{"id":5174,"date":"2020-12-10T11:22:41","date_gmt":"2020-12-10T10:22:41","guid":{"rendered":"https:\/\/www.retarus.com\/blog\/it\/truffe-informatiche-insidiose-i-phisher-si-trasformano-in-%e2%80%9cmailer-daemon%e2%80%9d"},"modified":"2024-05-07T20:06:05","modified_gmt":"2024-05-07T18:06:05","slug":"treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/blog\/it\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\/","title":{"rendered":"Truffe informatiche insidiose: i phisher si trasformano in \u201cMailer Daemon\u201d."},"content":{"rendered":" <p>Ogni utente e-mail li ha ricevuto almeno una volta: sono messaggi con mittente \u201cMailer Daemon\u201d che informano l\u2019utente che un messaggio e-mail non \u00e8 stato recapitato. Con Mailer Daemon si fa riferimento a un programma che si occupa di recapitare le e-mail. Se l\u2019operazione non va a buon fine, il programma invia un messaggio di errore in merito. Il mittente nel campo \u201cDa\u201d di queste notifiche segue in genere lo schema mailer-daemon@nomeserver.com.<\/p>   <h2 class=\"wp-block-heading\" id=\"h-indicazioni-di-azioni-concrete-mettono-sotto-pressione-i-destinatari\">Indicazioni di azioni concrete mettono sotto pressione i destinatari<\/h2>   <p>Fino a qui nulla di strano. Eppure sono proprio questi messaggi ordinari a essere sfruttati con maggiore frequenza dai criminali informatici, come hanno rilevato gli esperti di sicurezza di Retarus. In termini di layout, mittente e oggetto, queste e-mail sono molto simili ai messaggi che ci informano del mancato recapito di un\u2019e-mail (\u201cMessage Undeliverable\u201d). Il testo del messaggio per\u00f2 \u00e8 formulato in modo da indurre l\u2019utente a compiere un\u2019azione, proprio come avviene con le e-mail di phishing. Il destinatario viene informato che non \u00e8 stato possibile inviare un certo numero di e-mail e viene esortato ad intervenire per correggere il problema. Il collegamento riportato nel testo, che dovrebbe consentire al destinatario di visualizzare i messaggi \u201cbloccati\u201d, ha lo scopo di suscitare la curiosit\u00e0 del destinatario. Naturalmente, il collegamento non porta a una cartella di posta elettronica, bens\u00ec a un sito di phishing con intenzioni fraudolente.<\/p>   <figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.retarus.com\/blog\/de\/wp-content\/uploads\/sites\/4\/2020\/12\/phishing-mail-mailer-daemon-1.png\" alt=\"\" class=\"wp-image-14605\"\/><\/figure>   <h2 class=\"wp-block-heading\" id=\"h-l-indirizzo-e-mail-reale-del-destinatario-e-il-riferimento-a-microsoft-servono-a-rendere-credibile-il-tutto\">L\u2019indirizzo e-mail reale del destinatario e il riferimento a Microsoft servono a rendere credibile il tutto<\/h2>   <p>L\u2019elemento ingannevole che caratterizza le e-mail che riceviamo oggi con maggiore frequenza \u00e8 che il testo fa specificamente riferimento ai sistemi Microsoft come mittente e menziona l\u2019indirizzo e-mail corretto della potenziale vittima come nome utente nel testo del messaggio. Anche l\u2019URL collegato riprende questo indirizzo per suggerire autenticit\u00e0. Inoltre <a href=\"https:\/\/www.retarus.com\/blog\/de\/phishing-floriert-in-pandemiezeiten\/\">il link utilizza la crittografia di trasporto TLS<\/a> per simulare un presunto grado di sicurezza mediante il prefisso https:\/\/.<\/p>   <h2 class=\"wp-block-heading\" id=\"h-le-soluzioni-di-sicurezza-e-mail-aiutano-a-bloccare-gli-url-di-phishing\">Le soluzioni di sicurezza e-mail aiutano a bloccare gli URL di phishing<\/h2>   <p><a href=\"https:\/\/www.retarus.com\/fr\/services\/email-security\/\">Retarus Email Security<\/a> utilizza diversi metodi per individuare questi tentativi di frode. Con <a href=\"https:\/\/www.retarus.com\/fr\/services\/email-security\/tech-specs\/#time-of-click-protection\">Time-of-Click-Protection<\/a>, gli URL contenuti nelle e-mail vengono di regola riscritti e controllati a fronte di database di phishing continuamente aggiornati nel momento stesso in cui si fa clic su di essi. Solo se questo test ha esito positivo viene effettuato l\u2019inoltro alla pagina di destinazione. Se l\u2019URL viene classificato come sospetto, l\u2019utente riceve un messaggio di avviso corrispondente nel browser.<\/p>   <p>Con la sua soluzione <a href=\"https:\/\/www.retarus.com\/fr\/services\/email-security\/tech-specs\/#patient-zero-detection\">Patient Zero Detection brevettata<\/a>, Retarus \u00e8 in grado di riconoscere i messaggi sospetti anche se i siti web ad essi collegati si sono rivelati sospetti solo dopo la consegna.<\/p>   <h2 class=\"wp-block-heading\" id=\"h-la-costante-sensibilizzazione-degli-utenti-cruciale\">La costante sensibilizzazione degli utenti \u00e8 cruciale<\/h2>   <p>Tuttavia, poich\u00e9 nessuna soluzione di sicurezza e-mail pu\u00f2 garantire una protezione totale contro gli attacchi di phishing, \u00e8 indispensabile che le aziende sensibilizzino continuamente i loro utenti (per incrementare la \u201cconsapevolezza dell\u2019utente\u201d). Di seguito riportiamo alcune istruzioni che si sono dimostrate efficaci contro i tentativi di phishing:<\/p>   <ul class=\"wp-block-list\"><li>Non fare mai clic sui collegamenti contenuti in e-mail sospette (inclusi i collegamenti del tipo \u201cAnnulla iscrizione\u201d, con i quali di fatto si conferma l\u2019esistenza del proprio indirizzo e-mail).<\/li><li>Non aprire\/scaricare gli allegati (malware) delle e-mail sospette.<\/li><li>Non rispondere alle e-mail sospette e non inoltrare tali e-mail.<\/li><li>Non inserire mai nome utente, password o altri dati personali su siti web sospetti.<\/li><li>In caso di dubbio, verificare l\u2019autenticit\u00e0 dell\u2019e-mail parlando\/telefonando di persona al presunto mittente. In caso si riceva il messaggio \u201cMailer Daemon\u201d descritto prima o altre notifiche di sistema simili, contattare l\u2019amministratore\/il supporto informatico del proprio datore di lavoro.<\/li><\/ul>   <p>Per promuovere la consapevolezza verso le e-mail fraudolente, Retarus ha raccolto questi e altri preziosi consigli in una \u201cGuida antiphishing\u201d di facile comprensione. Sul nostro sito web \u00e8 possibile <a href=\"https:\/\/www.retarus.com\/fr\/services\/email-security\/#anti-phishing-guide\">scaricare gratuitamente questa guida in cinque lingue<\/a> e distribuirla ai propri dipendenti.<\/p> ","protected":false},"excerpt":{"rendered":"<p>Attualmente si sta sempre pi\u00f9 diffondendo un metodo di phishing che simula un messaggio di mancata consegna di Microsoft e chiede agli utenti di rilasciare le e-mail non inviate tramite un link.<\/p>\n","protected":false},"author":12,"featured_media":8064,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[8,15],"tags":[],"class_list":["post-5174","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Truffe informatiche insidiose: i phisher si trasformano in \u201cMailer Daemon\u201d. - Retarus Corporate Blog - IT<\/title>\n<meta name=\"description\" content=\"Aktuelle Phishing-Methode im Stile einer Microsoft-Unzustellbarkeitsnachricht fordert Nutzer auf, nicht versendete E-Mails per Link freizugeben.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.retarus.com\/blog\/it\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Truffe informatiche insidiose: i phisher si trasformano in \u201cMailer Daemon\u201d.\" \/>\n<meta property=\"og:description\" content=\"Aktuelle Phishing-Methode ruft Nutzer auf, nicht versendete E-Mails per Link freizugeben.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.retarus.com\/blog\/it\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\/\" \/>\n<meta property=\"og:site_name\" content=\"Retarus Corporate Blog - IT\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-10T10:22:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-07T18:06:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.retarus.com\/blog\/it\/wp-content\/uploads\/sites\/27\/2024\/05\/phishing-mail-mailer-daemon-1.png\" \/>\n<meta name=\"author\" content=\"S\u00f6ren Schulte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Aktuelle Phishing-Methode ruft Nutzer auf, nicht versendete E-Mails per Link freizugeben.\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"S\u00f6ren Schulte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\\\/\"},\"author\":{\"name\":\"S\u00f6ren Schulte\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/#\\\/schema\\\/person\\\/da5eb37e5936738ea4e12be8b429433d\"},\"headline\":\"Truffe informatiche insidiose: i phisher si trasformano in \u201cMailer Daemon\u201d.\",\"datePublished\":\"2020-12-10T10:22:41+00:00\",\"dateModified\":\"2024-05-07T18:06:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\\\/\"},\"wordCount\":646,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/wp-content\\\/uploads\\\/sites\\\/27\\\/2024\\\/05\\\/phishing-attack_16zu9.jpg\",\"articleSection\":[\"News\",\"Security\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\\\/\",\"url\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\\\/\",\"name\":\"Truffe informatiche insidiose: i phisher si trasformano in \u201cMailer Daemon\u201d. - Retarus Corporate Blog - IT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/wp-content\\\/uploads\\\/sites\\\/27\\\/2024\\\/05\\\/phishing-attack_16zu9.jpg\",\"datePublished\":\"2020-12-10T10:22:41+00:00\",\"dateModified\":\"2024-05-07T18:06:05+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/#\\\/schema\\\/person\\\/da5eb37e5936738ea4e12be8b429433d\"},\"description\":\"Aktuelle Phishing-Methode im Stile einer Microsoft-Unzustellbarkeitsnachricht fordert Nutzer auf, nicht versendete E-Mails per Link freizugeben.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/wp-content\\\/uploads\\\/sites\\\/27\\\/2024\\\/05\\\/phishing-attack_16zu9.jpg\",\"contentUrl\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/wp-content\\\/uploads\\\/sites\\\/27\\\/2024\\\/05\\\/phishing-attack_16zu9.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Truffe informatiche insidiose: i phisher si trasformano in \u201cMailer Daemon\u201d.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/#website\",\"url\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/\",\"name\":\"Retarus Corporate Blog - IT\",\"description\":\"Sempre aggiornati\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/#\\\/schema\\\/person\\\/da5eb37e5936738ea4e12be8b429433d\",\"name\":\"S\u00f6ren Schulte\",\"url\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/author\\\/sschulte\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Truffe informatiche insidiose: i phisher si trasformano in \u201cMailer Daemon\u201d. - Retarus Corporate Blog - IT","description":"Aktuelle Phishing-Methode im Stile einer Microsoft-Unzustellbarkeitsnachricht fordert Nutzer auf, nicht versendete E-Mails per Link freizugeben.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.retarus.com\/blog\/it\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\/","og_locale":"it_IT","og_type":"article","og_title":"Truffe informatiche insidiose: i phisher si trasformano in \u201cMailer Daemon\u201d.","og_description":"Aktuelle Phishing-Methode ruft Nutzer auf, nicht versendete E-Mails per Link freizugeben.","og_url":"https:\/\/www.retarus.com\/blog\/it\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\/","og_site_name":"Retarus Corporate Blog - IT","article_published_time":"2020-12-10T10:22:41+00:00","article_modified_time":"2024-05-07T18:06:05+00:00","og_image":[{"url":"https:\/\/www.retarus.com\/blog\/it\/wp-content\/uploads\/sites\/27\/2024\/05\/phishing-mail-mailer-daemon-1.png","type":"","width":"","height":""}],"author":"S\u00f6ren Schulte","twitter_card":"summary_large_image","twitter_description":"Aktuelle Phishing-Methode ruft Nutzer auf, nicht versendete E-Mails per Link freizugeben.","twitter_misc":{"Scritto da":"S\u00f6ren Schulte","Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.retarus.com\/blog\/it\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\/#article","isPartOf":{"@id":"https:\/\/www.retarus.com\/blog\/it\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\/"},"author":{"name":"S\u00f6ren Schulte","@id":"https:\/\/www.retarus.com\/blog\/it\/#\/schema\/person\/da5eb37e5936738ea4e12be8b429433d"},"headline":"Truffe informatiche insidiose: i phisher si trasformano in \u201cMailer Daemon\u201d.","datePublished":"2020-12-10T10:22:41+00:00","dateModified":"2024-05-07T18:06:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.retarus.com\/blog\/it\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\/"},"wordCount":646,"commentCount":0,"image":{"@id":"https:\/\/www.retarus.com\/blog\/it\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\/#primaryimage"},"thumbnailUrl":"https:\/\/www.retarus.com\/blog\/it\/wp-content\/uploads\/sites\/27\/2024\/05\/phishing-attack_16zu9.jpg","articleSection":["News","Security"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.retarus.com\/blog\/it\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.retarus.com\/blog\/it\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\/","url":"https:\/\/www.retarus.com\/blog\/it\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\/","name":"Truffe informatiche insidiose: i phisher si trasformano in \u201cMailer Daemon\u201d. - Retarus Corporate Blog - IT","isPartOf":{"@id":"https:\/\/www.retarus.com\/blog\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.retarus.com\/blog\/it\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\/#primaryimage"},"image":{"@id":"https:\/\/www.retarus.com\/blog\/it\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\/#primaryimage"},"thumbnailUrl":"https:\/\/www.retarus.com\/blog\/it\/wp-content\/uploads\/sites\/27\/2024\/05\/phishing-attack_16zu9.jpg","datePublished":"2020-12-10T10:22:41+00:00","dateModified":"2024-05-07T18:06:05+00:00","author":{"@id":"https:\/\/www.retarus.com\/blog\/it\/#\/schema\/person\/da5eb37e5936738ea4e12be8b429433d"},"description":"Aktuelle Phishing-Methode im Stile einer Microsoft-Unzustellbarkeitsnachricht fordert Nutzer auf, nicht versendete E-Mails per Link freizugeben.","breadcrumb":{"@id":"https:\/\/www.retarus.com\/blog\/it\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.retarus.com\/blog\/it\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.retarus.com\/blog\/it\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\/#primaryimage","url":"https:\/\/www.retarus.com\/blog\/it\/wp-content\/uploads\/sites\/27\/2024\/05\/phishing-attack_16zu9.jpg","contentUrl":"https:\/\/www.retarus.com\/blog\/it\/wp-content\/uploads\/sites\/27\/2024\/05\/phishing-attack_16zu9.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.retarus.com\/blog\/it\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.retarus.com\/blog\/it\/"},{"@type":"ListItem","position":2,"name":"Truffe informatiche insidiose: i phisher si trasformano in \u201cMailer Daemon\u201d."}]},{"@type":"WebSite","@id":"https:\/\/www.retarus.com\/blog\/it\/#website","url":"https:\/\/www.retarus.com\/blog\/it\/","name":"Retarus Corporate Blog - IT","description":"Sempre aggiornati","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.retarus.com\/blog\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.retarus.com\/blog\/it\/#\/schema\/person\/da5eb37e5936738ea4e12be8b429433d","name":"S\u00f6ren Schulte","url":"https:\/\/www.retarus.com\/blog\/it\/author\/sschulte\/"}]}},"_links":{"self":[{"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/posts\/5174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/comments?post=5174"}],"version-history":[{"count":11,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/posts\/5174\/revisions"}],"predecessor-version":[{"id":8943,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/posts\/5174\/revisions\/8943"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/media\/8064"}],"wp:attachment":[{"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/media?parent=5174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/categories?post=5174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/tags?post=5174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}