Salta al contenuto principale



diciamo che una buona sanità dovrebbe essere gratuita. nel senso che per esami e visite di un bambino un genitore non dovrebbe pagare. ma addirittura farsi pagare dallo stato per il servizio di mettere di disposizione i figli mi pare stoni un pochetto.


Keebin’ with Kristina: the One with the Elegant Macro Pad


Illustrated Kristina with an IBM Model M keyboard floating between her hands.

Some people are not merely satisfied with functionality, or even just good looks. These persnickety snoots (I am one of them) seek something elegant, a true marriage of form and function.

Image by [YANG SHU] via Hackaday.IOShould such a person be in the market for a macro pad (or ‘macropad’ if you prefer), that snoot should look no further than [YANG SHU]’s 8-key programmable stream deck-like device.

The main goal here was the perfect fusion of display and feel. I’m not sure that an FDM-printed, DIY macro pad can look any better than this one does. But looks are only half the story, of course. There’s also feel, and of course, functionality.

Yes those are (hot-swappable) mechanical key switches, and they are powered by an ESP32-S2. Drawn on the 3.5″ LCD are icons and text for each switch, which of course can be easily changed in the config app.

There’s a three-direction tact switch that’s used to switch between layout profiles, and I’m sure that even this is satisfying on the feel front. Does it get better than this? Besides maybe printing it in black. I ask Hackaday.

KeebDeck Keyboard Gets Two Thumbs Up


Did you make it to Supercon this year? If so, you hold a badge with a special keyboard — a custom job by Hackaday superfriend [Arturo182], aka Solder Party. Were you wondering about its backstory?

Image by [Arturo182] via Solder PartyUnsatisfied with having to rely on a dwindling stock of BBQ20 keyboards, [Arturo182] created a fantastic replacement called the KeebDeck Keyboard.

This 69-key alphanumeric silicone number has all the keys a hacker needs, plus a rainbow of extras that can be used for macros. According to [Arturo182], the keyboard has a tactile feel thanks to a snap dome sheet underneath the keys, and this makes it more comfortable for long thumb-typing sessions.

Be sure to check out the teasers at the bottom of the KeebDeck page, because there is some really exciting stuff. If you want to build one, GitHub is your friend, pal.

Thanks for the tip, [Wim Van Gool]!

The Centerfold: Controlled Chaos


Image by [Tardigradium] via redditDon’t you just love the repeated primary colors throughout this centerfold? I do, and I think this whole arrangement shows amazing restraint. Controlled chaos, if you will. That’s what [Tardigradium]’s wife calls it, anyway.

Here’s what I know: That’s a Nulea m512 mouse, the keyboard is a KBD Craft Sachiel LEGO number, and that there is a Cidoo macro pad. Best of all, [Tardigradium] hand-painted the speakers. Neat-o!

Do you rock a sweet set of peripherals on a screamin’ desk pad? Send me a picture along with your handle and all the gory details, and you could be featured here!

Historical Clackers: the Gerda Typewriter Was One of Accessibility


Some of us (okay, I) would have thought that most accessibility inventions are fairly recent, say, from the 1960s onward. But consider the Gerda typewriter, which was created in 1919 to enable blind and one-armed victims of WWI to become employable typists.
Image via The Antikey Chop
According to the Antikey Chop, it’s quite possible that the German government helped grease the wheels of this project so that these soldiers would have a usable typewriter with which to get on with life.

Three versions of this index typewriter were produced: a two-handed Gerda, one with a Braille index, and one with an English index. All entered the market the same year, and were produced for a total of three years.

The Gerda’s typewheel was quite like Blickensderfer, and some even had the DHIATENSOR layout. More expensive than last week’s Clacker (75 Marks), the Gerdas for blind and sighted people with two hands cost 195 Marks, and the one-handed edition was 205 Marks. Some of the two-handed models had rectangular, wooden key-tops, and others had round, glass-topped keys.

Finally, Module-Based Keyboard Is a Sensory Nightmare

Image by Future via Games Radar
I’ve been an early adopter of keyboards in the past. This is usually to bring them to your attention, either before they’re released, or just as they’ve come out. And never have I ever had this poor of an experience.

Games Radar recently reviewed a surprisingly not-failed Kickstarter keyboard that actually shipped, the Naya Create. It may not look like it, but the Create is supposed to be a gaming keyboard. What it does look like is mouse-focused, or at least mouse-forward. And that’s the point of it. Evidently.

Those big modules are interchangeable, and there are four of them so far: the Touch (a trackpad), Track (a trackball that falls out reliably), the Tune (a dial), and the Float, which is designed for space mousing around. They sound cool enough, and might actually be the best part of this whole setup.

To fully illustrate my poit I hvemt’t corrected any of the typos experieved typim this semtemve with the Naya Create while tryig to maintain my usual speed.


But according to Games Radar, the Naya Create is so not worth the $850 (!) asking price. It has ‘mushy, low-profile switches’ and clammy caps, and although the reviewer complains about the non-staggered keys, y’all know that those are my preference at this point.

And apparently, by default, Backspace is mapped to the left side. What? Of course, you can remap any key, whenever the software decides to work. Whenever the reviewer tried to save changes, the software would say that the keyboard is disconnected. Wonderful.

Despite these shortcomings, Games Radar says the keyboard is rock-solid aluminium with good hinges. So there’s that. Just, you know, swap out the switches and keycaps, and wait for software updates, I guess.


Got a hot tip that has like, anything to do with keyboards? Help me out by sending in a link or two. Don’t want all the Hackaday scribes to see it? Feel free to email me directly.


hackaday.com/2025/11/24/keebin…




A group of immigrant rights organizers are helping people use Fortnite to practice what to do if they encounter ICE agents in the wild.#fortnite #ICE #Gaming


Inside an ICE Defense Training on Fortnite


In the deserted town square of the city of Springfield, three people huddle in an empty courthouse. Two of these people are civilians; one is a “vulnerable,” someone being pursued and targeted by government agents. They talk in hushed tones to one another, playing music to keep fear at bay. Above the door of the courthouse, a plaque reads, “Liberty and Justice for Most.”

At the bottom of the courthouse stairs, two government agents step out of a purple golf cart. They approach the door. They’re carrying guns.

“Hey, is anyone inside?” one of them says. “Any vulnerables in here? We have a warrant. We have a warrant for any vulnerables in the area.”

One civilian opens the door, sees the agents, and immediately slams it shut. After more warrant calls, the civilian says, “Slip it under the door.”

“I would slip it under the door, but there’s no space under the door,” the agent says, stuttering.

The civilian pauses. “Well. Sounds like a personal problem.”

This was the scene in a Simpsons-themed Fortnite lobby on November 21, where members of a new 500-person gaming group gathered to practice what they would do if Immigration and Customs Enforcement (ICE) agents came knocking at their doors in real life. The group, New Save Collective, is an effort to organize people in the gaming world who have more progressive ideas but no place to discuss them.

“ Our hypothesis since we started this project has been that opposition forces like corporations and the military and the far right have done a really good job at weaponizing the social features of gaming,” said one of the organizers, who goes by PitaBreadFace online and spoke to 404 Media on condition of pseudonymity due to security concerns, as they said people claiming to be ICE agents have already infiltrated the group’s Discord server a few times. “ They’re building institutions in the gaming landscape, which is the biggest entertainment industry in the world, lest people forget.”

“Gaming wasn’t kind of a random genre that we chose,” Shauna Siggelkow of the organization Define American, which partnered with New Save Collective, told Wired ahead of the Friday event last week. “We’ve been tracking anti-immigrant myths and disinformation digitally for years.”

Some examples of those weaponizations include the U.S. Navy playing e-sports to recruit teens and kids being roped into neo-Nazi propaganda groups in online shooter games. ICE is also using games, like the sci-fi first-person shooter Halo and the all-time favorite Pokémon, in its recruitment ads. “More pro-social forces have really lacked,” PitaBreadFace said. “We have not been as effective at creating institutions. So we’ve seen the hunger for those kinds of spaces for gamers.”

PitaBreadFace and other grassroots organizers have been working on the Collective for the past three years, more recently in partnership with formal non-profit advocacy groups like Define American and Immigrants Belong. The Fortnite event was run by the Collective, but is part of a larger campaign titled “Play Your Role,” which is intended to teach people about their rights and “counter fear-based misinformation about immigrants,” according to a statement written by the non-profits. The Play Your Role campaign also included a live-streamed Grand Theft Auto event last Thursday, in which gamers roleplayed with people dressed as real ICE agents during traffic stops or outside apparent detention centers. Earlier this year, Roblox players conducted similar roleplaying events to simulate ICE raids and protests.



Scenes from the Nov. 21 Fortnite event. Redacted to remove players' usernames and other identifying information.

Organizers asked 404 Media not to join the official Fortnite lobby in real time; they said having reporters in the same space as Collective members might have exerted media pressure or kept them from getting the full experience. “ We’re not going to stream it for security reasons, and no reporters inside of it,” PitaBreadFace said on the morning ahead of the event. “Our main goal tonight is to really build and organize with the folks who are coming, and because I’m an organizer, that’s obviously the priority.”

However, they shared a number of clips from matches and discussions after the event had concluded.

After some scuffling, the agents agree to “abandon the vehicle” and run off. As they are chased off, one person calls after them, “Yeah, I threw a pizza at you! I threw a pizza at you with extra bacon.”


In another clip, the two gamers role-playing as ICE agents—portrayed by Fortnite’s Airhead character—are standing on their golf cart, surrounded by civilians in the middle of their pursuit of a “vulnerable,” the event’s chosen term for people being targeted by government agents.

“This does not concern you,” one of the agents says to the civilians, encouraging them to leave.

“We’re allowed to record,” one person responds. Another asks, “Who does it concern?”

“We’re looking for two vulnerables,” the agent says, as the civilian group closes in on the golf cart. “Excuse us, you’re interfering. We have a court order.”

After some scuffling, the agents agree to “abandon the vehicle” and run off. As they are chased off, one person calls after them, “Yeah, I threw a pizza at you! I threw a pizza at you with extra bacon.”

The agents were played by the organizers behind the Collective, and they were noticeably less persistent than ICE agents in real life. That’s evidenced by them saying things like, “Excuse us,” but it’s also evident in their behavior. In the first clip, they don’t bust down the door of the courthouse; when a civilian briefly opens it, they don’t barge inside. At the end of that encounter, one agent says to the other, “This home is too protected; let’s go see if we can find a vulnerable somewhere else.” Given their reputation for violence in raids, IRL ICE agents are unlikely to give up as easily.

But that kind of environment allows the training session to be a reasonable intensity for a gamer’s first round of practice responding to ICE, and still be a fun, safe place for people to hang out. According to PitaBreadFace, the main goal of the space wasn’t necessarily to be a specifically anti-ICE training facility, but more so to organize a community and build trust. And this tactical frivolity is a proven method of protest—ask anyone who wore a frog costume to a Portland protest earlier this year.

“ A situation, even though it’s virtual, where you can clearly overwhelm ICE’s numbers and do silly stupid things and work together easily and be connected to each other—it just felt like actually winning,” one gamer said in a clip provided to 404 Media. “It felt like a way to kind of heal some of the burnout.”

A virtual situation also allows players to fire back at ICE in ways that likely wouldn’t be practical in real life. In one clip, for example, two agents are chasing after a vulnerable, yelling, “Hey, stop right there!”

When they get close enough, the vulnerable drops a Boogie Bomb, an item which forces another player to dance under a disco ball for about three seconds.

“Oh,” the Boogie-Bombed agent exclaims, before the gamers start laughing.

The event also had another component. Before the practice ICE raids, gamers went around to practice finding one another, creating groups and building connections. PitaBreadFace described this segment as learning how to “meet your neighbors, know those around you, and establish contact.” A lot of that, according to clips provided to 404 Media, involves doing dance emotes together; in one case, it was a team of about 10 people destroying an in-map mansion and yelling, “Pay your taxes!”

But it also involved discussions about what community means. In the middle of a “Shout!” dance circle, one gamer said that they first learned the importance of community organizing when protesting the 2017 Muslim ban.

“ I feel like community taught me that like if enough people came together and there was enough will, anything could happen,” they said. “I remember the first Muslim ban, and just hella people went to the airport, and we were able to petition for people to get released. And they were. It was cool to see that organically happen.”

New Save Collective plans to run more events similar to this one through the end of this year, at which point Fortnite is slated to get rid of the proximity chat mode it uses. PitaBreadFace said the response had been so far overwhelmingly positive.

“ I think gamers represent this constituency of people who are really common-sense,” PitaBreadFace said. “It’s not like they’re even super pro-immigrant. They’re just like, ‘No, this doesn’t make sense. This community member who’s been part of a community for 25 years is being ripped out of his home in the middle of the night. That doesn’t make sense, and we should do something about it.’ We have a lot of people who joined the [Discord] server who are like, ‘I actually don’t know, but I know this is wrong and I’m here to learn and participate.’”




Build Yourself a Medium-Format Camera


Medium format cameras have always been a step up from those built in the 35 mm format. By virtue of using a much larger film, they offer improved resolution and performance. If you want a medium format film camera, you can always hunt for some nice vintage gear. Or, you could build one from scratch — like the MRF2 from [IDENTIDEM.design.]

The MRF2 might be a film camera, but in every other way, it’s a thoroughly modern machine. It’s a rangefinder design, relying on a DTS6012M LIDAR time-of-flight sensor to help ensure your shots are always in sharp focus. An ESP32 is responsible for running the show, and it’s hooked up to OLED displays in the viewfinder and on the body to show status info. The lens is coupled with a linear position sensor for capturing accurate shots, there’s a horizon indicator in the viewfinder, and there’s also a nice little frame counter using a rotary encoder to track the film.

Shots from a prototype on Instagram show that this camera can certainly pull off some beautiful shots. We love a good camera build around these parts. You can even make one out of a mouse if you’re so inclined.

youtube.com/embed/_sIWXoqOFIU?…


hackaday.com/2025/11/24/build-…



The Unexpected Joys Of Hacking an Old Kindle


In the closing hours of JawnCon 0x2, I was making a final pass of the “Free Stuff for Nerds” table when I noticed a forlorn Kindle that had a piece of paper taped to it. The hand-written note explained that the device was in shambles — not only was its e-ink display visibly broken, but the reader was stuck in some kind of endless boot loop. I might have left it there if it wasn’t for the closing remark: “Have Fun!”

Truth is, the last thing I needed was another Kindle. My family has already managed to build up a collection of the things. But taking a broken one apart and attempting to figure out what was wrong with it did seem like it would be kind of fun, as I’d never really had the opportunity to dig into one before. So I brought it home and promptly forgot about it as Supercon was only a few weeks away and there was plenty to keep me occupied.

The following isn’t really a story about fixing a Kindle, although it might seem like it on the surface. It’s more about the experience of working on the device, and the incredible hacking potential of these unassuming gadgets. Whether you’ve got a clear goal in mind, or just want to get your hands dirty in the world of hardware hacking, you could do far worse than picking a couple of busted Kindles up for cheap on eBay.

If there’s a singular takeaway, it’s that the world’s most popular e-reader just so happens to double as a cheap and impressively capable embedded Linux development environment for anyone who’s willing to crack open the case.

Getting Connected


We start with what’s essentially Hardware Hacking 101: the hidden serial debug port. It’s the sort of thing you learn to look for when taking apart a new gadget, and unsurprisingly, it’s also at the heart of Kindle hacking. While there’s plenty of software modifications you can do depending on the age and version of your particular Kindle, opening up the case and tapping into the serial port is always the most direct way to gain access to the system.

From my research, every Kindle (with the possible exception of the very latest models from the 2020s) have an unpopulated serial port on the board. In the case of this Kindle Paperwhite 2 from 2013, it’s even labeled. I simply soldered on some jumper wires and ran them out to a pin header to make connecting to it a little less fiddly. The only thing to watch out for is the voltage; it seems that the serial port on the majority of Kindles is 1.8 V, and connecting up a higher voltage USB-serial adapter without a level shifter could release the Magic Smoke.

With the hardware connected and my favorite serial communications tool running, it was easy to see what ailed this particular Kindle. As evidenced by the final few lines of the kernel messages, a failure of one of the voltage regulators in the MAX77696 — a power management IC designed specifically for e-ink readers — was preventing the driver module from loading fully. This in turn was triggering a reboot, presumably because some sort of watchdog routine was in place to bail out if any critical hardware issues were detected.

On the Hunt


Coming from the “normal” Linux world, the solution seemed easy enough. Since the screen was toast anyway, all I needed to do to get the Kindle booting was to prevent the kernel module from loading. That way I could at least use it for something, perhaps an energy efficient minimalist server.

But according to the MAX77696 datasheet, the chip was responsible for quite a bit more than simply driving the e-ink panel. If I pulled the kernel module entirely, there was a good chance I’d also lose features like the real-time clock and the ability to read the battery voltage as well. So I decided to change tactics: rather than keeping the driver from loading, I’d take out the watchdog that was forcing the system to reboot. But where was it?

Amazon makes it easy to manually download the latest firmware for each member of the Kindle family, and the aptly named KindleTool lets you manipulate them. In this case I used the extract function to pull out the root filesystem image, which I could then locally mount as a basic EXT3 volume.

That was refreshingly straightforward, but unfortunately didn’t get me where I needed to go. Using grep to search all the files within the filesystem for the string “failed to load eink driver” showed no hits. If the watchdog wasn’t in the root filesystem, then where was it?

Unpacking the firmware update with KindleTool also got me the kernel image, and running Binwalk against it showed there was a compressed filesystem at 0x466C. I reasoned this must be an initramfs — essentially a minimal Linux system that lives in RAM and gives the kernel a place to work as it brings up the rest of the system. If the system has some self-check capability, it’s reasonable to assume that’s where it lives.

After drilling down a few times with Binwalk’s extract function, I was able to get to the contents of the initramfs. Sure enough, another search for the error message revealed our sentinel: /bin/recovery-util.

New Kernel, Who Dis?


I had considered trying to simply remove the recovery-util program from the kernel image, but since I wasn’t 100% sure how the whole watchdog system functioned, there was no guarantee that would have worked without more trial and error. So, emboldened by how well this was all going for me so far, I took the nuclear option and decided to rebuild the kernel with my own initramfs.

It’s here that the Kindle software environment, and the community around it, really started to shine. Once again, Amazon made it ridiculously easy to get the source code for the exact firmware I was working with, and the community provided an actively maintained toolchain to build it with. A little more searching even pulled up some pre-compiled builds that were ready to use.

Actually building the kernel for the Kindle was essentially the same process as doing it on my desktop computer, with the notable addition of supplying the location of the cross compiler into each make command. But if I ever got off track, there were plenty of write-ups online to reference. I even found one that went over building a custom initramfs with BusyBox that doesn’t include any of Amazon’s programs.

But perhaps the best part was that, once I had compiled Amazon’s modified kernel and built my initramfs, installing it on the Kindle was as simple as using a modified version of Android’s fastboot command. There were no cryptographic hoops to jump through, you just give it the new kernel and away it went. It’s my understanding that newer Kindles might not be so understanding, but with at least the hardware of this vintage, there’s nothing stopping you from doing whatever you want.

Pocket Penguin Playground


With the source code, tools, and knowledge floating around out there, I was able to build my own kernel and initramfs that lets me boot into a full Linux environment on what was previously a non-functional Kindle. There are a few things I haven’t gotten to work yet, but I believe that’s largely because I’m still using the root filesystem provided by Amazon.

Now that I know how easy it is to work with Linux on the Kindle, I’m looking to push further and put together my own stripped-down environment without any of Amazon’s frameworks installed. Given how ridiculously cheap early Kindles are on the second hand market — especially if they have a busted screen — there are all sorts of tasks that I could see them performing if I had a solid base to build on.

Make no mistake, I’m greatly appreciative of the fact that we now have mature single-board computers like the Raspberry Pi available for a reasonable cost. But taking what’s essentially consumer e-waste and turning it into a useful platform for learning and experimentation is the true hacker way. So whether you’ve got a Kindle collecting dust somewhere at home, or end up grabbing a few off of eBay for a song, I invite you to bust out the USB-serial adapter and start exploring.



La Sorveglianza Digitale sui Lavoratori sta Arrivando: Muovi il Mouse più Veloce!


Il lavoro da remoto ha dato libertà ai dipendenti, ma con essa è arrivata anche la sorveglianza digitale.

Ne abbiamo parlato qualche tempo fa in un articolo riportando che tali strumenti di monitoraggio stanno arrivando anche all’interno di Microsoft teams. Pertanto, al posto dello sguardo fisso del capo, questo ruolo verrà sempre più svolto dagli “algoritmi” che monitoreranno per quanto tempo le applicazioni rimangono aperte, quali siti web vengono visitati e con quanta attività viene mosso il mouse e premuto i tasti.

Sistemi avanzati analizzano persino le espressioni facciali e il modo in cui i dipendenti camminano davanti a una webcam. Ma questi strumenti sottolineando al tempo stesso i limiti intrinseci della raccolta di dati personali.

Tuttavia, per molti lavoratori, tale monitoraggio non è visto come una preoccupazione, ma come una sfiducia e una violazione della privacy. Sondaggi e dati dell’American Psychological Association collegano la sorveglianza costante a un aumento dello stress, a un peggioramento del benessere psico-emotivo e al desiderio di lasciare il lavoro.

La necessità di trasmettere immagini da webcam o informazioni mediche sensibili è particolarmente pressante. Le persone chiedono spiegazioni chiare sul motivo per cui i dati vengono raccolti e con chi possono essere condivisi.

Lo sguardo gelido degli algoritmi non è meno pericoloso. I programmi mancano di contesto e scambiano facilmente telefonate o documenti per inattività. Questo porta i dipendenti a fingere un’attività frenetica per il bene degli indicatori di performance, e gli esperti del National Employment Law Project degli Stati Uniti hanno documentato casi di sanzioni ingiustificate e difficili da contestare quando la decisione viene effettivamente presa dal sistema.

Nei magazzini e nella logistica, dove ogni movimento è digitalizzato, la pressione è particolarmente intensa: la fretta di rispettare gli standard si traduce in dolore fisico, affaticamento e burnout. Secondo NELP, la sorveglianza digitale ha anche un impatto sui diritti dei lavoratori, ostacolando l’organizzazione dei lavoratori e fornendo alle aziende uno strumento per la rilevazione precoce dell’attività sindacale, con il pretesto di analizzare altri parametri.

Le regole del gioco stanno cambiando lentamente. Negli Stati Uniti, i datori di lavoro sono tenuti a fornire un avviso sulla raccolta dei dati, ma questi requisiti sono limitati, quindi gli stati stanno cercando di introdurre misure di salvaguardia proprie. La California sta discutendo di vietare i sistemi che riconoscono emozioni, andatura o espressioni facciali e trasmettono dati a terzi.

Nel frattempo, il Massachusetts sta promuovendo una legislazione che proteggerebbe i lavoratori dall’abuso della sorveglianza digitale. Nel frattempo, le autorità federali stanno cercando un approccio unificato alla regolamentazione dell’intelligenza artificiale, il che potrebbe indebolire le iniziative locali. Pertanto, l’interesse per la contrattazione collettiva come mezzo valido per combattere la sorveglianza eccessiva sta crescendo.

I sostenitori di un approccio più cauto insistono sul fatto che tali strumenti siano significativi solo quando aiutano a identificare le tendenze generali e a migliorare i processi, piuttosto che trasformare le persone in parametri. Dove rispetto, autonomia e condizioni di lavoro sicure permangono, la produttività emerge in modo naturale, senza una telecamera onnipresente che controlla ogni mossa.

L'articolo La Sorveglianza Digitale sui Lavoratori sta Arrivando: Muovi il Mouse più Veloce! proviene da Red Hot Cyber.



“Come rappresentanti delle aggregazioni laicali, nell’apprezzare con gratitudine il documento finale del Cammino sinodale delle Chiese in Italia, e nell’orizzonte del futuro documento attuativo, con senso di corresponsabilità e di partecipazione alla…


Mons. Stefano Rosati (vicario generale della diocesi di Parma) è stato rieletto presidente nazionale della federazione italiana dell’Unione apostolica del clero (Uac).


“Leone XIV ha approvato il conferimento del Premio Ratzinger 2025 al maestro Riccardo Muti”. Lo annuncia il Comitato scientifico e il Consiglio di amministrazione della Fondazione vaticana Joseph Ratzinger-Benedetto XVI.


Attacchi globali a quota 24 trilioni di dollari: come difendersi nell’era dell’Agentic AI


@Informatica (Italy e non Italy 😁)
Gartner ha identificato l'Agentic AI aziendale come la principale tendenza tecnologica strategica per il 2025, con una crescita prevista del 46,2% dal 2025 al 2030. Ma le sfide sono numerose. Ecco cosa prevede la Microsoft



"La speranza non significa avere tutte le risposte". Lo ha detto Leone XIV nella Sala del Concistoro accogliendo il pellegrinaggio nazionale della Lettonia, ricordando che l’incontro si svolge nell’Anno Giubilare e nel centenario del primo pellegrina…


Microsoft corregge il bug su WSUS, ma gli hacker Cinesi arrivano prima


Una vulnerabilità recentemente corretta nei servizi di aggiornamento di Windows Server di Microsoft ha portato a una serie di attacchi utilizzando uno degli strumenti di spionaggio più noti degli ultimi anni.

Gli incidenti dimostrano la rapidità con cui gli aggressori possono passare dallo studio di un exploit pubblicato allo sfruttamento attivo della vulnerabilità per penetrare nell’infrastruttura.

Secondo l’azienda sudcoreana AhnLab, un gruppo sconosciuto ha ottenuto l’accesso ai server Windows che eseguivano WSUS sfruttando la vulnerabilità CVE-2025-59287. Questa vulnerabilità è stata sfruttata per eseguire utilità di sistema standard, consentendo agli aggressori di contattare un server esterno e scaricare codice dannoso.

Prima di installare lo strumento principale, è stata utilizzata l’utilità PowerCat, che ha fornito agli aggressori un prompt dei comandi remoto. Quindi, utilizzando certutil e curl, è stato installato ShadowPad sul sistema.

Questo programma è considerato uno sviluppo di PlugX ed è da tempo utilizzato da entità collegate alla Cina. La sua architettura è modulare e viene avviato tramite sostituzione di libreria.

Un file DLL, situato in memoria e responsabile dell’esecuzione del contenuto principale, viene caricato nel file legittimo ETDCtrlHelper.exe. Al suo interno viene implementato un modulo che carica componenti aggiuntivi e utilizza meccanismi stealth e di persistenza.

Microsoft ha corretto CVE-2025-59287 un mese fa. Il bug è classificato come critico perché consente l’esecuzione di codice arbitrario con privilegi di sistema. Dopo il rilascio di un exploit dimostrativo, molti gruppi hanno iniziato a scansionare in massa i server WSUS accessibili, ottenendo l’accesso iniziale, effettuando ricognizioni e scaricando sia file dannosi che strumenti di amministrazione legittimi. Secondo AhnLab, è in questo modo che ShadowPad è stato distribuito sui server.

L’incidente ha chiaramente dimostrato che ogni vulnerabilità diventa una minaccia reale se la sua risoluzione viene ritardata. Quanto più rapidamente vengono affrontati i problemi identificati, tanto minore è la probabilità che gli aggressori riescano a infiltrarsi nell’infrastruttura e a trasformare un guasto in una crisi conclamata.

L'articolo Microsoft corregge il bug su WSUS, ma gli hacker Cinesi arrivano prima proviene da Red Hot Cyber.

Gazzetta del Cadavere reshared this.



Sono stati diffusi oggi il Regolamento generale della Curia romana e il Regolamento del personale, firmati da Leone XIV il 23 novembre e destinati a entrare in vigore il 1° gennaio 2026.


"Fondatore non è un uomo solo, ma più persone legate da una forte amicizia in Cristo". Così Leone XIV ha parlato nella Sala Clementina ai partecipanti al 215° Capitolo Generale dei Servi di Maria, indicando la fraternità come segno della loro vocazio…


ShinyHunters cerca impiegati infedeli mentre il caso Gainsight Salesforce si estende


La crescente fuga di dati dall’ecosistema Salesforce ha preso una nuova piega dopo che il gruppo ShinyHuntersha annunciato il suo coinvolgimento nell’incidente. Gli eventi sono in corso da diversi mesi, interessando diversi servizi correlati alle piattaforme CRM, e la portata dell’impatto continua a crescere.

ShinyHunters afferma di aver ottenuto l’accesso a Gainsight diversi mesi fa, sfruttando le funzionalità acquisite tramite un hack dell’integrazione di Salesloft Drift. All’epoca, individui sconosciuti si erano infiltrati nell’account GitHub di Salesloft ed estraevano i token OAuth utilizzati dal servizio di terze parti Drift con Salesforce. Questi token hanno permesso loro di accedere furtivamente ai dati di un gran numero di clienti aziendali.

Secondo quanto riferito, la stessa campagna ha compromesso anche Gainsight. Questo servizio opera come piattaforma di gestione dei processi dei clienti ed è connesso a Salesforce, HubSpot e sistemi di supporto come Zendesk.

L’incidente ha spinto l’azienda a contattare gli specialisti di Google Mandiant per indagare sulla natura dell’attività e sull’origine del problema. Gainsight sostiene che l’attività indesiderata si sia verificata tramite connessioni ad applicazioni esterne, non a causa di un bug nella piattaforma Salesforce stessa.

In risposta, Salesforce ha revocato tutte le chiavi di accesso attive per le app Gainsight e le ha temporaneamente rimosse da AppExchange. Zendesk e HubSpot hanno adottato misure simili, limitando la funzionalità dei rispettivi connettori in attesa di una revisione interna. I rappresentanti di Salesforce hanno rifiutato di commentare nei dettagli, ma hanno sottolineato che le misure sono state adottate immediatamente.

Secondo il Google Threat Intelligence Group, l’attacco è collegato al gruppo UNC6240, noto anche come ShinyHunters. L’azienda ha identificato oltre duecento istanze Salesforce interessate. Si ritiene che la fonte della compromissione siano i token OAuth rubati, che hanno consentito agli aggressori di accedere a servizi di terze parti e alle relative integrazioni.

I membri di ShinyHunters affermano di aver verificato il livello di monitoraggio nei sistemi di Gainsight e che l’attività illegale è stata rilevata circa una o due settimane dopo l’inizio delle intrusioni. Il gruppo afferma inoltre di cercare complici all’interno di grandi aziende. Salesforce aveva precedentemente dichiarato che non avrebbe acconsentito alle richieste degli estorsori e non avrebbe negoziato.

L'articolo ShinyHunters cerca impiegati infedeli mentre il caso Gainsight Salesforce si estende proviene da Red Hot Cyber.



"La prima sorgente a cui tornare sempre è il Vangelo". Lo ha detto Leone XIV nella Sala Clementina, incontrando i partecipanti al 215° Capitolo Generale dei Servi di Maria, sottolineando il valore del ritorno alle origini come via di creatività e pro…



Novelle des Polizeigesetzes: Sachsen will anlasslos mit Drohnen in fahrende Autos filmen


netzpolitik.org/2025/novelle-d…



L’Europa guarda a Monfalcone per la nuova rotta dell’industria marittima

@Notizie dall'Italia e dal mondo

Nel pieno della ridefinizione delle politiche industriali europee, la tappa del commissario ai Trasporti sostenibili e al Turismo Apostolos Tzitzikostas allo stabilimento Fincantieri di Monfalcone ha assunto il valore di un segnale politico preciso. Il sito friulano, da anni



Se la geopolitica supera gli strumenti della Prima Repubblica. Il commento di Camporini

@Notizie dall'Italia e dal mondo

La scorsa settimana si è riunito il Consiglio Supremo di Difesa, organo di rilevanza costituzionale, (art. 87 Cost.), “costituito secondo la legge”, legge che venne varata il 28 luglio del 1950, con formulazioni che non fanno piena chiarezza





Santopadre: “Vincere la Davis non era scontato. Berrettini ha ritrovato l’energia giusta e ora non si ferma più”

[quote]ROMA – L’Italia ha vinto per la terza edizione di fila la Coppa Davis. Vincenzo Santopadre, ex allenatore di Matteo Berrettini e nuovo allenatore di Lorenzo Sonego, racconta a Lumsanews…
L'articolo Santopadre:




Santopadre: “Vincere la Davis non era scontato. Berrettini ha ritrovato l’energia giusta e ora non si ferma più”

[quote]ROMA – L’Italia ha vinto per la terza edizione di fila la Coppa Davis. Vincenzo Santopadre, ex allenatore di Matteo Berrettini e nuovo allenatore di Lorenzo Sonego, racconta a Lumsanews…
L'articolo Santopadre:



Ucraina, svolta possibile. Trump: “Succederà qualcosa di buono”. Allarme droni a Mosca: chiusi tre aeroporti

[quote]BRUXELLES – Dall’uso degli asset russi congelati per finanziare il processo di ricostruzione dell’Ucraina alle garanzie di sicurezza per Kiev simili a quelle contenute nell’articolo 5 della Nato. Sono solo…
L'articolo Ucraina,







Il filtro antispam funziona: bloccate quasi 10 milioni chiamate al giorno

[quote]ROMA – Il filtro contro le chiamate spam da finti cellulari italiani funziona: bloccate quasi 10 milioni telefonate al giorno. Dal 19 novembre 2025, l’Agcom impedisce ai call center molesti…
L'articolo Il filtro antispam funziona: bloccate quasi 10 milioni chiamate al giorno su



Roma, maxi blitz nel campo rom di via dei Gordiani: 18 arresti. Rapinavano anziani

[quote]ROMA – Furti, minacce e violenze. Era questo il modus operandi della banda sgominata oggi – 24 novembre – dai carabinieri, che hanno arrestato 18 persone. L’indagine ha accertato l’esistenza…
L'articolo Roma, maxi blitz nel campo rom di via dei Gordiani: 18 arresti.



Ornella Vanoni, l’addio infinito alla regina della canzone: migliaia in coda per la camera ardente. Attesa per i funerali

[quote]MILANO – L’ultimo saluto a Ornella Vanoni. Per farlo ha riaperto la camera ardente del Piccolo Teatro di Milano, dove fino alle 13 di oggi (24 novembre) è stato possibile…
L'articolo Ornella



Cina, alta tensione con il Giappone: “Rischio scontro militare”. Tokyo schiera missili vicino a Taiwan

[quote]PECHINO – Scintille tra Cina e Giappone. Il dispiegamento di “armi offensive” nipponiche sulle sue isole a sudovest “vicine alla regione cinese di Taiwan è un deliberato tentativo di creare…
L'articolo Cina, alta tensione con il



Moody’s promuove l’Italia dopo 23 anni e alza il rating. Giorgetti: “Fiducia nel governo”

Dopo quasi un quarto di secolo Moody's promuove il rating sovrano dell'Italia da Baa3 – il livello più basso dell'investment grade – a Baa2
L'articolo Moody’s promuove l’Italia dopo 23 anni e alza il rating. Giorgetti: “Fiducia nel governo” su Lumsanews.


Barazzutti: “La Davis resta una grande competizione anche senza i top. Ma preferivo la vecchia formula”

[quote]ROMA – Corrado Barazzutti, allenatore ed ex tennista, è ritenuto uno dei più forti tennisti italiani di sempre, numero 7 del mondo e numero 1 d’Italia per 198 settimane. Nel…
L'articolo Barazzutti: “La Davis resta una grande



suvvia, coraggio... finito trump quel che rimane sarà necessariamente più bello... ammesso che qualcosa sopravviva. la lunga notte della ragione avrà fine?

informapirata ⁂ reshared this.

in reply to simona

beh. parlo di cambiamento. non di elezione di un suo sosia. se riconfermano trump seppur con una faccia diversa siamo punto e daccapo.
in reply to simona

Non resta che sperare. Speranze alimentate dalle imbecilli politiche dell'imbecille pregiudicato arancione, che stanno mettendo in crisi anche buona parte dei suoi sostenitori.


Regionali, cala l’affluenza: 13mln di italiani chiamati alle urne in Veneto, Campania e Puglia

[quote]ROMA – Sono stati riaperti i seggi in Veneto, Campania e Puglia, dove circa 13 milioni di elettori sono chiamati al voto fino a lunedì pomeriggio per scegliere i governatori…
L'articolo Regionali, cala l’affluenza: 13mln di italiani chiamati alle urne



Caso Garofani, La Russa: “Credo che il consigliere del Quirinale debba dimettersi”

[quote]ROMA – Il caso del consigliere del Presidente della Repubblica Francesco Saverio Garofani si riaccende dopo le due dichiarazioni del presidente del Senato Ignazio La Russa, intervenuto all’evento “Italia Direzione…
L'articolo Caso Garofani, La Russa: “Credo che il