Post-exploitation framework now also delivered via npm
Incident description
The first version of the AdaptixC2 post-exploitation framework, which can be considered an alternative to the well-known Cobalt Strike, was made publicly available in early 2025. In spring of 2025, the framework was first observed being used for malicious means.
In October 2025, Kaspersky experts found that the npm ecosystem contained a malicious package with a fairly convincing name: https-proxy-utils
. It was posing as a utility for using proxies within projects. At the time of this post, the package had already been taken down.
The name of the package closely resembles popular legitimate packages: http-proxy-agent
, which has approximately 70 million weekly downloads, and https-proxy-agent
with 90 million downloads respectively. Furthermore, the advertised proxy-related functionality was cloned from another popular legitimate package proxy-from-env
, which boasts 50 million weekly downloads. However, the threat actor injected a post-install script into https-proxy-utils
, which downloads and executes a payload containing the AdaptixC2 agent.
Metadata for the malicious (left) and legitimate (right) packages
OS-specific adaptation
The script includes various payload delivery methods for different operating systems. The package includes loading mechanisms for Windows, Linux, and macOS. In each OS, it uses specific techniques involving system or user directories to load and launch the implant.
In Windows, the AdaptixC2 agent is dropped as a DLL file into the system directory C:\Windows\Tasks
. It is then executed via DLL sideloading. The JS script copies the legitimate msdtc.exe
file to the same directory and executes it, thus loading the malicious DLL.
Deobfuscated Windows-specific code for loading AdaptixC2
In macOS, the script downloads the payload as an executable file into the user’s autorun directory: Library/LaunchAgents
. The postinstall.js
script also drops a plist autorun configuration file into this directory. Before downloading AdaptixC2, the script checks the target architecture (x64 or ARM) and fetches the appropriate payload variant.
Deobfuscated macOS-specific code for loading AdaptixC2
In Linux, the framework’s agent is downloaded into the temporary directory /tmp/.fonts-unix
. The script delivers a binary file tailored to the specific architecture (x64 or ARM) and then assigns it execute permissions.
Deobfuscated Linux-specific code for loading AdaptixC2
Once the AdaptixC2 framework agent is deployed on the victim’s device, the attacker gains capabilities for remote access, command execution, file and process management, and various methods for achieving persistence. This both allows the attacker to maintain consistent access and enables them to conduct network reconnaissance and deploy subsequent stages of the attack.
Conclusion
This is not the first attack targeting the npm registry in recent memory. A month ago, similar infection methods utilizing a post-install script were employed in the high-profile incident involving the Shai-Hulud worm, which infected more than 500 packages. The AdaptixC2 incident clearly demonstrates the growing trend of abusing open-source software ecosystems, like npm, as an attack vector. Threat actors are increasingly exploiting the trusted open-source supply chain to distribute post-exploitation framework agents and other forms of malware. Users and organizations involved in development or using open-source software from ecosystems like npm in their products are susceptible to this threat type.
To stay safe, be vigilant when installing open-source modules: verify the exact name of the package you are downloading, and more thoroughly vet unpopular and new repositories. When using popular modules, it is critical to monitor frequently updated feeds on compromised packages and libraries.
Indicators of compromise
Package name
https-proxy-utils
Hashes
DFBC0606E16A89D980C9B674385B448E – package hash
B8E27A88730B124868C1390F3BC42709
669BDBEF9E92C3526302CA37DC48D21F
EDAC632C9B9FF2A2DA0EACAAB63627F4
764C9E6B6F38DF11DC752CB071AE26F9
04931B7DFD123E6026B460D87D842897
Network indicators
cloudcenter[.]top/sys/update
cloudcenter[.]top/macos_update_arm
cloudcenter[.]top/macos_update_x64
cloudcenter[.]top/macosUpdate[.]plist
cloudcenter[.]top/linux_update_x64
cloudcenter[.]top/linux_update_arm
F/0.38 Camera Lens Made With Oil Immersion Microscope Objective
Over on YouTube [Applied Science] shows us how to make an f/0.38 camera lens using an oil immersion microscope objective.
The f-number of a lens indicates how well it will perform in low-light. To calculate the f-number you divide the focal length by the diameter of the aperture. A common f-number is f/1.4 which is generally considered “fast”.
We are told the fastest commercial lens ever used had f/0.7 and was used by Stanley Kubrick to shoot the film Barry Lyndon which was recorded only with candle light.
A microscope objective is a crucial lens that gathers and magnifies light to form an image. It plays a key role in determining the quality and clarity of the final magnified image produced by a microscope.
In this case the microscope objective is optically coupled to the CMOS image sensor using a drop of oil. The oil has better refractive properties than an air-gap. In order to get the closest coupling possible the protective glass sheet on the top of the image sensor was removed. This process resulted in a lot of broken image sensors! Apparently the yield was only two working image sensors from eight attempts at removing the glass.
Of course we’ve seen f-number hacking here at Hackaday before, such as with the A Low F Number Lens, From Scratch which achieved f/0.5.
youtube.com/embed/DQv0nlGsW-s?…
2025 Component Abuse Challenge: Boosting Voltage With Just a Wire
Switching power supplies are familiar to Hackaday readers, whether they have a fairly conventional transformer, are a buck, a boost, or a flyback design. There’s nearly always an inductor involved, whose rapid change in magnetic flux is harnessed to do voltage magic. [Craig D] has made a switching voltage booster that doesn’t use an inductor, instead it’s using a length of conductor, and no, it’s not using the inductance of that conductor as a store of magnetic flux.
Instead it’s making clever use of reflected short pulses in a transmission line for its operation. Electronics students learn all about this in an experiment in which they fire pulses down a length of coax cable and observe their reflections on an oscilloscope, and his circuit is very similar but with careful selection of pulse timing. The idea is that instead of reflected pulses canceling out, they arrive back at the start of the conductor just in time to meet a pulse transition. This causes them to add rather than subtract, and the resulting higher voltage pulse sets off down the conductor again to repeat the process. We can understand the description, but this is evidently one to sit down at the bench and experiment with to fully get to grips with.
[Craig]’s conductor is an alternative to a long coil of coax, a home made delay line of the type once found in the luminance circuit of some color TVs. It’s a coaxial cable in which the outer is formed of a tightly wound coil rather than a solid tube. With it and a high-speed gate driver he can light a couple of neon bulbs, a significant step-up, we think. We’re trying to work out which component is being abused here (other than the gate driver chip he blows) as the conductor is simply performing its natural function. Either way it’s a clever and unexpected circuit, and if it works, we like it.
This project is part of the Hackaday Component Abuse Challenge, in which competitors take humble parts and push them into applications they were never intended for. You still have time to submit your own work, so give it a go!
Hackaday Podcast Episode 342: Poopless Prints, Radio in Your Fillings, and One Hyperspectral Pixel at a Time
It was Elliot and Dan on the podcast today, taking a look at the best the week had to offer in terms of your hacks. We started with surprising news about the rapidly approaching Supercon keynote; no spoilers, but Star Trek fans such as we who don’t have tickets will be greatly disappointed.
Elliot waxed on about taking the poop out of your prints (not pants), Dan got into a camera that adds a dimension to its images, and we both delighted in the inner workings of an air-powered squishy robot.
Questions? We’ve got plenty. Is it possible to take an X-ray without an X-ray tube? Or X-rays, for that matter? Did Lucille Ball crack a spy ring with her fillings? Is Algol set to take over the world? What’s inside a germanium transistor? How does a flipping fish say Happy Birthday? And how far down the Meshtastic rabbit hole did our own Tom Nardi fall? Tune in to find out the answers.
html5-player.libsyn.com/embed/…
Download this free-range, cruelty-free MP3.
Where to Follow Hackaday Podcast
Places to follow Hackaday podcasts:
Episode 342 Show Notes:
News:
What’s that Sound?
- Congrats to [James Barker] for picking the sound of a rake!
Interesting Hacks of the Week:
- SLM Co-extruding Hotend Makes Poopless Prints
- I built a rotating mixing nozzle to print with different colors
- 3D Printer with “rotating nozzle”
- GitHub – Heinz-Loepmeier/nozzleboss
- Waterjet-Cut Precision Pastry
- Waverider: Scanning Spectra One Pixel At A Time
- More Than 100 Sub-Circuit Designs From Texas Instruments
- The Singing Dentures Of Manchester And Other Places
- Printing An Air-Powered Integrated Circuit For Squishy Robots
- Tubeless X-Ray Runs On Patience
Quick Hacks:
- Elliot’s Picks
- Could This Be The Year Of Algol?
- How Bad Can A Cheap Knockoff ADS1115 ADC Be?
- RFIDisk: When Floppy Drives Go Contactless
- Attack Turns Mouse Into Microphone
- Dan’s Picks:
- Toasty Subwoofer Limps Back To Life
- Inside A Germanium Transistor
- Billy Bass Gets New Job As A Voice Assistant
Can’t-Miss Articles:
hackaday.com/2025/10/17/hackad…
This Week in Security: F5, SonicWall, and the End of Windows 10
F5 is unintentionally dabbling in releasing the source code behind their BIG-IP networking gear, announcing this week that an unknown threat actor had access to their internal vulnerability and code tracking systems. This security breach was discovered on August 9th, and in the time since, F5 has engaged with CrowdStrike, Mandiant, and NCC Group to review what happened.
So far it appears that the worst result is access to unreleased vulnerabilities in the F5 knowledge management system. This means that any unpatched vulnerabilities were effectively 0-days, though the latest set of patches for the BIG-IP system has fixed those flaws. There aren’t any reports of those vulnerabilities being exploited in the wild, and F5 has stated that none of the leaked vulnerabilities were critical or allowed for remote exploitation.
Slightly more worrying is that this access included the product development environment. The problem there isn’t particularly the leak of the source code — one of the covered projects is NGINX, which is already open source software. The real danger is that changes could have been surreptitiously added to those codebases. The fact that NGINX is Open Source goes a long way to alleviate that danger, and when combined with the security built into tools like git, it seems very unlikely that malicious code could be sneaked into the NGINX public code base. A thorough review of the rest of the F5 codebases has similarly come up negative, and so far it looks like the supply-chain bullet has been dodged.
WatchGuard Out of Bounds
WatchGuard’s Fireware OS has a stack buffer overflow. There’s a few interesting details about this story. The first, as WatchTowr researchers gleefully point out, is that it’s 2025 and a security vendor has a stack overflow bug straight out of the ’90s. But second, this is one of the first vulnerabilities we’ve covered that has a CVSS 4.0 score. In CVSS 3 terms, this would be a severity 10 vulnerability. As the the 4th iteration of the Common Vulnerability Scoring System also measures the impact on the rest of the network, it scores a bit lower 9.3 there, though one could probably make an argument that it should be higher.
The actual vulnerability is in the VPN service, and it’s as simple as it gets. An attacker controlled buffer is copied into a fixed length memory region without any bounds checking. That VPN service uses an IKEv2 handshake protocol to establish connections, and the server responds with an odd Base64 encoded string. Decode the string, and it turns out the vulnerable service announces VN=12.11.3 BN=719894
, the version number and build string, allowing for super easy identification of vulnerable targets.
The final step in turning this into a true vulnerability is to corrupt the stack, take control of the program counter, and Return-Oriented-Program your way through a couple gadgets to be able to call system()
. Right? This platform doesn’t turn on every mitigation — stack canaries and position independent execution are noticeably missing. But there are some good hardening steps that were done, like leaving out /bin/sh
altogether. How do you run shellcode when the machine doesn’t have a shell at all? The answer the WatchTowr crew turned to was to run the system code in the Python3 shell. Thinking outside the box!
Sonicwall and Unintentional Distributed Backups
About a month ago, we shared the news that Sonicwall had a breach of their own, with limited customers backups being exposed. At the time, the word was that fewer than 5% of customers would be affected. That estimate seems to have been a bit optimistic, as SonicWall is now recommending that all customers step through their new remediation playbook, which calls for a complete cycling of all credentials stored on Sonicwall devices.
It’s unclear if this is because more configuration data was accessible than was previously believed, or because attackers are actively using the pilfered data in attacks against SonicWall customers. The unintentional distribution of system backups turns out not to have been a good strategy.
UEFI Backdoor
UEFI and Secure Boot have been viewed with skepticism, particularly by Linux enthusiasts over the years. There is, however, something to be said for the idea that your computer won’t boot a manipulated OS without your permission, and especially since major Linux distros have access to signed Secure Boot keys, it hasn’t been the dystopian disaster that many of us feared. The security question of the UEFI root of trust has had its own problems, and one of those problems has recently bitten Framework laptops. The issue is the mm
(Memory Modify) command that can optionally be built into UEFI shells. This is strictly for debugging purposes, and it’s been discovered that allowing arbitrary access to system memory is not great for system security.
Eclypsium researchers are calling this one BombShell, and it boils down to overwriting the security handler pointer in the UEFI firmware, so all Secure Boot checks are disabled. It seems that this level of tampering is invisible to the system and booted OS. And with just a bit of cleverness, it can be injected as a permanent boot payload. While it’s specifically Framework laptops that are in question with this specific disclosure, it’s not strictly a Framework issue, but can affect any UEFI machine that ships a signed UEFI shell, that includes dangerous commands like mm
.
Hack a Car Company, and All the Cars
We have a delightful hack from Def Con 33, where an as-of-yet-unnamed car brand had a couple security problems with their admin web portal, and those problems are pretty serious when put together. First, the invite-only dealer portal didn’t actually verify the invite tokens. And second, when creating an account, the back-end didn’t actually check the account creation details. Meaning that anyone that knew where to look could create an admin account.
The result was that a VIN number could be used to look up a car, and the owner’s details could be accessed. Or the system could be searched via owner’s information, to find vehicle information. It allowed transferring authentication of one of the vehicles to a new mobile app account, and the mobile app could be used to unlock the vehicle.
youtube.com/embed/U1VKazuvGrc?…
Windows 10
It’s time to turn out the lights, the party is over. The sun has set and Windows 10 has entered its twilight. The advice from every other legacy OS applies: upgrade if you can. Yes, there are some frustrating problems with upgrading to Windows 11, particularly if your machine is just too old to have a TPM or Secure Boot.
If you’re stuck on Windows 10, there’s good news and bad news. The good news is that Microsoft is making security updates available for free, for many computers, if you use a Microsoft account on the machine. The bad news is that those updates are a monthly trickle of fresh vulnerabilities that some machines just won’t ever get patched for.
Bits and Bytes
What do you do when you’re flying, and you’re too cheap frugal to pay for in-flight wifi? Naturally, find some way to tunnel out for free. The key is usually DNS. It’s probably the inverse of the meme, that the problem is always DNS, as that’s the last thing a security hardening team wants to break. And if that won’t work, there’s always MAC address cloning.
Many a pen test has hit a brick wall when faced with a gRPC endpoint. Google’s Remote Procedure Call framework is binary, and without reflection turned on, extremely difficult to map what calls are available. There’s a new tool, grpc-scan
, that just might shed some light on the subject. It’s a combination of common design patterns, and carefully parsing the returned errors to learn about the system.
And finally, where’s the most bulletproof place you can host some malicious code? A server in Russia? Apparently it’s now on the blockchain. This isn’t a theoretical attack from a security thinktank, but a real-world malware campaign believed to originate from North Korean hackers. Yet another red flag to watch out for in smart contracts!
How press can survive interactions with police on the skirmish line
As protesters paint signs for another round of “No Kings” demonstrations this Saturday, journalists are getting ready in their own way: Charging camera batteries, notifying emergency contacts, and rinsing old tear gas off their shatter-resistant goggles.
At similar events since June, well over a hundred journalists have been injured, detained, or arrested by police. Now two cities — Los Angeles, California, and Chicago, Illinois — are expecting their largest protests since federal judges issued multiple rulings exempting the press from general dispersal orders and restricting law enforcement use of “less lethal” munitions.
Those are big wins on paper, but only if you know how to use them.
The law exists in two separate but unequal places: the court and the street. And you’ll never win a philosophical argument on a skirmish line.
Sure, you’re probably right. You’re armed with the First Amendment. But the average police officer is armed with a baton, handcuffs, body armor, tear gas, and at least a couple of guns. They may also be tired, overwhelmed, hungry, and see you standing between them and a bathroom break.
As they’ve been known to say, “You can beat the rap, but you can’t beat the ride.”
It’s no longer “Listen to me,” it’s ideally “Here’s a signed order from your boss.”
Covering a protest, an immigration raid, or an immigration hearing is no place to give up your rights. Instead, you can learn to invoke them more effectively.
The press is one of two professions (alongside religious practitioners) distinguished by its constitutionally guaranteed freedoms. Policing is the opposite, marked by rigid command structure and a sworn duty to enforce very specific codes and regulations.
But cops are supposed to be trained and held accountable by their department. They shouldn’t need reminding of the law they’re supposed to uphold. And it’s not the job of journalists to train them.
As professional communicators, journalists may find it more productive to translate conversations into the language of law enforcement.
For example, in California, it won’t get you very far to tell an officer you’re exempt from dispersal orders thanks to “Senate Bill 98.” You might be talking to a kid fresh out of the police academy or a detective pulled off desk duty to earn overtime. They have no idea what passed the statehouse four years ago. At best, they’re trained to speak in terms of “penal code.” Mentioning “Penal Code 409.7,” the statute established by that bill, might be your better ticket out of handcuffs. (This state law only applies to local law enforcement, not to federal operations like Immigration or Customs Enforcement or other Department of Homeland Security agencies.)
For journalists in the Chicago and Los Angeles areas, recent court rulings, including one for the LA Press Club in which I’m a plaintiff, have made things much clearer. Ideally you don’t need to print out 80 pages of preliminary injunctions. An officer will likely ignore that anyway, figuring it’s up to department lawyers to interpret. Instead, try to print the version of orders their boss(’s boss’s boss) was required to issue. The following list of PDFs are being updated as those materials are released by each agency, so use your judgment and print what might be applicable to your situation.
- Chicago-area Temporary Restraining Order (Northern District of Illinois)
- As each DHS subsidiary agency provided their own cover sheet to personnel, it may be useful to print each of the following.
- Federal Protective Service Cover Sheet
- Immigration and Customs Enforcement Cover Sheet
- Customs and Border Patrol Cover Sheet
- Department of Justice Cover Sheet
- Los Angeles Police Department’s “Chief’s Notice” to all personnel
- This is an earlier version based on an initial TRO. It will be updated with a newer version based on a more recent preliminary injunction, which is even more favorable to press.
- LA-area Preliminary Injunction (Central District of California)
- DHS has not shared details on how this order was distributed. As a longer document, you may wish to only print the cover page along with pages 43 to 45, which contain the injunction itself.
This puts things in law enforcement terms — from the top of their command structure. It’s no longer “Listen to me,” it’s ideally “Here’s a signed order from your boss.”
You want a printed copy, since your phone could run out of battery, be lost, or shatter. And it’s never a good idea to hand your unlocked phone to police. Also, if you need to pull out these orders (or a press pass), state clearly what you’re reaching for before placing your hand in a pocket or bag. Officers don’t love those sorts of unannounced movements.
A piece of paper isn’t much of a shield from a raging officer swinging a baton and screaming, “Leave the area.” But if you can engage with them, you want to ensure the precious few words that they hear will resonate. And it bears repeating: Everyone has a boss.
Protests involve a lot of turnover on the front line, so you may never see the same officer twice. If possible, communicate early and often. Ask to meet a supervisor or public information officer during a calm moment, and get their name so you can ask for them if you have trouble later on.
Unfortunately, even a signed order from the chief isn’t always a “get out of jail free” card. After a temporary restraining order was issued against the LAPD this summer, officers still put several journalists in zip ties during a protest. Two lawyers who had won the TRO showed up with a copy of official paperwork instructing officers to leave press alone. After they handed it to the incident commander, police still drove two photojournalists away in the back of a squad car.
The LAPD later suggested those photographers were ”pretending to be media.” The pair’s credits include The Atlantic, The New Yorker, Business Insider, The Washington Post, New York Magazine, Rolling Stone, Mother Jones, and even a cover for Time magazine.
A federal judge later wrote of the LAPD, “The Court expresses no approval for this conduct. To the contrary, the evidence presented is disturbing and, at the very least, shows that Defendants violated the spirit if not the letter of the Court’s initial restraining order.”
Of course, the photojournalists beat the rap. But they didn’t beat the ride.
Attending a protest outside of LA or Chicago? You still have First Amendment rights, even if you don’t have a court order. The U.S. Press Freedom Tracker has been investigating and documenting serious violations in cities from New York to Portland, Oregon. If you experience or witness law enforcement violating press rights anywhere in the country, please send us tips and any available evidence to tips@pressfreedomtracker.us.
reshared this
When the law’s on your side but ICE isn’t
Dear Friend of Press Freedom,
It’s been two weeks since Atlanta journalist Mario Guevara was deported and 207 days since Rümeysa Öztürk was arrested for co-writing an op-ed. Read on for more about this weekend’s planned protests, actions you can take to protect journalists, and events you can catch us at this month.
When the law’s on your side but ICE doesn’t care
As protesters paint signs for another round of “No Kings” demonstrations this Saturday, journalists are getting ready in their own way: charging camera batteries, notifying emergency contacts, and rinsing old tear gas residue off their shatter-resistant goggles.
Two cities — Los Angeles, California, and Chicago, Illinois — are expecting their largest protests since federal judges issued multiple rulings exempting the press from general dispersal orders and restricting law enforcement’s use of “less lethal” munitions.
Those are big wins for journalists, but only if they know how to use them. Our new deputy director of advocacy at Freedom of the Press Foundation (FPF), Adam Rose, wrote about how journalists can prepare for the weekend. Read more here.
Administration ignores flotilla abuses
Three U.S. journalists have been abducted from aid flotillas bound for Gaza and detained by Israel. All three reported experiencing or witnessing abuse and even torture.
Photojournalist Noa Avishag Schnall recalled, “I was hung from the metal shackles on my wrists and ankles and beaten in the stomach, back, face, ear and skull by a group of men and women guards, one of whom sat on my neck and face, blocking my airways … Our cell was awoken with threats of rape.”
Jewish Currents reporter Emily Wilder said she “announced … ‘I’m a journalist, I’m press.’ The woman to my left hissed, ‘We don’t give a fuck,’ and the other dug her nails into my scalp and pulled me by my hair across the port.”
In normal times, this would be a major scandal. We joined Defending Rights & Dissent and others in a letter to Secretary of State Marco Rubio explaining what should be obvious — the U.S. shouldn’t sit silently as its ally assaults its journalists. Read it here.
First rule of Qatari jets? Don’t talk about Qatari jets
We sued the Trump administration for refusing to share its legal rationale for approving the president’s acceptance of a $400 million jet from the Qatari government, despite the Constitution saying he can’t do that. Now the administration wants to strike our complaint, claiming the background discussion of the gifted jet is “impertinent” and “scandalous.”
That’s rich, especially weeks after the president’s frivolous defamation lawsuit against The New York Times got dismissed for rambling on about how he was once on WrestleMania and “The Fresh Prince of Bel-Air” (he’s since filed an amended complaint).
Public records expert: ‘We can do better’
If fewer newspapers exist to request public records, does the government become less transparent? That’s the question at the heart of “Dark Deserts,” a new research paper by David Cuillier of the Freedom of Information Project at the Brechner Center for Advancement of the First Amendment and law student Brett Posner-Ferdman.
Cuillier told us about what he and Posner-Ferdman found and what it means for the public’s right to know. Read the interview here.
Standing with student journalists
Last week we told you about the lawsuit filed by The Stanford Daily to stop the Trump administration’s unconstitutional and appalling push to deport foreign students who say or write things it doesn’t like.
This week we joined the American Civil Liberties Union of Northern California, the First Amendment Coalition, and others in a legal brief in support of that important lawsuit.
Congressional secrecy bill advances
The Senate passed Sens. Ted Cruz and Amy Klobuchar’s bill to protect themselves — but not you — from data broker abuses and otherwise allow federal lawmakers to censor the internet.
FPF’s Caitlin Vogus wrote for The Dallas Morning News about how the bill threatens journalism — for example, by stifling reporting on its co-sponsor vacationing while his constituents endure natural disasters. Read more here.
Tell the House to kill the bill.
What we’re reading
Pentagon reporters have now turned in their badges – but plan to keep reporting (The Guardian). Journalists told The Guardian, “the restrictions won’t stop the work, with some even saying they plan to take a more aggressive tack.” Good. The policy is highly unconstitutional, but it’s an opportunity to omit Pentagon lies and spin from reporting.
LAPD wants judge to lift an order restricting use of force against the press (LAist). Rose, who is also press rights chair for the LA Press Club, said that “Instead of holding the department accountable, the city is spending even more money to hire an outside law firm so they can effectively beg a judge for permission to keep assaulting journalists for just doing their job.”
Facebook suspends popular Chicago ICE-sightings group at Trump administration’s request (Chicago Sun-Times). So much for Facebook’s renewed commitment to free speech. And so much for this administration’s condemnation of social media censorship.
Victory: Federal court halts Texas’ ‘no First Amendment after dark’ campus speech ban (FIRE). A federal court blocked a ridiculous law that banned almost all speech on public college campuses in Texas at night, including student journalism. As we explained in the Houston Chronicle, free speech does not have a curfew.
Upcoming FPF events
Oct. 22: Join FPF’s Adam Rose and others on Oct. 22 at 3 p.m. EDT for an online conversation hosted by the American Constitution Society about the impact of federal law enforcement violence on your First Amendment rights. Register here.
Oct. 24: If you’re in Chicago and fortunate enough to not have to hide from ICE invaders, come to Northwestern for a panel on Oct. 24 at 10 a.m. CT featuring FPF Advocacy Director Seth Stern. We’ll discuss the numerous digital and physical challenges journalists are facing. Register here.
Oct. 29: FPF’s Caitlin Vogus will join an online panel of experts to break down how the Federal Communications Commission and Federal Trade Commission are targeting journalists and the First Amendment and how to fight back. Register here for the Center for Democracy and Technology’s Future of Speech 2025, “Working the Refs” panel on Oct. 29 at 12:10 p.m. EDT.
That same day, join us for a conversation about making public records-based reporting free, featuring Vogus as well as our Chair on Government Secrecy Lauren Harper, in conversation with leadership at Wired and 404 Media, including Wired global editorial director and FPF board member Katie Drummond. The event starts at 2 p.m. EDT; RSVP on Zoom here.
Oct. 30: Join an online discussion on Oct. 30 at 1 p.m. EDT about digital safety and legal rights for journalists reporting on immigration in the U.S., featuring FPF Director of Digital Security Harlo Holmes and several other experts from the U.S. Journalist Assistance Network. Register here.
Gazzetta del Cadavere reshared this.
Bundestagsdebatte: Was ist bei der Chatkontrolle unter „anlassbezogen“ zu verstehen?
Social Media ab 16: EU-Abgeordnete fordern strengere Regeln für Jugendschutz
National-Once-Only-Technical-System: Bundestag macht Weg frei für „Datenautobahn“
Il “dopo Gaza”: laboratorio per una nuova democrazia funzionalistica e tecnocratica?
@Giornalismo e disordine informativo
articolo21.org/2025/10/il-dopo…
Dopo i giorni della svolta a Gaza, col giusto sollievo per la liberazione degli ultimi ostaggi e per la auspicabile cessazione
Aggiungiamo altri blog e newsletter italiani basati su #Ghost alla lista di quelli che già ricondividiamo
Salutiamo i nuovi ingressi @Diario Di Un Analista | Data Science, ML & Analytics @Sottocoperta (Matteo Petrani) @Cronache Digitali @Letter to a gamer @La cantina dell'appartamento al terzo piano (senza ascensore) @Ricette da un altro pianeta @razionalista.it @Il Blog di Vita da Host @Focus America @AISent @Analogic.me - Stile di vita analogico, guide e consigli @Mondo Pesca @Piattaforma sulla post-crescita @The Street Rover @Culture Wars. La newsletter @Morning Tech @Techpertutti @TERAFLOP @Zone di Transizione
Morning Tech likes this.
informapirata ⁂ reshared this.
INCENERITORE ROMA: IL SITO È CONTAMINATO
“Il sito comprato da Ama per realizzare l’inceneritore alla cifra astronomica di sette milioni e mezzo di euro è oggetto di indagini della Procura di Roma e della Corte dei conti è contaminato” è quanto dichiara in una nota l’Unione dei Comitati contro l’inceneritore.
“A metterlo nero su bianco – precisa la nota dell’Unione dei Comitati - sono le indagini di caratterizzazione ambientale del suolo svolte nel primo semestre del 2024 da Acea Infrastrutture che hanno evidenziato molteplici superamenti delle CSC per idrocarburi pesanti e degli IPA.
Appaiono particolarmente gravi – incalzano dall’Unione dei Comitati - le omissioni di Ama e dell’Amministrazione capitolina. La municipalizzata ha omesso di avviare le procedure obbligatorie attuando le misure di prevenzione stabilite dall'articolo 242 del codice dell’ambiente mentre l’amministrazione capitolina guidata da Gualtieri ha proseguito l’iter che ha portato alla validazione del progetto in un sito contaminato. L’amministrazione capitolina ha pertanto ignorato il principio di precauzione di derivazione europea stabilito che avrebbe imposto di indagare, origine, estensione e profondità della contaminazione la cui origine antropica in relazione agli idrocarburi pesanti e agli IPA è fuori discussione.
“Nell’ambito delle osservazioni alla VIA e sulla base del principio di precauzione stabilito dall’ articolo 191 del Trattato sul funzionamento dell’Unione europea – concludono dall’Unione – abbiamo pertanto chiesto di sospendere la VIA e il PAUR fin quando non fosse completato l’espletamento dell’insieme delle procedure obbligatorie necessarie alla caratterizzazione del sito. Infine, abbiamo sollecitato un intervento in autotutela finalizzato al previo espletamento delle procedure di caratterizzazione del sito accompagnato dalla sospensione della VIA e del PAUR evitando il danno erariale legato ai maggiori costi da sostenere per la bonifica per l’avvio in fasi successive”.
USA, Israele e i paesi arabi rafforzano la collaborazione militare
@Notizie dall'Italia e dal mondo
Secondo un'inchiesta, cinque paesi arabi hanno creato in segreto con Israele una struttura per la sicurezza regionale coordinata dagli Stati Uniti e diretta contro l'Iran
L'articolo USA, pagineesteri.it/2025/10/17/med…
Razionalizzazione e modernizzazione. Ecco il piano Mattei per la difesa
@Notizie dall'Italia e dal mondo
La riforma del giugno 2024 ha segnato un punto di svolta nella struttura del ministero della Difesa, separando per la prima volta la figura del segretario generale da quella del direttore nazionale degli armamenti. Una scelta che mira a garantire efficienza e chiarezza di
L’evoluzione dell’intelligence? Non è tutto scontato con l’IA. L’analisi di Teti e Manenti
@Notizie dall'Italia e dal mondo
La trasformazione digitale, quindi l’IA, come metro per capire dove e come le attività di intelligence stanno cambiando passo e strumenti. E al contempo la capacità dei decisori, da un lato di comprendere rapidamente e fino in fondo strategie e
Scattered LAPSUS$ Hunters—one of the latest amalgamations of typically young, reckless, and English-speaking hackers—posted the apparent phone numbers and addresses of hundreds of government officials, including nearly 700 from DHS.#News
“With fewer visits to Wikipedia, fewer volunteers may grow and enrich the content, and fewer individual donors may support this work.”#News
OPSON XIV. 631 persone denunciate alle autorità giudiziarie, 11.566 tonnellate di cibo e 1,4 milioni di litri di bevande ritirate dal mercato
#Europol, #OLAF, #DGSANTE e 31 paesi in tutta Europa e oltre, insieme ai produttori di alimenti e bevande del settore privato, hanno unito le forze nella quattordicesima edizione dell'operazione OPSON.
Questo sforzo annuale si rivolge ai criminali dietro alimenti e bevande contraffatti e scadenti.
Le forze dell'ordine, le dogane e le agenzie di regolamentazione alimentare hanno sequestrato 259.012 pacchi, 1.416.168 litri di bevande e 11.566.958 chilogrammi di cibo, compresi carne e frutti di mare.
Nel complesso, l'operazione OPSON XIV ha conseguito questi risultati:
- 631 persone denunciate all'autorità giudiziaria;
- 101 mandati di arresto emessi;
- 13 gruppi criminali organizzati interrotti;
- sequestrati beni per un valore di circa 95 milioni di euro;
- 31.165 controlli e ispezioni effettuati.
Beni in scadenza reinseriti nella catena di fornitura
Una delle principali tendenze identificate quest’anno sono stati i gruppi criminali organizzati che si sono infiltrati nelle aziende di smaltimento dei rifiuti con l’intento di ottenere l’accesso al cibo scaduto in attesa di distruzione. I criminali rimuovono quindi il "meglio prima" (best before) originale o le date di scadenza utilizzando solventi e stampano nuove date falsificate sui pacchi. Questi prodotti rietichettati vengono poi reintrodotti nella catena di fornitura. In termini di qualità, potrebbero non solo essere scadenti ma spesso rappresentare anche un rischio per la salute, come si è visto nei casi che coinvolgono pesce in scatola. In quanto modus operandi criminale, la pratica di rietichettare il cibo scaduto non è del tutto nuova, ma la sua portata attuale non ha precedenti.
Tuttavia, la gamma di frodi nel settore alimentare e delle bevande non si limita solo alla ristampa di date di scadenza false. La contraffazione di alimenti e bevande e l'abuso di indicazioni geografiche sono tra le tattiche fraudolente più comuni. Per quanto riguarda gli alimenti contraffatti e erroneamente designati, l'olio d'oliva e i vini a denominazione di origine protetta restano tipi di prodotti fortemente colpiti.
Inoltre, le autorità hanno riscontrato diversi casi di carne o prodotti a base di carne venduti a ristoranti o consumatori nonostante fossero stati immagazzinati in condizioni scadenti o con i macellatori che non rispettavano gli standard igienici legali e necessari. Modi operandi simili sono stati visti con i frutti di mare (ad esempio, molluschi bivalvi), che non erano più adatti al consumo di consumo ma comunque venduti.
Controlli dalla materia prima al prodotto finale
Le frodi nel settore alimentare e delle bevande costituiscono un settore criminale grave e significativo che necessita di essere affrontato a livello nazionale e internazionale. L’operazione #OPSON è stata istituita con l’obiettivo di proteggere la salute e la sicurezza pubblica in tutta l’UE.
L'elenco degli articoli alimentari e delle bevande ritirati dal mercato abbraccia un'ampia gamma. Le autorità hanno sequestrato beni di prima necessità come frutta, verdura, pollame, carne, prodotti a base di carne e frutti di mare. L'elenco dei prodotti alimentari comprende anche dolciumi, grassi e oli, con particolare attenzione all'olio d'oliva. Inoltre, nel corso dell'OPSON XIV sono stati trattati integratori alimentari e additivi.
Punti salienti operativi di OPSON XIV
Europol ha coordinato OPSON XIV e ha sostenuto molti casi individuali inviando esperti con un ufficio mobile alle giornate di azione. Durante questi controlli e raid, gli esperti sul posto potrebbero fornire supporto analitico e di intelligence alle autorità nazionali. Inoltre, Europol ha organizzato riunioni operative per i casi spin-off. Con centinaia di indagini e controlli individuali eseguiti da polizia, dogane e autorità nazionali di regolamentazione alimentare in collaborazione con partner del settore privato, più di alcuni si sono distinti come esempi da evidenziare in dettaglio.
Italia
Un'inchiesta del Nucleo Carabinieri Antisofisticazioni e Sanità Pubblica (Nuclei Antisofisticazione e Sanità dell'Arma dei Carabinieri, #NAS) ha portato all'emissione di un mandato di cattura per sette allevatori di cavalli e camionisti. Facevano parte di un'organizzazione criminale operante in Umbria e Puglia, che macellava clandestinamente cavalli trattati con prodotti farmaceutici, ponendo un significativo rischio per la salute pubblica. Inoltre, le autorità hanno scoperto e sequestrato un impianto di macellazione clandestino in una fattoria, insieme a un camion contenente parti di animali macellati illegalmente.
fabrizio reshared this.
Carta di Roma: grave atto criminale
@Giornalismo e disordine informativo
articolo21.org/2025/10/carta-d…
L’associazione Carta di Roma invia la sua solidarietà a Sigfrido Ranucci, alla sua famiglia e a tutta la redazione di Report dopo i fatti gravissimi accaduti nella scorsa notte. Un ordigno é stato posto sotto l’auto dell’autore e conduttore di Report e fatto esplodere.
Convocazione del Consiglio di Istituto per mercoledì 22 ottobre dalle 15:30 alle 16:30
Come riportato nella circolare n.100 reperibile sulla sezione "Albo online" del sito web dell'Istituto, è stato convocato un Consiglio di Istituto per mercoledì 22 ottobre dalle 15:30 alle 16:30 .
Chiunque desiderasse assistere come uditore alla seduta, potrà inviare una richiesta all'indirizzo email della scuola avente come oggetto:
Richiesta di partecipazione in qualità di uditore al Consiglio di Istituto del 22 ottobre
Qui un canovaccio del testo:
Alla cortese attenzione della dirigenza dell'Istituto
Con preghiera di diffusione alla presidenza del Consiglio di Istituto,
Buongiorno,
come genitore dell'alunn__ _______________ ___________, desidero assistere in qualità di uditore al consiglio di istituto che si terrà il giorno 22 ottobre.
A tal fine chiedo la possibilità di disporre dei parametri di accesso che mi consentano di accedere alla sessione di videoconferenza in modalità ascoltatore.
Cordiali saluti,
NOME COGNOME
La scuola potrà quindi inviare il link di accesso come spettatore della videoconferenza, cui potrebbe essere necessario accedere con l'account google del proprio figlio.
Questo è l'ordine del giorno provvisorio del Consiglio di Istituto:
- Lettura e approvazione Verbale precedente
- Resoconto occupazione
- Adesione ACCORDO DI RETE TRA SCUOLE PER LO SVOLGIMENTO, IN VIA AGGREGATA, DI UNA PROCEDURA PER L'AFFIDAMENTO DEL SERVIZIO DI CASSA con Liceo Tasso di Roma
- Proposta chiusura uffici amministrativi nei giorni prefestivi
- Date Open day e progetto Eureka
- Proposta di accoglienza di un gruppo di studenti e professori da Bratislava per visita alla scuola con partecipazione ad attività scolastiche presumibilmente dal 26 al 29 novembre 2025 (Erasmus)
- Proposta di apertura canale social (instagram) ufficiale della scuola
- Tetto di spesa massimo per viaggi d’istruzione per alunno
- Proposte di iniziative didattiche da parte degli studenti sulla situazione internazionale e in Palestina
- Concessione triennale distributori bevande e generi alimentari
- Variazioni e radiazioni P.A. 2025
- Modalità operative e funzionamento per prossime elezioni Organi Collegiali
Coro di solidarietà dalla Campania, che conta sei giornalisti sotto scorta
@Giornalismo e disordine informativo
articolo21.org/2025/10/coro-di…
Anche dalla Campania si alza un coro di solidarietà nei confronti di Sigfrido Ranucci dopo l’attentato subìto a Pomezia. “Abbiamo ricordato, da poco, il
Mattarella esprime solidarietà a Ranucci e condanna il grave gesto di intimidazione
@Giornalismo e disordine informativo
articolo21.org/2025/10/mattare…
Il Presidente della Repubblica, Sergio Mattarella, ha fatto pervenire a Sigfrido Ranucci la sua solidarietà, esprimendo
Subito in piazza per Sigfrido Ranucci e per difendere l’articolo 21 della Costituzione
@Giornalismo e disordine informativo
articolo21.org/2025/10/subito-…
Dei mandanti e degli esecutori dell’attentato se ne occuperanno gli inquirenti, ma il clima creato contro Report
West Bank: Israeli soldiers kill 11-year-old boy playing football with friends
"La Russia sta vincendo, i Tomahawk non ci spaventano": cosa ha detto Putin a Trump
e allora di cosa stiamo a discutere? dateli all'ucraina. zellensky è contento e a putin non importa. va benissimo. a noi una russia che stravince a questo modo va ancora più bene. 100 di queste vittorie. un augurio di infinite vittorie come questa.
Trames reshared this.
Raggiunto l’accordo sull’industria della Difesa in Europa. 1,5 miliardi per l’industria e preferenza Ue
@Notizie dall'Italia e dal mondo
A poche ore dalla presentazione della Roadmap per la prontezza operativa entro il 2030, un altro tassello della costruzione della Difesa europea ha trovato collocazione. I negoziatori della presidenza del Consiglio
Il Venezuela chiede all’Onu di dichiarare illegali i raid statunitensi
@Notizie dall'Italia e dal mondo
Le operazioni degli Stati Uniti, che colpiscono imbarcazioni in acque internazionali senza prove di attività illecite, hanno causato già 27 morti. Intanto, Washington dà mandato alla CIA di compiere attività sul suolo del Venezuela
L'articolo Il Venezuela chiede
Perché il campo larghissimo allargato al centro non è una buona idea (di R. Parodi)
@Politica interna, europea e internazionale
L’entusiasmo vagamente infantile con il quale Elly Schelin ha salutato la vittoria del campo progressista in Toscana – un risultato ampiamente scontato – mi ha provocato un soprassalto di tenerezza. Ci vuole davvero poco, a volte, per capovolgere il sentimento di chi aveva incassato con
fanpage.it/esteri/cisgiordania…
direi che la questione palestinese è ben lungi dall'essere risolta. solito trump superficiale a essere carini.
Merlin Sheldrake - L'ordine nascosto. La vita segreta dei funghi.
Possono alterare la nostra mente, guarirci dalle malattie e persino aiutarci a evitare catastrofi ambientali. Hanno un metabolismo straordinario, contribuiscono alla rigenerazione del suolo e sono protagonisti di tantissimi processi naturali. I funghi sono ovunque, ma è facile non notarli. Sono dentro e fuori di noi. Anche mentre leggete questo libro, stanno modificando il flusso della vita, come fanno da milioni di anni. Merlin Sheldrake ci accompagna in un percorso che sconvolgerà tutte le nostre percezioni e da cui si esce con una visione completamente stravolta del pianeta e della vita stessa. Questa nuova edizione, rielaborata dall’autore a partire dal testo originale, è arricchita da più di cento spettacolari immagini a colori in grado di mostrare la straordinaria varietà, le bizzarrie e la bellezza dei funghi come mai prima d’ora.
Editore: Marsilio
Formato: Copertina rigida con sovvracopertina
Anno edizione: 2023
Condizioni: Nuovo
Pagine: 240
Per info, dettagli e acquisti scriveteci o venite a trovarci in libreria o su www.semidinchiostro.com (link in bio).
Libreria Semi d'inchiostro
Via Serraloggia 24, Fabriano
GAZA. Israele continua i raid e limita gli aiuti umanitari
@Notizie dall'Italia e dal mondo
Gli Stati Uniti respingono le accuse di violazione dei termini del cessate il fuoco mosse da Tel Aviv ad Hamas. I corpi degli ostaggi sono stati consegnati secondo i termini, mentre Israele continua a uccidere palestinesi e tiene chiuso il valico di Rafah
L'articolo GAZA. Israele continua
freezonemagazine.com/articoli/…
Alba ha 26 anni ed è già morta e rinata. Alba è morta il 31 dicembre 1999 e rinata il 1 gennaio 2000, perché quella notte sono passati nel suo piccolo villaggio algerino i barbuti, i terroristi della Jihad e hanno sgozzato più di mille persone tra cui tutta la sua famiglia, padre, madre e […]
L'articolo Kamel Daoud – Urì proviene da FREE ZONE MAGAZINE.
Alba ha 26 anni ed è già morta e rinata. Alba è morta il 31
AI-generated Reddit Answers are giving bad advice in medical subreddits and moderators can’t opt out.#News
The plaintiffs claim that without the payment processors, which include CCBill, Epoch, and several others that process "high-risk" merchant payments, GirlsDoPorn would not have been a commercial enterprise to begin with.#girlsdoporn #payments #porn
Non ho parole... Certa gente dovrebbe avere il buon senso di autoestinguersi
liguriaoggi.it/2025/10/16/lors…
Liguria Oggi – Il quotidiano di Genova e Liguria
Lorsica, carabinieri multano allevatore per i campanacci delle mucche A Lorsica carabinieri multano mucche per il rumore dei campanacciRedazione Liguria (Liguria Oggi)
Videos demoing one of the sites have repeatedly gone viral on TikTok and other platforms recently. 404 Media verified they can locate specific peoples' Tinder profiles using their photo, and found that the viral videos are produced by paid creators.
Videos demoing one of the sites have repeatedly gone viral on TikTok and other platforms recently. 404 Media verified they can locate specific peoplesx27; Tinder profiles using their photo, and found that the viral videos are produced by paid creat…#News
Oggi #16ottobre è la Giornata Mondiale della Rianimazione Cardiopolmonare. Al Salone dello Studente...
Oggi #16ottobre è la Giornata Mondiale della Rianimazione Cardiopolmonare. Al Salone dello Studente si stanno svolgendo le dimostrazioni di primo soccorso a cura di INAIL, nell’ambito della campagna ministeriale #MiStaiACuore volta a sensibilizzare #…
Ministero dell'Istruzione
Oggi #16ottobre è la Giornata Mondiale della Rianimazione Cardiopolmonare. Al Salone dello Studente si stanno svolgendo le dimostrazioni di primo soccorso a cura di INAIL, nell’ambito della campagna ministeriale #MiStaiACuore volta a sensibilizzare #…Telegram
macfranc
in reply to Ghost: blog e newsletter italiane • • •W #Ghost e #DeleteSubstack!
@blog @index@matteopetrani.com @index@marcogovoni.it @index@letter-to-a-gamer.com @ed @index@ricettario.theia.fit @index@razionalista.it @index@blog.vitadahost.it @info @index@blog.aisent.io @index@analogic.me @index@mondopesca.it @index@postcrescita.it @index@thestreetrover.it @social @index@morningtech.it @index@techpertutti.com @index@teraflop.it @index@blog.tmpmix.dev
The Street Rover
in reply to Ghost: blog e newsletter italiane • • •Ghost: blog e newsletter italiane likes this.
Ghost: blog e newsletter italiane reshared this.