{"id":3863,"date":"2025-11-25T15:47:37","date_gmt":"2025-11-25T15:47:37","guid":{"rendered":"https:\/\/phishia.fr\/?p=3863"},"modified":"2025-12-11T01:05:03","modified_gmt":"2025-12-11T01:05:03","slug":"cose-il-dark-web-e-perche-i-vostri-dati-possono-essere-trovati-li","status":"publish","type":"post","link":"https:\/\/phishia.fr\/it\/blog\/sorveglianza\/cose-il-dark-web-e-perche-i-vostri-dati-possono-essere-trovati-li\/","title":{"rendered":"Cos'\u00e8 il dark web e perch\u00e9 i vostri dati possono finire l\u00ec?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"3863\" class=\"elementor elementor-3863\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1eb1413 e-flex e-con-boxed e-con e-parent\" data-id=\"1eb1413\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce9efd0 elementor-widget elementor-widget-text-editor\" data-id=\"ce9efd0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Si sente spesso parlare di\u00a0<em>dark web<\/em>\u00a0come un luogo misterioso riservato ai pirati. In realt\u00e0, \u00e8 soprattutto un\u00a0<strong>un luogo in cui vengono vendute o esposte informazioni sensibili rubate<\/strong>, a volte per mesi senza che le organizzazioni se ne accorgano.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7ad6625 e-flex e-con-boxed e-con e-parent\" data-id=\"7ad6625\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd126eb elementor-widget elementor-widget-heading\" data-id=\"bd126eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">L'iceberg del web: superficie, profondit\u00e0 e zone d'ombra<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-437aa3b e-flex e-con-boxed e-con e-parent\" data-id=\"437aa3b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46c750a elementor-widget elementor-widget-image\" data-id=\"46c750a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/iceberg2-1024x576.png\" class=\"attachment-large size-large wp-image-3865\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/iceberg2-1024x576.png 1024w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/iceberg2-300x169.png 300w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/iceberg2-768x432.png 768w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/iceberg2-1536x864.png 1536w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/iceberg2-18x10.png 18w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/iceberg2.png 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0544be elementor-widget elementor-widget-text-editor\" data-id=\"b0544be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"54\" data-end=\"250\"><strong data-start=\"54\" data-end=\"87\">Clear Web - la parte visibile<\/strong><br data-start=\"87\" data-end=\"90\" \/>Lo strato \u201csopra la superficie\u201d: siti web pubblici, media, blog, social network, tutti a pochi clic di distanza tramite Google o altri motori di ricerca.<\/p><p data-start=\"252\" data-end=\"475\"><strong data-start=\"252\" data-end=\"286\">Deep Web - nascosto ma legittimo<\/strong><br data-start=\"286\" data-end=\"289\" \/>Sotto la superficie: aree private (e-mail, extranet, portali interni), documenti e rapporti a cui si pu\u00f2 accedere solo tramite un link o un account. Non indicizzati, ma perfettamente legali.<\/p><p data-start=\"477\" data-end=\"700\"><strong data-start=\"477\" data-end=\"508\">Dark Web - la zona a rischio<\/strong><br data-start=\"508\" data-end=\"511\" \/>Accesso tramite strumenti specifici come Tor, con forum chiusi, marketplace e gruppi privati spesso utilizzati per rivendere dati, strumenti di attacco o accessi compromessi.<\/p><p>\u00c8 proprio su questi strati pi\u00f9 profondi che la\u00a0<strong>Informazioni sulle minacce informatiche (CTI)<\/strong>\u00a0cercher\u00e0 di individuare segnali deboli e perdite.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d8ad66 e-flex e-con-boxed e-con e-parent\" data-id=\"5d8ad66\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d66bbb6 elementor-widget elementor-widget-heading\" data-id=\"d66bbb6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Quali informazioni sensibili vengono vendute o esposte sul dark web?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-65e8c44 e-flex e-con-boxed e-con e-parent\" data-id=\"65e8c44\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2e4dddb elementor-widget elementor-widget-text-editor\" data-id=\"2e4dddb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Sul dark web, gli aggressori non vendono \u201cfile\u201d in astratto. Vendono soprattutto\u00a0<strong>accesso<\/strong>\u00a0e\u00a0<strong>elementi di fiducia<\/strong>\u00a0per costruire un attacco.<\/p><p>Ecco alcuni esempi concreti tratti dai casi che incontriamo in Phishia:\u00a0<\/p><h5><strong> Credenziali di accesso<\/strong><\/h5><p>Queste sono le coppie\u00a0<strong>login \/ password<\/strong>\u00a0per :<\/p><ul><li>portali interni (intranet, portali agenti, aree donatori, ecc.),<\/li><li>servizi aziendali (CRM, strumenti per le risorse umane, soluzioni per i pagamenti e le donazioni),<\/li><li>caselle di posta elettronica o account di amministratore.<\/li><\/ul><p>Questi identificatori possono provenire da :<\/p><ul><li>un computer compromesso (malware, phishing),<\/li><li>riutilizzo di una password gi\u00e0 rubata altrove,<\/li><li>un fornitore di servizi negligente.<\/li><\/ul><p>Nelle nostre analisi, vediamo regolarmente\u00a0<strong>elenchi di centinaia di credenziali<\/strong>\u00a0associati allo stesso nome di dominio, con livelli di criticit\u00e0 molto diversi a seconda dell'account in questione: da un accesso \u201cnon sensibile\u201d ad account che possono modificare dati finanziari o accedere a informazioni riservate.\u00a0<\/p><h5><strong> Dati personali e finanziari<\/strong><\/h5><p>Sia per le associazioni che per gli enti pubblici, gli esempi sono numerosi:<\/p><ul><li>i dati dei donatori (dati di contatto, cronologia delle donazioni, talvolta mandato SEPA),<\/li><li>dati dell'utente o del beneficiario,<\/li><li>informazioni che consentono di impersonare una persona o un'organizzazione.\u00a0<\/li><\/ul><p>Possibili conseguenze: frode, appropriazione indebita di donazioni, perdita di fiducia, sanzioni normative.<\/p><h5><strong> Accesso tecnico ed elementi infrastrutturali<\/strong><\/h5><p>Anche i forum e i mercati del dark web presentano :<\/p><ul><li>accesso a\u00a0<strong>VPN interne<\/strong>,<\/li><li>Sessioni RDP (controllo remoto di un server o di una workstation),<\/li><li>informazioni sulle vulnerabilit\u00e0 non risolte,<\/li><li>vendita di malware mirati a un particolare tipo di organizzazione o tecnologia.<\/li><\/ul><p>Questi elementi vengono utilizzati per preparare un attacco pi\u00f9 ampio (ad esempio un ransomware).<\/p><h5><strong> Perdite \u201cgrezze\u201d da smistare<\/strong><\/h5><p>Gli elenchi delle perdite non sono sempre ordinati e precisi. Comprendono:<\/p><ul><li>identificatori reali ancora validi,<\/li><li>identificatori obsoleti,<\/li><li>duplicati,<\/li><li>falsi positivi.<\/li><\/ul><p>Uno dei ruoli chiave di un'unit\u00e0 CTI \u00e8 quello di\u00a0<strong>ordinare e qualificare<\/strong>\u00a0per distinguere la minaccia reale dal rumore di fondo.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-153b940 e-flex e-con-boxed e-con e-parent\" data-id=\"153b940\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f5f735b elementor-widget elementor-widget-heading\" data-id=\"f5f735b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Perch\u00e9 questo \u00e8 un problema per un'organizzazione?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f563f63 e-flex e-con-boxed e-con e-parent\" data-id=\"f563f63\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66f2711 elementor-widget elementor-widget-text-editor\" data-id=\"66f2711\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Queste informazioni vengono utilizzate per :<\/p><ul><li>d\u2019<strong>inserite i vostri sistemi<\/strong>\u00a0senza far scattare l'allarme,<\/li><li>preparare un\u00a0<strong>truffa mirata<\/strong>\u00a0(phishing, frode dei presidenti, truffa delle donazioni),<\/li><li>da\u00a0<strong>rivendere i vostri dati<\/strong>\u00a0ad altri gruppi criminali,<\/li><li>infangare la vostra immagine se la fuga di notizie diventa pubblica.<\/li><\/ul><p>Nel peggiore dei casi, i vostri identificativi e i vostri dati circolano da mesi, o addirittura da anni, su forum specializzati e\u00a0<strong>non si sa<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-01734c3 e-flex e-con-boxed e-con e-parent\" data-id=\"01734c3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-595e0a4 elementor-widget elementor-widget-heading\" data-id=\"595e0a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Come pu\u00f2 aiutarvi l'offerta CTI di Phishia<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-df48a7e e-flex e-con-boxed e-con e-parent\" data-id=\"df48a7e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-32470f3 elementor-widget elementor-widget-text-editor\" data-id=\"32470f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"0\" data-end=\"551\">La <strong data-start=\"3\" data-end=\"38\">Informazioni sulle minacce informatiche (CTI)<\/strong> consiste nel monitorare in modo proattivo tutto ci\u00f2 che accade intorno alla vostra organizzazione nel surface web, nel deep web, nel dark web e all'interno di alcuni gruppi privati di criminali informatici.<\/p><p data-start=\"0\" data-end=\"551\">A <strong data-start=\"242\" data-end=\"253\">Phishia<\/strong>, Ci affidiamo a <strong data-start=\"288\" data-end=\"297\">Bagliori<\/strong>, il nostro sensore web\/deep\/dark, che traccia automaticamente qualsiasi fuga di notizie legata ai vostri identificativi (nomi di dominio, indirizzi e-mail, indirizzi IP, identificativi, password, ecc. <strong data-start=\"477\" data-end=\"500\">competenze di analisi<\/strong> per qualificare, dare priorit\u00e0 e trattare ogni perdita.<\/p><p data-start=\"553\" data-end=\"1315\">In concreto, il nostro approccio CTI combina diversi elementi costitutivi: un <strong data-start=\"618\" data-end=\"643\">monitoraggio continuo<\/strong> fonti utili (vendite di accessi, fughe di dati, account compromessi, malware), da <strong data-start=\"733\" data-end=\"758\">audit mirati<\/strong> per verificare la validit\u00e0 di alcuni identificatori all'interno del quadro normativo, una <strong data-start=\"833\" data-end=\"859\">Contesto OSINT<\/strong> per capire quali servizi sono interessati e quale impatto pu\u00f2 avere, seguito da una <strong data-start=\"945\" data-end=\"975\">valutazione della criticit\u00e0<\/strong> con allarme immediato in caso di perdite gravi e un <strong data-start=\"1026\" data-end=\"1049\">piano correttivo<\/strong>(reimpostazione della password, blocco degli accessi, rafforzamento della configurazione, nuove regole SIEM\/EDR, ecc.) Tutto viene consolidato in un <strong data-start=\"1198\" data-end=\"1220\">rapporti periodici<\/strong> Rapporti dettagliati, indicatori di attivit\u00e0 e monitoraggio delle tendenze delle minacce rivolte all'utente.<\/p><p data-start=\"1317\" data-end=\"1540\" data-is-last-node=\"\" data-is-only-node=\"\">L'obiettivo \u00e8 semplice: <strong data-start=\"1341\" data-end=\"1378\">avvisarvi il prima possibile<\/strong> quando le vostre informazioni appaiono sul dark web o in aree ad alto rischio, e <strong data-start=\"1461\" data-end=\"1539\">aiutarvi a correggere la situazione prima che diventi un incidente grave<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d52f0ea e-flex e-con-boxed e-con e-parent\" data-id=\"d52f0ea\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a636138 elementor-widget elementor-widget-text-editor\" data-id=\"a636138\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0<\/p><p>Volete saperne di pi\u00f9? Visitate <span style=\"text-decoration: underline;\"><a href=\"https:\/\/phishia.fr\/it\/cti\/\">la nostra offerta CTI :<\/a><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Spesso si sente parlare del dark web come di un luogo misterioso riservato agli hacker. In realt\u00e0, \u00e8 soprattutto un luogo dove le informazioni sensibili rubate vengono rivendute o esposte, a volte per mesi, senza che le organizzazioni se ne accorgano. L'iceberg del web: superficie, profondit\u00e0 e aree oscure Clear Web - la parte visibileLo strato \u201csopra il [...]<\/p>","protected":false},"author":3,"featured_media":3899,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[31],"class_list":["post-3863","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-surveillance","tag-darkweb"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Qu\u2019est-ce que le dark web, et pourquoi vos donn\u00e9es peuvent s\u2019y retrouver ? - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/it\/blog\/sorveglianza\/cose-il-dark-web-e-perche-i-vostri-dati-possono-essere-trovati-li\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Qu\u2019est-ce que le dark web, et pourquoi vos donn\u00e9es peuvent s\u2019y retrouver ? - Phishia\" \/>\n<meta property=\"og:description\" content=\"On entend souvent parler du\u00a0dark web\u00a0comme d\u2019un endroit myst\u00e9rieux r\u00e9serv\u00e9 aux pirates. En r\u00e9alit\u00e9, c\u2019est surtout un\u00a0espace o\u00f9 des informations sensibles vol\u00e9es sont revendues ou expos\u00e9es, parfois pendant des mois sans que les organisations le sachent. L\u2019iceberg du web : surface, profondeur et zones obscures Clear Web \u2013 la partie visibleLa couche \u201cau-dessus de la [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/it\/blog\/sorveglianza\/cose-il-dark-web-e-perche-i-vostri-dati-possono-essere-trovati-li\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-25T15:47:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-11T01:05:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/P6nR5BjdpHEUspxkCwTxdc-1200-80.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/\"},\"author\":{\"name\":\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/ab1f38ad06f750da69863e8f06e86528\"},\"headline\":\"Qu\u2019est-ce que le dark web, et pourquoi vos donn\u00e9es peuvent s\u2019y retrouver ?\",\"datePublished\":\"2025-11-25T15:47:37+00:00\",\"dateModified\":\"2025-12-11T01:05:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/\"},\"wordCount\":928,\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/P6nR5BjdpHEUspxkCwTxdc-1200-80.jpg\",\"keywords\":[\"Darkweb\"],\"articleSection\":[\"Surveillance\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/\",\"name\":\"Qu\u2019est-ce que le dark web, et pourquoi vos donn\u00e9es peuvent s\u2019y retrouver ? - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/P6nR5BjdpHEUspxkCwTxdc-1200-80.jpg\",\"datePublished\":\"2025-11-25T15:47:37+00:00\",\"dateModified\":\"2025-12-11T01:05:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/P6nR5BjdpHEUspxkCwTxdc-1200-80.jpg\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/P6nR5BjdpHEUspxkCwTxdc-1200-80.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Surveillance\",\"item\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/category\\\/surveillance\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Qu\u2019est-ce que le dark web, et pourquoi vos donn\u00e9es peuvent s\u2019y retrouver ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/ab1f38ad06f750da69863e8f06e86528\",\"name\":\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cos'\u00e8 il dark web e perch\u00e9 i vostri dati possono finirci? - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/it\/blog\/sorveglianza\/cose-il-dark-web-e-perche-i-vostri-dati-possono-essere-trovati-li\/","og_locale":"it_IT","og_type":"article","og_title":"Qu\u2019est-ce que le dark web, et pourquoi vos donn\u00e9es peuvent s\u2019y retrouver ? - Phishia","og_description":"On entend souvent parler du\u00a0dark web\u00a0comme d\u2019un endroit myst\u00e9rieux r\u00e9serv\u00e9 aux pirates. En r\u00e9alit\u00e9, c\u2019est surtout un\u00a0espace o\u00f9 des informations sensibles vol\u00e9es sont revendues ou expos\u00e9es, parfois pendant des mois sans que les organisations le sachent. L\u2019iceberg du web : surface, profondeur et zones obscures Clear Web \u2013 la partie visibleLa couche \u201cau-dessus de la [&hellip;]","og_url":"https:\/\/phishia.fr\/it\/blog\/sorveglianza\/cose-il-dark-web-e-perche-i-vostri-dati-possono-essere-trovati-li\/","og_site_name":"Phishia","article_published_time":"2025-11-25T15:47:37+00:00","article_modified_time":"2025-12-11T01:05:03+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/P6nR5BjdpHEUspxkCwTxdc-1200-80.jpg","type":"image\/jpeg"}],"author":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/"},"author":{"name":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","@id":"https:\/\/phishia.fr\/#\/schema\/person\/ab1f38ad06f750da69863e8f06e86528"},"headline":"Qu\u2019est-ce que le dark web, et pourquoi vos donn\u00e9es peuvent s\u2019y retrouver ?","datePublished":"2025-11-25T15:47:37+00:00","dateModified":"2025-12-11T01:05:03+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/"},"wordCount":928,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/P6nR5BjdpHEUspxkCwTxdc-1200-80.jpg","keywords":["Darkweb"],"articleSection":["Surveillance"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/","url":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/","name":"Cos'\u00e8 il dark web e perch\u00e9 i vostri dati possono finirci? - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/P6nR5BjdpHEUspxkCwTxdc-1200-80.jpg","datePublished":"2025-11-25T15:47:37+00:00","dateModified":"2025-12-11T01:05:03+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/P6nR5BjdpHEUspxkCwTxdc-1200-80.jpg","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/P6nR5BjdpHEUspxkCwTxdc-1200-80.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Surveillance","item":"https:\/\/phishia.fr\/blog\/category\/surveillance\/"},{"@type":"ListItem","position":3,"name":"Qu\u2019est-ce que le dark web, et pourquoi vos donn\u00e9es peuvent s\u2019y retrouver ?"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"Consulenza informatica, sicurezza informatica, sostenibilit\u00e0","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/ab1f38ad06f750da69863e8f06e86528","name":"Enzo Debosque, consulente junior di CyberSecurity"}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/posts\/3863","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/comments?post=3863"}],"version-history":[{"count":10,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/posts\/3863\/revisions"}],"predecessor-version":[{"id":3979,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/posts\/3863\/revisions\/3979"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/media\/3899"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/media?parent=3863"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/categories?post=3863"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/tags?post=3863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}