Emergenza sicurezza a Roma: al via le “zone a vigilanza rafforzata”
Servizio a cura di Alessio Corsaro e Pietro Bazzicalupi
L'articolo Emergenza sicurezza a Roma: al via le “zone a vigilanza rafforzata” su Lumsanews.
A Game Boy Speedometer, Just Because You Can
From a practical standpoint, [John] may be correct that his recent creation is the “world’s worst digital dash”, but we’re still oddly enamored with the idea of using a Nintendo Game Boy as a digital speedometer. Pulling it off meant interfacing the handheld with the vehicle’s CAN bus system, so whether you’re into retro gaming or car hacking, this project has something to offer.
Showing real-time vehicle speed on the Game Boy sounds like it should be relatively easy, but the iconic game system wasn’t exactly built for such a task. Its 2 MHz CPU and 160×144 pixel dot-matrix screen were every kid’s dream in 1989, but using it as a car dashboard is pushing it. To bridge that gap, [John] designed two custom circuit boards. One interfaces with the Game Boy, intercepting its memory requests and feeding it data from a microcontroller. The other processes the CAN bus signals, translating speed information into a form the Game Boy can display. [John] used inexpensive tools and software to read the CAN bus data, and used GBDK-2020 to write the software in C. His video goes in great detail on how to do this.
Months of work have gone into decoding the Game Boy’s data bus and creating a schematic for the interface board. Tricking the Game Boy into thinking it was loading a game, while actually displaying incoming speed data. The screen’s low resolution and slow refresh rate rendered it barely readable in a moving vehicle. But [John]’s goal wasn’t practicality — it was just proving it could be done.
Want to dive deep into the Game Boy? Have you seen the Ultimate Game Boy talk?
youtube.com/embed/xroxYBp9DOo?…
Tar del Lazio: “Via gli ambulanti da San Pietro durante il Giubileo”
Servizio di Pietro Bazzicalupi e Antonio Fera
L'articolo Tar del Lazio: “Via gli ambulanti da San Pietro durante il Giubileo” su Lumsanews.
UK Considers Banning Ransomware Payments
The U.K. government is considering banning ransomware payments to make critical industries “unattractive targets for criminals.”Fiona Jackson (TechRepublic)
Giorgio Sarto reshared this.
Databroker Files: Sieben Wege, um deinen Standort vor Databrokern zu schützen
netzpolitik.org/2025/databroke…
Giorgio Sarto reshared this.
Microsoft 365 sotto attacco: brute-force ad alta velocità con FastHTTP
Gli attacchi informatici stanno evolvendo con una rapidità impressionante, e i criminali informatici continuano a trovare modi innovativi per aggirare le difese. Recentemente, è stata scoperta una nuova campagna che sfrutta la libreria FastHTTP per eseguire attacchi brute-force ad alta velocità contro account Microsoft 365 in tutto il mondo.
L’attacco: brute-force e MFA Fatigue
Gli attacchi, identificati dalla società di incident response SpearTip, hanno preso il via il 6 gennaio 2024 e mirano agli endpoint dell’API di Azure Active Directory Graph. Utilizzando FastHTTP, una libreria Go progettata per massimizzare l’efficienza e la velocità nella gestione delle richieste HTTP, i cybercriminali automatizzano tentativi di login non autorizzati con un tasso di successo inquietante: quasi il 10% dei tentativi porta a un takeover dell’account.
Oltre al brute-force, la campagna utilizza anche attacchi di MFA fatigue, bombardando gli utenti con richieste di autenticazione multi-fattore fino a indurli a concedere l’accesso.
Origini e numeri della campagna
Secondo SpearTip, la maggior parte del traffico malevolo proviene dal Brasile (65%), seguito da Turchia, Argentina, Uzbekistan, Pakistan e Iraq. I numeri sono impressionanti:
- 41.5% degli attacchi fallisce.
- 21% provoca il blocco dell’account.
- 17.7% viene respinto per violazioni delle policy di accesso.
- 10% è protetto da MFA.
Tuttavia, resta quel preoccupante 9.7% di successo, che mette a rischio dati sensibili, proprietà intellettuale e la continuità operativa delle aziende.
Difendersi: rilevamento e contromisure
Per contrastare questa minaccia, SpearTip ha fornito un PowerShell script per rilevare la presenza dello user agent FastHTTP nei log di audit. Inoltre, gli amministratori possono verificare manualmente i tentativi sospetti nel portale Azure seguendo questi passaggi:
- Accedere al portale di Azure.
- Navigare su Microsoft Entra ID → Utenti → Log degli accessi.
- Applicare il filtro: Client app: “Other Clients”.
Se viene individuata attività malevola, le azioni consigliate includono:
- Terminare immediatamente le sessioni utente e reimpostare tutte le credenziali.
- Verificare e rimuovere eventuali dispositivi MFA non autorizzati.
- Consultare gli indicatori di compromissione (IoC) pubblicati nel rapporto di SpearTip.
Conclusione
Gli attacchi contro Microsoft 365 rappresentano una minaccia concreta per le aziende, con conseguenze devastanti: esposizione di dati riservati, furto di proprietà intellettuale e danni alla reputazione. Questa campagna dimostra quanto sia essenziale adottare un approccio proattivo alla sicurezza, combinando tecnologie avanzate e una costante attenzione ai segnali di compromissione.
Di fronte alla velocità con cui si evolvono queste minacce, è fondamentale rispondere con tempestività e decisione.
L'articolo Microsoft 365 sotto attacco: brute-force ad alta velocità con FastHTTP proviene da il blog della sicurezza informatica.
No Ham License? Listen Anyway in Your Browser
Full disclosure: ham radio isn’t for everyone, and there are many different facets to it. What appeals to one person might bore another to death. One area of ham radio that has changed a lot in the last few years is more or less local and typically mobile operation on VHF or UHF. Not long ago, hams used HTs (walky-talkies or handi-talkies) or mobile radios via repeaters to talk to each other and — the golden prize back then — make phone calls from their cars. Cell phones have made that much less interesting, but there is still an active community of operators talking on repeaters. However, the traffic has gone digital, the Internet is involved, and people with inexpensive, low-powered radios can talk to each other across the globe. This is nothing new, of course. However, having digital services means that operators with special interests can congregate in what amounts to radio chat rooms organized by region or topic.
There’s a long history of people listening to ham radio conversations with shortwave radios, SDRs, and scanners. But with so much activity now carried on the Internet, you can listen in using nothing more than your web browser or a phone app. I’ll show you how. If you get interested enough, it is easy enough to get your license. You don’t need any Morse code anymore, and a simple Technician class license in the United States is all you need to get going.
A Quick DMR Primer
There are several digital ham networks around and like real networks, you can have different physical transport layers and then build on top of that. For the purposes of this post, I’m going to focus on DMR (digital mobile radio) on the Brandmeister network which is very large and popular ham network. You won’t need a license nor will you need to sign up for anything as long as you are content to just listen.
Here’s how it works: Brandmeister operates a large number of servers worldwide that communicate with each other and provide calling services, including group calls. So, if we set up a Hackaday talk group (fictitious, by the way) on group 1337, interested people could connect to that talk group and have a conversation.
Since we are just going to listen, I’m going to skip some of the details, but the trick is how people get to talk to these networks. In general, there are three ways. The classic way is to use a digital radio to talk to a repeater that is connected to the network. The repeater may have one or more talk groups on all the time, or you might request access to one.
However, another way to connect your radio to a “hotspot” connected to the Internet. That is, more or less, a special form of repeater that is very low power, and you have complete control over it compared to a repeater on some faraway hill. However, if you don’t mind operating using just a computer, you don’t need a radio at all. You simply talk directly to the nearest server, and you are on the network. Some of your audio will go to other computers, and it may go over the airwaves via someone else’s hotspot or repeater.
Talk Groups
Just a few of the 1,600+ talkgroups available on the network
The Brandmeister website has a lot of info and you don’t need to be logged in to see it. Head over to their site and you’ll see a lot of info including a network map and statistics about repeaters and hotspots. You can get an idea of who has been talking lately by clicking Last Heard link. While this is interesting, it isn’t as interesting as you’d think, because you really want to focus on talk groups, not individual users.
To see a list of all the talk groups on the system, you can click Information and then Talkgroups. You can filter the list and you can also download the dataset in different formats if you want to browse it in a different format.
The hoseline shows you all the activity across the network and lets you listen in, too.
There are three buttons on each row of the database. The LH button shows you the last heard stations for that group. The Wiki button takes you to a Wiki page that, for some groups, has more information about it. But the really interesting button is the one marked Hoseline. You can also open the Hoseline directly which is what I usually do.
What’s the Hoseline? It shows activity across the network as a bunch of boxes indicating recently active talk groups. Boxes with red lines around them have people actively talking on them. The others have been recently active. It is visually interesting, yes, but that’s not the big selling point.
If you click on a box, you will hear the activity on that talk group. That’s all there is to it.
Overwhelming
There are a lot of talk groups. You can filter at the top left part of the page where it says “Everything.” You’ll have to drop the list down and unselect Everything. Then, you can select any countries or areas you want to follow. If you are brave, you can click RegEx mode and enter regular expressions to match talk group numbers (e.g. ^310.*).
The “Player” button at the top right gives you more control. You can add multiple groups from a list, see information about who is talking, and stop or start the audio.
The hose is available on Android, too.
If you prefer to do your listening mobile, you can also get the hoseline on your Android device. Just install the app, and you’ll find it works the same way.
Finding Something Interesting
Lord Nelson once said, “The greatest difficulty in war is not to win the battle, but to find the enemy.” That’s accurate here, too. Finding an interesting conversation out of all those talk groups is somewhat a needle in a haystack. A quick look around at the talk group lists might help.
The 91 and 93 groups stay busy but generally with short exchanges since they cover a wide area. The USA bridge at 3100 sometimes has traffic, too.
Talk group 31484 (SE Texas) has 66 devices attached, some of which you can see here.
If you look at the group’s listing on the Web, you can click the group number and see what stations are connected to it. Keep in mind, some of these may be repeaters or gateways that could have no one on the other side, or could have dozens of people on the other side. But it can give you an idea if the talkgroup has any users at all.
You can also search the Internet for DMR nets and repeaters. Sometimes, it is interesting to listen to local repeaters. Sometimes, it is fun to listen to repeaters in other places. Want to find out what’s going on at your next vacation spot? Practice your French?
You can find many DMR repeaters using the RepeaterBook search page. There are also man lists of DMR nets.
Next Steps
There are many other similar networks, but they may not have a way to listen that doesn’t require some software, registration, or licenses. There’s plenty on Brandmeister to keep you busy. If you worry about people listening in, that’s no different than regular radio has been since the beginning.
You can always get your ham license and join in. Even without a radio, there are ways to talk on the network. [Dan Maloney] has advice for getting your “ticket.” It is easier than you think, and you can do a lot more with a license, including talking through satellites, sending TV signals over the air, and bouncing signals of meteors or the moon. If you want to listen to more traditional ham radio in your browser, try a Web-based SDR.
Libsophia #7 – Adam Smith con Ermanno Ferretti
@Politica interna, europea e internazionale
L'articolo Libsophia #7 – Adam Smith con Ermanno Ferretti proviene da Fondazione Luigi Einaudi.
Databroker Files: New data set reveals 40,000 apps behind location tracking
netzpolitik.org/2025/databroke…
Gazzetta del Cadavere reshared this.
Databroker Files: Neuer Datensatz enthüllt 40.000 Apps hinter Standort-Tracking
netzpolitik.org/2025/databroke…
Medienberichte: EU-Kommission soll bei der Durchsetzung von Plattformregeln zögern
netzpolitik.org/2025/medienber…
Videoüberwachung: Hamburger Polizei soll KI mit personenbezogenen Daten trainieren
netzpolitik.org/2025/videouebe…
Free Our Feeds: Initiative will soziale Netzwerke vor Milliardären schützen
netzpolitik.org/2025/free-our-…
Offener Brief: Fünf Maßnahmen für mehr Vertrauen in die elektronische Patientenakte
netzpolitik.org/2025/offener-b…
Pressefreiheit: Prominente georgische Journalistin festgenommen und angeklagt
netzpolitik.org/2025/pressefre…
The proposed HIPAA Security Rule introduces mandatory measures to prevent malicious cyberattacks in health care.
The proposed HIPAA Security Rule introduces mandatory measures that reflect the growing sophistication of cyber threats in health care.#healthcaresecurity #healthinsuranceportabilityandaccountabilityact #healthcaresecurity #hipaa
Giorgio Sarto reshared this.
CyberGhost VPN Review (2025): Features, Pricing, and Security
Is CyberGhost VPN truly fast, secure, and great for streaming? Explore its performance, privacy features, and streaming compatibility in our review.Luis Millares (TechRepublic)
Giorgio Sarto reshared this.
La Commissione vuole un centro dedicato alla salute nell’agenzia per la sicurezza informatica dell’UE
L'articolo proviene da #Euractiv Italia ed è stato ricondiviso sulla comunità Lemmy @Intelligenza Artificiale
La Commissione europea ha presentato un piano d’azione a livello UE per salvaguardare il settore sanitario dell’Unione,
La nuova scuola secondo Valditara: “Storia senza ideologie, latino alle medie, lettura della Bibbia e poesie a memoria”
@Politica interna, europea e internazionale
La nuova scuola di Valditara: “Storia senza ideologie e lettura della Bibbia” Dall’introduzione del latino alle scuole medie alla lettura della Bibbia: sono le nuove indicazioni per la scuola annunciate dal ministro dell’Istruzione Giuseppe
Nuova Variante di Banshee per Apple macOS: Il Malware che Elude Apple XProtect
I ricercatori hanno scoperto una nuova versione dell’infostealer Banshee progettato per macOS. Il malware non controlla più se sui sistemi infetti è installata la lingua russa ed elude il rilevamento utilizzando la crittografia delle stringhe di Apple XProtect.
Ricordiamo che Banshee è un infostealer rivolto ai sistemi che eseguono macOS. È stato avvistato per la prima volta a metà del 2024. Quindi ha funzionato secondo lo schema stealer-as-a-service, e poteva raccogliere dati da browser, portafogli di criptovaluta e file che soddisfacevano determinati criteri. Il malware veniva venduto sulla darknet per 3.000 dollari al mese.
Nel novembre 2024, il codice sorgente del ladro è stato pubblicato sui forum di hacking, dopodiché il progetto è stato chiuso, ma altri criminali hanno avuto l’opportunità di creare il proprio malware basato su Banshee.
Come riferiscono ora gli esperti di Check Point , hanno scoperto una nuova variante di Banshee che è ancora attiva oggi e utilizza un nuovo metodo di crittografia che gli consente di eludere meglio il rilevamento. Inoltre, questa versione dello stealer non evita più i sistemi degli utenti russi, il che significa che gli aggressori cercano di ampliare la gamma dei possibili bersagli degli attacchi.
Apple XProtect è una tecnologia di rilevamento malware integrata in macOS. Utilizza una serie di regole, simili alle firme antivirus, per identificare e bloccare le minacce conosciute. La variante Banshee osservata dai ricercatori utilizza l’algoritmo di crittografia delle stringhe utilizzato da XProtect per proteggere i propri dati. Crittografando le stringhe e decrittografandole solo in fase di esecuzione, Banshee evita i metodi di rilevamento statico standard. Inoltre, gli esperti ritengono che anche macOS stesso e gli strumenti di sicurezza di terze parti trattino questo metodo di crittografia con meno sospetto, il che consente al ladro di rimanere inosservato più a lungo.
I ricercatori notano che questa versione di Banshee è distribuita principalmente attraverso repository fraudolenti su GitHub, che presumibilmente offrono vari software. Allo stesso tempo, gli operatori di malware attaccano anche gli utenti Windows, ma utilizzando lo stealer Lumma.
L'articolo Nuova Variante di Banshee per Apple macOS: Il Malware che Elude Apple XProtect proviene da il blog della sicurezza informatica.
Parolenfassung Umweltverantwortungsinitiative
Die Piratenpartei hat die „Stimmfreigabe“ zur Umweltverantwortungsinitiative beschlossen [1].
Ausnahmsweise wurde die Parole nicht an einer Mitgliederversammlung, sondern vom Vorstand in einem referendumsfähigen Beschluss gefasst.
Movimento 5 Stelle: “Via i cassonetti gialli”
Servizio di Sofia Silveri e Iris Venuto
L'articolo Movimento 5 Stelle: “Via i cassonetti gialli” su Lumsanews.
Claudio Baglioni da record, al via il terzo tour nei teatri lirici. Prima tappa a Roma il 15 gennaio
[quote]ROMA – Da mercoledì 15 gennaio 2025 al via il terzo tour nei teatri lirici italiani di Claudio Baglioni. Il cantautore andrà in scena al Teatro dell’Opera di Roma, debutto…
L'articolo Claudio Baglioni da record, al via il terzo tour nei
Gaza, frenata sulla tregua: “Hamas vuole rallentare i colloqui”. Nuovi raid dell’Idf
[quote]TEL AVIV – D’accordo, ma solo in linea di principio. Così si è espresso Muhammad Sinwar, il leader di Hamas, sui termini dell’intesa con Israele per il rilascio degli ostaggi…
L'articolo Gaza, frenata sulla tregua: “Hamas vuole rallentare i colloqui”. Nuovi raid dell’Idf
Using the ESP8266 for Low-Cost Fault Injection
As a general concept, fault injection is a technique that studies how a system reacts to unusual or unexpected external forces. The idea is that, if you can trigger a glitch at the precise moment, you might be able to use that to your advantage in disabling security features or otherwise gaining further access to the device in question. In the hardware world, this could be achieved by fiddling with the power going into the device, or subjecting it to extreme temperatures.
We’ve covered voltage glitching attacks on these pages in the past, but most of the tools used are fairly expensive if you’re not doing this kind of thing professionally. Luckily for us, [Aditya Patil] has developed a fault injection tool that can run on a standard ESP8266 development board. Obviously it’s not as capable as a bespoke device costing hundreds of dollars, but if you just want to experiment with the concept, it’s a fantastic way to wrap your head around it all.
Now to be clear, the ESP8266 alone isn’t able to generate the sort of high-voltage spikes that are often used to glitch out a chip. The idea with this project is that the ESP would serve as the programmable timer used to trigger a high voltage generator or other nefarious piece of kit. That said, if you’ve got something low power enough that could get confused by rapidly having ~3 V applied to its power rails, in theory you could use the dev board without any additional hardware — though we’d strongly recommend at least throwing a MOSFET between the ESP and whatever you’re harassing.
With the firmware flashed to the ESP8266, plugging the board into your computer will provide you with a serial interface through which the software can be configured and attacks can be launched. While this interactive menu system is nice, and reminds us a bit of the Bus Pirate, [Aditya] also provides an example Python script that will let you fire commands at the system far faster than you could type them out.
If you’re looking for more capability, something like the PicoGlitcher would probably be the next step up, but if you want to really dive into the deep-end, the ChipWhisperer line of devices from [Colin O’Flynn] are really where it’s at. Check out the fascinating talk he gave about voltage glitching during the 2021 Remoticon if you’d like to learn more about the technique.
Scontro sul terzo mandato, Zaia: “No a lezioni da bocche sfamate da 30 anni in Parlamento”
[quote]Scontro sul terzo mandato, la polemica prosegue in Veneto. A colpire sono state soprattutto le risposte caustiche del governatore Luca Zaia
L'articolo Scontro sul terzo mandato, Zaia: “No a lezioni da bocche sfamate da 30 anni in Parlamento” su
Corea del Sud, l’ex presidente Yoon arrestato per tradimento: “Crollato stato di diritto”
[quote]SEUL – “Lo Stato di diritto è crollato”. La dichiarazione del presidente deposto Yoon Suk-yeol, sotto impeachment per il tentativo fallito di imporre la legge marziale, segue di pochi minuti…
L'articolo Corea del Sud, l’ex presidente Yoon arrestato per
Abusi sui minori, Papa Francesco: “Atto spregevole. Dobbiamo risvegliare le coscienze”
Papa Francesco torna a trattare il tema dell'abuso minorile nel corso dell'udienza generale del mercoledì. Parole anche sullo sfruttamento
L'articolo Abusi sui minori, Papa Francesco: “Atto spregevole. Dobbiamo risvegliare le coscienze” su Lumsanews.
Un nuovo caso Sala: l’operatore ong Alberto Trentini bloccato in Venezuela
CARACAS – “Siamo molto provati. Non sento mio figlio da due mesi, da quando lo hanno portato via. Lui ora è ostaggio di quel Paese, ma è solo una pedina.…
L'articolo Un nuovo caso Sala: l’operatore ong Alberto Trentini bloccato in Venezuela su Lumsanews.