Ohh.....
So this is why the FCC banned foreign made routers... it's RFK jr's fault! /sarcasm
reshared this
Ohh.....
So this is why the FCC banned foreign made routers... it's RFK jr's fault! /sarcasm
reshared this
The Dutch Ministry of Finance took treasury banking portal offline after a cyberattack; core tax systems were not affected.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
So, while I was looking to refine my Google search results and remove AI garbage news sites, I found that you can now tell Google to rank preferred sources above other results
reshared this
Magento online stores are being targeted using a recently patched vulnerability known as PolyShell.
According to Sansec, attacks have entered the mass-exploitation phase, with hundreds of stores being hacked every hour.
sansec.io/research/polyshell-m…
Sansec detected 471 stores compromised in a single hour as attackers exploit the PolyShell vulnerability at scale. The attack injects obfuscated JavaScript f...Sansec Forensics Team (Sansec)
reshared this
The Eufymake E1 is a recently-released prosumer UV printer that can print high-resolution color images onto pretty much anything. It also uses proprietary ink cartridges (which integrate a magnetic stirrer, nice) which are far more expensive than UV ink in bulk. So [charliex] set out to figure out how to refill the ink cartridges, including the cleaning cartridge.If one doesn’t mind a bit of fiddling, cartridges can be refilled without having to add any new holes.
UV printing in general is a bit of a maintenance hog, which has helped keep it from hobbyist use. UV ink doesn’t really like sitting idle in a machine, but the E1 automates cleaning and flushing of the print head as well as having swappable cartridges for each ink. This makes it a lot more user-friendly than UV printing has historically been.
The cartridge hardware can have a longer serviceable life than the ink inside, so it makes sense to try to refill them. There are more reasons to do this than just limiting costs. What if one wishes to print and the parent company is sold out of cartridges? What if they shut down? Refilling cartridges, and emptying waste from the cleaning cartridge, would become imperatives — lest an expensive prosumer UV printer turn into a paperweight. Thankfully software DRM control of the cartridges seems limited, at least so far.
Refilling cartridges can be carefully done with syringes combined with manual bypass of spring-loaded valve mechanisms. Emptying the cleaning cartridge can similarly be done by syringe, and it even has a hidden refill port under some plastic at its top.
[charliex] approaches all of this from a reverse-engineering perspective, indeed, he has a whole separate blog post about the software for the printer. So his solution is much more informed and elegant than, for example, just melting a new refill hole in the side of the things. It’s an interesting read, so check it out.
Our own Tom Nardi took a close, hands-on look at the E1 printer last year and came away pretty impressed with its capabilities. The cartridges are a big part of the user-friendliness of the system, but we hope there remains a viable option for manual refill for those of us who want to control costs or don’t wish to be locked in, and don’t mind violating a warranty or two in the process.
@Informatica (Italy e non Italy)
Google ha aggiornato il Q-Day, il momento in cui i computer quantistici potrebbero spezzare la crittografia attuale. Migrare verso la crittografia post-quantistica è sempre meno un’opzione
L'articolo Per Google il Q-Day arriverà nel 2029 proviene da Cyber Security 360.
reshared this
My favorite thing to do over the past months has been to watch Battlefield players and content creators slowly realize that EA, a company known for its predatory p2w games, has turned BF6 into a pay-to-win game
I love watching people slowly falling into despair
youtube.com/watch?v=tizFmlUvkm…
Profitez des vidéos et de la musique que vous aimez, mettez en ligne des contenus originaux, et partagez-les avec vos amis, vos proches et le monde entier.Westie (YouTube)
reshared this
A group of North Korean hackers engaged in Contagious Interview campaigns left one of their web consoles exposed on the internet
opensourcemalware.com/blog/con…
A single NPM package that led us to the Lazarus Groups latest campaign targeting software engineers using fake recruiters on LinkedIn, Fiverr and UpWork.opensourcemalware.com
reshared this
The U.S. CISA adds a vulnerability in Citrix NetScaler to its Known Exploited Vulnerabilities catalog......Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
@Informatica (Italy e non Italy)
Il riepilogo delle ultime settimane di quanto uscito su Guerre di Rete.
#GuerreDiRete è la newsletter curata da @Carola Frediani
guerredirete.substack.com/p/gu…
reshared this
@Informatica (Italy e non Italy)
Il provvedimento del Garante privacy non è solo una sanzione record per il settore bancario italiano: 31, 8 milioni di euro. È una lezione sistemica su insider threat, accountability e gestione delle violazioni. Ecco cosa devono imparare
reshared this
One of the most popular JavaScript packages on earth Axios has been compromised
opensourcemalware.com/blog/axi…
The Axios NPM package has been compromised and the maintainer of the project has been locked out of their account. This will go down in history as one of the most successful software supply chain attacks everopensourcemalware.com
reshared this
Il ritrovamento del Masripithecus, il “tassello mancante” che riscrive le origini delle grandi scimmie e degli esseri umani
La nuova specie risale a 18 milioni di anni fa, e suggerisce che il Nord Africa e il Medio Oriente potrebbero essere stati la culla evolutiva degli antenati degli odierni ominidi
reshared this
AHAHAH mi sa che ti sei confuso con l'immagine: quello è il gasparropithecus riconoscibile per il movimento oculare indipendente 🤣
reshared this
👉Il progetto #FUSS: software libero nella scuola👈
Oggi martedì 31, dalle 18.00 alle 19.00, ilwebinar di @programmailfuturo con @opavlos e Andrea Bonani
programmailfuturo.it/link-webi…
Learn using BigBlueButton, the trusted open-source web conferencing solution that enables seamless virtual collaboration and online learning experiences.www.programmailfuturo.it
Rozaŭtuno likes this.
reshared this
Un agente AI di Alibaba utilizzato per mining di criptovalute senza autorizzazione: cosa c’è dietro questo comportamento imprevisto…
📌 Link all'articolo : redhotcyber.com/post/ai-di-ali…
A cura di Carolina Vivianti
#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity
Un agente AI di Alibaba ha tentato di usare infrastruttura di calcolo per minare criptovalute senza autorizzazione, sollevando preoccupazioni sulla sicurezza dell'intelligenza artificiale.Carolina Vivianti (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Se sei di sinistra vota Meloni, non Schlein, Cinquestelle, i giudici, Hamas e il coiffeur di Bonelli
Alcuni post pubblicati da "liberali di sinistra" spiegano che i valori di SX sono incarnati dalla maggioranza di Nordio e Valditara, di Donzelli e La Russa, il governo amico di Trump, Netanyahu, Orbán.
Fattor comune? I post sono scritti da personaggetti di serie B, attivati per l'occasione. In pratica c'è un colonnello Dalchimsky che sta risvegliando il fondo del barile 🤣
reshared this
reshared this
As literally everything ought to be able to play DOOM in some fashion, [Adam Rice] recently set out to make the venerable DNS finally play the game after far too many decades of being DOOM-less. You may be wondering how video games and a boring domain records database relate to each other. This is where DNS TXT records come into play, which are essentially fields for arbitrary data with no requirements or limitations on this payload, other than a 2,000 character limit.
Add to this the concept of DNS zones which can contain thousands of records and the inkling of a plan begins to form. Essentially the entire game (in C#) is fetched from TXT records, loaded into memory and run from there. This is in some ways a benign form of how DNS TXT records can be abused by people with less harmless intentions, though [Adam] admits to using the Claude chatbot to help with the code, so YMMV.
The engine and WAD file with the game’s resources are compressed to fit into 1.7 MB along with a 1.2 MB DLL bundle, requiring 1,966 TXT records in Base64 encoding on a Cloudflare Pro DNS zone. With a free Cloudflare account you’d need to split it across multiple zones. With the TXT records synced across the globe, every DNS server in the world now has a copy of DOOM on it, for better or worse.
You can find the project source on GitHub if you want to give this a shake yourself.
Thanks to [MrRTFM] for the tip.
@Informatica (Italy e non Italy)
La giornata internazionale dedicata al backup dei dati è un'occasione per effettuare la verifica delle proprie strategie di protezione dati in uno scenario di assedio cyber. Ecco i consigli pratici per le aziende che
reshared this
Qilin ransomware claims a breach of Dow Inc., listing it on its Tor leak site, but no proof of the hack has been released yet.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Una falla critica nei sistemi Citrix NetScaler ADC e Gateway potrebbe mettere a rischio la sicurezza delle reti aziendali…
📌 Link all'articolo : redhotcyber.com/post/citrix-ne…
A cura di Redazione RHC
#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #news
Scopri la vulnerabilità CVE-2026-3055 in Citrix NetScaler ADC e Gateway e come proteggere le tue reti aziendaliRedazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
I dati vengono già raccolti per essere decifrati con computer quantistici: cosa succederà quando questi super computer saranno realtà?
📌 Link all'articolo : redhotcyber.com/post/harvest-n…
A cura di Massimo Dionisi
#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy
Scopri la minaccia HNDL (Harvest Now, Decrypt Later): dati cifrati oggi possono essere violati domani dai computer quantistici.Massimo Dionisi (Red Hot Cyber)
reshared this
🚀 RHC Conference 2026: Workshop "Skill On" del pomeriggio di Lunedì 18 Maggio
Di seguito le informazioni sull'evento:
📍Quando: Lunedì 18 Maggio 2026 (Mattina workshop "hands-on" e pomeriggio workshop "skill-on")
📍Dove: Teatro Italia, Via Bari 18, Roma (Metro Piazza Bologna)
📍Programma: redhotcyber.com/linksSk2L/prog…
📍Iscriviti ai Workshop di lunedì 18 maggio : rhc-conference-2026-workshop.e…
#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity
Registrazione per i Workshop di Lunedì 18 Maggio 2026 presso il Teatro Italia di Roma, in Via Bari 18.Eventbrite
Cybersecurity & cyberwarfare reshared this.
Scopri il modello linguistico che sta facendo discutere: privo di restrizioni etiche e con prestazioni sorprendenti, cosa può fare davvero…
📌 Link all'articolo : redhotcyber.com/post/qwen-e-li…
A cura di Carolina Vivianti
#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news
È stata rilasciata una nuova versione del modello Qwen3.5-9B, priva di restrizioni etiche e errori, mantenendo le funzionalità del modello base.Carolina Vivianti (Red Hot Cyber)
reshared this
When you think of iconic parings, your brain probably goes more to “cookies and milk” than “DEC and Ikea” but after watching [Dave]’s latest on Usagi Electric where he puts a PDP-11 into an Ikea desk, you may rethink that.
The PDP-11 is vintage hardware that actually lived inside of a different desk, once upon a time, serving as the control unit for an FTIR spectrometer. While the lab equipment has thankfully survived the decades, the desk did not and when [Dave] got the unit it was as a pile of parts. He revived it, of course– it’s kind of what he does– but it didn’t get a new desk for years, until his latest shop re-organization.
The one concession to modernity– and missing parts– is using switching power supplies rather than the bulky linear PSU that would have originally powered the unit. It’s a good thing, too, or we have trouble picturing how everything would fit! This particular PDP-11 comes with the high performance vector processing unit in order to crunch those spectrographs, and apparently those chips idle at about 60C, so the desk-case got some decent-sized 120V fans to keep everything cool and running for years to come.
This isn’t the most aesthetic or fanciest case-mod we’ve seen, mostly being made of surplus plywood and scrap metal fittings, but it certainly gets the job done. Given that the PDP-11 has been crammed into every form-factor known to man, from a system-on-a-chip (before anybody really talked about SOCs) to desktop workstations, and of course the hulking cabinets with their iconic blinkenlights-– it’s hard to say that this installation isn’t reasonably authentic, even if it isn’t the original desk.
youtube.com/embed/mG3XGbbvWH8?…
L’intelligenza artificiale rivoluziona lo sviluppo software, ma a quale costo? Velocità e sicurezza sono davvero compatibili…
📌 Link all'articolo : redhotcyber.com/post/allarme-n…
A cura di Silvia Felici
#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity
Il National Cyber Security Centre del Regno Unito avverte sull'uso del "vibe coding" che potrebbe cambiare radicalmente il mercato del software cloud.Silvia Felici (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Have you ever wanted to see the computers behind the first (and for now only) man-made objects to leave the heliosphere? [Gary Friedman] shows us, with an archived tour of JPL building 230 in the ’80s.
A NASA employee picks up a camcorder and decides to record a tour of the place “before they replace it all with mainframes”. They show us computers that would seem prehistoric compared to anything modern; early Univac and IBM machines whose power is outmatched today by even an ESP32, yet made the Voyager program possible all the way back in 1977. There are countless peripherals to see, from punch card writers to Univac debug panels where you can see the registers, and from impressive cabinets full of computing hardware to the zip-tied hacks “attaching” a small box they call the “NIU”, dangling off the inner wall of the cabinet. And don’t forget the tape drives that are as tall as a refrigerator!
We could go on ad nauseum, nerding out about the computing history, but why don’t you see it for yourself in the video after the break?
youtube.com/embed/T_bqc76_3xU?…
Thanks to [Michael] for the tip!
Sekoia looks at a new Phishing-as-a-Service platform named EvilTokens that has been spotted running campaigns since February.
The platform is one of the few that can run device-code phishing operations against Microsoft accounts, so expect this to become very popular in the coming months.
blog.sekoia.io/new-widespread-…
Uncover the new sophisticated EvilTokens device code phishing as-a-service, with AI-augmented features facilitating BEC fraudQuentin Bourgue and Sekoia TDR (Sekoia.io Blog)
reshared this
The ISO C++ committee has completed work on the C++26 specification of the C++ programming language.
This will be the biggest overhaul to C++ since the 2011 specification.
herbsutter.com/2026/03/29/c26-…
News flash: C++26 is done! 🎉 On Saturday, the ISO C++ committee completed technical work on C++26 in (partly) sunny London Croydon, UK. We resolved the remaining international comments on the C++26…Herb Sutter (Sutter’s Mill)
reshared this
Lorenzo Meacci introduces InsomniacUnwinding, a new technique to hide and sleep malicious code, even from EDR solutions that continuously scan the memory for malicious code
lorenzomeacci.com/unwind-data-…
Hi all, in this blog we will discuss sleep masking in detail, the default assumptions that come with it, and how we are going to break those assumptions with a novel approach called InsomniacUnwinding.Lorenzo Meacci
reshared this
reshared this
CNET is being brought back after the AI articles fiasco
linkedin.com/posts/david-katzm…
I am proud to announce that CNET News is back. We’ve remained a trusted voice in tech news throughout our nearly 35 year history -- yes, we own news.com -- and today marks the reformation of our official news team led by Jon Reed.David Katzmaier (LinkedIn)
reshared this
@cnet
Can't imagine why I'd *ever* trust you for anything resembling journalism again...
Ya done fucked up.
Trust is hard won and easily thrown away.
🤷♂️🤦♂️🤡🫏🖕🖕💩💩
Despite losing the US and EU market, Kaspersky reported a record revenue of $836 million last year
kaspersky.ru/about/press-relea…
Продажи решений компании в мире выросли на 4%, а в России и странах СНГ — на 23%/
reshared this
We haven’t seen an instrument panel quite like [bluesyann]’s, which was made by curing UV resin directly onto plywood with the help of a 3D printer and a bit of software work. The result is faintly-raised linework that also makes hand drilling holes both cleaner and more accurate.
The process begins by designing the 2D layout in Inkscape, which has the advantage of letting one work in 1:1 dimensions. A 10 mm diameter circle will print as 10 mm; a nice advantage when designing for physical components. After making the layout one uses OpenSCAD to import the .svg and turn it into a 3D model that’s 0.5 mm tall. That 3D model gets loaded into the resin printer, and the goal is to put it directly onto a sheet of plywood.A little donut shape makes a drill centering feature, and the surrounding ring keeps the edges of the hole clean.
To do that, [bluesyann] sticks the plywood directly onto the 3D printer’s build platform with double-sided tape. With the plywood taking the place of the usual build surface, the printer can cure resin directly onto its surface. Cleanup still involves washing uncured resin off the board, but it’s nothing a soak in isopropyl alcohol and an old toothbrush can’t take care of.
[bluesyann] has a few tips for getting the best results, and one of our favorites is a way to make drilling holes easier and cleaner. Marking the center of a drill hit with a small donut-shaped feature makes a fantastic centering guide, making hand drilling much more accurate. And adding a thick ring around the drill hole ensures clean edges with no stray wood fibers, so no post-drilling cleanup required. Don’t want the ring to stick around after drilling? Just peel it off. There’s a load of other tips too, so be sure to check it out.
A nice front panel really does make a project better, and we’ve seen many different approaches over the years. One can stick laminated artwork onto an enclosure, or one can perform toner transfer onto 3D printed surfaces by putting the design on top of the 3D printer’s build surface, and letting the heat of molten plastic do the work of transferring the toner. And if one should like the idea of a plywood front panel but balk at resin printing onto it, old-fashioned toner transfer works great on wood.
In our modern society, we have started to take the humble camera for granted. Perhaps because of this, trendy standalone cameras have started to take off. Unfortunately, most of the time these cameras are expensive and not any better than those in our everyday smartphones. If only there were some open-source solution where you could build and customize your own standalone device? [Yutani] has done just that with the SATURNIX.
Simple microcontrollers and cameras meant for Raspberry Pis are a dime a dozen these days. Because of this, it’s no surprise to hear that the SATURNIX is based on recognizable hardware, a Raspberry Pi Zero 2W and an Arducam 16MP sensor. The Pi Zero powers both the sensors’ capture abilities and the interactive LCD display.
Some sample filtered shots from the SATURNIX
With a simple visual design, the device could certainly fit into the same market we see so many other standalone cameras. Pictures from the camera look great without or with the included filter options if you want a more retro look. While currently there do appear to be some speed improvements needed, the best part of open source is that you yourself can help out!
We always love ambitious open source projects that look to build a true base for others to work on, and this seems like no exception! If you want similarly impressive feats of optical trickery, look no further than using scotch tape as a camera lens!
@Informatica (Italy e non Italy)
Un data breach protratto per più di due anni, migliaia di accessi indebiti e sistemi di controllo ritenuti inadeguati. Con queste motivazioni il Garante per la protezione dei dati personali ha sanzionato Intesa Sanpaolo con una multa da 31,8 milioni di euro,
like this
reshared this
I post possono essere di diversi tipi:
1) post pubblicati manualmente
2) post pubblicati da feed di alcune testate selezionate
3) ricondivisioni manuali di altri account
4) ricondivisioni automatiche di altri account gestiti da esperti di cybersecurity
NB: purtroppo i post pubblicati da feed di alcune testate includono i cosiddetti "redazionali"; i redazionali sono di fatto delle pubblicità che gli inserzionisti pubblicano per elogiare i propri servizi: di solito li eliminiamo manualmente, ma a volte può capitare che non ce ne accorgiamo (e no: non siamo sempre on line!) e quindi possono rimanere on line alcuni giorni. Fermo restando che le testate che ricondividiamo sono gratuite e che i redazionali sono uno dei metodi più etici per sostenersi economicamente, deve essere chiaro che questo account non riceve alcun contributo da queste pubblicazioni.
like this
reshared this
Kimota94
in reply to Catalin Cimpanu • • •