Salta al contenuto principale






The Lavon affair was a failed Israeli covert operation, codenamed Operation Susannah, conducted in Egypt in the summer of 1954.

As part of a false flag operation, a group of Egyptian Jews were recruited by Israeli military intelligence to plant bombs inside Egyptian-, US-, and British-owned civilian targets.

This is the story behind the botched plot to sabotage Cairo, deceive the West, and control the Suez Canal — at any cost.

youtube.com/watch?v=xiE25bsLfg…

🕎 🇵🇸 ☮️
#Gaza #Palestine
#Press #News



Please sign the initiative for a ban on conversion practices in the European Union, the deadline is tomorrow May 17th: eci.ec.europa.eu/043/public/#/… #lgbtqia #lgbt #europe #EU







Today in Labor History, May 16: Romani Resistance Day, commemorating the Roma people who fought the fascists during World War II. The date was chosen due to a Holocaust survivor stating that on 16 May 1944, there was a rebellion of Roma detainees at the Auschwitz Birkenau concentration camp. However subsequent research by the Auschwitz Museum discovered that this date was most likely incorrect. It was actually in early April that a number of Roma prisoners refused orders from the SS to leave to work in Germany. Instead, a Polish prisoner was ordered to make a list of Roma able to work to be transported later. By 2 August 1944, those Roma able to work had been transported elsewhere, when the SS came to take the others to the gas chambers. The prisoners armed themselves with crowbars and fought back, but were eventually overcome and gassed. And in 2024, The European Committee for Social Rights (ECSR) unanimously concluded that Italy was violating the European Social Charter as regards the housing rights of the Roma, 15,000 of whom are currently living in shanty towns on the margins of big cities such as Rome, Milan and Naples.

reuters.com/world/europe/europ…

#workingclass #LaborHistory #nazis #genocide #holocaust #roma #romani #aushwitz #resistance #fascism #rebellion #italy #WorldWarTwo #concentrationcamp



Bei der Frage nach einem #AfDVerbot spricht Merz von
„Konkurrentenbeseitigung“ & Innenminister Dobrindt ist auffallend leise.
Konstantinv. Notz macht im #Bundestag deutlich: ein Parteiverbot ist ein zentrales Instrument unserer Verfassung, um unsere Demokratie zu schützen!


youtube.com/watch?v=U7X1kZZnD8…


This Week in Security: Lingering Spectre, Deep Fakes, and CoreAudio


Spectre lives. We’ve got two separate pieces of research, each finding new processor primitives that allow Spectre-style memory leaks. Before we dive into the details of the new techniques, let’s quickly remind ourselves what Spectre is. Modern CPUs use a variety of clever tricks to execute code faster, and one of the stumbling blocks is memory latency. When a program reaches a branch in execution, the program will proceed in one of two possible directions, and it’s often a value from memory that determines which branch is taken. Rather than wait for the memory to be fetched, modern CPUs will predict which branch execution will take, and speculatively execute the code down that branch. Once the memory is fetched and the branch is properly evaluated, the speculatively executed code is rewound if the guess was wrong, or made authoritative if the guess was correct. Spectre is the realization that incorrect branch prediction can change the contents of the CPU cache, and those changes can be detected through cache timing measurements. The end result is that arbitrary system memory can be leaked from a low privileged or even sandboxed user process.

In response to Spectre, OS developers and CPU designers have added domain isolation protections, that prevent branch prediction poisoning in an attack process from affecting the branch prediction in the kernel or another process. Training Solo is the clever idea from VUSec that branch prediction poisoning could just be done from within the kernel space, and avoid any domain switching at all. That can be done through cBPF, the classic Berkeley Packet Filter (BPF) kernel VM. By default, all users on a Linux system can run cBPF code, throwing the doors back open for Spectre shenanigans. There’s also an address collision attack where an unrelated branch can be used to train a target branch. Researchers also discovered a pair of CVEs in Intel’s CPUs, where prediction training was broken in specific cases, allowing for a wild 17 kB/sec memory leak.

Also revealed this week is the Branch Privilege Injection research from COMSEC. This is the realization that Intel Branch Prediction happens asynchronously, and in certain cases there is a race condition between the updates to the prediction engine, and the code being predicted. In short, user-mode branch prediction training can be used to poison kernel-mode prediction, due to the race condition.

(Editor’s note: Video seems down for the moment. Hopefully YouTube will get it cleared again soon. Something, something “hackers”.)

youtube.com/embed/jrsOvaN7PaA?…

Both of these Spectre attacks have been patched by Intel with microcode, and the Linux kernel has integrated patches for the Training Solo issue. Training Solo may also impact some ARM processors, and ARM has issued guidance on the vulnerability. The real downside is that each fix seems to come with yet another performance hit.

Is That Real Cash? And What Does That Even Mean?


Over at the Something From Nothing blog, we have a surprisingly deep topic, in a teardown of banknote validators. For the younger in the audience, there was a time in years gone by where not every vending machine had a credit card reader built-in, and the only option was to carefully straighten a bill and feed it into the bill slot on the machine. Bow how do those machines know it’s really a bill, and not just the right sized piece of paper?

And that’s where this gets interesting. Modern currency has multiple security features in a single bill, like magnetic ink, micro printing, holograms, watermarks, and more. But how does a bill validator check for all those things? Mainly LEDs and photodetectors, it seems. With some machines including hall effect sensors, magnetic tape heads for detecting magnetic ink, and in rare cases a full linear CCD for scanning the bill as it’s inserted. Each of those detectors (except the CCD) produces a simple data stream from each bill that’s checked. Surely it would be easy enough to figure out the fingerprint of a real bill, and produce something that looks just like the real thing — but only to a validator?

In theory, probably, but the combination of sensors presents a real problem. It’s really the same problem with counterfeiting a bill in general: implementing a single security feature is doable, but getting them all right at the same time is nearly impossible. And so with the humble banknote validator.

Don’t Trust That Phone Call


There’s a scam that has risen to popularity with the advent of AI voice impersonation. It usually takes the form of a young person calling a parent or grandparent from jail or a hospital, asking for money to be wired to make it home. It sounds convincing, because it’s an AI deepfake of the target’s loved one. This is no longer just a technique to take advantage of loving grandparents. The FBI has issued a warning about an ongoing campaign using deepfakes of US officials. The aim of this malware campaign seems to be just getting the victim to click on a malicious link. This same technique was used in a LastPass attack last year, and the technique has become so convincing, it’s not likely to go away anytime soon.

AI Searching SharePoint


Microsoft has tried not to be left behind in the current flurry of AI rollouts that every tech company seems to be engaging in. Microsoft’s SharePoint is not immune, and the result is Microsoft Copilot for SharePoint. This gives an AI agent access to a company’s SharePoint knowledge base, allowing users to query it for information. It’s AI as a better search engine. This has some ramifications for security, as SharePoint installs tend to collect sensitive data.

The first ramification is the most straightforward. The AI can be used to search for that sensitive data. But Copilot pulling data from a SharePoint file doesn’t count as a view, making for a very stealthy way to pull data from those sensitive files. Pen Test Partners found something even better on a real assessment. A passwords file hosted on SharePoint was unavailable to view, but in an odd way. This file hadn’t been locked down using SharePoint permissions, but instead the file was restricted from previewing in the browser. This was likely an attempt to keep eyes off the contents of the file. And Copilot was willing to be super helpful, pasting the contents of that file right into a chat window. Whoops.

Fuzzing Apple’s CoreAudio


Googler [Dillon Franke] has the story of finding a type confusion flaw in Apple’s CoreAudio daemon, reachable via Mach Inter-Process Communication (IPC) messages, allowing for potential arbitrary code execution from within a sandboxed process. This is a really interesting fuzzing + reverse engineering journey, and it starts with imagining the attack he wanted to find: Something that could be launched from within a sandboxed browser, take advantage of already available IPC mechanisms, and exploit a complex process with elevated privileges.

Coreaudiod ticks all the boxes, but it’s a closed source daemon. How does one approach this problem? The easy option is to just fuzz over the IPC messages. It would be a perfectly viable strategy, to fuzz CoreAudio via Mach calls. The downside is that the fuzzer would run slower, and have much less visibility into what’s happening in the target process. A much more powerful approach is to build a fuzzing harness that allows hooking directly to the library in question. There is some definite library wizardry at play here, linking into a library function that hasn’t been exported.

The vulnerability that he found was type confusion, where the daemon expected an ioctl object, but could be supplied arbitrary data. As an ioctl object contains a pointer to a vtable, which is essentially a collection of function pointers. It then attempts to call a function from that table. It’s an ideal situation for exploitation. The fix from Apple is an explicit type check on the incoming objects.

Bits and Bytes


Asus publishes the DriverHub tool, a gui-less driver updater. It communicates with driverhub.asus.com using RPC calls. The problem is that it checks for the right web URL using a wildcard, and driverhub.asus.com.mrbruh.com was considered completely valid. Among the functions DriverHub can perform is to install drivers and updates. Chaining a couple of fake updates together results in relatively easy admin code execution on the local machine, with the only prerequisites being the DriverHub software being installed, and clicking a single malicious link. Ouch.

The VirtualBox VGA driver just patched a buffer overflow that could result in VM escape. The vmsvga3dSurfaceMipBufferSize call could be manipulated so no memory is actually allocated, but VirtualBox itself believes a buffer is there and writable. This memory write ability can be leveraged into arbitrary memory read and write capability on the host system.

And finally, what’s old is new again. APT28, a Russian state actor, has been using very old-school Cross Site Scripting (XSS) attacks to gain access to target’s webmail systems. The attack here is JavaScript in an email’s HTML code. That JS then used already known XSS exploits to exfiltrate emails and contacts. The worst part of this campaign is how low-effort it was. These aren’t cutting-edge 0-days. Instead, the target’s email servers just hadn’t been updated. Keep your webmail installs up to date!


hackaday.com/2025/05/16/this-w…




The W3C @tag has published the Privacy Principles as a W3C Statement. Privacy is an essential part of the web.

This document provides definitions for privacy and related concepts that are applicable worldwide as well as a set of privacy principles that should guide the development of the web as a trustworthy platform.

People using the web would benefit from a stronger relationship between technology and policy, and this document is written to work with both. #privacy
w3.org/news/2025/privacy-princ…




Greg Abbott signs law to shield publicly traded companies from 'rogue' shareholder lawsuits


Gov. Greg Abbott has signed into law a slate of fresh corporate protections, including provisions making it harder for shareholders to file lawsuits against publicly traded companies, like the one in Delaware that blocked a massive pay package for Tesla Inc. CEO Elon Musk, spurring him to move his companies to Texas.

The Republican governor said the measures would “attract businesses, attract job creators, and will ensure that Texans are going to have plentiful job opportunities to earn a great paycheck for decades to come.”

Under the new litigation law, shareholders could only bring so-called derivative claims that allege wrongdoing by executives if they hold a 3% stake in the company. The law also insulates all corporate directors and officers from most shareholder claims brought in the state’s new business courts, unless it can be proven that they committed fraud or knowingly broke the law. The changes would also shield executive’s emails, texts and other communications from shareholder inspection in most cases.



Tomorrow is the International Day Against Homophobia, Biphobia and Transphobia - #IDAHOTB

We understand how important it is for queer people to feel safe in the communities they build online. That's why we ensure the Community Guidelines across all of our services prevent hateful and harmful content.

If you see content that doesn't belong, please report it to the server admin. Together, we can make the open social web a home for LGBTQ+ people.

#LGBTQ #Queer #SocialWeb #Mastodon #IDAHOBIT

Questa voce è stata modificata (5 mesi fa)

reshared this



National Archaeological Museum, Athens, Greece.
그리스 고고학 박물관
アテネ国立考古学博物館

#photo #photography #사진 #写真 #Athens #Greece






US military commanders to be told to oust trans troops via medical checks


US military commanders will be told to identify troops in their units who are transgender or have gender dysphoria, then send them to get medical checks in order to force them out of the service.

A senior defense official on Thursday laid out what could be a complicated and lengthy new process aimed at fulfilling Donald Trump’s directive to remove transgender service members from the US military despite years of service alongside all the other two million US troops.




Trump’s ‘Good Cop, Bad Cop’ Game With Iran southfront.press/trumps-good-c…


HBO’s no good very bad rebrand theverge.com/the-vergecast/668… #Entertainment #Streaming #Vergecast #Podcasts #Android #Google #Apple #Tech


Today in Labor History May 16, 1934: Teamsters initiated a General Strike (5/16-8/21) for union recognition in Minneapolis-St. Paul, Minnesota, which was, then, the main distribution center for the upper Midwest. The worst violence occurred on Bloody Friday, July 20, when police shot at strikers in a downtown truck battle, killing two and injuring 67. Continuing violence lasted throughout the summer. The strike formally ended on August 22. The strike was led by the Trotskyist Communist League of America, which later founded the Socialist Workers Party (United States). While this General Strike was going on in Minneapolis, there was an equally violent General Strike going continuing on San Francisco’s waterfront (5/9-7/31), with much of the West Coast dockers joining them (Everett, WA; Portland, OR; Seattle, WA; and Los Angeles, CA). 9 workers were killed in the West Coast waterfront strikes, along with over 1,000 injuries and over 500 arrests. At the same time, there was also a General Strike going on in Toledo, OH, the Auto Lite Strike (4/12-6/3), in which 2 workers were killed.

#workingclass #LaborHistory #strike #generalstrike #union #minneapolis #sanfrancisco #toledo #police #policebrutality #socialism



Microsoft Fixes Windows Update That Broke GRUB in Dual-Boot Systems lxer.com/module/newswire/ext_l…


I let lasers power my smart home — and I don’t want to go back theverge.com/tech/663899/wi-ch… #SmartHomeReviews #Reviews #Tech


Today in Music History May 16, 1953: Romani guitar wizard and jazz legend, Django Reinhardt, died. Reinhardt was the first major jazz talent to emerge from Europe and is still probably the best. He formed the Paris-based Quintette du Hot Club de France in 1934 with violinist Stephane Grappelli. This group was one of the first jazz groups anywhere to feature guitar as a lead instrument. Reinhardt toured briefly with Duke Ellington in 1946. He died unexpectedly of a stroke at age 43. In 1928, he had an accident that left him only able to use his first two fingers on his left hand. This forced him to invent a new technique that allowed him to become even more proficient than he had been prior to the accident. He never learned to read or write music and played completely by ear.

youtube.com/watch?v=vVsC4UNYOH…

#djangoreinhardt #jazz #guitar #roma #romani #france



Acer’s Swift Edge laptop is gunning for the MacBook Air theverge.com/news/668200/acers… #Laptops #News #Tech



Interessante sta cosa oh !
gamberorosso.it/notizie/attual…


Via libera dall'Europa per il bonus giovani.
Con bonus giovani e donne almeno 100mila assunzioni stabili. A regime nel 2026 oltre 208milioni per donne, 682,5 per giovani. Con i bonus giovani e donne sarà possibile a regime assumere almeno 100mila persone a tempo indeterminato ma il numero potrebbe essere largamente superiore a fronte di assunzioni part time o con contratti che non..

#assunzioni #bonusgiovani #commissioneeuropea #ministerolavoro #Zonaeconomicaspeciale

scienzamagia.eu/sociale-collet…




Drag Your Friends To Linux Before Windows 10 Dies #Linux #YouTube youtu.be/9jOBP03XBjs



16 May 1936 | French Jewish girl, Lina Mendelsohn, was born in Paris.

She was deported to #Auschwitz from Drancy on 17 August 1942. She was murdered in a gas chamber after arrival selection.

reshared this



When Trump took office, the administration set up a tip line for employees to identify and assist in slashing programs focused on diversity, equity, inclusion and accessibility.

Not one of the EPA’s more than 15,000 employees used it, ProPublica learned via a public records request.
propublica.org/article/epa-div…

#News #EPA #Trump #DEI #Diversity #Government




Náhuatl and Mayan Language Renaissance Occurring in Mexico

Link: yucatanmagazine.com/mayan-lang…
Discussion: news.ycombinator.com/item?id=4…





Apple Music’s new transfer tool simplifies switching from other streaming services thever.ge/RgJe #Apple #Apps #News #Tech



Ransomware gang members increasingly use a new malware called Skitnet ("Bossnet") to perform stealthy post-exploitation activities on breached networks.

bleepingcomputer.com/news/secu…



For the tech founders of a startup, choosing a technology to run with can be difficult. My approach is to try to use the stack that has a good balance between features (for your use case) and accessibility; by that I mean, your skillset. If you're thinking of using C# - here's an interesting account of a startup's journey adopting the language from the beginning.

#dotnet #csharp #startup #tech #softwaredevelopment

devblogs.microsoft.com/dotnet/…




Innenminister Dobrindt verteidigt Migrationskurs

Die neue Bundesregierung hat das Thema Migration zur Priorität erklärt. Innenminister Dobrindt bekräftigt im Bundestag die geplante härtere Gangart. Die Reaktion beim Koalitionspartner SPD bleibt teils verhalten. Von Dietrich Karl Mäurer.

➡️ tagesschau.de/inland/innenpoli…

#Dobrindt #Bundestag #Migrationspolitik #Bundesregierung

in reply to tagesschau

Woher kommt nur der Hass und die Hetze der Schwesterparteien AFD und CXU?
in reply to tagesschau

Warum besteht die #SPD nicht auf der Einhaltung des Koalitionsvertrags? Wo ist das Einvernehmen der Nachbarländer?
#spd


Omolesbobitransfobia, 110 storie nel report 2025 di Arcigay. Piazzoni: "Dilaga il branco, spesso di ispirazione ideologica" gayburg.com/2025/05/omolesbobi…