{"id":29773,"date":"2025-11-13T16:00:11","date_gmt":"2025-11-13T15:00:11","guid":{"rendered":"https:\/\/tinextadefence.it\/?p=29773"},"modified":"2025-11-13T16:00:11","modified_gmt":"2025-11-13T15:00:11","slug":"uses-and-abuses-of-ebpf-threats-detection-techniques-and-countermeasures-part-1","status":"publish","type":"post","link":"https:\/\/tinextadefence.it\/en\/uses-and-abuses-of-ebpf-threats-detection-techniques-and-countermeasures-part-1\/","title":{"rendered":"Uses and abuses of eBPF: threats, detection techniques and countermeasures - Part 1"},"content":{"rendered":"<p><span data-contrast=\"auto\">Originally designed to optimise the performance of Linux systems, the\u00a0<\/span><b><span data-contrast=\"auto\">eBPF<\/span><\/b><span data-contrast=\"auto\">\u00a0(<\/span><i><span data-contrast=\"auto\">extended Berkeley Packet Filter<\/span><\/i><span data-contrast=\"auto\">) has rapidly established itself as a strategic component in\u00a0<\/span><b><span data-contrast=\"auto\">computer security<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Versatility, execution privileges and code verification make<\/span><b><span data-contrast=\"auto\">\u00a0eBPF<\/span><\/b><span data-contrast=\"auto\">\u00a0an extremely useful tool for collecting detailed information in real time, without compromising the stability of the kernel. However, it is precisely these characteristics that make it a particularly suitable technology for the realisation of\u00a0<\/span><b><span data-contrast=\"auto\">malicious implants<\/span><\/b><span data-contrast=\"auto\">such as the\u00a0<\/span><b><span data-contrast=\"auto\">rootkit<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">With the increasing adoption of eBPFs in tools for monitoring, networking and runtime protection, the available attack surface is progressively widening and the risk of abuse is no longer theoretical, but\u00a0<\/span><span data-contrast=\"auto\">concretely applicable,<\/span><span data-contrast=\"auto\">\u00a0especially in environments\u00a0<\/span><b><span data-contrast=\"auto\">containerised<\/span><\/b><span data-contrast=\"auto\">\u00a0and\u00a0<\/span><b><span data-contrast=\"auto\">multi-tenant<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Next\u2019s\u00a0<\/span><b><span data-contrast=\"auto\">new DFIR study<\/span><\/b><span data-contrast=\"auto\">\u00a0thus opens a series of publications dedicated to the analysis of eBPF abuse in an offensive context, with the aim of:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"-\" data-font=\"Aptos\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Aptos&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">explore the malicious potential of eBPF programmes;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"-\" data-font=\"Aptos\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Aptos&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">outline possible detection and mitigation methodologies;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"-\" data-font=\"Aptos\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Aptos&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">present techniques and tools useful for DFIR teams and SOC centres to detect eBPF rootkit activities.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">In this first publication, we offer a theoretical overview of scenarios in which the offensive use of eBPF offers concrete advantages to malicious actors, with references to academic studies and malware used in real-life activities.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">If you wish to learn more, here is the link to our\u00a0<\/span><a href=\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/11\/Report_usi_abusi_eBPF_parte_1.pdf\"><b><span data-contrast=\"none\">comprehensive study<\/span><\/b><\/a><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">In addition, you can subscribe to the specific mailing list\u00a0<\/span><b><span data-contrast=\"none\">Cyber Studios by Tinexta Defence<\/span><\/b><span data-contrast=\"none\">to receive updates on upcoming research:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/tinextadefence.it\/en\/cyber-studios-mailing-list\/\"><span data-contrast=\"none\">https:\/\/tinextadefence.it\/mailing-list-cyber-studios\/<\/span><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Originally designed to optimise the performance of Linux systems, eBPF (Extended Berkeley Packet Filter) technology has quickly established itself as a strategic component in the field of computer security.  Versatility, execution privileges and code verification make eBPF an extremely useful tool for gathering detailed information in real time, without compromising the stability of the kernel. However, it is precisely these features that make it a [...]<\/p>","protected":false},"author":7,"featured_media":29769,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[102],"tags":[],"class_list":["post-29773","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tinextadefencebusiness"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Usi e abusi di eBPF: minacce, tecniche di rilevamento e contromisure \u2013 parte 1 - Tinexta Defence<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tinextadefence.it\/en\/uses-and-abuses-of-ebpf-threats-detection-techniques-and-countermeasures-part-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Usi e abusi di eBPF: minacce, tecniche di rilevamento e contromisure \u2013 parte 1 - Tinexta Defence\" \/>\n<meta property=\"og:description\" content=\"Originariamente progettata per ottimizzare le prestazioni dei sistemi Linux, la tecnologia\u00a0eBPF\u00a0(extended\u00a0Berkeley\u00a0Packet\u00a0Filter) si \u00e8 rapidamente affermata come un componente strategico in ambito\u00a0di\u00a0sicurezza informatica.\u00a0 Versatilit\u00e0, privilegi di esecuzione e verifica del codice rendono\u00a0eBPF\u00a0uno strumento estremamente utile per la raccolta di informazioni dettagliate in tempo reale, senza compromettere la stabilit\u00e0 del kernel.\u00a0Tuttavia,\u00a0sono proprio queste caratteristiche a renderla una [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tinextadefence.it\/en\/uses-and-abuses-of-ebpf-threats-detection-techniques-and-countermeasures-part-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Tinexta Defence\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-13T15:00:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/11\/Business_evidenza.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Federica Casadei\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Federica Casadei\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/\"},\"author\":{\"name\":\"Federica Casadei\",\"@id\":\"https:\/\/tinextadefence.it\/#\/schema\/person\/0dc89f3eeaa8cd7b7c354b61c84d164d\"},\"headline\":\"Usi e abusi di eBPF: minacce, tecniche di rilevamento e contromisure \u2013 parte 1\",\"datePublished\":\"2025-11-13T15:00:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/\"},\"wordCount\":257,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/tinextadefence.it\/#organization\"},\"image\":{\"@id\":\"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/11\/Business_evidenza.jpg\",\"articleSection\":[\"#TDefenceBusiness\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/\",\"url\":\"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/\",\"name\":\"Usi e abusi di eBPF: minacce, tecniche di rilevamento e contromisure \u2013 parte 1 - Tinexta Defence\",\"isPartOf\":{\"@id\":\"https:\/\/tinextadefence.it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/11\/Business_evidenza.jpg\",\"datePublished\":\"2025-11-13T15:00:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/#primaryimage\",\"url\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/11\/Business_evidenza.jpg\",\"contentUrl\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/11\/Business_evidenza.jpg\",\"width\":1800,\"height\":960},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tinextadefence.it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Usi e abusi di eBPF: minacce, tecniche di rilevamento e contromisure \u2013 parte 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tinextadefence.it\/#website\",\"url\":\"https:\/\/tinextadefence.it\/\",\"name\":\"Tinexta Defence\",\"description\":\"think next, protect now\",\"publisher\":{\"@id\":\"https:\/\/tinextadefence.it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tinextadefence.it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/tinextadefence.it\/#organization\",\"name\":\"Tinexta Defence\",\"url\":\"https:\/\/tinextadefence.it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/tinextadefence.it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_marchio.png\",\"contentUrl\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_marchio.png\",\"width\":2000,\"height\":990,\"caption\":\"Tinexta Defence\"},\"image\":{\"@id\":\"https:\/\/tinextadefence.it\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/tinextadefence.it\/#\/schema\/person\/0dc89f3eeaa8cd7b7c354b61c84d164d\",\"name\":\"Federica Casadei\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/tinextadefence.it\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6b35becb35fb83a681c7b431c36de302b4101b5ef0c48984910308c04617428f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6b35becb35fb83a681c7b431c36de302b4101b5ef0c48984910308c04617428f?s=96&d=mm&r=g\",\"caption\":\"Federica Casadei\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Uses and abuses of eBPF: threats, detection techniques and countermeasures - Part 1 - Tinexta Defence","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tinextadefence.it\/en\/uses-and-abuses-of-ebpf-threats-detection-techniques-and-countermeasures-part-1\/","og_locale":"en_GB","og_type":"article","og_title":"Usi e abusi di eBPF: minacce, tecniche di rilevamento e contromisure \u2013 parte 1 - Tinexta Defence","og_description":"Originariamente progettata per ottimizzare le prestazioni dei sistemi Linux, la tecnologia\u00a0eBPF\u00a0(extended\u00a0Berkeley\u00a0Packet\u00a0Filter) si \u00e8 rapidamente affermata come un componente strategico in ambito\u00a0di\u00a0sicurezza informatica.\u00a0 Versatilit\u00e0, privilegi di esecuzione e verifica del codice rendono\u00a0eBPF\u00a0uno strumento estremamente utile per la raccolta di informazioni dettagliate in tempo reale, senza compromettere la stabilit\u00e0 del kernel.\u00a0Tuttavia,\u00a0sono proprio queste caratteristiche a renderla una [&hellip;]","og_url":"https:\/\/tinextadefence.it\/en\/uses-and-abuses-of-ebpf-threats-detection-techniques-and-countermeasures-part-1\/","og_site_name":"Tinexta Defence","article_published_time":"2025-11-13T15:00:11+00:00","og_image":[{"width":1800,"height":960,"url":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/11\/Business_evidenza.jpg","type":"image\/jpeg"}],"author":"Federica Casadei","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Federica Casadei","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/#article","isPartOf":{"@id":"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/"},"author":{"name":"Federica Casadei","@id":"https:\/\/tinextadefence.it\/#\/schema\/person\/0dc89f3eeaa8cd7b7c354b61c84d164d"},"headline":"Usi e abusi di eBPF: minacce, tecniche di rilevamento e contromisure \u2013 parte 1","datePublished":"2025-11-13T15:00:11+00:00","mainEntityOfPage":{"@id":"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/"},"wordCount":257,"commentCount":0,"publisher":{"@id":"https:\/\/tinextadefence.it\/#organization"},"image":{"@id":"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/#primaryimage"},"thumbnailUrl":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/11\/Business_evidenza.jpg","articleSection":["#TDefenceBusiness"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/","url":"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/","name":"Uses and abuses of eBPF: threats, detection techniques and countermeasures - Part 1 - Tinexta Defence","isPartOf":{"@id":"https:\/\/tinextadefence.it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/#primaryimage"},"image":{"@id":"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/#primaryimage"},"thumbnailUrl":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/11\/Business_evidenza.jpg","datePublished":"2025-11-13T15:00:11+00:00","breadcrumb":{"@id":"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/#primaryimage","url":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/11\/Business_evidenza.jpg","contentUrl":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/11\/Business_evidenza.jpg","width":1800,"height":960},{"@type":"BreadcrumbList","@id":"https:\/\/tinextadefence.it\/usi-e-abusi-di-ebpf-minacce-tecniche-di-rilevamento-e-contromisure-parte-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tinextadefence.it\/"},{"@type":"ListItem","position":2,"name":"Usi e abusi di eBPF: minacce, tecniche di rilevamento e contromisure \u2013 parte 1"}]},{"@type":"WebSite","@id":"https:\/\/tinextadefence.it\/#website","url":"https:\/\/tinextadefence.it\/","name":"Tinexta Defence","description":"think next, protect now","publisher":{"@id":"https:\/\/tinextadefence.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tinextadefence.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/tinextadefence.it\/#organization","name":"Tinexta Defence","url":"https:\/\/tinextadefence.it\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/tinextadefence.it\/#\/schema\/logo\/image\/","url":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_marchio.png","contentUrl":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_marchio.png","width":2000,"height":990,"caption":"Tinexta Defence"},"image":{"@id":"https:\/\/tinextadefence.it\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/tinextadefence.it\/#\/schema\/person\/0dc89f3eeaa8cd7b7c354b61c84d164d","name":"Federica Casadei","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/tinextadefence.it\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6b35becb35fb83a681c7b431c36de302b4101b5ef0c48984910308c04617428f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6b35becb35fb83a681c7b431c36de302b4101b5ef0c48984910308c04617428f?s=96&d=mm&r=g","caption":"Federica Casadei"}}]}},"_links":{"self":[{"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/posts\/29773","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/comments?post=29773"}],"version-history":[{"count":0,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/posts\/29773\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/media\/29769"}],"wp:attachment":[{"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/media?parent=29773"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/categories?post=29773"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/tags?post=29773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}