Salta al contenuto principale



Vi racconto la missione di Praexidia, la fondazione a tutela delle imprese. Parla il gen. Goretti

@Notizie dall'Italia e dal mondo

Difesa, aerospazio, cybersicurezza, biotecnologie e infrastrutture critiche: sono questi i settori al centro della missione della Fondazione Praexidia, nuova realtà nata con l’obiettivo di tutelare e valorizzare le filiere



YouTuber Benn Jordan has never been to Israel, but Google's AI summary said he'd visited and made a video about it. Then the backlash started.

YouTuber Benn Jordan has never been to Israel, but Googlex27;s AI summary said hex27;d visited and made a video about it. Then the backlash started.#News #AI

#ai #News #x27



Ask Hackaday: Now You Install Your Friends’ VPNs. But Which One?


Something which may well unite Hackaday readers is the experience of being “The computer person” among your family or friends. You’ll know how it goes, when you go home for Christmas, stay with the in-laws, or go to see some friend from way back, you end up fixing their printer connection or something. You know that they would bridle somewhat if you asked them to do whatever it is they do for a living as a free service for you, but hey, that’s the penalty for working in technology.

Bad Laws Just Make People Avoid Them


There’s a new one that’s happened to me and no doubt other technically-minded Brits over the last few weeks: I’m being asked to recommend, and sometimes install, a VPN service. The British government recently introduced the Online Safety Act, which is imposing ID-backed age verification for British internet users when they access a large range of popular websites. The intent is to regulate access to pornography, but the net has been spread so wide that many essential or confidential services are being caught up in it. To be a British Internet user is to have your government peering over your shoulder, and while nobody’s on the side of online abusers, understandably a lot of my compatriots want no part of it. We’re in the odd position of having 4Chan and the right-wing Reform Party alongside Wikipedia among those at the front line on the matter. What a time to be alive.

VPN applications have shot to the top of all British app download charts, prompting the government to flirt with deny the idea of banning them, but as you might imagine therein lies a problem. Aside from the prospect of dodgy VPN apps to trap the unwary, the average Joe has no idea how to choose from the plethora of offerings. A YouTuber being paid to shill “that” VPN service is as close of they’ve ever come to a VPN, so they are simply unequipped to make a sound judgement when it comes to trusting a service with their web traffic. They have no hope of rolling their own VPN; setting up WireGuard and still further having a friend elsewhere in the world prepared to act as their endpoint are impractical.

It therefore lies upon us, their tech-savvy friends, to lead them through this maze. Which brings me to the point of this piece; are we even up to the job ourselves? I’ve been telling my friends to use ProtonVPN because their past behaviour means I trust Proton more than I do some of the other well-known players, but is my semi-informed opinion on the nose here? Even I need help!

Today Brits, Tomorrow The Rest Of You


At the moment it’s Brits who are scrambling for VPNs, but it seems very likely that with the EU yet again flirting with their ChatControl snooping law, and an American government whose actions are at best unpredictable, soon enough many of the rest of you will too. The question is then: where do we send the non-technical people, and how good are the offerings? A side-by-side review of VPNs has been done to death by many other sites, so there’s little point in repeating. Instead let’s talk to some experts. You lot, or at least those among the Hackaday readership who know their stuff when it comes to VPNs. What do you recommend for your friends and family?

Header image: Nenad Stojkovic, CC BY 2.0.


hackaday.com/2025/09/03/ask-ha…



L’eredità dell’omicidio Dalla Chiesa e le cose ancora da fare


@Giornalismo e disordine informativo
articolo21.org/2025/09/leredit…
La memoria del generale, prefetto, Carlo Alberto Dalla Chiesa, assassinato a Palermo il 3 settembre 1982 all’esito di una convergenza di interessi mai completamente chiarita e punita può anche



Dai think tank al campo di battaglia. L’IA militare tra Washington e Kyiv

@Notizie dall'Italia e dal mondo

Dalle linee di trincea ucraine fino alla Silicon Valley, passando per gli uffici del Pentagono. La corsa all’intelligenza artificiale militare rappresenta oggi il nuovo terreno di competizione tra potenze. La notizia riportata da Politico, nuda e cruda, è che quando affidi scenari di crisi a modelli




Israele manda i droni contro l’Onu. Unifil: “Granate a venti metri da noi”


@Notizie dall'Italia e dal mondo
La missione ONU in Libano accusa Israele di aver messo in pericolo il proprio personale nonostante l’avviso preventivo; cresce la tensione lungo la frontiera mentre resta irrisolto il ritiro delle truppe dal sud del Paese.
L'articolo Israele manda i droni contro l’Onu. Unifil: “Granate a



Trump sceglie “Rocket city” come nuova sede dell’US Space command

@Notizie dall'Italia e dal mondo

Dopo speculazioni sulle possibili novità annunciate durante la conferenza stampa di Trump, tra cui l’ipotesi di un intervento contro il Venezuela, il presidente americano ha sorpreso tutti annunciando il trasferimento del quartier generale dello US Space command da Colorado Springs, Colorado, a




Burkina Faso, nuova legge contro la comunità LGBTQ: fino a cinque anni di carcere


@Notizie dall'Italia e dal mondo
La nuova normativa, approvata all’unanimità dal parlamento di transizione, prevede da due a cinque anni di carcere, multe e la deportazione per gli stranieri recidivi.
L'articolo Burkina Faso, nuova legge contro la comunità LGBTQ: fino a cinque



Meno vincoli, più sviluppo. Nasce l’Osservatorio sul Diritto all’Innovazione

@Politica interna, europea e internazionale

MENO VINCOLI, PIÙ SVILUPPO Nasce l’Osservatorio sul diritto all’innovazione, 9 settembre 2025, ore 13:00, Sala “Caduti di Nassirya”, Senato della Repubblica Interverranno Andrea Cangini, Segretario generale Fondazione Einaudi e Direttore Osservatorio sul



GRUB1 e il colpo supply-chain: così un chatbot ha messo a rischio Cloudflare (e non solo)


@Informatica (Italy e non Italy 😁)
Il patto implicito tra un’azienda e i suoi clienti si regge su un pilastro fondamentale: la fiducia. Fiducia che i propri dati, anche quelli condivisi per risolvere un problema tecnico urgente, siano al sicuro. All’inizio di settembre,



La US Navy affonda una barca di trafficanti venezuelani. Tensione nel Mar dei Caraibi

@Notizie dall'Italia e dal mondo

Una nave della US Navy ha intercettato e affondato un’imbarcazione carica di droga, partita dal Venezuela e legata – secondo Washington – a un’organizzazione narco–terrorista vicina al governo di Nicolás Maduro. L’operazione è stata annunciata dal segretario di Stato Marco Rubio e



YaraSensei, la webapp che potenzia le regole YARA con il RAG e l’AI di Google


@Informatica (Italy e non Italy 😁)
Oggi, scrivere regole YARA efficaci è un’arte. È un bilanciamento costante tra copertura e precisione, tra il rischio di falsi positivi e quello di lasciarsi sfuggire una variante malevola. Ora, a dare una mano ai threat hunter e ai ricercatori arriva



“Faccetta nera” alla festa di Coldiretti di Benevento


@Giornalismo e disordine informativo
articolo21.org/2025/09/faccett…
C’è un’Italia che non si accorge nemmeno più dei propri fantasmi. Non perché siano spariti, ma perché li ha accolti come parte del paesaggio: dettagli pittoreschi, incidenti tecnici, folklore da archiviare. A



Immigrazione, bocciata la strategia di Trump: non è un’invasione


@Notizie dall'Italia e dal mondo
La legge, invocata solo durante la Guerra del 1812 e i due conflitti mondiali, non può essere usata per giustificare rimpatri di massa in tempo di pace.
L'articolo Immigrazione, pagineesteri.it/2025/09/03/mon…



Premio Internazionale Giovanni Malagodi 2025

@Politica interna, europea e internazionale

Interverranno Giuseppe Benedetto, Presidente Fondazione Einaudi Andrea Cangini, Segretario generale Fondazione Einaudi Marco Mariani, Vicepresidente European Liberal Forum Ilhan Kyuchyuk, Parlamentare europeo, già Co-Presidente Alde Party Cerimonia di consegna del Premio a Karl-Heinz Paqué, Presidente Liberal



Pornhub's parent company Aylo and its affiliates settled a lawsuit with the FTC and Utah that alleged the company "deceived users" about abuse material on the site.

Pornhubx27;s parent company Aylo and its affiliates settled a lawsuit with the FTC and Utah that alleged the company "deceived users" about abuse material on the site.#pornhub #FTC


Pornhub Will Pay $5 Million Over Allegations of Hosting Child Sexual Abuse Material


The Federal Trade Commission announced Wednesday that Pornhub and its parent company Aylo settled a lawsuit filed by the Federal Trade Commission and the state of Utah.

The FTC and Utah’s attorney general claimed that Pornhub and its affiliates “deceived users by doing little to block tens of thousands of videos and photos featuring child sexual abuse material (CSAM) and nonconsensual material (NCM) despite claiming that this content was ‘strictly prohibited,’” the FTC wrote in a press release.

“As part of a proposed order settling the allegations, Pornhub’s operators, Aylo and its affiliated companies (collectively Aylo), will be required to establish a program to prevent the distribution of CSAM and NCM on its websites and pay a $5 million penalty to the state of Utah,” it said.

“This settlement reaffirms and enhances Aylo’s efforts to prevent the publication of child sexual abuse material (CSAM) and non-consensual material (NCM) on its platforms,” a spokesperson for Aylo told 404 Media said in a statement. “Aylo is committed to maintaining the highest standards of safety and compliance on its platforms. While the FTC and Utah DCP [Division of Consumer Protection] have raised serious concerns and allege that some of Aylo’s user generated content websites made available videos and photos containing CSAM and NCM, this agreement strengthens the comprehensive safeguards that have been in place for years on Aylo platforms. These measures reflect Aylo’s ongoing commitment to constantly evolving compliance efforts. Importantly, this settlement resolves the matter with no admission of wrongdoing while reaffirming Aylo’s commitment to the highest standards of platform safety and compliance.”

In addition to the penalty fee, according to the proposed settlement, Aylo would have to “implement a program” to prevent CSAM and non-consensual imagery from being disseminated on its sites, establish a system “to verify that people who appear in videos or photos on its websites are adults and have provided consent to the sexual conduct as well as its production and publication,” remove content uploaded before those programs until Aylo “verifies that the individuals participating in those videos were at least 18 at the time the content was created and consented to the sexual conduct and its production and publication,” post a notice on its website about the FTC and Utah’s allegations, and implement “a comprehensive privacy and information security program to address the privacy and security issues detailed in the complaint.”

Pornhub Is Now Blocked In Almost All of the U.S. South
As of today, three more states join the list of 17 that can’t access Pornhub because of age verification laws.
404 MediaSamantha Cole


Aylo already does much of this. Pornhub overhauled its content and moderation practices starting in 2020, after Visa, Mastercard and Discover stopped servicing the site and its network following allegations of CSAM and sex trafficking. It purged hundreds of thousands of videos from its sites in early 2020 and registered with the National Center for Missing and Exploited Children (NCMEC).

In 2024, Pornhub started requiring proof of consent from every single person who appeared in content on the platform.

“The resolution reached involved enhancements to existing measures but did not introduce any new substantive requirements that were not either already in place or in progress,” Aylo’s spokesperson said. “This settlement resolves the investigation and underscores Aylo's commitment to robust safety protocols that should be applied broadly across all websites publishing user generated content. Aylo supports vigorous enforcement against CSAM and NCM, and encourages the FTC and Utah DCP to extend their initiative to protect the public across the broader internet, adult and mainstream, fostering a safer online environment for everyone. Throughout the investigation, Aylo worked to cooperatively resolve the concerns raised by the FTC and Utah DCP.”

The complaint from Utah and the FTC focuses largely on content that appeared on Pornhub prior to 2020, and includes allegations against several of the 100 different websites owned by Alyo—then Mindgeek, prior to the company’s 2023 acquisition by Ethical Capital Partners—and its affiliates. For example, the complaint claims the website operators identified CSAM on the sites KeezMovies, SpankWire, and ExtremeTube with titles such as “Brunette Girl was Raped,” “Drunken passed out young niece gets a creampie,” “Amateur teen after party and fun passed out sex realty [sic] submissive,” “Girl getting gangraped,” and “Giving her a mouthful while she’s passed out drunk.”

“Rather than remove the videos, Defendants merely edited their titles to remove any suggestion that they contained CSAM or NCM. As a result, consumers continued to view and download these videos,” the complaint states. The FTC and Utah don’t specify in the complaint whether the people performing in those videos, or any of the videos mentioned, were actually adults participating in consensual roleplay scenarios or if the titles and tags were literal.

The discussions between then-Mindgeek compliance staff outlined in the complaint show some of the conversations moderators were allegedly having around 2020 about how to purge the site of unverified content. “A senior member of Defendants’ Compliance team stated in an internal email that ‘none of it is enough,’ ‘this is just a start,’ and ‘we need to block millions more’ because ‘the site is FULL of non-compliant content,’” the complaint states. “Another senior employee responded: ‘it’s over’ and ‘we’re fucked.’”

The complaint also mentions the Girls Do Porn sex-trafficking ring, which Pornhub hosted content for and acted as a Pornhub Premium partner until the ring was indicted on federal trafficking charges in 2019. In 2023, Pornhub reached a settlement with the US Attorney General’s office after an FBI investigation, and said it “deeply regrets” hosting that content.





"These AI videos are just repeating things that are on the internet, so you end up with a very simplified version of the past."#AI #AISlop #YouTube #History


One ROM: the Latest Incarnation of the Software Defined ROM


A hand holding a One ROM with a Commodore 64 in the background

Retrocomputers need ROMs, but they’re just so read only. Enter the latest incarnation of [Piers]’s One ROM to rule them all, now built with a RP2350, because the newest version is 5V capable. This can replace the failing ROMs in your old Commodore gear with this sweet design on a two-layer PCB, using a cheap microcontroller.

[Piers] wanted to use the RP2350 from the beginning but there simply wasn’t space on the board for the 23 level shifters which would have been required. But now that the A4 stepping adds 5 V tolerance [Piers] has been able to reformulate his design.

The C64 in the demo has three different ROMs: the basic ROM, kernel ROM, and character ROM. A single One ROM can emulate all three. The firmware is performance critical, it needs to convert requests on the address pins to results on the data bus just as fast as it can and [Piers] employs a number of tricks to meet these requirements.

The PCB layout for the RP2350 required extensive changes from the larger STM32 in the previous version. Because the RP2350 uses large power and ground pads underneath the IC this area, which was originally used to drop vias to the other side of the board, was no longer available for signal routing. And of course [Piers] is constrained by the size of the board needing to fit in the original form factor used by the C64.

The One ROM code is available over on GitHub, and the accompanying video from [Piers] is an interesting look into the design process and how tradeoffs and compromises and hacks are made in order to meet functional requirements.

youtube.com/embed/Zy8IMe6fMI4?…

Thanks to [Piers] for writing in to let us know about the new version of his project.


hackaday.com/2025/09/03/one-ro…



La Ricchezza di Illegio
freezonemagazine.com/articoli/…
Le vie dell’arte, come quelle del Signore, sono infinite e per vie intendo proprio quelle calpestabili, asfaltate, percorribili. Una di queste è in Carnia, regione interna al Friuli Venezia Giulia, dove il centro più grande è Tolmezzo e dal quale, in una manciata di minuti d’auto, si raggiunge il borgo di Illegio. Qui, dove […]
L'articolo La Ricchezza di Illegio proviene da FREE ZONE MAGAZINE.
Le vie


LockBit 5.0 : segnali di una nuova e possibile “Rinascita”?


LockBit rappresenta una delle più longeve e strutturate ransomware gang degli ultimi anni, con un modello Ransomware-as-a-Service (RaaS)che ha segnato in maniera profonda l’ecosistema criminale.

A seguito dell’operazione internazionale Operation Cronos, condotta a febbraio 2024 e che ha portato al sequestro di numerose infrastrutture e alla compromissione dei pannelli di gestione affiliati, il gruppo sembrava destinato a un declino irreversibile. Tuttavia, nelle ultime settimane, nuove evidenze in rete onion stanno alimentando ipotesi di una resurrezione del brand LockBit, sotto la sigla LockBit 5.0.

Breve storia del gruppo


  • 2019– Comparsa delle prime varianti di LockBit, caratterizzate da automatismi di propagazione rapida in ambienti Windows e tecniche avanzate di cifratura.
  • 2020-2021– Consolidamento del modello RaaS e forte espansione nella scena del cybercrime; introduzione dei data leak site come strumento di doppia estorsione.
  • 2022– LockBit diventa uno dei gruppi più attivi a livello globale, rilasciando le versioni LockBit 2.0 e 3.0, con implementazioni in linguaggi multipli e payload cross-platform.
  • 2023– Ulteriore diversificazione con payload in Go e Linux, e campagne mirate verso supply chain e settori critici.
  • 2024 (Operazione Cronos)– Coordinata da Europol e FBI, l’operazione porta al sequestro di oltre 30 server, domini onion e strumenti interni. Per la prima volta viene distribuito un decryptor pubblico su larga scala.


Evidenze recenti


Analizzando il loro sito underground, viene mostrato un portale accessibile tramite rete onion con brand LockBit 5.0, che adotta lo stesso schema di queue panel già osservato in precedenti versioni del gruppo. L’interfaccia ripropone loghi riconducibili a Monero (XMR), Bitcoin (BTC) e Zcash (ZEC) come metodi di pagamento, indicando che il modello di estorsione rimarrebbe centrato su criptovalute ad alto grado di anonimato.

Il messaggio“You have been placed in a queue, awaiting forwarding to the platform”richiama i meccanismi classici dei pannelli di affiliazione LockBit, dove l’utente (o affiliato) viene instradato verso il backend operativo.

Analisi tecnica e possibili scenari


L’apparizione di LockBit 5.0 può essere interpretata secondo tre scenari principali:

  1. Tentativo di resurrezione reale: una parte del core team non colpita da Operation Cronos potrebbe aver ricostruito un’infrastruttura ridotta, puntando a reclutare nuovamente affiliati.
  2. Operazione di inganno (honeypot): non si esclude la possibilità che si tratti di un’esca creata da ricercatori o forze dell’ordine per monitorare traffico e identificare affiliati superstiti.
  3. Rebranding opportunistico: attori terzi, approfittando del “marchio” LockBit, potrebbero riutilizzarlo per ottenere visibilità e autorevolezza immediata nella scena underground.


Conclusioni


Sebbene al momento non vi siano prove concrete di nuove compromissioni riconducibili a LockBit 5.0, la presenza di un portale onion con brand ufficiale alimenta speculazioni su una possibile rinascita del gruppo. Sarà cruciale monitorare:

  • eventuali nuove campagne di intrusione con TTP riconducibili al passato di LockBit,
  • leak site attivi con pubblicazione di vittime,
  • segnali di reclutamento nel dark web.

La vicenda dimostra ancora una volta la resilienza e la capacità di adattamento delle cyber-gang, che spesso riescono a rigenerarsi anche dopo operazioni di law enforcement di portata globale.

L'articolo LockBit 5.0 : segnali di una nuova e possibile “Rinascita”? proviene da il blog della sicurezza informatica.



Bonnie Dobson & The Hanging Stars – Dreams
freezonemagazine.com/articoli/…
Il disco che non ti aspetti. Questo è quello che continua a girarmi in testa nel corso degli ascolti, fattisi ripetuti degli ultimi giorni, di questa collaborazione fra la voce bellissima di Bobbie Dobson, canadese dai trascorsi in ambito eminentemente folk/rock, che pur oltrepassata la soglia delle ottantacinque primavere mantiene una capacità di ammaliare con […]



Trotz Trump: EU-Gericht gibt grünes Licht für transatlantischen Datenverkehr


netzpolitik.org/2025/trotz-tru…



United Healthcare CEO murder suspect Luigi Mangione is not, in fact, modeling floral button-downs for Shein.#LuigiMangione #shein #AI


Field Guide to North American Crop Irrigation


Human existence boils down to one brutal fact: however much food you have, it’s enough to last for the rest of your life. Finding your next meal has always been the central organizing fact of life, and whether that meal came from an unfortunate gazelle or the local supermarket is irrelevant. The clock starts ticking once you finish a meal, and if you can’t find the next one in time, you’ve got trouble.

Working around this problem is basically why humans invented agriculture. As tasty as they may be, gazelles don’t scale well to large populations, but it’s relatively easy to grow a lot of plants that are just as tasty and don’t try to run away when you go to cut them down. The problem is that growing a lot of plants requires a lot of water, often more than Mother Nature provides in the form of rain. And that’s where artificial irrigation comes into the picture.

We’ve been watering our crops with water diverted from rivers, lakes, and wells for almost as long as we’ve been doing agriculture, but it’s only within the last 100 years or so that we’ve reached a scale where massive pieces of infrastructure are needed to get the job done. Above-ground irrigation is a big business, both in terms of the investment farmers have to make in the equipment and the scale of the fields it turns from dry, dusty patches of dirt into verdant crops that feed the world. Here’s a look at the engineering behind some of the more prevalent methods of above-ground irrigation here in North America.

Crop Circles


Center-pivot irrigation machines are probably the most recognizable irrigation methods, both for their sheer size — center-pivot booms can be a half-mile long or more — and for the distinctive circular and semi-circular crop patterns they result in. Center-pivot irrigation has been around for a long time, and while it represents a significant capital cost for the farmer, both in terms of the above-ground machinery and the subsurface water supply infrastructure that needs to be installed, the return on investment time can be as low as five years, depending on the crop.
Pivot tower in an alfalfa field in Oregon. You can clearly see the control panel, riser pipe, swivel elbow, and the boom. The slip rings for electrical power distribution live inside the gray dome atop the swivel. Note the supporting arch in the pipe created by the trusses underneath. Source: Tequask, CC BY-SA 4.0.
Effective use of pivot irrigation starts with establishing a water supply to the pivot location. Generally, this will be at the center of a field, allowing the boom to trace out a circular path. However, semi-circular layouts with the water supply near the edge of the field or even in one corner of a square field are also common. The source must also be able to supply a sufficient amount of water; depending on the emitter heads selected, the boom can flow approximately 1,000 gallons per minute.

The pivot tower is next. It’s generally built on a sturdy concrete pad, although there are towable pivot machines where the center tower is on wheels. The tower needs to stand tall enough that the rotating boom clears the crop when it’s at its full height, which can be substantial for crops like corn. Like almost all parts of the machine, the tower is constructed of galvanized steel to resist corrosion and to provide a bit of anodic protection to the underlying metal.

The tower is positioned over a riser pipe that connects to the water supply and is topped by a swivel fitting to change the water flow from vertical to horizontal and to let the entire boom rotate around the tower. For electrically driven booms, a slip ring will also be used to transfer power and control signals from the fixed control panel on the tower along the length of the boom. The slip ring connector is located in a weather-tight enclosure mounted above the exact center of the riser pipe.

The irrigation boom is formed from individual sections of pipe, called spans. In the United States, each span is about 180 feet long, a figure that makes it easy to build a system that will fit within the Public Land Survey System (PLSS), a grid-based survey system based on even divisions called sections, one mile on a side and 640 acres in area. These are divided down into half-, quarter-, and finally quarter-quarter sections, which are a quarter mile on a side and cover 40 acres. A boom built from seven spans will be about 1,260 feet long and will be able to irrigate a 160-acre quarter-section, which is a half-mile on a side.

The pipe for each span is usually made from galvanized steel, but aluminum is also sometimes used. Because of the flow rates, large-diameter pipe is used, and it needs to be supported lest it sag when filled. To do this, the pipe is put into tension with a pair of truss rods that run the length of the span, connecting firmly to each end. The truss rods and the pipe are connected by a series of triangular trusses attached between the bottom of the pipe and the truss rods, bending the pipe into a gentle arch. The outer end of each span is attached to a wheeled tower, sized to support the pipe at the same height as the center tower. The boom is constructed by connecting spans to each other and to the center pivot using flexible elastomeric couplings, which allow each span some flexibility to adjust for the terrain of the field. Sprinkler heads (drops) are attached to the span by elbows that exit at the top of the pipe. These act as siphon breakers, preventing water from flowing out of the sprinkler heads once water flow in the boom stops.

Different sprinkler heads are typically used along the length of the boom, with lower flow rate heads used near the center pivot. Sprinkler heads are also often spaced further apart close to the pivot. Both of these limit the amount of water delivered to the field where the boom’s rotational speed is lower, to prevent crops at the center of the field from getting overwatered. Most booms also have an end gun, which is similar to the impulse sprinklers commonly used for lawn irrigation, but much bigger. The end gun can add another 100′ or more of coverage to the pivot, without the expense of another length of pipe. End guns are often used to extend coverage into the corners of square fields, to make better use of space that otherwise would go fallow. In this case, an electrically driven booster pump can be used to drive the end gun, but only when the controller senses that the boom is within those zones.
Many center-pivot booms have an end gun, which is an impulse sprinkler that extends coverage by 100 feet or more without having to add an extra span. They can help fill in the corners of square fields. Source: Ingeniero hidr., CC BY-SA 3.0.
Most center-pivot machines are electrically driven, with a single motor mounted on each span’s tower. The motor drives both wheels through a gearbox and driveshaft. In electrically driven booms, only the outermost span rotates continuously. The motors on the inboard spans are kept in sync through a position-sensing switch that’s connected to the next-furthest-out span through mechanical linkages. When the outboard span advances, it eventually trips a microswitch that tells the motor on the inboard span to turn on. Once that span catches up to the outboard span, the motor turns off. The result is a ripple of movement that propagates along the boom in a wave.
Electrically driven pivots use switches to keep each span in sync. The black cam is attached to the next-further span by a mechanical linkage, which operates a microswitch to run the motor on that span. Source: Everything About Irrigation Pivots, by SmarterEveryDay, via YouTube.
While electrically driven center-pivot machines are popular, they do have significant disadvantages. Enterprising thieves often target them for copper theft; half a mile of heavy-gauge, multi-conductor cable sitting unattended in a field that could take hours for someone to happen upon is a tempting target indeed. To combat this, some manufacturers use hydrostatic drives, with hydraulic motors on each wheel and a powerful electric- or diesel-driven hydraulic pump at the pivot. Each tower’s wheels are controlled by a proportioning valve connected to the previous span via linkages, to run the motors faster when the span is lagging behind the next furthest-out tower.

Aside from theft deterrence, hydrostatic-drive pivots tend to be mechanically simpler and safer to work on, although it’s arguable that the shock hazard from the 480 VAC needed for the motors on electrically driven pivots is any less dangerous than hydraulic injection injuries from leaks. Speaking of leaks, hydrostatic pivots also pose an environmental hazard that electric rigs don’t; a hydraulic leak could potentially contaminate an entire field. To mitigate that risk, hydrostatic pivots generally use a non-toxic hydraulic fluid specifically engineered for pivots.

Occasionally, you’ll see center-pivot booms in fields that aren’t circular. Some rectangular fields can be irrigated with pivot-style booms that are set up with drive wheels at both ends. These booms travel up and down the length of a field with all motors running at the same speed. Generally, water is supplied via a suction hose dipping down from one end of the boom into an irrigation ditch or canal running alongside the field. At the end of the field, the boom reverses and heads back down the way it came. Alternatively, the boom can pivot 180 degrees at the end of the field and head back to the other end, tracing out a racetrack pattern. There are also towers where the wheels can swivel rather than being fixed perpendicularly to the boom; this setup allows individual spans or small groups to steer independently of the main boom, accommodating odd-shaped fields.
While pivot-irrigation is labor-efficient, it leaves quite a bit of land fallow. Many of these pivots use the end gun to get a few extra rows in each of the corner quadrants, increasing land use. Source: go_turk06, via Adobestock.

Rolling, Rolling, Rolling


While center-pivot machines are probably the ultimate in above-ground irrigation, they’re not perfect for every situation. They’re highly automated, but at great up-front cost, and even with special tricks, it’s still not possible to “square the circle” and make use of every bit of a rectangular field. For those fields, a lower-cost method like wheel line irrigation might be used. In this setup, lengths of pipe are connected to large spoked wheels about six feet in diameter. The pipe passes through the center of the wheel, acting as an axle. Spans of pipe are connected end-to-end on either side of a wheeled drive unit, forming a line the width of the field, up to a quarter-mile long, with the drive unit at the center of the line.
Wheel-line system in action on alfalfa in British Columbia. The drive unit at the center powers the whole string, moving it across the field a few times a day. It’s far more labor-intensive than a pivot, but far cheaper. Source: nalidsa, via Adobestock.
In use, the wheel line is rolled out into the field about 25 feet from the edge. When the line is in position, one end is connected to a lateral line installed along the edge of the field, which typically has fittings every 50 feet or so, or however far the sprinkler heads that are attached at regular intervals to the pipe cover. The sprinklers are usually impulse-type and attached to the pipe by weighted swivel fittings, so they always remain vertical no matter where the line stops in its rotation. The heads were traditionally made of brass or bronze for long wear and corrosion resistance, but thieves attracted to them for their scrap value have made plastic heads more common.

Despite their appearance, wheel lines do not continually move across the field. They need to be moved manually, often several times a day, by running the drive unit at the center of the line. This is generally powered by a small gasoline engine which rotates the pipe attached to either side, rolling the entire string across the field as a unit. Disconnecting the water, rolling the line, and reconnecting the line to the supply is quite labor-intensive, so it tends to be used only where labor is cheap.

Reeling In The Years


A method of irrigation that lives somewhere between the labor-intensive wheel line and the hands-off center-pivot is hose reel irrigation. It’s more commonly used for crop irrigation in Europe, but it does make an occasional appearance in US agriculture, particularly in fields where intensive watering all season long isn’t necessary.

As the name suggests, hose reel irrigation uses a large reel of flexible polyethylene pipe, many hundreds of feet in length. The reel is towed into the field, typically positioned in the center or at its edge. Large spades on the base of the reel are lowered into the ground to firmly anchor the reel before it’s connected to the water supply via hoses or pipes. The free end of the hose reel is connected to a tower-mounted gun, which is typically a high-flow impulse sprinkler. The gun tower is either wheeled or on skids, and a tractor is used to drag it out into the field away from the reel. Care is taken to keep the hose between rows to prevent damage to the crops.

Once the water is turned on, water travels down the hose and blasts out of the gun tower, covering a circle or semi-circle a hundred feet or more in diameter. The water pressure also turns a turbine inside the hose reel, which drives a gearbox that slowly winds the hose back onto the reel through a chain and sprocket drive. As the hose retracts, it pulls the gun back to the center of the field, evenly irrigating a large rectangular swath of the field. Depending on how the reel is set up, it can take a day or more for the gun to return to the reel, where an automatic shutoff valve shuts off the flow of water. The setup is usually moved to another point further down the field and the process is repeated until the whole field is irrigated.
Hose reel system being deployed for potatoes in Maine. The end gun on the right is about to be towed into the field, pulling behind it the large-diameter hose from the reel. The reel’s turbine and gearbox will wind the hose back up, pulling the gun in over a day or two. Source: Irrigation Hustle Continues, Bell’s Farming, via YouTube.
Although hose reels still need tending to, they’re nowhere near as labor-intensive as wheel lines. Farmers can generally look in on a reel setup once a day to make sure everything is running smoothly, and can often go several days between repositioning. Hose reels also have the benefit of being much easier to scale up and down than either center-pivot machines or wheel line; there are hose reels that store thousands of feet of large-diameter hose, and ones that are small enough for lawn irrigation that use regular garden hose and small impulse sprinklers.


hackaday.com/2025/09/03/field-…



Glaciers in Central Asia have remained intact even as other parts of the world have seen rapid glacial loss. A new study shows that may be changing.#TheAbstract


They Were Some of Earth’s Last Stable Glaciers. Now, They’re Melting.


🌘
Subscribe to 404 Media to get The Abstract, our newsletter about the most exciting and mind-boggling science news and studies of the week.

Scientists have long been puzzled by the sturdy glaciers of the mountains of central Asia, which have inexplicably remained intact even as other glaciers around the world rapidly recede due to human-driven climate change. This mysterious resilience may be coming to an end, however.

The glaciers in this mountainous region—nicknamed the “Third Pole” because it boasts more ice than any place outside of the Arctic and Antarctic polar caps— have passed a tipping point that could set them on a path to accelerated mass loss, according to a new study. The end of this unusual glacial resilience, known as the Pamir-Karakoram Anomaly, would have major implications for the people who rely on the glaciers for water.

Scientists suggested that a recent decline in snowfall to the region is behind the shift, but it will take much more research to untangle the complicated dynamics of these remote and under-studied glaciers, according to a study published on Tuesday in Communications Earth & Environment.

“We have known about this anomaly since the early 2000s,” said study co-author Francesca Pellicciotti, a professor at the Institute of Science and Technology Austria (ISTA), in a call with 404 Media. “In the last 25 years, remote-sensing has really revolutionized Earth sciences in general, and also cryospheric sciences.”

“There is no definite answer yet for why those glaciers were quite stable,” said Achille Jouberton, a PhD student at ISTA who led the study, in the same call. “On average, at the regional scale, they were doing quite well in the last decade—until recently, which is what our study is showing.”

This space-down view of the world’s glaciers initially revealed the resilience of ice and snowpack in the Pamir-Karakoram region, but that picture started to change around 2018. Many of these glaciers have remained inaccessible to scientists due to political instabilities and other factors, leaving a multi-decade gap in the research about their curious strength.

To get a closer look, Jouberton and his colleagues established a site for monitoring snowfall, precipitation, and water resources at Kyzylsu Glacier in central Tajikistan in 2021. In addition to this fieldwork, the team developed sophisticated models to reconstruct changes within this catchment since 1999.

While the glaciers still look robust from the outside, the results revealed that snowfall has decreased and ice melt has increased. These interlinked trends have become more pronounced over the past seven years and were corroborated by conversations with locals. The decline in precipitation has made the glacier vulnerable to summer melting, as there is less snowpack to protect it from the heat.

“It will take a while before these glaciers start looking wasted, like the glaciers of the Alps, or North America, or South America,” said Pellicciotti.

While the team pinpointed a lack of snowfall as a key driver of the shift, it’s unclear why the region is experiencing reduced precipitation. The researchers are also unsure if a permanent threshold has been crossed, or if these changes could be chalked up to natural variation. They hope that the study, which is the first to warn of this possible tipping point, will inspire climate scientists, atmospheric scientists, and other interdisciplinary researchers to weigh in on future work.

“We don't know if this is just an inflection in the natural cycle, or if it's really the beginning of a trend that will go on for many years,” said Pellicciotti. “So we need to expand these findings, and extend them to a much longer period in the past and in the future.”

Resolving these uncertainties will be critical for communities in this region that rely on healthy snowpack and ice cover for their water supply. It also hints that even the last stalwart glacial holdouts on Earth are vulnerable to climate change.

“The major rivers are fed by snow and glacier melts, which are the dominant source of water in the summer months, which makes the glaciers very important,” concluded Jouberton. "There’s a large amount of people living downstream in all of the Central Asian countries that are really direct beneficiaries of those water and meltwater from the glaciers.”

🌘
Subscribe to 404 Media to get The Abstract, our newsletter about the most exciting and mind-boggling science news and studies of the week.




Il RE dei DDoS! Cloudflare blocca un attacco mostruoso da 11,5 terabit al secondo


Il record per il più grande attacco DDoS mai registrato nel giugno 2025 è già stato battuto. Cloudflare ha dichiarato di aver recentemente bloccato il più grande attacco DDoS della storia, che ha raggiunto il picco di 11,5 Tbps.

“Le difese di Cloudflare sono operative senza sosta. Nelle ultime settimane abbiamo bloccato centinaia di attacchi DDoS iper-volume, il più grande dei quali ha raggiunto un picco di 5,1 miliardi di pacchetti al secondo e 11,5 Tbps”, ha affermato Cloudflare.

Secondo l’azienda, l’attacco è stato un flood UDP proveniente da diversi provider cloud e IoT, tra cui Google Cloud. I rappresentanti di Cloudflare hanno detto di voler pubblicare un rapporto dettagliato sull’incidente nel prossimo futuro. Secondo un’immagine allegata al comunicato dell’azienda, l’attacco da record è durato solo circa 35 secondi.

Ricordiamo che il record precedente era stato stabilito a giugno di quest’anno. In quell’occasione, Cloudflare aveva comunicato di aver neutralizzato un attacco DDoS rivolto a un provider di hosting non identificato, la cui potenza di picco aveva raggiunto i 7,3 Tbit/s.

Questo attacco è stato superiore del 12% rispetto al precedente record di 5,6 Tbps, stabilito nel gennaio 2025.

All’epoca, gli esperti scrissero che un’enorme quantità di dati veniva trasferita in soli 45 secondi: 37,4 TB. Ciò equivale a circa 7.500 ore di streaming HD o al trasferimento di 12.500.000 di foto JPEG.

Nel suo rapporto del primo trimestre del 2025 , Cloudflare ha dichiarato di aver bloccato un totale di 21,3 milioni di attacchi DDoS contro i suoi clienti lo scorso anno, oltre a più di 6,6 milioni di attacchi all’infrastruttura aziendale stessa.

L'articolo Il RE dei DDoS! Cloudflare blocca un attacco mostruoso da 11,5 terabit al secondo proviene da il blog della sicurezza informatica.

Gazzetta del Cadavere reshared this.



L’IA crescerà del 50% e anche la tua ansia per la bolletta della luce


Il settore globale dei data center si sta preparando a un forte aumento delle piattaforme di elaborazione per le richieste di intelligenza artificiale. Secondo Goldman Sachs, la capacità installata dei data center crescerà di circa il 50% entro il 2027 e il consumo di elettricità raddoppierà entro il 2030. Allo stesso tempo, gli analisti affermano esplicitamente di monitorare attentamente i segnali di surriscaldamento: l’adozione di massa dell’IA potrebbe essere inferiore alle attuali aspettative se la monetizzazione non dovesse funzionare o se emergessero innovazioni più economiche che renderebbero i modelli un prodotto di base.

Attualmente, la capacità globale dei data center è di circa 62 GW. I carichi di lavoro cloud rappresentano il 58%, i carichi di lavoro aziendali tradizionali il 29% e l’intelligenza artificiale il 13%. A titolo di confronto, all’inizio del 2023, il segmento delle attività generative e di formazione era quasi invisibile. Nelle previsioni per il 2027, la situazione cambia: l’intelligenza artificiale occuperà circa il 28% della capacità totale, il cloud il 50% e i carichi di lavoro classici il 21%. Non si tratta del declino dei segmenti classici, ma della crescita più rapida dell’intelligenza artificiale all’interno della torta complessiva in crescita.

L’ondata di investimenti è confermata da stime di terze parti. Secondo Omdia, gli investimenti di capitale nei data center sono paragonabili a quelli delle economie di medie dimensioni. Amazon da sola spende oltre 100 miliardi di dollari all’anno, una cifra paragonabile al PIL della Costa Rica. Counterpoint Research prevede che entro il 2030 il fatturato dell’industria dei semiconduttori potrebbe raddoppiare dal 2024 a oltre 1.000 miliardi di dollari, principalmente grazie all’acquisto di infrastrutture server avanzate per applicazioni di intelligenza artificiale. L’impulso più potente proviene dagli hyperscaler, e questo vale sia per i prossimi anni che per un orizzonte temporale più lungo. Un altro fattore trainante è la cosiddetta token economy: generare enormi volumi di token in scenari di intelligenza artificiale basata su agenti richiede un aumento multiplo dell’hardware.

Il cambiamento di scala è chiaramente visibile nelle configurazioni. Se due anni fa i server di punta erano dotati di otto acceleratori GPU, entro il 2027 i rack più diffusi monteranno fino a 576 processori grafici in un case delle dimensioni di un cabinet. Un modulo di questo tipo richiederà circa 600 kW, sufficienti a fornire energia a circa 500 famiglie statunitensi. Questi cluster impongono requisiti rigorosi per l’alimentazione e il raffreddamento e modificano anche la pianificazione delle aree: non è più sufficiente acquistare rack aggiuntivi; è necessaria una profonda riconfigurazione dei sistemi energetici e ingegneristici.

Le conseguenze energetiche del ridimensionamento sono prevedibili ma tangibili. Entro il 2030, il consumo totale dei data center, secondo Goldman Sachs, crescerà a livello globale del 165%: la quota del settore nel consumo globale di elettricità salirà dall’1-2% nel 2023 al 3-4% entro la fine del decennio. Si propone di colmare il carico aggiuntivo in modo misto. Si prevede che le fonti rinnovabili copriranno circa il 40% dell’aumento, una limitata espansione della generazione nucleare sarà specificamente indirizzata ai carichi di intelligenza artificiale e il restante 60% sarà fornito dalle stazioni di servizio. Queste ultime aggiungeranno, secondo i calcoli, 215-220 milioni di tonnellate di emissioni di gas serra entro il 2030, ovvero circa lo 0,6% in più alle emissioni energetiche globali.

La banca sottolinea che, nonostante la solidità del ciclo di investimenti, permangono dei rischi. Tra i principali, vi sono i tentativi falliti di recuperare i servizi di intelligenza artificiale, le innovazioni tecnologiche che riducono radicalmente i costi di formazione e inferenza e, di conseguenza, la mercificazione dei modelli, che può ridurre i premi sui cluster ad alte prestazioni. In questo scenario, anche la crescita della capacità e del consumo energetico rallenterà.

Per ora, la bilancia è a favore dell’accelerazione: la quota di IA nei data center sta crescendo da zero a una quota significativa del mercato nel giro di pochi anni, gli hyperscaler stanno riservando intere unità di potenza per applicazioni future e i produttori di chip stanno pianificando un fatturato di mille miliardi di dollari. Il prezzo da pagare per questa corsa è la ristrutturazione dell’infrastruttura energetica del pianeta e la necessità di introdurre rapidamente nuovi megawatt senza perdere di vista l’impronta di carbonio. È qui, secondo gli analisti, che verrà tracciata la linea di demarcazione tra le strategie degli attori: chi riuscirà a coniugare velocità di implementazione, costi di elaborazione e sostenibilità del mix energetico definirà il tono del mercato per il prossimo decennio.

L'articolo L’IA crescerà del 50% e anche la tua ansia per la bolletta della luce proviene da il blog della sicurezza informatica.



How Trump's tariffs are impacting all sorts of hobbies; how OnlyFans piracy is ruining the internet for everyone; and ChatGPT's reckoning.

How Trumpx27;s tariffs are impacting all sorts of hobbies; how OnlyFans piracy is ruining the internet for everyone; and ChatGPTx27;s reckoning.#Podcast


Podcast: Trump Take LEGO


We start this week with our articles about Trump’s tariffs, and how they’re impacting everything from LEGO to cameras to sex toys. After the break, Emanuel explains how misfired DMCA complaints designed to help adult creators are targeting other sites, including ours. In the subscribers-only section, we do a wrap-up of a bunch of recent ChatGPT stories about suicide and murder. A content warning for suicide and self-harm for that section.
playlist.megaphone.fm?e=TBIEA2…
Listen to the weekly podcast on Apple Podcasts,Spotify, or YouTube. Become a paid subscriber for access to this episode's bonus content and to power our journalism. If you become a paid subscriber, check your inbox for an email from our podcast host Transistor for a link to the subscribers-only version! You can also add that subscribers feed to your podcast app of choice and never miss an episode that way. The email should also contain the subscribers-only unlisted YouTube link for the extended video version too. It will also be in the show notes in your podcast player.
youtube.com/embed/srdUOWq_hfg?…




Anche Cloudflare violata nell’incidente Salesforce! I rischi del cloud colpiscono tutti


Un’intrusione di dati è stata rilevata da Cloudflare, dove un aggressore esperto ha potuto accedere e quindi rubare i dati sensibili dei propri clienti da quella che era l’istanza Salesforce messa a disposizione proprio dalla società. La violazione faceva parte di un attacco più ampio alla supply chain che sfruttava una vulnerabilità nell’integrazione del chatbot Salesloft Drift, colpendo centinaia di organizzazioni in tutto il mondo.

E’ importante notare, che oltre CloudFlare, sono rimaste vittima di questo incidente alla supply chain anche:

  • Palo Alto Networks : l’azienda di sicurezza informatica ha confermato l’esposizione di informazioni di contatto aziendali e dati di vendita interni dalla sua piattaforma CRM.
  • Zscaler : l’azienda di sicurezza cloud ha segnalato che sono state effettuate violazioni delle informazioni dei clienti, tra cui nomi, recapiti e alcuni contenuti dei casi di supporto.
  • Google: oltre a svolgere il ruolo di investigatore, Google ha confermato che un “numero molto limitato” di account Workspace è stato violato tramite token compromessi.

L’incidente che ha colpito Cloudflare, insieme a realtà di primo piano come Palo Alto Networks, Zscaler e persino Google, dimostra quanto un singolo punto di vulnerabilità in una piattaforma SaaS sul cloud possa generare effetti a catena devastanti. Un attacco mirato alla supply chain, come quello che ha sfruttato l’integrazione del chatbot Salesloft Drift, ha permesso all’attore della minaccia di ottenere accesso a dati sensibili gestiti da Salesforce, coinvolgendo centinaia di organizzazioni nel mondo. La portata dell’evento evidenzia come anche i leader della sicurezza informatica non siano immuni quando le loro attività si basano su infrastrutture esterne, che diventano bersagli privilegiati.

In una comunicazione dettagliata, Cloudflare ha spiegato che l’autore della minaccia, che il suo team di intelligence ha denominato GRUB1, ha ottenuto l’accesso non autorizzato al suo ambiente Salesforce tra il 12 e il 17 agosto 2025.

Per gestire l’assistenza clienti e la gestione interna, la società si avvale di Salesforce. I dati sensibili sono stati sottratti dagli hacker proprio dai “casi” archiviati su Salesforce, nella maggior parte dei casi relativi a ticket di assistenza tecnica dei clienti. Tra le informazioni compromesse figurano quelle contenute nei campi di testo dei casi di supporto. Tali dati comprendono i dettagli di contatto dei clienti, il testo dell’oggetto e il corpo delle corrispondenze relative ai casi.

È stato evidenziato da Cloudflare che, anche se non è richiesta la condivisione di informazioni sensibili da parte dei clienti nei ticket di supporto, tutte le credenziali, le chiavi API, i registri o le password che sono stati eventualmente incollati nei campi di testo dai clienti dovrebbero essere considerati ormai compromessi. L’azienda ha riportato che non è stato effettuato alcun accesso agli allegati e nessun servizio Cloudflare o infrastruttura principale è stato violato a seguito di questo incidente.

L’indagine ha rivelato che l’attacco è iniziato con una ricognizione il 9 agosto, mentre la compromissione iniziale si è verificata il 12 agosto. L’autore della minaccia ha utilizzato le credenziali rubate dall’integrazione Salesloft Drift per accedere ed esplorare sistematicamente il tenant Salesforce di Cloudflare prima di esfiltrare i dati del caso di supporto il 17 agosto.

Questo episodio ci ricordano ancora una volta che il cloud, pur offrendo scalabilità, comodità e flessibilità operativa, porta con sé rischi che spesso non sono immediatamente visibili. La natura interconnessa delle piattaforme SaaS, unite alle numerose integrazioni di terze parti, aumenta esponenzialmente la superficie di attacco. In questo contesto, anche le procedure più rigorose di gestione della sicurezza interna rischiano di non bastare: un errore o una vulnerabilità in un singolo anello della catena può compromettere l’intero ecosistema digitale.

La lezione principale è che la fiducia cieca nel cloud non può sostituire una strategia di sicurezza multilivello. Le aziende devono adottare approcci di zero trust, monitoraggio continuo e pratiche di riduzione dei privilegi, valutando con attenzione ogni integrazione esterna. L’incidente di agosto 2025 ci mostra chiaramente che, nel mondo digitale, la resilienza dipende non solo dalla forza delle difese interne, ma dalla capacità di prevedere e contenere i rischi derivanti da terze parti: perché oggi, un singolo incidente SaaS può trasformarsi in una compromissione globale.

L'articolo Anche Cloudflare violata nell’incidente Salesforce! I rischi del cloud colpiscono tutti proviene da il blog della sicurezza informatica.



Australisches Gutachten: Anbieter von Alterskontrollen horten biometrische Daten


netzpolitik.org/2025/australis…



Interessante articolo che chiarisce quello che è realmente successo al volo di #Ursula (sulla base dei dati pubblici)

redhotcyber.com/post/terrore-n…



The Nintendo Famicom Reimagined as a 2003-era Family Computer


If there’s one certainty in life, it is that Nintendo Famicom and similar NES clone consoles are quite literally everywhere. What’s less expected is that they were used for a half-serious attempt at making an educational family computer in the early 2000s. This is however what [Nicole Branagan] tripped over at the online Goodwill store, in the form of a European market Famiclone that was still in its original box. Naturally this demanded an up-close investigation and teardown.

The system itself comes in the form of a keyboard that seems to have been used for a range of similar devices based on cut-outs for what looks like some kind of alarm clock on the top left side and a patched over hatch on the rear. Inside are the typical epoxied-over chips, but based on some scattered hints it likely uses a V.R. Technology’s VTxx-series Famiclone. The manufacturer or further products by them will sadly remain unknown for now.

While there’s a cartridge slot that uses the provided 48-in-1 cartridge – with RAM-banked 32 kB of SRAM for Family BASIC – its compatibility with Famicom software is somewhat spotty due to the remapped keys and no ability to save, but you can use it to play the usual array of Famicom/NES games as with the typical cartridge-slot equipped Famiclone. Whether the provided custom software really elevates this Famiclone that much is debatable, but it sure is a fascinating entry.


hackaday.com/2025/09/03/the-ni…



Vulnerabilità critica in IIS Web Deploy: l’exploit PoC è ora pubblico


Questa settimana è stato pubblicato un exploit proof-of-concept per il bug CVE-2025-53772, una vulnerabilità critica di esecuzione di codice remoto nello strumento IIS Web Deploy (msdeploy) di Microsoft, che ha sollevato urgenti allarmi nelle community .NET e DevOps.

Il CVE-2025-53772 è una vulnerabilità RCE critica negli endpoint msdeploy.axd e msdeployagentservice di Microsoft Web Deploy, causata dalla deserializzazione non sicura dei dati dell’intestazione HTTP in formato GZip + Base64. Consente a un utente malintenzionato autenticato di eseguire codice da remoto.

Microsoft ha assegnato un punteggio CVSS di 8,8 per il CVE-2025-53772. Le misure di mitigazione immediate includono la disabilitazione del servizio Web Deploy Agent (MsDepSvc), l’applicazione di ACL di rete rigorosi sull’endpoint msdeploy.axd e l’applicazione di filtri in ingresso per bloccare intestazioni MSDeploy.SyncOptions inaspettate.

IIS Web Deploy (msdeploy) è un set di strumenti che impacchetta e trasferisce applicazioni Web, configurazioni IIS e risorse basate su provider in un ambiente di destinazione. Supporta due tipi di meccanismi di accesso: tramite Web Management Service (WMSvc) su endpoint HTTP(S): /msdeploy.axd tramite Web Deploy Agent Service (MsDepSvc):msdeployagentservice

Le funzionalità principali includono: Sincronizzazione e distribuzione tramite provider per file, siti Web, certificati, database, ecc. Flussi di lavoro per la creazione di pacchetti ( GetPackage) e l’applicazione di pacchetti ( Sync) Questa elevata flessibilità, se combinata con progetti di serializzazione che non convalidano rigorosamente gli input, amplia la superficie di attacco.

Per una correzione a lungo termine è necessario sostituire BinaryFormatter con un serializzatore sicuro (ad esempio, DataContractSerializer con contratti di tipo espliciti) e convalidare tutti gli input dell’intestazione prima della deserializzazione.

Con la diffusione degli exploit PoC, le organizzazioni che sfruttano IIS Web Deploy devono dare priorità all’applicazione di patch e al rafforzamento per impedire agli aggressori autenticati di sfruttare questo vettore RCE critico.

L'articolo Vulnerabilità critica in IIS Web Deploy: l’exploit PoC è ora pubblico proviene da il blog della sicurezza informatica.





Trasferimenti di dati UE-USA: Prime reazioni al caso "Latombe Prima reazione alla sentenza del Tribunale sul ricorso "Latombe" contro l'accordo sul trasferimento dei dati tra UE e USA (TADPF). mickey03 September 2025


noyb.eu/it/eu-us-data-transfer…