{"id":26855,"date":"2023-09-08T11:32:41","date_gmt":"2023-09-08T09:32:41","guid":{"rendered":"https:\/\/sendapp.live\/?p=26855"},"modified":"2023-09-08T11:33:06","modified_gmt":"2023-09-08T09:33:06","slug":"hackers-control-your-security","status":"publish","type":"post","link":"https:\/\/sendapp.live\/en\/2023\/09\/08\/gli-hacker-controllano-la-sicurezza-dellai\/","title":{"rendered":"Hackers Monitor AI Security"},"content":{"rendered":"<p class=\"entry-title my-4\"><strong>Hackers Monitor AI Security<\/strong><\/p>\n<p>In the information age, tech titans like Microsoft, Google, Nvidia, and Meta are testing their artificial intelligence (AI) models like never before. With the rise of generative AI systems, security has become a central concern. Forbes interviewed the heads of AI red teams at these companies, highlighting how security is becoming a key marketing criterion for these companies.<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-26857\" src=\"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker-privacy-password-crack-access-security-infringe-spy_03-w810h462.jpg\" alt=\"\" width=\"810\" height=\"462\" srcset=\"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker-privacy-password-crack-access-security-infringe-spy_03-w810h462.jpg 810w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker-privacy-password-crack-access-security-infringe-spy_03-w810h462-300x171.jpg 300w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker-privacy-password-crack-access-security-infringe-spy_03-w810h462-768x438.jpg 768w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker-privacy-password-crack-access-security-infringe-spy_03-w810h462-18x10.jpg 18w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker-privacy-password-crack-access-security-infringe-spy_03-w810h462-600x342.jpg 600w\" sizes=\"auto, (max-width: 810px) 100vw, 810px\" \/><\/h3>\n<h3>Prevention is Better than Cure: The Role of Red Teams in AI<\/h3>\n<p>A red team is a group of ethical hackers tasked with testing the robustness and security of a system. OpenAI, for example, has hired outside experts to test potential flaws and biases in its GPT-3.5 and GPT-4 models. These experts performed tests that uncovered unacceptable responses generated by the models, which were promptly corrected.<\/p>\n<p>Similarly, other red teams have examined preliminary versions of models like GPT-4, asking them to perform illegal and malicious activities. These security tests led to the identification and remediation of several vulnerabilities.<\/p>\n<h3>Finding the Right Balance: Security vs Utility<\/h3>\n<p>Red team leaders often find themselves having to balance security with utility. An AI model that is too restrictive is safe but useless; on the contrary, an overly permissive model is useful but potentially dangerous. This is a delicate balancing act, requiring constant and meticulous attention in order to keep the models both useful and safe.<\/p>\n<h3>Red Team Techniques and Tactics in AI<\/h3>\n<p>The concept of red teaming is not new and dates back to the 1960s. However, with the advent of generative AI, testing methods and security challenges have evolved. Red teams employ a variety of tactics, from generating inappropriate responses to extracting sensitive data and contaminating datasets. Daniel Fabian, head of Google&#039;s new AI red team, explains that the team uses a diverse set of techniques to keep models safe.<\/p>\n<div id=\"attachment_26860\" style=\"width: 903px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-26860\" class=\"size-full wp-image-26860\" src=\"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker01.jpg\" alt=\"\" width=\"893\" height=\"536\" srcset=\"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker01.jpg 893w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker01-300x180.jpg 300w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker01-768x461.jpg 768w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker01-18x12.jpg 18w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker01-600x360.jpg 600w\" sizes=\"auto, (max-width: 893px) 100vw, 893px\" \/><p id=\"caption-attachment-26860\" class=\"wp-caption-text\">102010925 \u2013 hacker using the internet hacked abstract computer server, database, network storage, firewall, social network account, theft of data<\/p><\/div>\n<h3>Sharing Knowledge and Tools: The Red Team Community<\/h3>\n<p>Since the field of AI safety is still developing, red teams tend to share their findings and tools. Microsoft has made open source security testing tools, such as Counterfit, available to the public. This sharing of resources and knowledge helps strengthen the entire AI ecosystem.<\/p>\n<h3>High Profile Events and Red Teaming Challenges<\/h3>\n<p>Recently, a White House-backed event featured several tech giants, who made their AI models available to be tested by outside hackers. These intensive tests led to the discovery of several new vulnerabilities, demonstrating the importance of such events for global AI security.<\/p>\n<h3>The Growing Importance of Security in AI<\/h3>\n<p>With an increased focus from both the public and governments on safety in AI, red teams are becoming an essential component to the success of technology companies. They not only help identify and fix vulnerabilities but also offer a competitive advantage, as security and trust become increasingly critical in the AI landscape.<\/p>\n<p>In conclusion, Hackers Control AI Security in the battle to make artificial intelligence safer. Through a set of advanced techniques, high-profile events and knowledge sharing,<\/p>","protected":false},"excerpt":{"rendered":"<p>Hackers Control AI Security In the information age, tech titans like Microsoft, Google, Nvidia, and Meta are testing their artificial intelligence (AI) models like never before\u2026<\/p>","protected":false},"author":22,"featured_media":26856,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_daim_seo_power":"","_daim_enable_ail":"","footnotes":""},"categories":[2538],"tags":[2855,3089,840,3617,3009,3119,3618],"class_list":{"0":"post-26855","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-microsoft","9":"tag-ai","10":"tag-google","11":"tag-hacker","12":"tag-meta","13":"tag-nvidia","14":"tag-red-teaming"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Gli Hacker Controllano La Sicurezza Dell&#039;AI<\/title>\n<meta name=\"description\" content=\"Gli Hacker Controllano La Sicurezza Dell&#039;AI. Nell&#039;era dell&#039;informazione, i titani tecnologici come Microsoft, Google\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sendapp.live\/en\/2023\/09\/08\/hackers-control-your-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gli Hacker Controllano La Sicurezza Dell&#039;AI\" \/>\n<meta property=\"og:description\" content=\"Gli Hacker Controllano La Sicurezza Dell&#039;AI. Nell&#039;era dell&#039;informazione, i titani tecnologici come Microsoft, Google\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sendapp.live\/en\/2023\/09\/08\/hackers-control-your-security\/\" \/>\n<meta property=\"og:site_name\" content=\"SendApp - Software Whatsapp Marketing\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sendapp.live\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-08T09:32:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-08T09:33:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sendapp_live\" \/>\n<meta name=\"twitter:site\" content=\"@sendapp_live\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/\"},\"author\":{\"name\":\"Blogger\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#\\\/schema\\\/person\\\/d299d0c16bd060adfd11119ff8f7d98b\"},\"headline\":\"Gli Hacker Controllano La Sicurezza Dell&#8217;AI\",\"datePublished\":\"2023-09-08T09:32:41+00:00\",\"dateModified\":\"2023-09-08T09:33:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/\"},\"wordCount\":599,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sendapp.live\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg\",\"keywords\":[\"#Microsoft\",\"ai\",\"Google\",\"Hacker\",\"meta\",\"nvidia\",\"Red Teaming\"],\"articleSection\":[\"news\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/\",\"url\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/\",\"name\":\"Gli Hacker Controllano La Sicurezza Dell'AI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sendapp.live\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg\",\"datePublished\":\"2023-09-08T09:32:41+00:00\",\"dateModified\":\"2023-09-08T09:33:06+00:00\",\"description\":\"Gli Hacker Controllano La Sicurezza Dell'AI. Nell'era dell'informazione, i titani tecnologici come Microsoft, Google\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sendapp.live\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg\",\"contentUrl\":\"https:\\\/\\\/sendapp.live\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sendapp.live\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gli Hacker Controllano La Sicurezza Dell&#8217;AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#website\",\"url\":\"https:\\\/\\\/sendapp.live\\\/it\\\/\",\"name\":\"SendApp\",\"description\":\"Automate Your Messages &amp; Grow Your Business\",\"publisher\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#organization\"},\"alternateName\":\"SendApp WhatsApp Marketing\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sendapp.live\\\/it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#organization\",\"name\":\"SendApp\",\"url\":\"https:\\\/\\\/sendapp.live\\\/it\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sendapp.live\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Logo-Sendapp-300x60-1.png\",\"contentUrl\":\"https:\\\/\\\/sendapp.live\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Logo-Sendapp-300x60-1.png\",\"width\":300,\"height\":60,\"caption\":\"SendApp\"},\"image\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/sendapp.live\",\"https:\\\/\\\/x.com\\\/sendapp_live\",\"https:\\\/\\\/www.instagram.com\\\/sendapp.live\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC2gaLpi0-OJLG4CFbOr6mLw\",\"https:\\\/\\\/it.trustpilot.com\\\/review\\\/sendapp.live\"],\"description\":\"Piattaforma italiana di WhatsApp Marketing con API ufficiali Meta. Assistente AI, campagne massive, SMS Gateway gratuito, Google Calendar, automazioni. Da \u20ac16\\\/mese senza markup sui messaggi.\",\"email\":\"info@sendapp.live\",\"foundingDate\":\"2016-07-25\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#\\\/schema\\\/person\\\/d299d0c16bd060adfd11119ff8f7d98b\",\"name\":\"Blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ce6c79c7d549254e170ba7e532db68391b034b95559bd744349aee442ecdad7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ce6c79c7d549254e170ba7e532db68391b034b95559bd744349aee442ecdad7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ce6c79c7d549254e170ba7e532db68391b034b95559bd744349aee442ecdad7?s=96&d=mm&r=g\",\"caption\":\"Blogger\"},\"url\":\"https:\\\/\\\/sendapp.live\\\/en\\\/author\\\/blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hackers Monitor AI Security","description":"Hackers Monitor AI Security. In the information age, technology titans like Microsoft, Google","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sendapp.live\/en\/2023\/09\/08\/hackers-control-your-security\/","og_locale":"en_US","og_type":"article","og_title":"Gli Hacker Controllano La Sicurezza Dell'AI","og_description":"Gli Hacker Controllano La Sicurezza Dell'AI. Nell'era dell'informazione, i titani tecnologici come Microsoft, Google","og_url":"https:\/\/sendapp.live\/en\/2023\/09\/08\/hackers-control-your-security\/","og_site_name":"SendApp - Software Whatsapp Marketing","article_publisher":"https:\/\/www.facebook.com\/sendapp.live","article_published_time":"2023-09-08T09:32:41+00:00","article_modified_time":"2023-09-08T09:33:06+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg","type":"image\/jpeg"}],"author":"Blogger","twitter_card":"summary_large_image","twitter_creator":"@sendapp_live","twitter_site":"@sendapp_live","twitter_misc":{"Written by":"Blogger","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#article","isPartOf":{"@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/"},"author":{"name":"Blogger","@id":"https:\/\/sendapp.live\/it\/#\/schema\/person\/d299d0c16bd060adfd11119ff8f7d98b"},"headline":"Gli Hacker Controllano La Sicurezza Dell&#8217;AI","datePublished":"2023-09-08T09:32:41+00:00","dateModified":"2023-09-08T09:33:06+00:00","mainEntityOfPage":{"@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/"},"wordCount":599,"commentCount":0,"publisher":{"@id":"https:\/\/sendapp.live\/it\/#organization"},"image":{"@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg","keywords":["#Microsoft","ai","Google","Hacker","meta","nvidia","Red Teaming"],"articleSection":["news"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/","url":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/","name":"Hackers Monitor AI Security","isPartOf":{"@id":"https:\/\/sendapp.live\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#primaryimage"},"image":{"@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg","datePublished":"2023-09-08T09:32:41+00:00","dateModified":"2023-09-08T09:33:06+00:00","description":"Hackers Monitor AI Security. In the information age, technology titans like Microsoft, Google","breadcrumb":{"@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#primaryimage","url":"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg","contentUrl":"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sendapp.live\/"},{"@type":"ListItem","position":2,"name":"Gli Hacker Controllano La Sicurezza Dell&#8217;AI"}]},{"@type":"WebSite","@id":"https:\/\/sendapp.live\/it\/#website","url":"https:\/\/sendapp.live\/it\/","name":"SendApp","description":"Automate Your Messages &amp; Grow Your Business","publisher":{"@id":"https:\/\/sendapp.live\/it\/#organization"},"alternateName":"SendApp WhatsApp Marketing","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sendapp.live\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sendapp.live\/it\/#organization","name":"SendApp","url":"https:\/\/sendapp.live\/it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sendapp.live\/it\/#\/schema\/logo\/image\/","url":"https:\/\/sendapp.live\/wp-content\/uploads\/2025\/04\/Logo-Sendapp-300x60-1.png","contentUrl":"https:\/\/sendapp.live\/wp-content\/uploads\/2025\/04\/Logo-Sendapp-300x60-1.png","width":300,"height":60,"caption":"SendApp"},"image":{"@id":"https:\/\/sendapp.live\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sendapp.live","https:\/\/x.com\/sendapp_live","https:\/\/www.instagram.com\/sendapp.live","https:\/\/www.youtube.com\/channel\/UC2gaLpi0-OJLG4CFbOr6mLw","https:\/\/it.trustpilot.com\/review\/sendapp.live"],"description":"Italian WhatsApp Marketing platform with official Meta API. AI assistant, mass campaigns, free SMS Gateway, Google Calendar, automations. From \u20ac16\/month with no message markup.","email":"info@sendapp.live","foundingDate":"2016-07-25"},{"@type":"Person","@id":"https:\/\/sendapp.live\/it\/#\/schema\/person\/d299d0c16bd060adfd11119ff8f7d98b","name":"Blogger","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4ce6c79c7d549254e170ba7e532db68391b034b95559bd744349aee442ecdad7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4ce6c79c7d549254e170ba7e532db68391b034b95559bd744349aee442ecdad7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ce6c79c7d549254e170ba7e532db68391b034b95559bd744349aee442ecdad7?s=96&d=mm&r=g","caption":"Blogger"},"url":"https:\/\/sendapp.live\/en\/author\/blogger\/"}]}},"_links":{"self":[{"href":"https:\/\/sendapp.live\/en\/wp-json\/wp\/v2\/posts\/26855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sendapp.live\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sendapp.live\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sendapp.live\/en\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/sendapp.live\/en\/wp-json\/wp\/v2\/comments?post=26855"}],"version-history":[{"count":1,"href":"https:\/\/sendapp.live\/en\/wp-json\/wp\/v2\/posts\/26855\/revisions"}],"predecessor-version":[{"id":26862,"href":"https:\/\/sendapp.live\/en\/wp-json\/wp\/v2\/posts\/26855\/revisions\/26862"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sendapp.live\/en\/wp-json\/wp\/v2\/media\/26856"}],"wp:attachment":[{"href":"https:\/\/sendapp.live\/en\/wp-json\/wp\/v2\/media?parent=26855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sendapp.live\/en\/wp-json\/wp\/v2\/categories?post=26855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sendapp.live\/en\/wp-json\/wp\/v2\/tags?post=26855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}