Salta al contenuto principale



Yet another DCOM object for lateral movement



Introduction


If you’re a penetration tester, you know that lateral movement is becoming increasingly difficult, especially in well-defended environments. One common technique for remote command execution has been the use of DCOM objects.

Over the years, many different DCOM objects have been discovered. Some rely on native Windows components, others depend on third-party software such as Microsoft Office, and some are undocumented objects found through reverse engineering. While certain objects still work, others no longer function in newer versions of Windows.

This research presents a previously undescribed DCOM object that can be used for both command execution and potential persistence. This new technique abuses older initial access and persistence methods through Control Panel items.

First, we will discuss COM technology. After that, we will review the current state of the Impacket dcomexec script, focusing on objects that still function, and discuss potential fixes and improvements, then move on to techniques for enumerating objects on the system. Next, we will examine Control Panel items, how adversaries have used them for initial access and persistence, and how these items can be leveraged through a DCOM object to achieve command execution.

Finally, we will cover detection strategies to identify and respond to this type of activity.

COM/DCOM technology

What is COM?


COM stands for Component Object Model, a Microsoft technology that defines a binary standard for interoperability. It enables the creation of reusable software components that can interact at runtime without the need to compile COM libraries directly into an application.

These software components operate in a client–server model. A COM object exposes its functionality through one or more interfaces. An interface is essentially a collection of related member functions (methods).

COM also enables communication between processes running on the same machine by using local RPC (Remote Procedure Call) to handle cross-process communication.

Terms


To ensure a better understanding of its structure and functionality, let’s revise COM-related terminology.

  1. COM interface
    A COM interface defines the functionality that a COM object exposes. Each COM interface is identified by a unique GUID known as the IID (Interface ID). All COM interfaces can be found in the Windows Registry under HKEY_CLASSES_ROOT\Interface, where they are organized by GUID.
  2. COM class (COM CoClass)
    A COM class is the actual implementation of one or more COM interfaces. Like COM interfaces, classes are identified by unique GUIDs, but in this case the GUID is called the CLSID (Class ID). This GUID is used to locate the COM server and activate the corresponding COM class.All COM classes must be registered in the registry under HKEY_CLASSES_ROOT\CLSID, where each class’s GUID is stored. Under each GUID, you may find multiple subkeys that serve different purposes, such as:
    • InprocServer32/LocalServer32: Specifies the system path of the COM server where the class is defined. InprocServer32 is used for in-process servers (DLLs), while LocalServer32 is used for out-of-process servers (EXEs). We’ll describe this in more detail later.
    • ProgID: A human-readable name assigned to the COM class.
    • TypeLib: A binary description of the COM class (essentially documentation for the class).
    • AppID: Used to describe security configuration for the class.


  3. COM server
    A COM is the module where a COM class is defined. The server can be implemented as an EXE, in which case it is called an out-of-process server, or as a DLL, in which case it is called an in-process server. Each COM server has a unique file path or location in the system. Information about COM servers is stored in the Windows Registry. The COM runtime uses the registry to locate the server and perform further actions. Registry entries for COM servers are located under the HKEY_CLASSES_ROOT root key for both 32- and 64-bit servers.

Component Object Model implementation
Component Object Model implementation

Client–server model


  1. In-process server
    In the case of an in-process server, the server is implemented as a DLL. The client loads this DLL into its own address space and directly executes functions exposed by the COM object. This approach is efficient since both client and server run within the same process.
    In-process COM server
    In-process COM server
  2. Out-of-process server
    Here, the server is implemented and compiled as an executable (EXE). Since the client cannot load an EXE into its address space, the server runs in its own process, separate from the client. Communication between the two processes is handled via ALPC (Advanced Local Procedure Call) ports, which serve as the RPC transport layer for COM.

Out-of-process COM server
Out-of-process COM server

What is DCOM?


DCOM is an extension of COM where the D stands for Distributed. It enables the client and server to reside on different machines. From the user’s perspective, there is no difference: DCOM provides an abstraction layer that makes both the client and the server appear as if they are on the same machine.

Under the hood, however, COM uses TCP as the RPC transport layer to enable communication across machines.

Distributed COM implementation
Distributed COM implementation

Certain requirements must be met to extend a COM object into a DCOM object. The most important one for our research is the presence of the AppID subkey in the registry, located under the COM CLSID entry.

The AppID value contains a GUID that maps to a corresponding key under HKEY_CLASSES_ROOT\AppID. Several subkeys may exist under this GUID. Two critical ones are:

  • AccessPermission: controls access permissions.
  • LaunchPermission: controls activation permissions.

These registry settings grant remote clients permissions to activate and interact with DCOM objects.

Lateral movement via DCOM


After attackers compromise a host, their next objective is often to compromise additional machines. This is what we call lateral movement. One common lateral movement technique is to achieve remote command execution on a target machine. There are many ways to do this, one of which involves abusing DCOM objects.

In recent years, many DCOM objects have been discovered. This research focuses on the objects exposed by the Impacket script dcomexec.py that can be used for command execution. More specifically, three exposed objects are used: ShellWindows, ShellBrowserWindow and MMC20.

  1. ShellWindows
    ShellWindows was one of the first DCOM objects to be identified. It represents a collection of open shell windows and is hosted by explorer.exe, meaning any COM client communicates with that process.
    In Impacket’s dcomexec.py, once an instance of this COM object is created on a remote machine, the script provides a semi-interactive shell.

    Each time a user enters a command, the function exposed by the COM object is called. The command output is redirected to a file, which the script retrieves via SMB and displays back to simulate a regular shell.

    Internally, the script runs this command when connecting:

    cmd.exe /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__17602 2>&1

    This sets the working directory to C:\ and redirects the output to the ADMIN$ share under the filename __17602. After that, the script checks whether the file exists; if it does, execution is considered successful and the output appears as if in a shell.

    When running dcomexec.py against Windows 10 and 11 using the ShellWindows object, the script hangs after confirming SMB connection initialization and printing the SMB banner. As I mentioned in my personal blog post, it appears that this DCOM object no longer has permission to write to the ADMIN$ share. A simple fix is to redirect the output to a directory the DCOM object can write to, such as the Temp folder. The Temp folder can then be accessed under the same ADMIN$ share. A small change in the code resolves the issue. For example:

    OUTPUT_FILENAME = 'Temp\\__' + str(time.time())[:5]

  2. ShellBrowserWindow
    The ShellBrowserWindow object behaves almost identically to ShellWindows and exhibits the same behavior on Windows 10. The same workaround that we used for ShellWindows applies in this case. However, on Windows 11, this object no longer works for command execution.
  3. MMC20
    The MMC20.Application COM object is the automation interface for Microsoft Management Console (MMC). It exposes methods and properties that allow MMC snap-ins to be automated.
    This object has historically worked across all Windows versions. Starting with Windows Server 2025, however, attempting to use it triggers a Defender alert, and execution is blocked.

    As shown in earlier examples, the dcomexec.py script writes the command output to a file under ADMIN$, with a filename that begins with __:

    OUTPUT_FILENAME = '__' + str(time.time())[:5]

    Defender appears to check for files written under ADMIN$ that start with __, and when it detects one, it blocks the process and alerts the user. A quick fix is to simply remove the double underscores from the output filename.

    Another way to bypass this issue is to use the same workaround used for ShellWindows – redirecting the output to the Temp folder. The table below outlines the status of these objects across different Windows versions.

    Windows Server 2025Windows Server 2022Windows 11Windows 10
    ShellWindowsDoesn’t workDoesn’t workWorks but needs a fixWorks but needs a fix
    ShellBrowserWindowDoesn’t workDoesn’t workDoesn’t workWorks but needs a fix
    MMC20Detected by DefenderWorksWorksWorks


Enumerating COM/DCOM objects


The first step to identifying which DCOM objects could be used for lateral movement is to enumerate them. By enumerating, I don’t just mean listing the objects. Enumeration involves:

  • Finding objects and filtering specifically for DCOM objects.
  • Identifying their interfaces.
  • Inspecting the exposed functions.

Automating enumeration is difficult because most COM objects lack a type library (TypeLib). A TypeLib acts as documentation for an object: which interfaces it supports, which functions are exposed, and the definitions of those functions. Even when TypeLibs are available, manual inspection is often still required, as we will explain later.

There are several approaches to enumerating COM objects depending on their use cases. Next, we’ll describe the methods I used while conducting this research, taking into account both automated and manual methods.

  1. Automation using PowerShell
    In PowerShell, you can use .NET to create and interact with DCOM objects. Objects can be created using either their ProgID or CLSID, after which you can call their functions (as shown in the figure below).
    Shell.Application COM object function list in PowerShell
    Shell.Application COM object function list in PowerShell

    Under the hood, PowerShell checks whether the COM object has a TypeLib and implements the IDispatch interface. IDispatch enables late binding, which allows runtime dynamic object creation and function invocation. With these two conditions met, PowerShell can dynamically interact with COM objects at runtime.

    Our strategy looks like this:

    As you can see in the last box, we perform manual inspection to look for functions with names that could be of interest, such as Execute, Exec, Shell, etc. These names often indicate potential command execution capabilities.

    However, this approach has several limitations:

    • TypeLib requirement: Not all COM objects have a TypeLib, so many objects cannot be enumerated this way.
    • IDispatch requirement: Not all COM objects implement the IDispatch interface, which is required for PowerShell interaction.
    • Interface control: When you instantiate an object in PowerShell, you cannot choose which interface the instance will be tied to. If a COM class implements multiple interfaces, PowerShell will automatically select the one marked as [default] in the TypeLib. This means that other non-default interfaces, which may contain additional relevant functionality, such as command execution, could be overlooked.


  2. Automation using C++
    As you might expect, C++ is one of the languages that natively supports COM clients. Using C++, you can create instances of COM objects and call their functions via header files that define the interfaces.However, with this approach, we are not necessarily interested in calling functions directly. Instead, the goal is to check whether a specific COM object supports certain interfaces. The reasoning is that many interfaces have been found to contain functions that can be abused for command execution or other purposes.
    This strategy primarily relies on an interface called IUnknown. All COM interfaces should inherit from this interface, and all COM classes should implement it.The IUnknown interface exposes three main functions. The most important is QueryInterface(), which is used to ask a COM object for a pointer to one of its interfaces.So, the strategy is to:
    • Enumerate COM classes in the system by reading CLSIDs under the HKEY_CLASSES_ROOT\CLSID key.
    • Check whether they support any known valuable interfaces. If they do, those classes may be leveraged for command execution or other useful functionality.

    This method has several advantages:

    • No TypeLib dependency: Unlike PowerShell, this approach does not require the COM object to have a TypeLib.
    • Use of IUnknown: In C++, you can use the QueryInterface function from the base IUnknown interface to check if a particular interface is supported by a COM class.
    • No need for interface definitions: Even without knowing the exact interface structure, you can obtain a pointer to its virtual function table (vtable), typically cast as a void*. This is enough to confirm the existence of the interface and potentially inspect it further.

    The figure below illustrates this strategy:

    This approach is good in terms of automation because it eliminates the need for manual inspection. However, we are still only checking well-known interfaces commonly used for lateral movement, while potentially missing others.

  3. Manual inspection using open-source tools

    As you can see, automation can be difficult since it requires several prerequisites and, in many cases, still ends with a manual inspection. An alternative approach is manual inspection using a tool called OleViewDotNet, developed by James Forshaw. This tool allows you to:

    • List all COM classes in the system.
    • Create instances of those classes.
    • Check their supported interfaces.
    • Call specific functions.
    • Apply various filters for easier analysis.
    • Perform other inspection tasks.

    Open-source tool for inspecting COM interfaces
    Open-source tool for inspecting COM interfaces

    One of the most valuable features of this tool is its naming visibility. OleViewDotNet extracts the names of interfaces and classes (when available) from the Windows Registry and displays them, along with any associated type libraries.

    This makes manual inspection easier, since you can analyze the names of classes, interfaces, or type libraries and correlate them with potentially interesting functionality, for example, functions that could lead to command execution or persistence techniques.


Control Panel items as attack surfaces


Control Panel items allow users to view and adjust their computer settings. These items are implemented as DLLs that export the CPlApplet function and typically have the .cpl extension. Control Panel items can also be executables, but our research will focus on DLLs only.

Control Panel items
Control Panel items

Attackers can abuse CPL files for initial access. When a user executes a malicious .cpl file (e.g., delivered via phishing), the system may be compromised – a technique mapped to MITRE ATT&CK T1218.002.

Adversaries may also modify the extensions of malicious DLLs to .cpl and register them in the corresponding locations in the registry.

  • Under HKEY_CURRENT_USER:
    HKCU\Software\Microsoft\Windows\CurrentVersion\Control Panel\Cpls
  • Under HKEY_LOCAL_MACHINE:
    • For 64-bit DLLs:
      HKLM\Software\Microsoft\Windows\CurrentVersion\Control Panel\Cpls
    • For 32-bit DLLs:
      HKLM\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Control Panel\Cpls


These locations are important when Control Panel DLLs need to be available to the current logged-in user or to all users on the machine. However, the “Control Panel” subkey and its “Cpls” subkey under HKCU should be created manually, unlike the “Control Panel” and “Cpls” subkeys under HKLM, which are created automatically by the operating system.

Once registered, the DLL (CPL file) will load every time the Control Panel is opened, enabling persistence on the victim’s system.

It’s worth noting that even DLLs that do not comply with the CPL specification, do not export CPlApplet, or do not have the .cpl extension can still be executed via their DllEntryPoint function if they are registered under the registry keys listed above.

There are multiple ways to execute Control Panel items:

  • From cmd: exe [filename].cpl
  • By double-clicking the .cpl file.

Both methods use rundll32.exe under the hood:

rundll32.exe shell32.dll,Control_RunDLL [filename].cpl

This calls the Control_RunDLL function from shell32.dll, passing the CPL file as an argument. Everything inside the CPlApplet function will then be executed.

However, if the CPL file has been registered in the registry as shown earlier, then every time the Control Panel is opened, the file is loaded into memory through the COM Surrogate process (dllhost.exe):

COM Surrogate process loading the CPL file
COM Surrogate process loading the CPL file

What happened was that a Control Panel with a COM client used a COM object to load these CPL files. We will talk about this COM object in more detail later.

The COM Surrogate process was designed to host COM server DLLs in a separate process rather than loading them directly into the client process’s address space. This isolation improves stability for the in-process server model. This hosting behavior can be configured for a COM object in the registry if you want a COM server DLL to run inside a separate process because, by default, it is loaded in the same process.

‘DCOMing’ through Control Panel items


While following the manual approach of enumerating COM/DCOM objects that could be useful for lateral movement, I came across a COM object called COpenControlPanel, which is exposed through shell32.dll and has the CLSID {06622D85-6856-4460-8DE1-A81921B41C4B}. This object exposes multiple interfaces, one of which is IOpenControlPanel with IID {D11AD862-66DE-4DF4-BF6C-1F5621996AF1}.

IOpenControlPanel interface in the OleViewDotNet output
IOpenControlPanel interface in the OleViewDotNet output

I immediately thought of its potential to compromise Control Panel items, so I wanted to check which functions were exposed by this interface. Unfortunately, neither the interface nor the COM class has a type library.

COpenControlPanel interfaces without TypeLib
COpenControlPanel interfaces without TypeLib

Normally, checking the interface definition would require reverse engineering, so at first, it looked like we needed to take a different research path. However, it turned out that the IOpenControlPanel interface is documented on MSDN, and according to the documentation, it exposes several functions. One of them, called Open, allows a specified Control Panel item to be opened using its name as the first argument.

Full type and function definitions are provided in the shobjidl_core.h Windows header file.

Open function exposed by IOpenControlPanel interface
Open function exposed by IOpenControlPanel interface

It’s worth noting that in newer versions of Windows (e.g., Windows Server 2025 and Windows 11), Microsoft has removed interface names from the registry, which means they can no longer be identified through OleViewDotNet.

COpenControlPanel interfaces without names
COpenControlPanel interfaces without names

Returning to the COpenControlPanel COM object, I found that the Open function can trigger a DLL to be loaded into memory if it has been registered in the registry. For the purposes of this research, I created a DLL that basically just spawns a message box which is defined under the DllEntryPoint function. I registered it under HKCU\Software\Microsoft\Windows\CurrentVersion\Control Panel\Cpls and then created a simple C++ COM client to call the Open function on this interface.

As expected, the DLL was loaded into memory. It was hosted in the same way that it would be if the Control Panel itself was opened: through the COM Surrogate process (dllhost.exe). Using Process Explorer, it was clear that dllhost.exe loaded my DLL while simultaneously hosting the COpenControlPanel object along with other COM objects.

COM Surrogate loading a custom DLL and hosting the COpenControlPanel object
COM Surrogate loading a custom DLL and hosting the COpenControlPanel object

Based on my testing, I made the following observations:

  1. The DLL that needs to be registered does not necessarily have to be a .cpl file; any DLL with a valid entry point will be loaded.
  2. The Open() function accepts the name of a Control Panel item as its first argument. However, it appears that even if a random string is supplied, it still causes all DLLs registered in the relevant registry location to be loaded into memory.

Now, what if we could trigger this COM object remotely? In other words, what if it is not just a COM object but also a DCOM object? To verify this, we checked the AppID of the COpenControlPanel object using OleViewDotNet.

COpenControlPanel object in OleViewDotNet
COpenControlPanel object in OleViewDotNet

Both the launch and access permissions are empty, which means the object will follow the system’s default DCOM security policy. By default, members of the Administrators group are allowed to launch and access the DCOM object.

Based on this, we can build a remote strategy. First, upload the “malicious” DLL, then use the Remote Registry service to register it in the appropriate registry location. Finally, use a trigger acting as a DCOM client to remotely invoke the Open() function, causing our DLL to be loaded. The diagram below illustrates the flow of this approach.

Malicious DLL loading using DCOM
Malicious DLL loading using DCOM

The trigger can be written in either C++ or Python, for example, using Impacket. I chose Python because of its flexibility. The trigger itself is straightforward: we define the DCOM class, the interface, and the function to call. The full code example can be found here.

Once the trigger runs, the behavior will be the same as when executing the COM client locally: our DLL will be loaded through the COM Surrogate process (dllhost.exe).

As you can see, this technique not only achieves command execution but also provides persistence. It can be triggered in two ways: when a user opens the Control Panel or remotely at any time via DCOM.

Detection


The first step in detecting such activity is to check whether any Control Panel items have been registered under the following registry paths:

  • HKCU\Software\Microsoft\Windows\CurrentVersion\Control Panel\Cpls
  • HKLM\Software\Microsoft\Windows\CurrentVersion\Control Panel\Cpls
  • HKLM\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Control Panel\Cpls

Although commonly known best practices and research papers regarding Windows security advise monitoring only the first subkey, for thorough coverage it is important to monitor all of the above.

In addition, monitoring dllhost.exe (COM Surrogate) for unusual COM objects such as COpenControlPanel can provide indicators of malicious activity.
Finally, it is always recommended to monitor Remote Registry usage because it is commonly abused in many types of attacks, not just in this scenario.

Conclusion


In conclusion, I hope this research has clarified yet another attack vector and emphasized the importance of implementing hardening practices. Below are a few closing points for security researchers to take into account:

  • As shown, DCOM represents a large attack surface. Windows exposes many DCOM classes, a significant number of which lack type libraries – meaning reverse engineering can reveal additional classes that may be abused for lateral movement.
  • Changing registry values to register malicious CPLs is not good practice from a red teaming ethics perspective. Defender products tend to monitor common persistence paths, but Control Panel applets can be registered in multiple registry locations, so there is always a gap that can be exploited.
  • Bitness also matters. On x64 systems, loading a 32-bit DLL will spawn a 32-bit COM Surrogate process (dllhost.exe *32). This is unusual on 64-bit hosts and therefore serves as a useful detection signal for defenders and an interesting red flag for red teamers to consider.

securelist.com/lateral-movemen…



Windmill Desk Lamp Is Beautifully Soothing


Typically, lamps provide a stationary source of light to illuminate a given area and help us see what we’re doing. However, they can also be a little more artistic and eye-catching, like this windmill lamp from [Huy Vector].

It’s somewhat of a charming desk toy, constructed out of copper wire soldered into the form of a traditional windmill. At its base, lives a simple motor speed controller, while up top, a brushed DC gearmotor is responsible for turning the blades. As you might imagine, it’s a little tricky to get power to flow to the LED filaments installed on those blades while they happen to be rotating. That’s where the build gets tricky, using the output shaft of the motor’s gear drive and a custom slip ring to pass power to the LEDs. That power comes courtesy of a pair of 16340 lithium-ion cells, which can be juiced up with the aid of a USB-C charger board.

It’s an elegant build, and rather charming to watch in motion to boot. We love a good lamp build here at Hackaday, particularly when they’re aesthetically beautiful.

youtube.com/embed/NdYTs1NasPw?…


hackaday.com/2025/12/19/windmi…



The Miracle of Color TV


We’ve often said that some technological advancements seemed like alien technology for their time. Sometimes we look back and think something would be easy until we realize they didn’t have the tools we have today. One of the biggest examples of this is how, in the 1950s, engineers created a color image that still plays on a black-and-white set, with the color sets also able to receive the old signals. [Electromagnetic Videos] tells the tale. The video below simulates various video artifacts, so you not only learn about the details of NTSC video, but also see some of the discussed effects in real time.

Creating a black-and-white signal was already a big deal, with the video and sync presented in an analog AM signal with the sound superimposed with FM. People had demonstrated color earlier, but it wasn’t practical for several reasons. Sending, for example, separate red, blue, and green signals would require wider channels and more complex receivers, and would be incompatible with older sets.

The trick, at least for the NTSC standard, was to add a roughly 3.58 MHz sine wave and use its phase to identify color. The amplitude of the sine wave gave the color’s brightness. The video explains why it is not exactly 3.58 MHz but 3.579545 MHz. This made it nearly invisible on older TVs, and new black-and-white sets incorporate a trap to filter that frequency out anyway. So you can identify any color by providing a phase angle and amplitude.

The final part of the puzzle is to filter the color signal, which makes it appear fuzzy, while retaining the sharp black-and-white image that your eye processes as a perfectly good image. If you can make the black-and-white signal line up with the color signal, you get a nice image. In older sets, this was done with a short delay line, although newer TVs used comb filters. Some TV systems, like PAL, relied on longer delays and had correspondingly beefier delay lines.

There are plenty of more details. Watch the video. We love how, back then, engineers worried about backward compatibility. Like stereo records, for example. Even though NTSC (sometimes jokingly called “never twice the same color”) has been dead for a while, we still like to look back at it.

youtube.com/embed/EPQq7xd3WdA?…


hackaday.com/2025/12/18/the-mi…



Zero-day nei firewall WatchGuard: Una RCE senza login è già sotto sfruttamento


Una vulnerabilità zero-day critica, identificata come CVE-2025-14733, ha messo in ginocchio gli amministratori di rete, costringendoli a una corsa contro il tempo per proteggere i loro sistemi.

Questa falla, con un punteggio CVSS di 9,3 rilevata sui firewall WatchGuard, è davvero pericolosa: consente ad aggressori non autenticati di eseguire codice arbitrario e assumere il controllo dei firewall aziendali.

E il fatto che gli autori delle minacce stiano già tentando di sfruttare questa vulnerabilità non fa che aumentare l’allarme. Vediamo quindi di capire meglio cosa sta succedendo e come questa vulnerabilità possa essere sfruttata dagli aggressori.

Il processo iked, che gestisce le negoziazioni IKEv2 (Internet Key Exchange) per le VPN, presenta una vulnerabilità che risiede nella sua capacità di essere sfruttata per eseguire operazioni non previste. Gli aggressori possono, da remoto, causare un errore di tipo “Out-of-bounds Write”, il quale comporta la corruzione della memoria. Questa falla permette agli attaccanti di influenzare il comportamento del sistema.

Inviando pacchetti dannosi appositamente creati all’interfaccia VPN del firewall, un aggressore può bloccare il servizio o, peggio, iniettare i propri comandi con privilegi a livello di sistema.

Ciò che rende questa vulnerabilità particolarmente insidiosa è la sua persistenza. Prende di mira le configurazioni VPN per utenti mobili e VPN per filiali che utilizzano IKEv2. Tuttavia, disattivare semplicemente la funzionalità potrebbe non essere sufficiente.

L’avviso mette in guardia da uno scenario di configurazione “zombie”: “Se Firebox era precedentemente configurato con la VPN dell’utente mobile con IKEv2… ed entrambe le configurazioni sono state successivamente eliminate, Firebox potrebbe essere ancora vulnerabile se è ancora configurata una VPN di filiale verso un peer gateway statico”.

WatchGuard ha rilasciato specifici indicatori di attacco (IoA) per aiutare i difensori a capire se sono già sotto attacco. Gli aggressori lasciano impronte digitali nei log. Un segnale rivelatore di un tentativo di exploit è un payload di certificato insolitamente grande.

Inoltre, i seguenti indirizzi IP sono stati direttamente collegati alla campagna di sfruttamento attiva: 45.95.19[.]50, 51.15.17[.]89, 172.93.107[.]67, 199.247.7[.]82. La vulnerabilità interessa un’ampia gamma di versioni del sistema operativo Fireware, tra cui 12.x e 2025.1. WatchGuard ha rilasciato versioni con patch (2025.1.4, 12.11.6 e 12.5.15) e sollecita aggiornamenti immediati.

Tuttavia, applicare una patch al software è solo il primo passo. Poiché la falla consente la compromissione totale del dispositivo, un dispositivo con patch potrebbe comunque nascondere segreti rubati.

L'articolo Zero-day nei firewall WatchGuard: Una RCE senza login è già sotto sfruttamento proviene da Red Hot Cyber.



Navigare nel Dark Web: distinzioni concettuali e il paradosso dell’anonimato


Dopo aver approfondito i delicati equilibri che vincolano gli operatori di Cyber Threat Intelligence(CTI) tra il GDPR e il rischio di Ricettazione, è fondamentale rivolgere l’attenzione a chiunque, spinto da mera curiosità o ricerca accademica, si avventuri nelle aree nascoste della rete. Il rischio penale, in questo contesto, è sproporzionato rispetto a qualsiasi altra attività onlinelecita, e la linea di confine tra un atto neutrale e l’illecito sfuma in modo pericoloso.

Come docente di Diritto penale dell’informatica, insisto sempre sulla distinzione concettuale. Il Deep Web costituisce la vasta maggioranza (circa il 90%) di Internet, ospitando archivi aziendali, database governativi e account privati protetti da credenziali di accesso: un ambiente che, se utilizzato correttamente, è relativamente legittimo e innocuo.

Il Dark Web, al contrario, è una sua porzione intenzionalmente celata, accessibile solo tramite software di anonimizzazione, come il browser Tor. La sua funzione duale è il fulcro del problema giuridico. Se da un lato offre rifugio a difensori della privacy e attivisti politici, dall’altro è il locus privilegiato per la compravendita di servizi criminali, ransomware e dati rubati.

La navigazione non è mai neutra


Nel Diritto penale italiano, l’atto tecnico di accedere al Dark Web non è intrinsecamente illegale; l’illegalità subentra solo con la specifica condotta e il contenuto acquisito. Tuttavia, la notorietà dell’ambiente come epicentro di attività illecite genera un intrinseco e elevato profilo di sospetto criminologico.

Ai miei studenti spiego che, in fase istruttoria, l’impiego di protocolli di anonimizzazione come Tor non è mai un elemento neutrale. Al contrario, tende a essere interpretato dall’Autorità Giudiziaria come un indizio a supporto di un animus nocendi o furandi. Questo è il primo, grave rischio che corre il navigatore curioso: essere sospettato di dolo solo in virtù del mezzo utilizzato.

Ma il pericolo maggiore, nella prassi forense, è il contatto involontario con illeciti materiali. Parliamo non solo dell’acquisto intenzionale, ma dell’esposizione o acquisizione non voluta di contenuti la cui semplice detenzione integra un reato. È incredibilmente facile, nel Dark Web, cadere vittime di trappole, malware o, peggio, finire nei guai a causa di file scaricati involontariamente, come materiale pedopornografico.La consapevolezza del contenuto, anche successiva all’acquisizione, è l’elemento che perfeziona il delitto di detenzione.

La normativa europea (NIS2 e DSA) tra maggiore tracciabilità e la prova dell’intenzione.


Il quadro normativo europeo, pur non puntando a punire la navigazione anonima, aumenta indirettamente il rischio di tracciabilità e responsabilità.

La Direttiva NIS2, che innalza il livello comune di cibersicurezza, riconosce esplicitamente il Dark Web come fonte primaria di minacce (come ransomware e credenziali rubate) per le infrastrutture critiche. Questo rafforza le capacità investigative congiunte. L”intelligence sul Dark Web, raccolta per fini difensivi, diventa un elemento prezioso per le indagini penali, rendendo più probabile che le tracce digitali, un tempo protette dall’anonimato, vengano acquisite e utilizzate a fini probatori.

Di notevole interesse è il Digital Services Act (DSA) che, nel vietare i dark pattern (pratiche manipolatorie nel design delle piattaforme), apre uno spiraglio difensivo cruciale. Come avvocato penalista, considero questa norma una potenziale leva per attenuare l’elemento psicologico del dolo. Se un sito onion utilizza tecniche ingannevoli per indurre l’utente a scaricare un programma malevolo o ad accedere a una sezione protetta, la manipolazione del processo decisionale autonomo può essere addotta come elemento per dimostrare l’assenza di coscienza e volontà nella commissione del reato.

Quando il curioso diventa criminale


La crisi della neutralità nel diritto italiano si manifesta nell’applicazione di specifiche fattispecie che non perdonano la “curiosità”.

L’Art. 615-ter c.p. punisce chiunque acceda abusivamente a un sistema protetto da misure di sicurezza o vi si mantenga contro la volontà del titolare. Il rischio è elevatissimo nel Dark Web, dove molti siti onion sono protetti e il locus è intrinsecamente ostile.

La giurisprudenza di legittimità ha chiarito che l’abusività della condotta si configura nella violazione oggettiva delle cautele di sicurezza, indipendentemente dal fine ultimo. Il doloè generico. E’ sufficiente la coscienza e volontà di entrare nel sistema protetto senza averne diritto. In sostanza, l’esplorazione, anche se motivata da intenti leciti o di studio, che comporti il superamento di misure di sicurezza, costituisce reato. L’intento di ricerca non è una scriminante.

Il legislatore ha anticipato la soglia di punibilità per intercettare il cyber crime nella fase preparatoria. Il vecchio Art. 615-quinquies c.p, ora 635 quater 1 , punisce il mero procurarsi programmi informatici, dispositivi o apparecchiature destinate a danneggiare sistemi o interromperne il funzionamento.

Questa norma è il “firewall penale” del nostro ordinamento. Il rischio per il navigatore che scarica un tool da un forum Dark Web, magari per testare una vulnerabilità sul proprio sistema (intentio non criminosa), è massimo. Il reato richiede il dolo specifico(agire con lo scopo di danneggiare o interrompere), ma la Procura può facilmente inferire questo dolo dalla natura oggettivamente illecita del locus di acquisizione e dalla specifica pericolosità dello strumento. L’onere di dimostrare la finalità lecita (ad esempio, ricerca accademica) si riversa integralmente sull’utente, che deve superare il forte sospetto generato dal contesto ambientale.

Come ho già avuto modo di sottolineare in precedenti scritti, la sanzione amministrativa passa in secondo piano di fronte al rischio penale di ricettazione(Articolo 648 c.p.) e, soprattutto, alla detenzione di materiale pedopornografico (Art. 600-quater c.p.). Il Garante Privacy ha, inoltre, esplicitamente messo in guardia: “scaricare dati dal dark web è reato”. Il possesso, anche temporaneo, di credenziali rubate o di merce illecita espone al rischio di ricettazione.

Per quanto riguarda la pedopornografia, il reato si consuma con la mera disponibilità del materiale, richiedendo il solo dolo generico (la consapevolezza del contenuto illecito). La facilità con cui si può inavvertitamente acquisire un file illecito in piattaforme aggressive rende la detenzione involontaria una difesa estremamente fragile, a meno di non dimostrare la totale e assoluta inconsapevolezza del contenuto.

Le best practice per isolare l’intento lecito dal dolo criminale


Per il navigatore non criminale, la prevenzione è l’unica vera difesa, e si articola in quattro capisaldi irrinunciabili. In primo luogo, la documentazione dell’intento. E’ imprescindibile documentare in modo scrupoloso e provabile la finalità lecita e legittima di ogni accesso o acquisizione, poiché la mera curiosità non regge il sospetto istruttorio. In secondo luogo, l’astensione assoluta dall’acquisizione di strumenti.Si deve evitare rigorosamente di procurarsi qualsiasi programma o exploit che ricada nell’Art 635 quater 1, primaart. 615-quinquies c.p. Terzo, la separazione tecnica. L”utilizzo costante di ambienti virtuali o sistemi operativi isolati per la navigazione Dark Web non solo previene la contaminazione di sistemi personali, ma limita l’estensione del sequestro probatorio a dati non pertinenti all’indagine. Infine, la consapevolezza del ontenuto. L”utente deve essere consapevole che l’ambiente è strutturato per l’inganno (dark pattern e trappole investigative) e che la detenzione di file la cui natura è oggettivamente illecita non ammette difese basate sulla non intenzionalità, ma solo sulla comprovata totale inconsapevolezza.

L'articolo Navigare nel Dark Web: distinzioni concettuali e il paradosso dell’anonimato proviene da Red Hot Cyber.



“Il mondo non attende da noi l’immagine di una istituzione senza crepe, né un ennesimo discorso che indica ciò che si dovrebbe fare: ha bisogno di incontrare in noi una comunità che, pur nelle sue imperfezioni e contraddizioni, vive davvero nella luc…


Omaggio a Jane Austen, una penna per lo schermo


@Giornalismo e disordine informativo
articolo21.org/2025/12/omaggio…
In un panorama culturale saturo di celebrazioni per il 250° anniversario della nascita di Jane Austen, il saggio di Giancarlo Zappoli e Claudia Bersani si propone come un intervento necessario e ambizioso. “Jane Austen, una penna per



Il Governo fa marcia indietro: la stretta sulle pensioni esce della manovra


@Politica interna, europea e internazionale
Il Governo fa marcia indietro sulle pensioni: nella Legge di Bilancio 2026 non ci sarà la stretta che si era prefigurata nei giorni scorsi con il maxi-emendamento alla manovra presentato dall’esecutivo. Il ministro dell’Economia Giancarlo Giorgetti, tra i principali

in reply to Elezioni e Politica 2025

vedi che hanno fatto anche cose buone? Siamo proprio una massa di komunisti inutili!

[sarcasm: on]

Questa voce è stata modificata (3 giorni fa)


PODCAST. La Cina espande la sua influenza nel Golfo


@Notizie dall'Italia e dal mondo
Pechino promuove il suo modello di cooperazione alternativo agli Usa e ai paesi arabi ora servono i suoi investimenti in tecnologie green
L'articolo PODCAST. La Cina espande la sua influenza nel Golfo pagineesteri.it/2025/12/19/med…



Ustica, non archiviate la ricerca di tutta la verità


@Giornalismo e disordine informativo
articolo21.org/2025/12/ustica-…
I parenti delle vittime della strage di Ustica oggi sono davanti al Gip per opporsi alla domanda di archiviazione dell’indagine aperta nel 2008 per la denuncia/testimonianza di Cossiga che indicava i francesi,





Sicherheitsbehörden und Databroker: Bundesregierung macht Datenkauf zum Staatsgeheimnis


netzpolitik.org/2025/sicherhei…



Miguel Bonnefoy – Il sogno del giaguaro
freezonemagazine.com/articoli/…
Ho scelto di leggere questo romanzo perché ho sempre subito il fascino dell’America Latina e delle storie che in essa nascono, ma ero piuttosto scettica all’inizio perché spesso nei libri ambientati in questa parte di mondo ci si trova di fronte a un eccessivo utilizzo del “realismo magico”, dell’irreale, del soprannaturale, che non si sposano […]
L'articolo Miguel Bonnefoy –


“Vittoria!”. Nei Paesi Baschi la mobilitazione batte la speculazione


@Notizie dall'Italia e dal mondo
Dopo tre anni di massicce proteste i comitati e gli abitanti sono riusciti a bloccare la realizzazione di un progetto speculativo del museo Guggenheim all'interno dell'unica riserva naturale dei Paesi Baschi
L'articolo “Vittoria!”. Nei Paesi Baschi la mobilitazione batte la speculazione



Decine di Ong internazionali perderanno l’accesso a Gaza e in Cisgiordania


@Notizie dall'Italia e dal mondo
A causa delle nuove regole di registrazione decise da Israele decine di gruppi umanitari internazionali rischiano la cancellazione entro il 31 dicembre, e dovranno chiudere le operazioni entro 60 giorni
L'articolo Decine di Ong internazionali perderanno




Oversight Democrats released a new trove of Epstein pictures on Dropbox and left the comments on.#News #JeffreyEpstein


The Government Added a Comments Section to the Epstein Photo Dump


Update: After publication of this piece, House Oversight Democrats disabled comments on the photos. The original article follows below.

Thursday afternoon House Democrats publicly released a new trove of photographs they’ve obtained from the estate of Jeffrey Epstein via Dropbox. They left the comments on so anyone who is signed into Dropbox and browsing the material can leave behind their thoughts.

Given that the investigation into Epstein is one of the most closely followed cases in the world and a subject of endless conspiracy theories, and that the committee released the trove of photographs with no context, it’s not surprising that people immediately began commenting on the photographs.
playlist.megaphone.fm?p=TBIEA2…
“Really punchable face,” BedeScarlet—whose avatar is Cloud from Final Fantasy VIIsaid above a picture of New York Times columnist David Brooks. Brooks, who wrote a column about his boredom with the Epstein case in November, attended a dinner with Epstein in 2011 and appears in two photographs in this new document dump.

“Noam Chomsky,” Alya Colours (a frequent Epstein dropbox commenter) said below a photograph of the linguist talking to Epstein on a plane. Below this there is a little prompt from Dropbox asking me to “join the conversation” next to a smiley face.

In another picture, director Woody Allen is bundled up to his eyes in a heavy coat while Epstein side hugs him. “Yep, I’d know that face anywhere,” Susan Brown commented.

Among the pictures is a closeup of a prescription bottle labeled Phenazopyridine. “This is a medication used to treat pain from urinary tract infections,” Rebecca Stinton added, helpfully, in the comments.

“The fuck were they doing all that math for?” BedeScarlet said next to a picture of Epstein in front of a whiteboard covered in equations.

“Shit probably tastes like ass,” he added to a picture of Epstein cooking something in a kitchen.

There are darker and weird photographs in this collection of images that, as of this writing, do not yet have comments. There’s a pair of box springs in an unfinished room lit by the sun. There is a map of Little St James indicating where Epstein wants various buildings constructed. Bill Gates is shown in two photos standing next to women with their faces blocked out.

And then there are the Lolita pictures. A woman’s foot sits in the foreground, a worn annotated copy of Vladimir Nabokov novel Lolita in the background. “She was Lo, plain Lo, in the morning, standing four feet teen in one sock,” is written on the foot, a quote from the novel.

These photos are followed by a series of pictures of passports with the information redacted. Some are from Ukraine. There’s one from South Africa and another from the Czech Republic.

The House Democrats allowing the public to comment on these photos is funny and it’s unclear if intentional or a mistake. It’s also a continuation of the just-get-out-there approach when they have published other material, with it sometimes being in unsorted caches that readers then have to dig through. The only grand revelation in the new material is that Brooks was present at a dinner with Epstein in 2011.

“As a journalist, David Brooks regularly attends events to speak with noted and important business leaders to inform his columns, which is exactly what happened at this 2011 event. Mr. Brooks had no contact with him before or after this single attendance at a widely-attended dinner,” a Times spokesperson told Semafor’s Max Tani.

House Oversight Democrats did not immediately return 404 Media’s request for comment.




AI Solutions 87 says on its website its AI agents “deliver rapid acceleration in finding persons of interest and mapping their entire network.”#ICE #AI


ICE Contracts Company Making Bounty Hunter AI Agents


Immigration and Customs Enforcement (ICE) has paid hundreds of thousands of dollars to a company that makes “AI agents” to rapidly track down targets. The company claims the “skip tracing” AI agents help agencies find people of interest and map out their family and other associates more quickly. According to the procurement records, the company’s services were specifically for Enforcement and Removal Operations (ERO), the part of ICE that identifies, arrests, and deports people.

The contract comes as ICE is spending millions of dollars, and plans to spend tens of millions more, on skip tracing services more broadly. The practice involves ICE paying bounty hunters to use digital tools and physically stalk immigrants to verify their addresses, then report that information to ICE so the agency can act.

This post is for subscribers only


Become a member to get access to all content
Subscribe now


#ai #ice


Il percorso delle celebrazioni per l’Ottavo Centenario francescano prosegue con un appuntamento musicale: venerdì 20 dicembre, alle ore 19, nella Chiesa di San Francesco a Ripa, si terrà “Canto delle Creature”, progetto di Ambrogio Sparagna con l’Orc…


Si è costituito il Centro Studi Internazionale Leone XIV Ets, Ente del terzo settore con sede a Firenze. Eretto dall’Ordine di Sant’Agostino con il consenso del Santo Padre, il Centro ha sede presso il Convento di Santo Spirito.


Anlasslose Massenüberwachung: SPD-Politiker fordert Inhaltskontrolle auf allen Endgeräten


netzpolitik.org/2025/anlasslos…

Fena Hize reshared this.






Radar e sicurezza, l’intesa tra Difesa e Leonardo

@Notizie dall'Italia e dal mondo

L’Italia compie un nuovo passo nel rafforzamento delle proprie capacità di difesa contro le minacce a lungo raggio, in una fase in cui la sicurezza europea è attraversata da trasformazioni rapide e da un ritorno della centralità dei sistemi di protezione integrata. Il quadro strategico dell’annuncio L’annuncio riguarda



Maurizio Belpietro è stato condannato per diffamazione per una copertina di Panorama che definiva le ong “i nuovi pirati”


Dovrà risarcire con 10mila euro ciascuna le ong Open Arms, Emergency, Sea-Watch, SOS Mediterranée, Louise Michel e Mediterranea, e con 7mila euro AOI, associazione che rappresenta le organizzazioni non governative italiane

Tutto questo è bellissimo 😁



Humanity has talked about aliens throughout recorded history, and obsession that has changed science, faith, and media.#Podcast #aliens


Why Are We Obsessed With Aliens?


The past few years have been very exciting for those who want to believe. The U.S. government has released tantalizing videos and held several gripping hearings showing and discussing UFOs. People who always thought the government was hiding evidence of alien life from the general population saw it as proof that what they’ve said was happening all along. Skeptics have made compelling arguments for why all these revelations could be anything but aliens.

But this debate and humanity’s obsession with aliens goes as far back as recorded history. In her book, First Contact: The Story of Our Obsession with Aliens, 404 Media’s science reporter and author of The Abstract newsletter Becky Ferreira delves deep into this history, what it teaches us about humans, and what the near and far future of the search for alien life looks like.
open.spotify.com/embed/episode…
I had a great time reading Becky’s book and an even better time discussing it with her on the podcast. It’s a great conversation that unpacks why these stories get so much attention, and a perspective on aliens in the news and pop culture that’s rooted in history and science.

Listen to the weekly podcast on Apple Podcasts, Spotify, or YouTube.

Become a paid subscriber for early access to these interview episodes and to power our journalism. If you become a paid subscriber, check your inbox for an email from our podcast host Transistor for a link to the subscribers-only version! You can also add that subscribers feed to your podcast app of choice and never miss an episode that way. The email should also contain the subscribers-only unlisted YouTube link for the extended video version too. It will also be in the show notes in your podcast player.
youtube.com/embed/QToByEeq2vU?…




Druetti-Marro: sgombero Askatasuna, altro che sicurezza, rappresaglie governative e repressione del dissenso militarizzano i quartieri


Druetti (Possibile)-Marro (AVS): sgombero Askatasuna, altro che sicurezza, rappresaglie governative e repressione del dissenso militarizzano i quartieri

“Lo sgombero dell’Askatasuna è allo stesso tempo una rappresaglia e un ennesimo tassello nel progetto sistematico di repressione del dissenso e degli spazi sociali e solidali da parte del governo”, dichiara Francesca Druetti, Segretaria Nazionale di Possibile. “Così è stato per il Leoncavallo, così è per ogni spazio simbolo e realtà attiva sui territori”.

“Perquisizioni e sgomberi notturni e una militarizzazione dei quartieri, con scuole inaccessibili e strade bloccate, come testimoniano i cittadini e le cittadine che si sono trovate davanti uno scenario di guerra mentre portavano i figli a scuola non rendono niente e nessuno più sicuro, anzi”, continua Giulia Marro, Consigliera Regionale di Avs in Piemonte. “Danno volto e sostanza a una distopia autoritaria in cui conta solo fare sfoggio di muscoli e manganello, aprendo gli idranti sui presidi pacifici e interrompendo con cordoni di polizia in assetto anti sommossa la vita quotidiana delle persone”.

“Questa non sarà mai la nostra definizione di sicurezza, né la risposta alla tensione e alle proteste. Ci vediamo alle 18.00 al presidio in corso Regina 47 con tutte le persone solidali che la pensano così”, concludono Marro e Druetti.

L'articolo Druetti-Marro: sgombero Askatasuna, altro che sicurezza, rappresaglie governative e repressione del dissenso militarizzano i quartieri proviene da Possibile.



Ieri il Ministro Giuseppe Valditara ha incontrato al #MIM le delegazioni delle scuole vincitrici della prima edizione del concorso “San Francesco d’Assisi: il pensiero, l’opera, la cultura e la sua eredità”.
#MIM


Papa Leone XIV ha pranzato oggi nella nunziatura apostolica presso lo Stato italiano, per poi recarsi, nel primo pomeriggio al Palazzo della Minerva, dove si trova la Biblioteca del Senato della Repubblica.



Druetti-Marro: sgombero Askatasuna, altro che sicurezza, rappresaglie governative e repressione del dissenso militarizzano i quartieri
possibile.com/druetti-marro-sg…
Lo sgombero dell'Askatasuna è allo stesso tempo una rappresaglia e un ennesimo tassello nel progetto sistematico di repressione del dissenso e degli spazi sociali e solidali da parte


Per l’Italia la partita del Quantum è ancora aperta

@Notizie dall'Italia e dal mondo

Gli Stati generali del Quantum, di cui Formiche era Media partner, hanno offerto uno spaccato multilivello della realtà quantistica italiana, mettendo attorno allo stesso tavolo istituzioni, mondo accademico, industria e decision-maker. Ne è emersa una fotografia composita, quella di un ecosistema che non nasce



È uscito il nuovo numero di The Post Internazionale. Da oggi potete acquistare la copia digitale


@Politica interna, europea e internazionale
È uscito il nuovo numero di The Post Internazionale. Il magazine, disponibile già da ora nella versione digitale sulla nostra App, e da domani, venerdì 19 dicembre, in tutte le edicole, propone ogni due settimane inchieste e approfondimenti sugli affari e il potere



Scientists found submerged stone structures off Brittany that date back at least 7,000 years, which may have been used as fish traps and protective cover for prehistoric people.#TheAbstract


Scientists Discover Massive Underwater Ruins That May Be a Lost City of Legend


Scientists have discovered the underwater ruins of huge stone structures erected by humans at least 7,000 years ago in the coastal waters of France, according to a new study published in the International Journal of Nautical Archaeology.

The submerged granite ruins near Sein Island, a Breton island in the Atlantic Ocean, are among the oldest large stone structures ever found in France, and may have inspired an ancient local legend about a city called Ys that vanished under the waves.

The structures vary in size from small stone dams, which were probably fish traps, to large monoliths and slabs that protrude six feet from the seafloor and extend 400 feet in length, which perhaps once served as a protective seawall.

Yves Fouquet, a geologist who works with the Society for Maritime Archaeology and Heritage (SAMM), first noticed hints of these long-lost megaliths in LiDAR data collected by the Litto3D program, a national initiative to create a precise 3D digital reconstruction of the entire French coastline. Fouquet and his colleagues confirmed the existence of the mysterious structures, and mapped out their locations, across dozens of dives carried out by ten SAMM divers between 2022 and 2024.

“The detailed analysis of these maps to redraw the underwater geological map of this area (faults, rock types) has made it possible to identify structures that did not appear natural to a geologist,” Fouquet said in an email to 404 Media.

Brittany, a peninsular region of northwest France, is home to the oldest megaliths in the nation and some of the earliest in Europe, which date back some 6,500 years. The team estimated that the submerged stone structures off Sein Island may predate these early megaliths in Brittany by about 500 years, based on their estimation of when the stones would have last been above sea level. But it will take more research to home in on the exact age of the megaliths.

“We plan to continue the exploration and carry out more detailed work to understand the architecture and precise the age of the structures,” Fouquet said.

The discovery of these stones opens a new window into the societies living in Brittany during the Mesolithic/Neolithic Transition, a period when hunter-gatherers began to shift toward settled lifestyles involving fishing, farming, and the construction of megaliths and other buildings.
Photos of the structures in Figure 7 of the study. Image: SAMM, 2023
The peoples who made these structures must have been both highly organized and relatively abundant in population in order to erect the stones. They were also sophisticated marine navigators, as the waters around Sein Island are notoriously dangerous—prone to swells and strong currents—which is one reason its underwater heritage has remained relatively poorly explored.

“Our results bear witness to the possible sedentary lifestyle of maritime hunter-gatherers on the coast of the extreme west of France from the 6th millennium onwards,” said Fouquet and his colleagues in the study. “The technical know-how to extract, transport, and erect monoliths and large slabs during the Mesolithic/Neolithic transition precedes by about 500 years the megalithic constructions in western France in the 5th millennium.”

The discovery raises new questions about the origins of these megalithics structures, which may have had a symbolic or religious resonance to these past peoples. the team added. “This discovery in a high hydrodynamic environment opens up new perspectives for searching for traces of human settlement in Brittany along the submerged coastline of the period 6000–5000 years cal. BCE.”

The researchers also speculate about a possible link between these structures, and the prehistoric people who made them, and local legends about sunken cities that may date back thousands of years.

“Legends about sunken cities, compared with recent data on rising sea levels, shows that the stories of ancient submergences, passed down by oral tradition, could date back as far as 5,000 to 15,000 years,” the team said, citing a 2022 study. “This suggests that oral traditions that may have preserved significant events in memory that could well be worthy of scientific examination. These settlements described in legend reveal the profound symbolic significance of maritime prehistory, which should not be overlooked.”

In particular, the people of Brittany have long told tales of the lost city of Ys, a sunken settlement thought to be located in the Bay of Douarnenez, about six miles east of Sein Island. The sunken megaliths off Sein Island “allow us to question the origin of the history of the city of Ys, not from the historical legends and their numerous additions, but from scientific findings that may be at the origin of this legend,” the team said.

It’s extremely tantalizing to imagine that the long-hidden ruins of these peoples, who appear to have been expert seafarers and builders, are the source of tales that date back for untold generations in the region. But while the researchers raise the possibility of a link between the stones and the story, they cannot conclusively confirm the connection.

“Legend is legend, enriched by all the additions of human imagination over the centuries,” Fouquet said in his email. “Our discoveries are based on what can be scientifically proven.”

🌘
Subscribe to 404 Media to get The Abstract, our newsletter about the most exciting and mind-boggling science news and studies of the week.





Corte Suprema austriaca: Meta deve dare agli utenti pieno accesso ai loro dati
La Corte Suprema austriaca ha emesso una sentenza in un procedimento lungo 11 anni contro Meta
mickey18 December 2025
Meta


noyb.eu/it/austrian-supreme-co…



Dietro le lodi servili: il flop di Trump svelato.


noblogo.org/transit/dietro-le-…


Dietro le lodi servili: il flop di Trump svelato.


(188)

(t1)

Il discorso alla nazione di #DonaldTrump del 17 dicembre 2025, trasmesso in prima serata dalla Diplomatic Room (con decorazioni natalizie perlomeno incongruenti), è durato meno di 20 minuti, ma ha condensato un tono visibilmente frustrato, aggressivo e autocelebrativo. Trump ha puntato il dito contro i democratici e Joe Biden con frasi ripetute come “Ho ereditato un disastro totale” e “È tutta colpa loro”, apparendo “arrabbiato e sulla difensiva” secondo le cronache dei media.

Questo stile, lontano da un sobrio aggiornamento sullo stato dell'Unione, sembrava mirare a placare i malumori crescenti tra gli elettori per il carovita persistente e le delusioni economiche, invitando gli americani alla “pazienza” in attesa di un futuro “boom senza precedenti”. Ha chiuso con un appello patriottico, esaltando l'“America prima di tutto”, ma il suo cipiglio tradiva insicurezze sul consenso interno in calo.​Il discorso è stato un autentico tripudio di superlativi e iperboli, tipico del repertorio trumpiano.

Ha descritto il confine meridionale come “il più sicuro della storia americana”, l'economia “tornata più forte che mai”, con “prezzi che calano a velocità record”, “salari che crescono più dell'inflazione per la prima volta in anni” e un “boom economico senza precedenti” realizzato in soli 11 mesi di mandato. Trump ha vantato 18.000 miliardi di dollari di investimenti privati attratti grazie ai dazi (definita la sua “parola preferita”, come se non si fosse capito) e ha rivendicato di aver “risolto otto guerre calde nel mondo”, inclusa una presunta pace stabile a #Gaza, portando “pace duratura in Medio Oriente per la prima volta nella storia”.

Non sono mancati annunci come il “warrior dividend” di 1.776 dollari (un numero simbolico per l'anno della dichiarazione d'indipendenza) per ogni militare, con assegni “già spediti per Natale”, esaltando un'America che “fa invidia al mondo intero” e che “tornerà grande come mai prima”.Queste affermazioni, pronunciate con enfasi teatrale, ignorano del tutto le complessità reali.​

(t2)

Il tycoon ha scaricato sistematicamente ogni problema economico e sociale sul predecessore #Biden, dipingendolo come responsabile di un'“invasione barbarica” alle frontiere, un “caos economico totale”, con un’inflazione “alle stelle come mai vista” e “mayhem” nei quartieri urbani.Ha deriso il suo predecessore per aver implorato al Congresso aiuti sul confine, sostenendo che bastava “un nuovo leader forte come me” per chiuderlo ermeticamente in soli sette mesi, riducendo i flussi di droga del 94% e fermando “milioni di criminali”.

Queste narrazioni distorcono i fatti storici: l'inflazione era già stabilizzata al 3% annuo all'insediamento di Trump a gennaio 2025, ereditata dal post-pandemia e dalle politiche globali, non un “disastro esclusivo” di Biden. Similmente, i flussi migratori erano in calo pre-Trump grazie a accordi messicani, e le accuse di “invasione” si basano su numeri gonfiati, come confermato da fact-check indipendenti.​

Un capitolo a parte merita l'incapacità cronica di Trump nel gestire le relazioni internazionali, nonostante le millanterie. Ha vantato di aver “risolto otto guerre” e portato “pace duratura in Medio Oriente”, con #Gaza come “trionfo personale” grazie a presunte mediazioni USA. In realtà, il conflitto in #Ucraina persiste senza tregue stabili, con aiuti militari USA in stallo; a Gaza, le escalation israeliane continuano con centinaia di vittime civili, mentre i raid USA in Yemen hanno solo intensificato le tensioni con gli Houthi anziché risolverle.

Le sue “storiche paci” con nazioni arabe del primo mandato sono rimaste fragili e unilaterali, senza affrontare il nodo palestinese. Intanto, le elazioni con #Cina e alleati #NATO si sono deteriorate per dazi protezionistici e minacce di ritiri, lasciando gli USA più isolati diplomaticamente e con costi militari in aumento del 15% per operazioni “unilaterali”.

Questa politica erratica ha alimentato instabilità globale, contraddicendo le promesse di “pace attraverso la forza”.​ Contrariamente alle iperboli, i numeri del primo anno di Trump deludono clamorosamente le attese. Il PIL ha contratto dello 0,3% nel primo trimestre 2025 a causa dell'afflusso massiccio di import pre-dazi, con rischi di recessione che hanno portato a una crescita anemica del 3%, ma solo grazie a import in calo e non a investimenti strutturali. L'inflazione resta ferma al 3% annuo a settembre (lontana dal “prezzi in calo” promesso). La disoccupazione è salita al 4,6% a novembre, ai massimi dal 2021, con un mercato del lavoro in indebolimento, licenziamenti nel settore tech e consumi al palo.

Gli investimenti vantati sono gonfiati: annunci non vincolanti, stimati realisticamente al massimo 7-9 trilioni, non i 18 promessi, mentre i salari crescono ma non compensano i rincari energetici. I fact-check confermano: l'economia arranca tra tariffe, incertezze e debiti pubblici alle stelle.​

Questo sproloquio riflette la narrazione trumpiana classica: trionfalistica, divisiva e smentita dai fatti. Trump vanta lodi dall'estero da leader come #GiorgiaMeloni, che lo esaltano pubblicamente per interessi economici (evitare dazi punitivi su export di auto Fiat, vino e macchinari) e strategici, come il supporto #NATO contro la Russia, ma si tratta di puro servilismo opportunistico. Meloni ha scritto su “X” “...Trump ha reso l'America forte di nuovo”, ignorando come le politiche protezioniste USA stiano causando rincari energetici in Europa e tensioni nel Mediterraneo, danneggiando Roma con bollette alle stelle e instabilità migratoria. Simili elogi da Orban o Netanyahu mascherano calcoli cinici, non ammirazione genuina. Gli americani, intanto, pagano costi elevati, crescita fiacca, caos internazionale e un'amministrazione isolata, con l'opinione pubblica in calo al 42%.

È ora di distinguere retorica da realtà. E sarebbe sempre il momento di imparare a fare da soli, che è meglio che essere accompagnati da un ballista dilettante.

#Blog #USA #Trump #Politica #Economia #Esteri #Opinioni

Mastodon: @alda7069@mastodon.unoTelegram: t.me/transitblogFriendica: @danmatt@poliverso.orgBlue Sky: bsky.app/profile/mattiolidanie…Bio Site (tutto in un posto solo, diamine): bio.site/danielemattioli

Gli scritti sono tutelati da “Creative Commons” (qui)

Tutte le opinioni qui riportate sono da considerarsi personali. Per eventuali problemi riscontrati con i testi, si prega di scrivere a: corubomatt@gmail.com




FOCUS. Gaza, cessate il fuoco sempre più fragile. La ricostruzione resta una ipotesi


@Notizie dall'Italia e dal mondo
Le prospettive di accordo a lungo termine appaiono più remote che mai. I palestinesi ritengono che Israele non completerà mai il ritiro, impedirà una vera ricostruzione per mantenere la Striscia in uno stato di rovina permanente
L'articolo