Salta al contenuto principale



New Session publishes poetry via Telnet, rejecting the internet’s fast-paced enshittification.#retro #zines #telnet


This Queer Online Zine Can Only Be Read Via an Ancient Internet Protocol


Unless you’re living in a ChatGPT hype-bro bubble, it’s a pretty common sentiment these days that the internet is getting shittier. Social media algorithms have broken our brains, AI slop flows freely through Google search results like raw sewage, and tech companies keep telling us that this new status quo is not only inevitable, but Good.

Standing in stark opposition to these trends is New Session, an online literary zine accessed via the ancient-but-still-functional internet protocol Telnet.

Like any other zine, New Session features user-submitted poems, essays, and other text-based art. But the philosophy behind each of its digital pages is anything but orthodox.

“In the face of right-wing politics, climate change, a forever pandemic, and the ever-present hunger of imperialist capitalism, we have all been forced to adapt,” reads the intro to New Session’s third issue, titled Adaptations, which was released earlier this month. “Both you and this issue will change with each viewing. Select a story by pressing the key associated with it in the index. Read it again. Come back to it tomorrow. Is it the same? Are you?”

The digital zine is accessibleon the web via a browser-based Telnet client, or if you’re a purist like me, via the command line. As the intro promises, each text piece changes—adapts—depending on various conditions, like what time of day you access it or how many times you’ve viewed it. Some pieces change every few minutes, while others update every time a user looks at it, like gazing at fish inside a digital aquarium.



How New Session looks on Telnet. Images courtesy Cara Esten Hurtle

Once logged in, the zine’s main menu lists each piece along with the conditions that cause it to change. For example, Natasja Kisstemaker’s “Sanctuary” changes with every viewing, based on the current weather. “Signature,” by Kaia Peacock, updates every time you press a key, slowly revealing more of the piece when you type a letter contained in the text—like a word puzzle on Wheel of Fortune.

Cara Esten Hurtle, an artist and software engineer based in the Bay Area, co-founded New Session in 2021 along with Lo Ferris, while searching for something to do with her collection of retro computers during the early days of the COVID-19 pandemic.

“I realized I’d been carrying around a lot of old computers, and I thought it would be cool to be able to do modern stuff on these things,” Hurtle told 404 Media. “I wanted to make something that was broadly usable across every computer that had ever been made. I wanted to be like, yeah, you can run this on a 1991 Thinkpad someone threw away, or you could run it on your modern laptop.”

If you’re of a certain age, you might remember Telnet as a server-based successor to BBS message boards, the latter of which operated by connecting computers directly. It hearkens back to a slower internet age, where you’d log in maybe once or twice a day to read what’s new. Technically, Telnet predates the internet itself, originally developed as anetworked teletype system in the late ‘60s for the internet’s military precursor, the ARPAnet. Years later, it was officially adopted as one of the earliest internet protocols, and today it remains the oldest application protocol still in use—though mainly by enthusiasts like Hurtle.

New Session intentionally embraces this slower pace, making it more like light-interactive fiction than a computer game. For Hurtle, the project isn’t just retro novelty—it’s a radical rejection of the addictive social media and algorithmic attention-mining that have defined the modern day internet.



New Session viewed on a variety of Hurtle's collection of machines. Photos courtesy Cara Esten Hurtle

“I want it to be something where you don’t necessarily feel like you have to spend a ton of time with it,” said Hurtle. “I want people to come back to it because they’re interested in the stories in the same way you’d come back to a book—not to get your streak on Duolingo.”

I won’t go into too much detail, because discovering how the pieces change is kind of the whole point. But on the whole, reading New Session feels akin to a palette cleanser after a long TikTok binge. Its very design evokes the polar opposite of the hyper-consumerist mindset that brought us infinite scrolls and algorithmic surveillance. The fact that you literally can’t consume it all in one session forces readers to engage with the material more slowly and meaningfully, piquing curiosity and exercising intuition.

At the same time, the zine isn’t meant to be a nostalgic throwback to simpler times. New Session specifically solicits works from queer and trans writers and artists, as a way to reclaim a part of internet history that was creditedalmost entirely to white straight men. But Hurtle says revisiting things like Telnet can also be a way to explore paths not taken, and re-assess ideas that were left in the dustbin of history.

“You have to avoid the temptation to nostalgize, because that’s really dangerous and it just turns you into a conservative boomer,” laughs Hurtle. “But we can imagine what aspects of this we can take and claim for our own. We can use it as a window to understand what’s broken about the current state of the internet. You just can’t retreat to it.”

Projects like New Session make a lot of sense in a time when more people are looking backward to earlier iterations of the internet—not to see where it all went wrong, but to excavate old ideas that could have shaped it in a radically different way, and perhaps still can. It’s a reminder of that hidden, universal truth—to paraphrase the famousDavid Graeber quote—that the internet is a thing we make, and could just as easily make differently.




200 dollari per l’Accesso ad una Azienda italiana! Mentre il Dark Web fa affari, tu sei pronto a difenderti?


Dopo il caso dei 568 endpoint di un’azienda italiana del settore macchinari industriali, un altro accesso compromesso relativo a una società italiana di ingegneria del software è finito in vendita su un forum underground frequentato da Initial Access Broker e attori ransomware.

L’inserzione, pubblicata dall’utente spartanking, offre accesso completo a un server con privilegi di amministratore locale e controllo remoto tramite AnyDesk.

L’inserzione riporta chiaramente che il sistema compromesso è collegato a un dominio Active Directory. Secondo quanto dichiarato nel post:

  • Sono presenti 11 host attivi
  • L’accesso è di tipo “local admin / AnyDesk”
  • Il venditore accetta solo pagamenti tramite escrow del forum (Guarantor), a tutela delle parti coinvolte
  • Il prezzo richiesto è di 200 dollari

L’accesso consentirebbe quindi privilegi elevati su almeno un server. In uno screenshot, si nota che il sistema compromesso è un Microsoft Windows Server 2012 R2 Standard installato su un HP ProLiant ML350p Gen8, con 16 GB di RAM e 465 GB di spazio disco.

Le immagini a corredo dell’annuncio forniscono numerosi indizi:

  • Accesso al desktop remoto completo del sistema, con icone visibili per applicazioni business come Nextcloud, Oracle VirtualBox, IBM Access per Windows, HW Serial Port e software da laboratorio.
  • Presenza di tool di scansione di rete (Advanced IP Scanner), che mostrano una topologia di rete con 11 dispositivi attivi, tra cui switch Cisco, router MikroTik e diversi endpoint HP.
  • Indicazione di un dominio Active Directory denominato “CEP”.

Sebbene l’accesso sia messo in vendita a un prezzo relativamente basso (200$), ciò non ne riduce l’impatto potenziale. Gli accessi low cost sono spesso acquistati da:

  • Attori meno sofisticati ma motivati (script kiddie, gruppi ransomware minori)
  • Gruppi interessati a movimenti laterali verso altri target
  • Operatori specializzati in esfiltrazione dati o cryptojacking

La continua pubblicazione di accessi aziendali italiani dimostra che il nostro Paese non è affatto immune alle pratiche degli Initial Access Broker. Le PMI tecnologiche, spesso convinte di essere “troppo piccole per essere un target”, risultano invece vulnerabili e appetibili.

Il caso spartanking, con i suoi 7 escrow all’attivo, conferma inoltre che questi venditori stanno costruendo una reputazione duratura e profittevole, segno che il mercato di accessi italiani nel dark web è tutt’altro che marginale.

Ma la morale in tutto questo?


Che comprendere prima che un Initial Access Broker stia osservando o analizzando una rete aziendale è oggi una delle informazioni più preziose per la difesa preventiva. Questi attori vendono porte d’accesso già aperte, e sapere in anticipo se si è finiti nel loro radar consente di rafforzare i punti deboli, segmentare la rete, aggiornare le policy di accesso e attuare contromisure tempestive. Aspettare che l’accesso venga venduto – e poi magari usato da un gruppo ransomware – significa intervenire quando il danno è già in atto.

Qui entra in gioco la Cyber Threat Intelligence (CTI), che non si limita a osservare il passato, ma analizza pattern, comportamenti, reputazione e movimenti degli attori nelle zone grigie del web. L’intelligence delle minacce consente alle aziende di monitorare marketplace, forum underground, canali Telegram e dark web per rilevare vendite sospette, fughe di dati o credenziali compromesse. In un’epoca in cui le PMI vengono bersagliate con la stessa frequenza delle grandi aziende, la CTI non è un lusso per pochi, ma una necessità per tutti.

L'articolo 200 dollari per l’Accesso ad una Azienda italiana! Mentre il Dark Web fa affari, tu sei pronto a difenderti? proviene da il blog della sicurezza informatica.



Le sfide della deterrenza atlantica nell’era della velocità. Il dialogo Cavo Dragone-Vandier

@Notizie dall'Italia e dal mondo

In occasione del Nato Public Forum organizzato all’Aja in concomitanza con il vertice dei capi di Stato e di governo dell’Alleanza, l’ammiraglio Giuseppe Cavo Dragone, presidente del Comitato militare della Nato, e l’ammiraglio Pierre



Is Box Turtle the Open Source AMS we’ve been waiting for?


Multimaterial printing was not invented by BambuLabs, but love them or hate them the AMS has become the gold standard for a modern multi-material unit. [Daniel]’s latest Mod Bot video on the Box Turtle MMU (embedded below) highlights an open source project that aims to bring the power and ease of AMS to Voron printers, and everyone else using Klipper willing to put in the work.
A 3d Printed panda with black and white filamentThis isn’t a torture test, but it’s very clean and very cute.
The system itself is a mostly 3D printed unit that sits atop [Daniel]’s Voron printer looking just like an AMS atop a BambuLab. It has space for four spools, with motorized rollers and feeders in the front that have handy-dandy indicator LEDs to tell you which filament is loaded or printing. Each spool gets its own extruder, whose tension can be adjusted manually via thumbscrew. A buffer unit sits between the spool box and your toolhead.

Aside from the box, you need to spec a toolhead that meets requirements. It needs a PTFE connector with a (reverse) boden tube to guide the filament, and it also needs to have a toolhead filament runout sensor. The sensor is to provide feedback to Klipper that the filament is loaded or unloaded. Finally you will probably want to add a filament cutter, because that happens at the toolhead with this unit. Sure, you could try the whole tip-forming thing, but anyone who had a Prusa MMU back in the day can tell you that is easier said than done. The cutter apparently makes this system much more reliable.

In operation, it looks just like a BambuLabs printer with an AMS installed. The big difference, again, is that this project by [Armored Turtle] is fully open source, with everything on GitHub under a GPL-3.0 license. Several vendors are already producing kits; [Daniel] is using the LDO version in his video.

It looks like the project is well documented–and [Mod Bot] agrees, and he reports that the build process is not terribly difficult (well, if you’re the kind of person who builds a Voron, anyway), and adding the AFC Klipper Addon (also by [Armored Turtle]) was easy as pie. After that, well. It needs calibration. Calibration and lots of tuning, which is an ongoing process for [Daniel]. If you want to see that, watch the video below, but we’ll spoil it for you and let you know it really pays off. (Except for lane 4, where he probably needs to clean up the print.)We’ve featured open-source MMUs before, like the Enraged Rabbit Carrot Feeder, but it’s great to see more in this scene, especially something that looks like it can take on the AMS. It’s not the only way to get multimaterial– there’s always tool-changers, or you could just put in a second motion system and gantry.

youtube.com/embed/Akvasjkd3VU?…


hackaday.com/2025/06/24/is-box…



Repression gegen Budapest Pride: EU soll gegen digitale Verfolgung und Diskriminierung einschreiten


netzpolitik.org/2025/repressio…



James Senese – Chest Nun E’ A Terra Mia
freezonemagazine.com/articoli/…
Uno dei punti sui quali da sempre si trovano sulla stessa linea, addetti ai lavori, mezzi di informazione, suoi fan, appassionati di musica, è l’impareggiabile Coerenza di James Senese. In lui non c’è mai stata una separazione fra l’essere musicista e Il lato umano, sono una sagoma sola, schietta, espressiva, carismatica. È un figlio della […]
L'articolo James Senese – Chest Nun


Rutte e la nuova deterrenza. Industria, resilienza e coesione politica

@Notizie dall'Italia e dal mondo

Aprendo i lavori del Nato public Forum, organizzato dall’Alleanza Atlantica all’Aja, congiuntamente al Summit, è intervenuto oggi il segretario generale Mark Rutte, tracciando la direzione da seguire durante i due giorni di Summit previsti. La direzione da seguire secondo Rutte Il



Cyber security e innovazione: l’equilibrio è possibile


@Informatica (Italy e non Italy 😁)
Attacchi ransomware che chiudono gli ospedali, hacker che rubano ‘tesori’ di dati personali dalle banche, video deepfake che manipolano l'opinione pubblica. L'odierno panorama è in rapida evoluzione, ma cyber security e innovazione possono offrire soluzioni efficaci contro le minacce



Attacchi informatici, l’Iran potrebbe colpire le aziende


@Informatica (Italy e non Italy 😁)
L’attacco, sferrato da Israele contro l’Iran lo scorso 13 giugno, si protrarrà per 15 giorni, secondo l’esercito israeliano. Ma gli analisti pensano possa durare molto di più, soprattutto dopo l’intervento diretto degli Stati Uniti (che ora spingono verso un accordo di pace). E potrebbe



Il Regno Unito sballotta Google?

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Google rappresenta oltre il 90% delle ricerche effettuate nel Regno Unito, ma ora l'autorità antitrust britannica sta valutando se assegnarle uno status particolare che le permetterebbe di rafforzare startmag.it/innovazione/il-reg…




Tregua. Israele denuncia attacco Iran, Teheran nega


@Notizie dall'Italia e dal mondo
Il presidente americano nella notte ha annunciato la fine dello scontro tra Israele e Iran. Netanyahu ha confermato di aver accettato lo stop agli attacchi ma Tel Aviv denuncia che nuovi missili sono stati lanciati da Teheran. Iran smentisce.
L'articolo Tregua. Israele denuncia attacco Iran, Teheran




Privacy e accessibilità: due pilastri per la libertà individuale nella società digitale


@Informatica (Italy e non Italy 😁)
Il Decreto legislativo 82/2022 che ha recepito l'European Accessibility Act segna un punto di svolta nell’integrazione dei diritti digitali, poiché impone l’accessibilità come condizione strutturale per



Perché Trump ha rimandato TikTok a settembre

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Con la guerra in Iran altri dossier sembrano essersi di colpo imposti sulla scrivania di Trump che per il terzo rinvio ha deciso di prendersi tutta l'estate: TikTok può infatti beneficiare di una ulteriore proroga di 90 giorni e continuare a



Data flows and digital repression: Civil society urges EU to reassess Israel’s adequacy status


On 24 June 2025, EDRi, Access Now and other civil society organisations sent a second letter to the European Commission, urging it to reassess Israel’s data protection adequacy status under the GDPR. The letter outlines six categories of concerns linking Israel’s data practices to escalating human rights violations in Gaza and the West Bank.

The post Data flows and digital repression: Civil society urges EU to reassess Israel’s adequacy status appeared first on European Digital Rights (EDRi).





Un anno fa, il 24 giugno 2024, accadeva l'impossibile: il giornalista Julian Assange veniva rilasciato dal famigerato carcere di massima sicurezza a Belmarsh, Londra.

Roberto Resoli reshared this.



There’s A New Reusable Rocket, And It’s A Honda


As we watched the latest SpaceX Starship rocket test end in a spectacular explosion, we might have missed the news from Japan of a different rocket passing a successful test. We all know Honda as a car company but it seems they are in the rocket business too, and they successfully tested a reusable rocket. It’s an experimental 900 kg model that flew to a height of 300 m before returning itself to the pad, but it serves as a valuable test platform for Honda’s take on the technology.

It’s a research project as it stands, but it’s being developed with an eye towards future low-cost satellite launches rather than as a crew launch platform.As a news story though it’s of interest beyond its technology, because it’s too easy to miss news from the other side of the world when all eyes are looking at Texas. It’s the latest in a long line of interesting research projects from the company, and we hope that this time they resist the temptation to kill their creation rather than bring it to market.


hackaday.com/2025/06/24/theres…



OPEN LETTER: The European Commission must act now to defend fundamental rights in Hungary


With Budapest Pride set to take place on June 28, 2025, EDRi and 46 organisation are urging the European Commission to defend fundamental rights in Hungary so that Pride organisers and participants can safely exercise their right to peaceful assembly and freedom of expression.

The post OPEN LETTER: The European Commission must act now to defend fundamental rights in Hungary appeared first on European Digital Rights (EDRi).



EU-Ratspräsidentschaft: Dänemark setzt Chatkontrolle wieder auf die Agenda


netzpolitik.org/2025/eu-ratspr…

reshared this

in reply to The Pirate Post

Die übliche Zermürbungs- und Ermüdungstaktik. Will man #Datenschutz und informationelle #Selbstbestimmung bewahren, muss man solche Vorhaben in jeder einzelnen Abstimmung abschmettern. Will man hingegen diese Dinge zugunsten eines Überraschungsapparates abschaffen, kann man das Thema wieder und wieder auf die Tagesordnung bringen und muss dann nur ein einziges Mal eine Abstimmung gewinnen, damit der Geist aus der Flasche ist, und der lässt sich nicht so leicht wieder einfangen. 🙄

#Chatkontrolle #Überwachung #surveillance #EUpol

reshared this



Genomics Market Comprehensive Statistics, Growth Rate, and Future Trends 2035


Release Date: 2025-Jun-24

A recently compiled research report offers a comprehensive overview of the Genomics Market, presenting well-structured insights into current market behavior, historical performance, and projections for the years ahead. This report is developed to support informed business decisions by offering relevant market intelligence, segment-level analysis, and region-specific breakdowns.

Included in the publication is a concise summary of data points covering past trends, present-day developments, and general observations about the structure of the market. The report also includes information on technology-related activities, product alignment, and performance category. It is designed for professionals seeking accessible and detailed knowledge and is available in both PDF and spreadsheet formats for ease of use.

The global genomics market size, valued at USD 38.77 billion in 2024, is expected to reach USD 46.06 billion in 2025 and USD 186.64 billion by 2035, representing a compounded annual growth rate (CAGR) of 15.0% during the forecast period. The report presents these projections with supporting market data, providing a clear reference for understanding current conditions and segment activity.

Genomics Market Characterization

Market Scope and Market Size:

The report segments the global market based on Distribution by CAGR (Till 2035), Type of Deliverable, Type of Technology, Type of Process, Type of Study, Type of Application Area, End User, Geographical Regions.

This structured segmentation supports understanding of the Genomics Market from multiple angles. Readers can analyze trends based on crop usage, product type, and application method, while comparing region-specific contributions and market activity across different areas. The information helps frame each segment’s relevance and position within the overall market.

source of information: rootsanalysis.com/reports/geno…

Key Market Companies

Several prominent players are featured in the report, including 23andMe, Agilent Technologies, Bio-Rad Laboratories, BGI Genomics, Color Genomics, Danaher, Eppendorf, Eurofins Scientific (, GE HealthCare, Illumina, Myriad Genetics, Oxford Nanopore Technologies, Pacific Biosciences, QIAGEN, Quest Diagnostics, Roche, Thermo Fisher Scientific. These companies are profiled based on business reach, operational footprint, and product scope. The analysis also includes revenue performance, strategic direction, and product highlights for each company.

This section is designed to inform readers about how major companies are positioned within the Genomics industry, with a focus on sales performance, business expansion, and geographic engagement. It also highlights examples of recent activity across different regions, including portfolio extensions and new market entries.

Geographical Insights

Regional segmentation offers a breakdown of the Genomics Market by location, North America (US, Canada and Mexico) Europe (France, Germany, Italy, Spain, UK and Rest of Europe) Asia-Pacific (China, India, Japan, South Korea, Australia, Russia, Thailand, Malaysia, Indonesia and Rest of the Asia-Pacific) Midde East and North Africa (Egypt, Saudi Arabia and UAE) Latin America (Argentina and Brazil). . Each region is reviewed with respect to historical performance, reported sales, and revenue share. The report presents these insights using a neutral and fact-based approach to ensure consistency across all regions.

Main Chapters in the Report:

Part 01: Market Overview
Part 02: Market Size, by regions
Part 03: Market Revenue, by countries
Part 04: Market Competition, by key players
Part 05: Company Profiles

Thank you for reviewing this market report. If you require a customized version or have any specific questions, please reach out to our team. We are happy to provide further assistance or deliver tailored content based on your strategic focus.

About Roots Analysis

Roots Analysis is a global research and consulting powerhouse specializing in Healthcare, Pharmaceutical, Biotech, Semiconductors, Chemicals and ICT industry. With over a decade of experience, they’ve supported more than 750 clients — spanning Fortune 500 companies, innovative startups, academic institutions, VCs, and strategic investors. Their expertise covers a wide set of domains, including market sizing, pricing trends, regulatory outlooks, competitive landscapes, and opportunity mapping across geographies.

Why Use Roots Analysis in era of Artificial Intelligence?

Tailored Insights
Robust Methodology
Smart Decisions Made Easy
By combining world-class domain expertise, careful data gathering, and dialogue with senior industry experts, Roots Analysis ensures their deliveries are trustworthy, actionable, and aligned with strategic priorities. The value proposition generated on insights generated by Roots Analysis team is unparalleled in the market research industry.

Services Offered:

Consulting Services (custom insights supporting strategic and tactical requirements, off-the-shelf ready to consume work)
Roots Analysis offers bespoke consulting services tailored to the unique needs of clients in the life sciences and healthcare sectors. Their team conducts in-depth studies on drug pipelines, clinical trials, and therapeutic landscapes, helping clients make informed decisions.

They specialize in market assessments, tracking industry trends, dynamics, and competitive positioning. These insights help companies fine-tune their product strategies and market-entry plans.

Roots Analysis also delivers expert guidance on partnerships, licensing, and investment opportunities. Their strategic support extends to KOL identification, publication analysis, and regulatory intelligence, making them a valuable partner in business growth and innovation.

Subscription Services (bundled services supporting multiple topics and domains for a firm)
With their subscription plans, Roots Analysis provides seamless access to a vast library of market intelligence reports. Subscribers enjoy unlimited downloads in multiple formats, covering various sectors like pharma, biotech, and diagnostics.

The service includes on-demand research support—allowing clients to request tailored insights and initiate custom research topics. This ensures that emerging needs are met quickly and effectively.

Each subscription comes with a dedicated account manager and direct access to analysts. Flexible billing options and tiered plans make this service suitable for organizations of all sizes seeking continuous, reliable insights.

Contact Details for Roots Analysis

Chief Executive: Gaurav Chaudhary

Email: Gaurav.chaudhary@rootsanalysis.com

Website: rootsanalysis.com/



Madrid chiede all’UE lo stop al trattato di associazione con Israele


@Notizie dall'Italia e dal mondo
Il governo spagnolo chiede all'UE la sospensione del trattato di associazione con Israele ma movimenti filopalestinesi e partiti di sinistra pretendono da Pedro Sànchez azioni concrete e urgenti. Intanto Bruxelles rimanda ogni decisione su Israele
L'articolo Madrid chiede all’UE lo stop al



Building A Custom Paper Tape Punch Machine



The solenoid and punch side of the machine. {Credit: Simon Boak)The solenoid and punch side of the machine. {Credit: Simon Boak)
Although [Simon Boak] had no use for an automatic paper tape punch, this was one of those intrusive project thoughts that had to be put to rest. With not a lot of DIY projects to look at, the first step was to prototype a punch mechanism that would work reliably. This involved the machining of a block of aluminium with holes at the right locations for the punch (HSS rods) to push through and create holes into the paper without distortions. Next was to automate this process.

To drive the punches, 12V solenoids were selected, but using leverage to not require the solenoids to provide all the force directly. On the electronics side this then left designing a PCB with the solenoid drivers and an Arduino Nano-style board as the brains, all of which including the Arduino source can be found on GitHub. Much like with commercial tape punch machines, this unit receives the data stream via the serial port (and optional parallel port), with the pattern punched into the 1″ paper tape.

One issue was finding blank paper tape, for which [Simon] cut up rolls of thermal paper using a 3D-printed rig with appropriately installed sharp blades. This paper tape seems to work quite well so far, albeit with the compromise that due to the current drawn by each solenoid (~1.7A) only one solenoid gets activated at any time. This makes it slower than commercial punch machines.

Thanks to [Tim] for the tip.


hackaday.com/2025/06/23/buildi…



“Pulizia” su Windows Update! Microsoft dichiara guerra ai driver sfruttati negli attacchi ransomware


Microsoft ha annunciato che rimuoverà periodicamente i driver obsoleti dal catalogo di Windows Update per ridurre i rischi e migliorare la compatibilità. “L’obiettivo di questa iniziativa è fornire il miglior set di driver in Windows Update per le varie soluzioni hardware dell’ecosistema Windows e contribuire a mantenere Microsoft Windows sicuro”, ha dichiarato l’azienda in un comunicato.

Microsoft ha inoltre aggiunto che “Questa iniziativa pulirà periodicamente i driver in Windows Update, il che comporterà la mancata distribuzione di alcuni driver sui sistemi del nostro ecosistema.”. Come ha chiarito l’azienda, la prima fase della procedura di “pulizia” interesserà i driver per i quali Windows Update dispone già di alternative più recenti.

Con “pulizia” Microsoft intende rimuovere i driver scaduti in Windows Update, in modo che non vengano più offerti su alcun sistema Windows. Questo verrà ottenuto rimuovendo le assegnazioni corrispondenti dei vecchi driver nell’Hardware Development Center. Si segnala inoltre che in futuro Microsoft amplierà l’elenco delle categorie che possono essere escluse da Windows Update per motivi di sicurezza. Si segnala che i partner potranno comunque ripubblicare i driver rimossi da Microsoft se forniscono una giustificazione aziendale per farlo.

“La rimozione dei driver obsoleti da Windows Update è una misura proattiva di Microsoft per garantire la sicurezza e la qualità dei driver per gli utenti Windows”, aggiungono gli sviluppatori. “In futuro, ci si aspetta che la pulizia diventi una routine, così come nuove raccomandazioni di pubblicazione, per aiutare tutti gli utenti Windows a mantenere i propri sistemi sicuri e protetti.”

Nel vasto ecosistema Windows, i driver di dispositivo non sono semplici componenti di supporto: sono elementi critici che operano a basso livello nel sistema, spesso con privilegi elevati. Quando non vengono aggiornati o restano presenti in forma obsoleta, diventano un punto cieco perfetto per i cyber criminali. Negli ultimi anni, diverse campagne ransomware hanno sfruttato driver vulnerabili per eludere le protezioni EDR, disabilitare servizi di sicurezza e ottenere accesso persistente. Microsoft lo sa, e ora corre ai ripari.

Con la nuova iniziativa annunciata, Redmond ha deciso di rimuovere regolarmente i driver non più aggiornati da Windows Update, riducendo la probabilità che questi componenti finiscano sui sistemi degli utenti. Ma la posta in gioco è alta: questa non è solo una scelta tecnica, è una strategia di difesa preventiva. Limitare la distribuzione dei driver vecchi significa chiudere porte nascoste prima che qualcuno le sfrutti. Un passo verso un ecosistema Windows più sicuro, ma anche un chiaro segnale ai vendor hardware: aggiornare o sparire.

L'articolo “Pulizia” su Windows Update! Microsoft dichiara guerra ai driver sfruttati negli attacchi ransomware proviene da il blog della sicurezza informatica.