Salta al contenuto principale



Streamlining detection engineering in security operation centers


Security operations centers (SOCs) exist to protect organizations from cyberthreats by detecting and responding to attacks in real time. They play a crucial role in preventing security breaches by detecting adversary activity at every stage of an attack, working to minimize damage and enabling an effective response. To accomplish this mission, SOC operations can be broken down into four operating phases:

Each of these operating phases has a distinct role to play, and well-defined processes or procedures ensure a seamless handover of findings from one phase to the next. In practice, SOC processes and procedures at each operational phase often require continuous improvement over time.

Assessment observations: Common SOC issues


During our involvement in SOC technical assessments, adversary emulations, and incident response readiness projects across different regions, we evaluated each operating phase separately. Based on our assessments, we observed common challenges, weak practices, and recurring issues across these four key SOC capabilities.

Log collection


There are three main issues we have observed at this stage:

  • Lack of visibility coverage based on the MITRE DETT&CT framework – customers do not practice maintaining a visibility coverage matrix. Instead, they often maintain log source data as an Excel or similar spreadsheet that is not easily tracked. This means they don’t have a systematic approach to what data they are feeding into the SIEM and which TTPs can be detected in their environment. And in most cases, maintaining a continuous visibility matrix is also a challenge because log sources may disappear over time for a variety of reasons: agent termination, changes in log destination settings, device (e.g., firewall) replacement. This only leads to the degradation of the log visibility matrix.
  • Inefficient use of data for correlation – in many cases, relevant data is available to detect threats, but there are no correlation rules in place to leverage it for threat detection.
  • Correlation exists, but lacks the necessary data fields – while some rule sets are properly configured with the right logic to detect threats, the required data fields from log sources are missing, preventing the rules from being triggered. This critical issue can only be detected through a data quality assessment.


Detection


At this stage, we have seen the following issues during assessment procedures:

  • Over-reliance on vendor-provided rules – many customers rely heavily on the default rule sets in their SIEM and only tune them when alerts are triggered. Since the default content is not optimized, it often generates thousands of alerts. This reactive approach leads to excessive alert fatigue, making it difficult for analysts to focus on truly meaningful alerts.
  • Lack of detection alignment with the threat profile – the absence of a well-defined organizational threat profile prevents customers from focusing on the threats that are most likely to target them. Instead, they adopt a scattered approach to detection, like shooting in the dark rather than prioritizing relevant threats.
  • Poor use of threat intelligence feeds – we have encountered cases where endpoint logs do not contain file hash data. The log sources only provide filenames or file paths, but not the actual hash values, making it difficult for the SOC to correlate threat intelligence (TI) feeds that rely on file hashes. As a result, TI feeds are not operational because the required data field is not ingested into the SIEM.
  • Analytics deployment errors – one of the most challenging issues we see is when a well-designed detection rule is deployed incorrectly, causing threat detection to fail despite having the right analytics in place. We have found that there is no structured process for reviewing and validating rule deployments.


Triage and investigation


The most typical issues at this stage are:

  • Lack of a documented triage procedure – analysts often rely on generic, high-level response playbooks sourced from the internet, especially from unreliable sources, which slows or hinders the process of qualifying alerts as potential incidents. Without a structured triage procedure, they spend more time investigating each case instead of quickly assessing and escalating threats.
  • Unattended alerts – we also observed that many alerts were completely ignored by analysts. This likely stems from either a lack of skill in linking multiple alerts into a single incident, or analysts being swamped with high-severity alerts, causing them to overlook other relevant alerts.
  • Difficulty in correlating alerts – as noted in the previous observation, one of the biggest challenges is linking related alerts into a single incident. The lack of alert correlation makes it harder to see the full attack pattern, leading to disorganized alert diagnosis.
  • Default use of alert severity – SIEM default rules don’t take into account the context of the target system. Instead, they rely on the default severity in the rule, which is often set randomly or based on an engineer’s opinion without a clear process. This lack of context makes it harder to investigate and properly assess alerts.


Response


The challenges of the final operating phase are most often derived from the issues encountered in the previous stages.

  • Challenges in incident scoping – as mentioned earlier, the inability to properly correlate alerts leads to a fragmented understanding of attack patterns. This makes it difficult to see the bigger picture, resulting in inefficient incident handling and misjudged response efforts.
  • Increase in unnecessary escalations – this issue is particularly common in MSSP environments, where a lack of understanding of baseline behavior causes analysts to escalate benign cases. Without proper context, normal activities are mistaken for threats, resulting in wasted time and effort.

With these ongoing challenges, chaos will continue in SOC operations. As organizations adopt new security tools such as CASB and container security, both of which generate valuable detection data, and as digital transformation introduces even more technology, security operations will only become more complex, exacerbating these issues.

Taking the right and impactful approach


Enhancing SOC operations requires evaluating each operating phase from an investment perspective, with the detection phase having the greatest impact because it directly affects data quality, threat visibility, incident response efficiency, and the overall effectiveness of the SOC analyst. Investing in detection directly influences all the other operating phases, making it the foundation for improving all operating phases. The detection operating phase must be handled through a dedicated program that ensures log collection is purpose-driven, collecting only the data fields necessary for detection rather than unnecessarily driving up SIEM costs. This focused approach helps define what should be ingested into the SIEM while ensuring meaningful threat visibility.

Strengthening detection reduces false positives and false negatives, improves true positive rates, and enables the identification of attacker activity chains. A documented triage and investigation process streamlines the work of analysts, improving efficiency and reducing response time. Furthermore, effective incident scoping, guided by accurate detection of the cyber kill chain, enables a faster and more precise response. By prioritizing investment in detection and managing it through a structured approach, organizations can significantly improve SOC performance and resilience against evolving threats. This article focuses solely on SIEM-based detection management.

Detection engineering program


Before diving into the program-level approach, we will first present the detection engineering lifecycle that forms the foundation of the proposed program. The image below shows the stages of this lifecycle.

The detection engineering lifecycle shown here is typically followed when building detections, but its implementation often lacks well-defined processes or a dedicated team. A structured program must be put in place to ensure that the SOC’s investment and efforts in detection engineering are used efficiently.

When we talk about a program, it should be built on the following key elements:

  • A dedicated team responsible for driving the program
  • Well-defined processes and procedures to ensure consistency and effectiveness
  • The right tools to integrate with workflows, facilitate output handovers, and enable feedback loops across related processes
  • Meaningful metrics to measure the overall performance of the program.

We will discuss these performance measurement metrics in the final section of the article.

  1. Team supporting detection engineering program

The key idea behind having a dedicated team is to take full control of the detection engineering (DE) lifecycle, from analysis to release, and ensure accountability for the program’s success. In a traditional SOC setup, deployment and release are often handled by SOC engineers. This can lead to deployment errors due to potential differences in the data models used by DE and SOC teams (raw log data vs. SIEM-optimized data), as well as deployment delays due to the SOC team being overloaded with other tasks. This, in turn, can indirectly impact the work of the detection team. However, the one responsibility that does not fall under the DE team is log onboarding. Since this process requires coordination with other teams, it should continue to be managed by SOC engineers to keep the DE team focused on its core objectives.

The DE team should start with at least three key roles:

The size of the team depends on factors related to the program’s objectives. For example, if the goal is to build a certain number of detection rules per month, the number of detection engineers required will vary accordingly. Similarly, if a certain number of rules need to be tested and deployed within a week, the team size must be adjusted to meet that demand.

The Detection Engineering Lead should communicate with SOC leadership to set the right expectations by outlining what goals can realistically be achieved based on the size and capacity of the DE team. A dedicated Detection QA role can be established as the need for testing, deployment, and release of detections grows.

  1. Process and procedures

Well-defined workflows, supported by structured processes and procedures, must be established to streamline detection engineering operations. The following image illustrates the necessary processes and procedures, along with the roles responsible for executing each workflow:

During the qualification process, the Detection Engineering Lead or Detection Engineer may discover that the data source needed to develop a detection is not available. In such cases, they should follow the log management process to request onboarding of the required data before proceeding with detection research and development. The testing process typically checks that the rule works by ensuring that the SIEM triggers an alert based on the required data fields.

Lastly, a validation process that is not part of the detection engineering lifecycle must be incorporated into the detection engineering program to assess its overall effectiveness. Ideally, this validation should be conducted by individuals outside the DE lifecycle or by an external service provider.

Proper planning is required that incorporates threat intelligence and an updated threat profile. In addition, the validation process should generate reports that outline:

  • What is working well
  • Areas that need improvement
  • Detection gaps identified
  1. Tools

An essential element of the DE lifecycle is the use of tools to streamline processes and improve efficiency. Key tools include:

  • Ticketing platform – efficiently manages workflows, tracks progress from ticket creation to closure, and provides time-based metrics for monitoring.
  • Rules repository – platform for managing detection queries and code, supporting Detection-as-Code, using a unified rule format such as SIGMA, and implementing code development best practices in detection engineering, including features such as version control and change management.
  • Centralized knowledge base – dedicated space for documenting detection rules, descriptions, research notes, and other relevant information. See the best practices section below for more details on centralized documentation.
  • Communication platform – facilitates collaboration among DE team members, integrates with the ticketing system, and provides real-time notification of ticket status or other issues.
  • Lab environment – virtualized setup, including SIEM and relevant data sources, tools to simulate attacks for testing purposes. The core function of the lab is to test detection rules prior to release.


Best practices in detection engineering


Several best practices can significantly enhance your detection engineering program. Based on our experience, implementing these best practices will help you effectively manage your rule set while providing valuable support to security analysts.

  1. Rule naming convention

When developing analytics or a rule, adhering to a proper naming convention provides a concrete framework. A rule name like “Suspicious file drop detected” may confuse the analyst and force them to dig deeper to understand the context of the alert that was triggered. It would be better to give a rule a name that provides complete context at first glance, such as “Initial Access | Suspicious file drop detected in user directory | Windows – Medium”. This example makes it easy for the analyst to understand:

  • At what stage of the attack the rule is triggered. In this case, it is Initial Access as per MITRE / Kill Chain Model.
  • Where exactly the file was dropped. In this case, the user directory was the target, which may mean that this probably involved user interaction, which is another sign that the attack was probably detected at an early stage.
  • What platform was attacked. In this case, it is Windows, which can help the analyst to quickly find the machine that triggered the alert.
  • Lastly, an alert priority can be set, which helps the analyst to prioritize accordingly. For this to work properly, SIEM’s priority levels should be aligned with the rule priorities defined by the detection engineering team. For example, a high priority in SIEM should correspond to a high-priority alert.

A consistent rule naming structure can help the detection engineering team to easily search, sort and manage existing rules, avoid creating duplicates with different names, etc.

The naming structure doesn’t necessarily have to look like the example above. The whole idea of this best practice is to find a good naming convention that not only helps the SOC analyst, but also makes managing detection rules easier and more convenient.

For example, while the rule name “Audit Log Deletion” gives a basic idea of what is happening, a more effective name would be:
[High] – Audit Log Deletion in Internal Server Farm – Linux - Defense Evasion (1070.002).
This provides better context, making it much more useful to the SOC team, and more keywords for the DE team to find this particular rule or filter rules if necessary.

  1. Centralized knowledge base

Once a rule is created after thorough research, the detection team should manage it in a centralized platform (a knowledge base). This platform should not only store the rule name and logic, but also other key details. Important elements to consider:

  • Rule name/ID/description – rule name, unique ID, and a brief description of the rule.
  • Rule type/status – provides insight into the rule type (static, correlated, IoC-based, etc.) and the status (experimental, stable, retired, etc.).
  • Severity and confidence – seriousness of the threat triggering this rule and the likelihood of a true positive.
  • Research notes – possible public links, threat reports, used as a basis for creating the rule.
  • Data components used to detect the behavior – list of source and data fields used to detect activity.
  • Triage steps – provides steps to investigate the alert.
  • False positives – provides options where the alert could show false positive behavior.
  • Tags (CVE, Actors, Malware, etc.) – provide more context if the detection is linked to a behavior or artifact, specific to any APT group, or malware.

Make sure this centralized documentation is accessible to all SOC analysts.

  1. Contextual tagging

As covered in the previous best practice, tags provide a great value in understanding the attack chain. That’s why we want to highlight them as a separate best practice.

The tags attached to the above detection rule are the result of the research done on the behavior of the attack when writing the detection rule. They help the analyst gain more context at the time the rule is triggered. In the example above, the analyst may suspect a potential initial access attempt related to QakBot or Black Basta ransomware. This also helps in reporting to security leadership that the SOC team successfully detected the initial ransomware behavior and was able to thwart the attack in the early stages of the kill chain.

  1. Triage steps

A good practice is to include triage (or investigation steps) in detection rule documentation. Since the DE team has spent a lot of time understanding the threat, it is very important to document the precursors and possible next steps the attacker can take. The SOC analyst can quickly review these and provide incident qualification with confidence.

For the rule from the previous section, “Initial Access | Suspicious LNK files dropped in download folder | Windows – Medium”, the triage procedure is shown below.

MITRE has a project called the Technique Inference Engine, which provides a model for understanding other techniques an attacker is likely to use based on observed adversary behavior. This tool can be useful for both DE and SOC teams. By analyzing the attacker’s path, organizations can improve alert correlation and enhance scoping of incident/threats.

  1. Baselining

Understanding the infrastructure and its baseline operations is a must, as it helps reduce the false positive rate. The detection engineering team must learn the prevention policies (to de-prioritize detection if already remediated), learn about the technologies deployed in the infrastructure, understand the network protocols being used and user behavior under normal circumstances.

For example, to detect T1480.002: Execution Guardrails: Mutual Exclusion sub-technique, MITRE recommends monitoring a “file creation” data component. According to the MITRE Data Sources framework, data components are possible actions with data objects and/or data objects statuses or parameters that may be relevant for threat detection. We discussed them in more detail in our detection prioritization article.

MITRE’s detection recommendation for T1480.002 sub-technique

A simple rule for detecting such activity is to monitor lock file creation events in the /var/run folder, which stores temporary runtime data for running services. However, if you have done the baselining and found that the environment uses containers that also create lock files to manage runtime operations, you can filter out container-linked events to avoid triggering false positive alerts. This filter is easy to apply, and overall detection can be improved by baselining the infrastructure you are monitoring.

  1. Finding the narrow corridors

Some indicators, such as file hashes or software tools are easy to change, while others are more difficult to replace. Detections based on such “narrow corridors” tend to have high true positive rates. To pursue this, detection should focus primarily on behavioral indicators, ensuring that attackers cannot easily evade detection by simply changing their tools or tactics. Priority should be given to behavior-based detection over tool-specific, software-dependent, or IoC-driven approaches. This aligns with the Pyramid of Pain model, which emphasizes detecting adversaries based on their tactics, techniques, and procedures (TTPs) rather than easily replaceable indicators. By prioritizing common TTPs, we can effectively identify an adversary’s modus operandi, making detection more resilient and impactful.

  1. Universal rules

When planning a detection program from scratch, it is important not to ignore the universal threat detection rules that are mostly available in SIEM by default. Detection engineers should operationalize them as soon as possible and tune them according to feedback received from SOC analysts or what they have learned about the organization’s infrastructure during baselining activity.

Universal rules generally include malicious behavior associated with applications, databases, authentication anomalies, unusual remote access behavior, and policy violation rules (typically to monitor compliance requirements).

Some examples include:

  • Windows firewall settings modification detected
  • Use of unapproved remote access tools
  • Bulk failed database login attempts


Performance measurement


Every investment needs to be justified with measurable outcomes that demonstrate its value. That is why communicating the value of a detection engineering program requires the use of effective and actionable metrics that demonstrate impact and alignment with business objectives. These metrics can be divided into two categories: program-level metrics and technical-level metrics. Program-level metrics signal to security leadership that the program is well aligned with the company’s security objectives. Technical metrics, on the other hand, focus on how operational work is being carried out to maximize the detection engineering team’s operational efficiency. By measuring both program-level metrics and technical-level metrics, security leaders can clearly show how the detection engineering program supports organizational resilience while ensuring operational excellence.

Designing effective program-level metrics requires revisiting the core purpose for initiating the program. This approach helps identify metrics that clearly communicate success to security leadership. There are three metrics that can be very effective to measure the success at program level.

  1. Time to Detect (TTD) – this metric is calculated as the time elapsed from the moment an attacker’s initial activity is observed until the time it is formally detected by the analyst. Some SOCs consider the time the alert is triggered on the SIEM as the detection time, but that is not really an actionable metric to consider. The time the alert is converted into a potential incident is the best option to consider for detection time by SOC analysts.

Although the initial detection of activity occurs at t1 (alert triggered), when malicious activity occurs, a series of events must be analyzed before qualifying the incident. This is why t3 is required to correctly qualify the detection as a potential threat. Additional metrics such as time to triage (TTT), which establishes how long it takes to qualify the incident, and time to investigate (TTI), which describes how long it takes to investigate the qualified incident, can also come in handy.

Time to detect compared to time to triage and time to investigate metrics
Time to detect compared to time to triage and time to investigate metrics


  1. Signal-to-Noise Ratio (SNR) – this metric indicates the effectiveness of detection rules by measuring the balance between relevant and irrelevant information. It compares the number of true positive detections (correct alerts for real threats) to the number of false positives (incorrect or misleading alerts).

Where:

True positives: instances where a real threat is correctly detected
False positives: incorrect alerts that do not represent real threats

A high SNR indicates that the system is generating more meaningful alerts (signal) compared to noise (false positives), thereby enhancing the efficiency of security operations by reducing alert fatigue and focusing analysts’ attention on genuine threats. Improving SNR is crucial to maximizing the performance and reliability of a detection program. SNR directly impacts the amount of SOC analyst effort spent on false positives, which in turn influences alert fatigue and the risk of professional burnout. Therefore, it is a very important metric to consider.

  1. Threat Profile Alignment (TPA) – this metric evaluates how well detections are aligned with known adversarial tactics, techniques, and procedures (TTPs). This metric measures this by determining how many of the identified TTPs are adequately covered by unique detections (unique data components).

Total TTPs identified – this is the number of known adversarial techniques relevant to the organization’s threat model, typically derived from cyber threat intelligence threat profiling efforts
Total TTPs covered with at least three unique detections (where possible) – this counts how many of the identified TTPs are covered by at least three distinct detection mechanisms. Having multiple detections for a given TTP enhances detection confidence, ensuring that if one detection fails or is bypassed, others can still identify the activity.
Team efforts supporting the detection engineering program must also be measured to demonstrate progress. These efforts are reflected in technical-level metrics, and monitoring these metrics will help justify team scalability and address productivity challenges. Key metrics are outlined below:

  1. Time to Qualify Detection (TTQD) – this metric measures the time required to analyze and validate the relevance of a detection for further processing. The Detection Engineering Lead assesses the importance of the detection and prioritizes it accordingly. The metric equals the time that has elapsed from when a ticket is raised to create a detection to when it is shortlisted for further research and implementation.

  1. Time to Create Detection (TTCD) – this tracks the amount of time required to design, develop and deploy a new detection rule. It highlights the agility of detection engineering processes in responding to evolving threats.

  1. Detection Backlog – the backlog refers to the number of pending detection rules awaiting review or consideration for detection improvement. A growing backlog might indicate resource constraints or inefficiencies.
  1. Distribution of Rules Criticality (High, Medium, Low) – this metric shows the proportion of detection rules categorized by their criticality level. It helps in understanding the balance of focus between high-risk and lower-risk detections.
  1. Detection Coverage (MITRE) – detection coverage based on MITRE ATT&CK indicates how well the detection rules cover various tactics, techniques, and procedures (TTPs) in the MITRE ATT&CK framework. It helps identify coverage gaps in the defense strategy. Tracking the number of unique detections that cover each specific technique is highly recommended, as it provides visibility into the threat profile alignment – a program level metric. If unique detections are not being built to detect gaps and the coverage is not increasing over time, it indicates an issue in the detection qualification process.
  1. Share of Rules Never Triggered – this metric tracks the percentage of detection rules that have never been triggered since their deployment. It may indicate inefficiencies, such as overly specific or poorly implemented rules, and provides insight for rule optimization.

There are other relevant metrics, such as the proportion of behavior-based rules in the total set. Many more metrics can be derived from a general understanding of the detection engineering process and its purpose to support the DE program. However, program managers should focus on selecting metrics that are easy to measure and can be calculated automatically by available tools, minimizing the need for manual effort. Avoid using an excessive number of metrics, as this can lead to a focus on measurement only. Instead, prioritize a few meaningful metrics that provide valuable insight into the program’s progress and efforts. Choose wisely!


securelist.com/streamlining-de…



Eric Andersen – Blue River – Live in Tokyo 2012
freezonemagazine.com/articoli/…
Per l’occasione di questo “momento Andersen” sono andato a rispolverare Today Is the Highway (1965) e, dopo sessant’anni, guardare il viso sorridente di Eric così come compariva sulla cover del suo album di debutto, con il berrettino di lana calato in testa, bavero alzato della pesante giacca in uno stile marinaio – mise che tradisce […]
L'articolo Eric Andersen –


NIS2, inizia la seconda fase attuativa: che c’è da sapere sulle determinazioni ACN


@Informatica (Italy e non Italy 😁)
Con la pubblicazione di tre determinazioni cruciali, l’ACN ha di fatto dato il via alla seconda fase attuativa e operativa della NIS2. Un salto qualitativo nell’approccio alla cyber sicurezza nazionale che introduce un sistema formale di



Gli Usa dichiarano di deportare gli studenti per difendere il “processo di pace” in Medioriente


@Notizie dall'Italia e dal mondo
Nel caso dell'ultimo studente arrestato ieri negli Stati Uniti, il segretario di stato Rubio ha dichiarato che le proteste minacciando l'obiettivo di politica estera degli Stati Uniti di "risolvere il conflitto di



I dazi di Trump abbatteranno i conti delle aziende Usa di macchinari per i chip

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
I dazi di Trump potrebbero avere un impatto economico di 1 miliardo di dollari all'anno sulle aziende americane che producono macchinari per i semiconduttori, come Applied Materials e Lam Research, già



Così si contrabbandano i microchip sotto restrizione


@Informatica (Italy e non Italy 😁)
Un giro di forniture parallele aggira le sanzioni occidentali e porta i semiconduttori in Cina e Russia. Ecco come funziona.
L'articolo Così si contrabbandano i microchip sotto restrizione proviene da Guerre di Rete.

L'articolohttps://www.guerredirete.it/cosi-si-contrabbandano-i-microchip-sotto-restrizione/



Google corre ai ripari: scoperti due bug pericolosissimi sul browser Chrome


Google ha distribuito un aggiornamento di emergenza per il browser Chrome in seguito all’individuazione di due gravi falle di sicurezza. Le vulnerabilità appena corrette avrebbero potuto permettere a cybercriminali di sottrarre informazioni sensibili e compromettere i dispositivi degli utenti, ottenendo accesso non autorizzato ai sistemi.

Le vulnerabilità interessano tutti gli utenti che utilizzano versioni obsolete di Google Chrome su piattaforme desktop. Tra questi rientrano privati, aziende ed enti governativi che utilizzano Chrome per la navigazione web e la gestione dei dati.

si tratta di due bug di sicurezza monitorati con il CVE-2025-3619 e il CVE-2025-3620, che interessano le versioni di Chrome precedenti alla 135.0.7049.95/.96 per Windows e Mac e alla 135.0.7049.95 per Linux. La più grave delle due, CVE-2025-3619, è un heap buffer overflow del nel componente Codecs di Chrome. Questa vulnerabilità può consentire agli aggressori di eseguire codice arbitrario sfruttando il modo in cui Chrome elabora determinati file multimediali, con il rischio di compromettere l’intero sistema e il furto di dati.

🚨 Threat Alert: Google Chrome Vulnerabilities CVE-2025-3619 and CVE-2025-3620

📅 Date: 2025-04-16

📌 Attribution: Elias Hohl (CVE-2025-3619), @retsew0x01 (CVE-2025-3620)

📝 Summary:
Google released Chrome version 135.0.7049.95/.96 to patch two high-impact vulnerabilities:…
— Syed Aquib (@syedaquib77) April 16, 2025

La seconda, CVE-2025-3620, è una falla di tipo “use-after-free” nel componente USB, che potrebbe essere sfruttata anche per eseguire codice dannoso o ottenere un accesso non autorizzato al sistema. Gli esperti di sicurezza avvertono che queste vulnerabilità sono particolarmente pericolose perché possono essere sfruttate da remoto: è sufficiente che l’utente visiti un sito web dannoso o interagisca con contenuti compromessi.

Una volta sfruttati, gli aggressori potrebbero rubare password, informazioni finanziarie e altri dati sensibili memorizzati nel browser o addirittura assumere il controllo del dispositivo interessato. L’aggiornamento verrà distribuito a livello globale nei prossimi giorni e settimane. Gli utenti che memorizzano password, dati di carte di credito o informazioni personali in Chrome sono particolarmente vulnerabili al furto di identità e alle frodi se il browser non viene aggiornato tempestivamente.

L’azienda ha temporaneamente limitato l’accesso alle informazioni dettagliate sui bug per proteggere gli utenti durante il rilascio dell’aggiornamento. Google attribuisce il merito della segnalazione delle vulnerabilità ai ricercatori di sicurezza esterni Elias Hohl e @retsew0x01, sottolineando l’importanza della collaborazione per mantenere la sicurezza del browser.

L'articolo Google corre ai ripari: scoperti due bug pericolosissimi sul browser Chrome proviene da il blog della sicurezza informatica.



Celac, in Honduras il vertice ai tempi di Trump


@Notizie dall'Italia e dal mondo
Si è concluso il IX vertice della Comunità degli Stati americani e caraibici, l'organismo che rappresenta ancora una forte spina nel fianco per l'imperialismo Usa.
L'articolo Celac, in Honduras il vertice ai pagineesteri.it/2025/04/16/ame…



I problemi del reato di “rivolta in carcere” introdotto dal governo


I “relatori speciali” delle Nazioni Unite, esperti indipendenti che si occupano di controllare categorie specifiche di diritti all’interno dei paesi, hanno inviato una nuova comunicazione al governo italiano invitandolo ad abrogare il decreto Sicurezza (lo avevano già fatto a dicembre, quando ancora molte norme di questo decreto dovevano essere approvate all’interno di un disegno di legge). Tra le norme problematiche del “decreto Sicurezza” segnalate dall’ONU c’è proprio il reato di rivolta in carcere e nei CPR, definito «restrizione inutile e sproporzionata del diritto di protesta pacifica e di espressione» delle persone detenute.


ilpost.it/2025/04/16/reato-riv…



Binner Makes Workshop Parts Organization Easy


We’ve all had times where we knew we had some part but we had to go searching for it all over as it wasn’t where we thought we put it. Organizing the numerous components, parts, and supplies that go into your projects can be a daunting task, especially if you use the same type of part at different times for different projects. It helps to have a framework to keep track of all the small details. Binner is an open source project that aims to allow you to easily maintain a database that can be customized to your use.

dashboard of binner UIIn a recent video for DigiKey, [Byte Sized Engineer] used Binner to track the locations of his components and parts in his freshly organized workshop. Binner already has the ability to read the labels used by well-known electronics suppliers via a barcode scanner, and uses that information to populate your inventory. It even grabs quantities and links in a datasheet for your newly added part. The barcode scanner can also be used to retrieve the contents of a location, so with a single scan Binner can bring up everything residing at that location.

Binner can be run locally so there isn’t the concern of putting in all the effort to build up your database just to have an internet outage make it inaccessible. Another cool feature is that it allows you to print labels, you can customize the fields to display the values you care about.

The project already has future plans to tie into a “smart bin” system to light up the location of your component — a clever feature we’ve seen implemented in previous setups.

youtube.com/embed/ymEuw_RdUzQ?…


hackaday.com/2025/04/16/binner…



Canzoni per fantasmi
freezonemagazine.com/articoli/…
Alive in the superunknown First it steals your mind And then it steals your soul (Soundgarden, «Superunknown», 1994) Quando ero una ragazzina, non c’erano ancora i video musicali, però avevamo i 33 giri. Compravo un album (spesso di nascosto, perché i miei genitori trovavano discutibile il mio vizio di sputtanare i pochi soldi che […]
L'articolo Canzoni per fantasmi proviene da FREE ZONE MAGAZIN
Alive in the





in reply to alessandro tenaglia

Due osservazioni:

1) hai scritto Nicola Zingaretti, ma probabilmente intendevi Luca Zingaretti
2) non pubblicare solo i link, ma riporta il titolo del post e un breve riassunto.

A questo proposito, hai provato a utilizzare gli strumenti di Friendica per ripubblicare i post del tuo blog sul tuo account Friendica?
Puoi dare un'occhiata al link seguente: informapirata.it/2024/07/25/w-…



Integrare una pubblicazione di notizie nel Fediverse: l'analisi approfondita delle prove, delle tribolazioni e delle verifiche effettuate da Sean Tilly per colmare il divario tra la pubblicazione online e il social networking federato

Una interessante spaccato storico sulle modalità di pubblicazione adottate, partendo da Hubzilla e Pterotype a #Ghost e #Wordpress con i suoi fantastici Plugin

ho sperimentato l'integrazione del mio progetto di pubblicazione di notizie con il Fediverse per quasi cinque anni. Ci sono stati diversi esperimenti, errori e momenti di insegnamento che mi hanno portato dove sono oggi. Voglio parlare di alcune delle cose che ho provato e del perché queste cose sono state importanti per me.

Il post di @Sean Tilley può essere letto qui: deadsuperhero.com/integrating-…@Che succede nel Fediverso?


I wrote up an article on my personal (Ghost-powered!) blog about some of the work I’ve been doing to integrate our news publication at We Distribute into the #Fediverse.

This is the culmination of years and years of experiments, and we’re almost to a point where most of our ideas have been realized.

deadsuperhero.com/integrating-…


in reply to Poliverso - notizie dal Fediverso ⁂

By the way, we take this opportunity to let @Sean Tilley and @Alex Kirk know that we tried the "Enable Mastodon Apps" plugin with #RaccoonforFriendica, which is an app developed for Friendica by @Dieguito 🦝 but is also compatible with Mastodon, but also allows you to write in simplified HTML with a very functional toolbar.

Well, it was wonderful to write formatted texts and with links from Raccoon for Friendica, even if I haven't managed to get the mentions to work yet.

Unfortunately, even if Raccoon allows you to publish posts with inline images, it can only do so with Friendica, while with the simple Mastodon API this is not possible.

But the experience was very good

@Che succede nel Fediverso?



A 2025 roadmap for PeerTube, some more info on how FediForum is moving forward and more.


Fediverse Report – #112

This week is a bit of a shorter Report, it’s a relatively quieter news week and some other work is taking up most of my attention this week. Still, there is a PeerTube roadmap for 2025, some more updates on how FediForum is moving forward and more.

The News


Framasoft has published their PeerTube roadmap for 2025. Last year, PeerTube’s big focus was on the consumer, with the launch of the PeerTube apps. This year, PeerTube’s improvement is on instance administrators. The organisation will work on building a set-wizard, making it easier for new instance admins to get started and configure the platform. Framasoft will also work on further customisation for instances, allowing admins to further tune how the instance looks for the end-users. There is also a lot of work being done on video channels, with the new features being the ability to transfer ownership of a channel, as well as having channels that are owned by multiple accounts. Framasoft also mentions they are working on shared lists of blocked accounts and instances, where admins can share information with other admins on which instances to block. And now that PeerTube is available on Android and iOS, other new platforms that PeerTube will come to is tablets and Android TVs.

The planned FediForum for early April was cancelled at the last minute. A group of attendees held the Townhall event that was held in its place to discuss how to move forward, and listen to people’s perspectives. The notes of the FediForum Townhall have now been published. Last week, the FediForum account posted: “Planned next steps: another townhall likely next week, and a rescheduled & adapted FediForum in May.” The organisers posted a survey for attendees on how to move forward as well. Jon Pincus has an extensive article, “On FediForum (and not just FediForum)” that places the entire situation of why FediForum was cancelled, in its larger context.

PieFed now allows people to limit who can DM them. By default only people on the same instance can receive DMs from each other. The Piefed/Lemmy/Mbin network has seen a rise on spam DMs which send gore images, and this is a helpful way of dealing with this harassment.

IFTAS wrote about how they are continuing their mission. The organisation recently had to wind down most of their high-profile projects due to a lack of funding. This is not the end of the entire organisation however, as IFTAS will continue with their Moderator Needs Assessment, the CARIAD domain observatory, which provides insight in the most commonly blocked domains and more, as well as the IFTAS Connect community for fediverse moderators.

A master’s thesis on the fediverse, which looks at the user activity and governance structures, with the main finding: “The findings reveal that instance size and active engagement—such as frequent posting and interacting with others—are the strongest predictors of user activity, while technical infrastructure plays a more supportive role rather than a determining one. Governance structures, such as moderation practices and community guidelines, show a weaker but positive correlation with user activity.”

Sean Tilley from WeDistribute writes how his work on ‘Integrating a News Publication Into the Fediverse’. Tilley has over a decade of experimentation on building journalistic outlets on fediverse platforms, and in this article he reflects on all the different case studies he has done over the years, and where WeDistribute is headed next.

Building a blog website on Lemmy. This personal website uses Lemmy as a backend for a personal blogging site, where the site is effectively a Lemmy client that looks like a blogging site.

The Links


That’s all for this week, thanks for reading! You can subscribe to my newsletter to get all my weekly updates via email, which gets you some interesting extra analysis as a bonus, that is not posted here on the website. You can subscribe below:

#fediverse

fediversereport.com/fediverse-…




La rivelazione di un whistleblower spiega come DOGE potrebbe aver sottratto dati sensibili sui lavoratori

I membri dello staff tecnico erano allarmati da ciò che gli ingegneri del DOGE facevano quando veniva loro concesso l'accesso, in particolare quando notavano un picco nei dati in uscita dall'agenzia. È possibile che i dati includessero informazioni sensibili su sindacati, cause legali in corso e segreti aziendali – dati che quattro esperti di diritto del lavoro hanno dichiarato a NPR che non dovrebbero quasi mai uscire dall'NLRB e che non hanno nulla a che fare con l'aumento dell'efficienza del governo o con la riduzione della spesa.

npr.org/2025/04/15/nx-s1-53558…

@Lavoratori Tech

reshared this



Hackers claim to have obtained 4chan's code, emails of moderators, and internal communications.

Hackers claim to have obtained 4chanx27;s code, emails of moderators, and internal communications.#News

#News #x27


#Sumy, la nebbia della propaganda


altrenotizie.org/primo-piano/1…


Decreto bollette, Bonelli: “Se convertissimo in energia le balle di Salvini avremmo già risolto” | VIDEO


@Politica interna, europea e internazionale
Dopo numerosi rinvii, è approdato alla Camera il decreto bollette, il provvedimento del governo che prevede una dotazione di circa 3 miliardi di euro, oltre la metà dei quali destinati a finanziare il bonus per le famiglie. Il decreto è stato criticato dai



Customs and Border Protection released more documents last week that show which AI-powered tools that agency has been using to identify people of interest.#News
#News


Sono lieto di annunciare che Lunedì 21 Aprile nella cornice più ampia delle celebrazioni per il 2078° compleanno della #CittàEterna avrò l'onore presso il #Campidoglio di inaugurare artisticamente una intera giornata di spettacoli dedicati a #Roma e ai suoi grandi artisti, partendo dalla mia interpretazione cantata dei sonetti romaneschi di #GiuseppeGioachinoBelli, per passare poi a #Petrolini (omaggiato da Enoch Marella), #GabriellaFerri (con lo spettacolo a cura della mia amata #GiuliaAnanìa), e molte altre cose ancora, con momento culminante il concerto de #IlMuroDelCanto. Presentazione di questa bella iniziativa e programma completo qui:

culture.roma.it/la-festa-di-ro…

Una Pasquetta in pieno centro e con un alto tasso della meglio Romanità, non mancate a stronzi 🙌😅

#LaFestaDiRoma







Make the Navy Great Again. Trump firma l’ordine esecutivo per rilanciare la cantieristica Usa

@Notizie dall'Italia e dal mondo

Rilanciare la produzione dei vascelli della US Navy, sostenere l’impiego di manodopera locale e riportare gli Stati Uniti sul podio delle potenze cantieristiche mondiali. Questo, in poche parole, è il piano di Donald Trump per quanto



Inside the Economy of AI Spammers Getting Rich By Exploiting Disasters and Misery#AI #AISlop


VITTORIO ARRIGONI. Egidia Beretta: “La tua presenza è più viva e vicina che mai”


@Notizie dall'Italia e dal mondo
La lettera di Egidia Beretta al figlio per il 14esimo anniversario della sua uccisione
L'articolo VITTORIO ARRIGONI. Egidiahttps://pagineesteri.it/2025/04/15/mediterraneo/vittorio-arrigoni-egidia-beretta-la-tua-presenza-e-piu-viva-e-vicina-che-mai/



l'europa non è assente. quella vera. quella che non apprezza la classica politica russa dei colpi di stato e dei governi fantoccio. putin: dimettiti: sei vecchio, brutto e cattivo. e porti solo il male.


Meta torna ad addestrare l’IA sui post di Facebook e Instagram nonostante le proteste legali

L'articolo proviene da #Euractiv Italia ed è stato ricondiviso sulla comunità Lemmy @Intelligenza Artificiale
Il colosso tecnologico Meta ha intenzione di ricominciare ad addestrare la sua intelligenza artificiale sui post dei cittadini dell’UE, ha

in reply to Informa Pirata

mi riferivo a questo cybernews.com/news/europe-redu… ma se non levano i dazi pare UE voglia procedere con multe elevate laterrazzamongardino.it/tutte-… insomma una mano lava l’altra e tutte e due ci prendono per il culo…

Informa Pirata reshared this.



Strategia industriale e bilancio. Sulla difesa è corsa al 2%

@Notizie dall'Italia e dal mondo

L’Italia si prepara a raggiungere l’obiettivo del 2% del Pil in spesa per la difesa, in linea con gli impegni assunti in sede Nato. “È una decisione politica che abbiamo preso”, ha detto il vicepresidente del Consiglio e ministro degli Esteri Antonio Tajani domenica, anticipando una prossima comunicazione ufficiale da parte della



UGANDA. Centinaia di cliniche chiuse e niente più farmaci per HIV


@Notizie dall'Italia e dal mondo
Intervista al direttore dell'ospedale di Emergency in Uganda, Giacomo Iacomino, dopo il taglio dei fondi all'agenzia di aiuti umanitari globali. 1.500.000 persone HIV positive senza più medici né farmaci
L'articolo UGANDA. Centinaia di cliniche chiuse e niente più farmaci per HIV



🇮🇹 Oggi è la #GiornatanazionaledelMadeinItaly! Viene celebrata nel giorno dell’anniversario della nascita di Leonardo da Vinci, avvenuta il 15 aprile 1452, ed è dedicata alla promozione della creatività e dell’eccellenza italiana

“Oggi celebriamo un…



Julia Deck – Proprietà privata
freezonemagazine.com/news/juli…
In libreria dal 9 maggio 2025 Il trasferimento in un moderno ecoquartiere, i nuovi vicini, un gatto. Il romanzo del vicinato: bassezze e voyeurismo, tutto un programma. Un romanzo che tocca tutti con la sua ironia e cinismo e che attraverso uno stile limpido e spiazzante ci restituisce la fotografia di una società frammentata. E […]
L'articolo Julia Deck – Proprietà privata proviene da FREE ZONE M


La NATO acquista dalla statunitense Palantir un sistema di combattimento basato sull’Intelligenza artificiale

L'articolo proviene da #Euractiv Italia ed è stato ricondiviso sulla comunità Lemmy @Intelligenza Artificiale
La NATO ha ufficialmente annunciato di aver finalizzato l’accordo con la società Palantir Technologies per

Intelligenza Artificiale reshared this.





Italian readiness, in cosa consiste l’idea di una forza di reazione rapida nazionale

@Notizie dall'Italia e dal mondo

Nel quadro della discussione annuale sulle missioni internazionali, la Camera dei deputati ha avviato l’esame della relazione congiunta delle Commissioni Esteri e Difesa sulla partecipazione dell’Italia alle operazioni militari all’estero per il 2025.



Il mio personalissimo parere sulla firme apposte dal fotografo nelle fotografie.

1) Da un punto di vista del copyright vale come la sabbia nel deserto.

2) Se metti la firma perché credi che l'immagine abbia un altissimo valore, probabilmente l'immagine non ha un valore e/o non ha senso mettere una firma per scoraggiare un'eventuale uso non autorizzato.

3) Se sei davvero richiesto e/o famoso non hai bisogno di condividere le foto fuori dal tuo controllo, oppure non c'è bisogno della firma perché si sappia che è tua (o non ti importa più, perché l'immagine vive di vita propria, diffusa da siti specializzati, libri, mostre, ecc).

La penso più o meno allo stesso modo per il watermark: a meno che non sia apposto da un sito su cui la tua foto è in vendita, non ha molto senso secondo me, specie in tempi di IA.

Cosa ne pensate? C'è qualcosa che mi sfugge e mi sono fatto un'idea sbagliata?

Se la usate, perché mettete la vostra firma sulle foto che sviluppate?

#fotografia #fotografi #foto #copyright

Unknown parent

@Andre123 ma anche in quel caso non basta il nome? Perché la firma?