5f-4dc6-8aaa-8e845150e6da_800x800.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-11-28T19:05:29.839Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3c661c1-5077-449b-8785-249e74c7e268_2500x1838.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.canalhacker.com.br/p/combustivel-sera-possivel-produzir&quot;,&quot;section_name&quot;:&quot;Hackers &amp; Cultura&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:152296543,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Canal Hacker&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec97aec-607e-405a-8e2c-b37d5b7817ad_820x820.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;f7985a31-dfce-491b-a109-170f9fb59129&quot;,&quot;caption&quot;:&quot;Provavelmente voc&#234; deve conhecer esta s&#233;rie por meio do site &#8220;O Analista&#8221;, que teve seu in&#237;cio l&#225; em meados de 2015. Na verdade, o Canal Hacker &#233; O Analista. Foi apenas uma mudan&#231;a de nome, tanto que, se voc&#234; digit&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Di&#225;rio de um Hacker #01&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:96506759,&quot;name&quot;:&quot;Ricardo Maganhati&quot;,&quot;bio&quot;:&quot;Atuo como Especialista em Seguran&#231;a da Informa&#231;&#227;o e criador de conte&#250;do do Canal Hacker, onde gosto de falar sobre coisas do universo tecnol&#243;gico e da cyberseguran&#231;a.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b321cb5-cf5f-4dc6-8aaa-8e845150e6da_800x800.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-11-28T15:04:25.803Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93cf587e-f2ec-440b-a27b-fcfa35349b2b_984x637.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.canalhacker.com.br/p/diario-de-um-hacker-01-343&quot;,&quot;section_name&quot;:&quot;Di&#225;rio de um Hacker&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:152253491,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Canal Hacker&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec97aec-607e-405a-8e2c-b37d5b7817ad_820x820.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;0545c066-a5a3-4c94-90cf-b3e0f21f8f77&quot;,&quot;caption&quot;:&quot;&#201; com muito prazer que estamos mudando aos poucos para o Substack! &#201; uma ferramenta foda que mistura sistema de blogs e rede social. Tudo o que a gente precisa pra estar mais perto de voc&#234;!&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Estamos no Substack!&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:96506759,&quot;name&quot;:&quot;Ricardo Maganhati&quot;,&quot;bio&quot;:&quot;Atuo como Especialista em Seguran&#231;a da Informa&#231;&#227;o e criador de conte&#250;do do Canal Hacker, onde gosto de falar sobre coisas do universo tecnol&#243;gico e da cyberseguran&#231;a.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b321cb5-cf5f-4dc6-8aaa-8e845150e6da_800x800.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-11-27T18:10:12.482Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37793b14-ce98-46d8-8b1b-e6452d3ea7ce_740x370.webp&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.canalhacker.com.br/p/coming-soon&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:152251218,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Canal Hacker&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec97aec-607e-405a-8e2c-b37d5b7817ad_820x820.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;e9dab9c9-f013-46a5-b8d3-ceb5f4a96246&quot;,&quot;caption&quot;:&quot;Parece que voltamos no tempo e voc&#234; vai entender. Em 2015, terroristas mataram cerca de 14 pessoas (e feriram tantas outras) numa festa em San Bernardino, California. Ap&#243;s esse fato, o FBI iniciou uma investiga&#231;&#227;o intensa na vida dos terroristas, e nesse meio, os seus celulares. Mais precisamen&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;FBI alega que criptografia dificulta a extra&#231;&#227;o de dados de celular&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:96506759,&quot;name&quot;:&quot;Ricardo Maganhati&quot;,&quot;bio&quot;:&quot;Atuo como Especialista em Seguran&#231;a da Informa&#231;&#227;o e criador de conte&#250;do do Canal Hacker, onde gosto de falar sobre coisas do universo tecnol&#243;gico e da cyberseguran&#231;a.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b321cb5-cf5f-4dc6-8aaa-8e845150e6da_800x800.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-08-02T14:38:48.000Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a5baa9-05bd-4fd5-b0cd-5a05eef54573_1020x574.webp&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.canalhacker.com.br/p/fbi-alega-que-criptografia-dificulta-a-extracao-de-dados-de-celular&quot;,&quot;section_name&quot;:&quot;Ciberseguran&#231;a&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:152289859,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Canal Hacker&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec97aec-607e-405a-8e2c-b37d5b7817ad_820x820.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;2facdeb7-339c-4400-8d14-1d5020fbc554&quot;,&quot;caption&quot;:&quot;Cibercriminosos est&#227;o utilizando modelos de linguagem de larga escala (Large Language Models ou simplesmente LLMs) de IA para criar c&#243;digo malicioso, que &#233; entregue por e-mails de phishing, fazem download de outros payloads/recursos, incluindo amea&#231;as como o had&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;IA: Est&#227;o automatizando a cria&#231;&#227;o de ataques cibern&#233;ticos&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:96506759,&quot;name&quot;:&quot;Ricardo Maganhati&quot;,&quot;bio&quot;:&quot;Atuo como Especialista em Seguran&#231;a da Informa&#231;&#227;o e criador de conte&#250;do do Canal Hacker, onde gosto de falar sobre coisas do universo tecnol&#243;gico e da cyberseguran&#231;a.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b321cb5-cf5f-4dc6-8aaa-8e845150e6da_800x800.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-07-30T15:41:33.000Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c0e593-4926-4d72-b0b2-4310e550709b_1253x835.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.canalhacker.com.br/p/ia-estao-automatizando-a-criacao-de-ataques-ciberneticos&quot;,&quot;section_name&quot;:&quot;Hackers &amp; Cultura&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:152289861,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Canal Hacker&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec97aec-607e-405a-8e2c-b37d5b7817ad_820x820.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;140e4897-cde0-43f3-90b8-5e27dbd63c85&quot;,&quot;caption&quot;:&quot;A OpenAI acaba de anunciar o lan&#231;amento do SearchGPT, o prot&#243;tipo de um buscador feito para revolucionar a forma como as pessoas pesquisam informa&#231;&#245;es na Internet.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;SearchGPT: OpenAI lan&#231;a o seu buscador&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:96506759,&quot;name&quot;:&quot;Ricardo Maganhati&quot;,&quot;bio&quot;:&quot;Atuo como Especialista em Seguran&#231;a da Informa&#231;&#227;o e criador de conte&#250;do do Canal Hacker, onde gosto de falar sobre coisas do universo tecnol&#243;gico e da cyberseguran&#231;a.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b321cb5-cf5f-4dc6-8aaa-8e845150e6da_800x800.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-07-26T16:22:58.000Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3edd516c-d3a5-4eeb-b21a-8ecf4cb23fdb_1440x771.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.canalhacker.com.br/p/searchgpt-openai-lanca-o-seu-buscador&quot;,&quot;section_name&quot;:&quot;Hackers &amp; Cultura&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:152290094,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Canal Hacker&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec97aec-607e-405a-8e2c-b37d5b7817ad_820x820.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;57c21915-8903-4beb-89da-b4548412ec58&quot;,&quot;caption&quot;:&quot;E tempos onde a gera&#231;&#227;o de imagens por IA j&#225; est&#225; ao alcance das massas (e com as elei&#231;&#245;es chegando a&#237; no Brasil), a capacidade de poder detectar imagens falsas (Deepfake) &#233; algo realmente importante.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Deepfake, sabe como identificar? Olhe para as estrelas (dos olhos)&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:96506759,&quot;name&quot;:&quot;Ricardo Maganhati&quot;,&quot;bio&quot;:&quot;Atuo como Especialista em Seguran&#231;a da Informa&#231;&#227;o e criador de conte&#250;do do Canal Hacker, onde gosto de falar sobre coisas do universo tecnol&#243;gico e da cyberseguran&#231;a.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b321cb5-cf5f-4dc6-8aaa-8e845150e6da_800x800.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-07-20T03:42:48.000Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9899dbc-3764-4586-85ea-473f076a4477_850x513.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.canalhacker.com.br/p/deepfake-sabe-como-identificar-olhe-para-as-estrelas-dos-olhos&quot;,&quot;section_name&quot;:&quot;Hackers &amp; Cultura&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:152290096,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Canal Hacker&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec97aec-607e-405a-8e2c-b37d5b7817ad_820x820.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;2b81477c-4645-40b8-a5e3-0ba8c7bc3fb0&quot;,&quot;caption&quot;:&quot;(SS7) Um dos assuntos que sempre gostei, desde quando comecei a me interessar por tecnologia, foi a telefonia. Junte isso com o tema hacking e voc&#234; ter&#225; um terreno f&#233;rtil para o aprendizado e das possibilidades (se &#233; que me entendem). Com o SS7 n&#227;o &#233; diferente.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;SS7: Redes de telefonia m&#243;vel est&#227;o vulner&#225;veis?&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:96506759,&quot;name&quot;:&quot;Ricardo Maganhati&quot;,&quot;bio&quot;:&quot;Atuo como Especialista em Seguran&#231;a da Informa&#231;&#227;o e criador de conte&#250;do do Canal Hacker, onde gosto de falar sobre coisas do universo tecnol&#243;gico e da cyberseguran&#231;a.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b321cb5-cf5f-4dc6-8aaa-8e845150e6da_800x800.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-07-15T05:15:19.000Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/07701051-0f2f-459d-bb23-18149c9e2689_1024x697.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.canalhacker.com.br/p/ss7-redes-de-telefonia-movel-estao-vulneraveis&quot;,&quot;section_name&quot;:&quot;Hackers &amp; Cultura&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:152289867,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Canal Hacker&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec97aec-607e-405a-8e2c-b37d5b7817ad_820x820.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div>]]></content:encoded></item></channel></rss>