Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Ohh.....

So this is why the FCC banned foreign made routers... it's RFK jr's fault! /sarcasm

Questa voce è stata modificata (6 minuti fa)

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Dutch Ministry of Finance takes treasury systems offline amid cyber incident investigation
securityaffairs.com/190204/hac…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

So, while I was looking to refine my Google search results and remove AI garbage news sites, I found that you can now tell Google to rank preferred sources above other results

google.com/preferences/source?…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Magento online stores are being targeted using a recently patched vulnerability known as PolyShell.

According to Sansec, attacks have entered the mass-exploitation phase, with hundreds of stores being hacked every hour.

sansec.io/research/polyshell-m…

reshared this

Refill UV Printer Ink Cartridges Like It’s The Late 90s


The media in this post is not displayed to visitors. To view it, please log in.

The Eufymake E1 is a recently-released prosumer UV printer that can print high-resolution color images onto pretty much anything. It also uses proprietary ink cartridges (which integrate a magnetic stirrer, nice) which are far more expensive than UV ink in bulk. So [charliex] set out to figure out how to refill the ink cartridges, including the cleaning cartridge.
If one doesn’t mind a bit of fiddling, cartridges can be refilled without having to add any new holes.
UV printing in general is a bit of a maintenance hog, which has helped keep it from hobbyist use. UV ink doesn’t really like sitting idle in a machine, but the E1 automates cleaning and flushing of the print head as well as having swappable cartridges for each ink. This makes it a lot more user-friendly than UV printing has historically been.

The cartridge hardware can have a longer serviceable life than the ink inside, so it makes sense to try to refill them. There are more reasons to do this than just limiting costs. What if one wishes to print and the parent company is sold out of cartridges? What if they shut down? Refilling cartridges, and emptying waste from the cleaning cartridge, would become imperatives — lest an expensive prosumer UV printer turn into a paperweight. Thankfully software DRM control of the cartridges seems limited, at least so far.

Refilling cartridges can be carefully done with syringes combined with manual bypass of spring-loaded valve mechanisms. Emptying the cleaning cartridge can similarly be done by syringe, and it even has a hidden refill port under some plastic at its top.

[charliex] approaches all of this from a reverse-engineering perspective, indeed, he has a whole separate blog post about the software for the printer. So his solution is much more informed and elegant than, for example, just melting a new refill hole in the side of the things. It’s an interesting read, so check it out.

Our own Tom Nardi took a close, hands-on look at the E1 printer last year and came away pretty impressed with its capabilities. The cartridges are a big part of the user-friendliness of the system, but we hope there remains a viable option for manual refill for those of us who want to control costs or don’t wish to be locked in, and don’t mind violating a warranty or two in the process.


hackaday.com/2026/03/31/refill…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Per Google il Q-Day arriverà nel 2029


@Informatica (Italy e non Italy)
Google ha aggiornato il Q-Day, il momento in cui i computer quantistici potrebbero spezzare la crittografia attuale. Migrare verso la crittografia post-quantistica è sempre meno un’opzione
L'articolo Per Google il Q-Day arriverà nel 2029 proviene da Cyber Security 360.

#Cybersecurity360 è la cybersecurity360.it/news/googl…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

My favorite thing to do over the past months has been to watch Battlefield players and content creators slowly realize that EA, a company known for its predatory p2w games, has turned BF6 into a pay-to-win game

I love watching people slowly falling into despair

youtube.com/watch?v=tizFmlUvkm…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

A group of North Korean hackers engaged in Contagious Interview campaigns left one of their web consoles exposed on the internet

opensourcemalware.com/blog/con…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

U.S. CISA adds a flaw in Citrix NetScaler to its Known Exploited Vulnerabilities catalog
securityaffairs.com/190197/hac…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

Intesa Sanpaolo, mega sanzione privacy per accessi abusivi: una lezione per CISO e DPO


@Informatica (Italy e non Italy)
Il provvedimento del Garante privacy non è solo una sanzione record per il settore bancario italiano: 31, 8 milioni di euro. È una lezione sistemica su insider threat, accountability e gestione delle violazioni. Ecco cosa devono imparare

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

One of the most popular JavaScript packages on earth Axios has been compromised

opensourcemalware.com/blog/axi…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Il ritrovamento del Masripithecus, il “tassello mancante” che riscrive le origini delle grandi scimmie e degli esseri umani

La nuova specie risale a 18 milioni di anni fa, e suggerisce che il Nord Africa e il Medio Oriente potrebbero essere stati la culla evolutiva degli antenati degli odierni ominidi

wired.it/article/ritrovamento-…

@scienza

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

👉Il progetto #FUSS: software libero nella scuola👈

Oggi martedì 31, dalle 18.00 alle 19.00, ilwebinar di @programmailfuturo con @opavlos e Andrea Bonani

programmailfuturo.it/link-webi…

@gnulinuxitalia

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Un agente AI di Alibaba utilizzato per mining di criptovalute senza autorizzazione: cosa c’è dietro questo comportamento imprevisto…

📌 Link all'articolo : redhotcyber.com/post/ai-di-ali…

A cura di Carolina Vivianti

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Se sei di sinistra vota Meloni, non Schlein, Cinquestelle, i giudici, Hamas e il coiffeur di Bonelli

Alcuni post pubblicati da "liberali di sinistra" spiegano che i valori di SX sono incarnati dalla maggioranza di Nordio e Valditara, di Donzelli e La Russa, il governo amico di Trump, Netanyahu, Orbán.
Fattor comune? I post sono scritti da personaggetti di serie B, attivati per l'occasione. In pratica c'è un colonnello Dalchimsky che sta risvegliando il fondo del barile 🤣

@politica

The D in DNS Stands for DOOM


The media in this post is not displayed to visitors. To view it, please log in.

As literally everything ought to be able to play DOOM in some fashion, [Adam Rice] recently set out to make the venerable DNS finally play the game after far too many decades of being DOOM-less. You may be wondering how video games and a boring domain records database relate to each other. This is where DNS TXT records come into play, which are essentially fields for arbitrary data with no requirements or limitations on this payload, other than a 2,000 character limit.

Add to this the concept of DNS zones which can contain thousands of records and the inkling of a plan begins to form. Essentially the entire game (in C#) is fetched from TXT records, loaded into memory and run from there. This is in some ways a benign form of how DNS TXT records can be abused by people with less harmless intentions, though [Adam] admits to using the Claude chatbot to help with the code, so YMMV.

The engine and WAD file with the game’s resources are compressed to fit into 1.7 MB along with a 1.2 MB DLL bundle, requiring 1,966 TXT records in Base64 encoding on a Cloudflare Pro DNS zone. With a free Cloudflare account you’d need to split it across multiple zones. With the TXT records synced across the globe, every DNS server in the world now has a copy of DOOM on it, for better or worse.

You can find the project source on GitHub if you want to give this a shake yourself.

Thanks to [MrRTFM] for the tip.


hackaday.com/2026/03/31/the-d-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

World Backup Day 2026, il dato fa parte della nostra identità digitale: come proteggerlo


@Informatica (Italy e non Italy)
La giornata internazionale dedicata al backup dei dati è un'occasione per effettuare la verifica delle proprie strategie di protezione dati in uno scenario di assedio cyber. Ecco i consigli pratici per le aziende che

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Qilin #Ransomware allegedly breached chemical manufacturer giant #Dow Inc
securityaffairs.com/190186/cyb…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Una falla critica nei sistemi Citrix NetScaler ADC e Gateway potrebbe mettere a rischio la sicurezza delle reti aziendali…

📌 Link all'articolo : redhotcyber.com/post/citrix-ne…

A cura di Redazione RHC

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #news

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

I dati vengono già raccolti per essere decifrati con computer quantistici: cosa succederà quando questi super computer saranno realtà?

📌 Link all'articolo : redhotcyber.com/post/harvest-n…

A cura di Massimo Dionisi

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚀 RHC Conference 2026: Workshop "Skill On" del pomeriggio di Lunedì 18 Maggio

Di seguito le informazioni sull'evento:

📍Quando: Lunedì 18 Maggio 2026 (Mattina workshop "hands-on" e pomeriggio workshop "skill-on")
📍Dove: Teatro Italia, Via Bari 18, Roma (Metro Piazza Bologna)
📍Programma: redhotcyber.com/linksSk2L/prog…
📍Iscriviti ai Workshop di lunedì 18 maggio : rhc-conference-2026-workshop.e…

#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Scopri il modello linguistico che sta facendo discutere: privo di restrizioni etiche e con prestazioni sorprendenti, cosa può fare davvero…

📌 Link all'articolo : redhotcyber.com/post/qwen-e-li…

A cura di Carolina Vivianti

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news

PDP-11 Lives in Literal Computer Desk Once More


The media in this post is not displayed to visitors. To view it, please log in.

The ikea desk, with the spectrometer on the far left.

When you think of iconic parings, your brain probably goes more to “cookies and milk” than “DEC and Ikea” but after watching [Dave]’s latest on Usagi Electric where he puts a PDP-11 into an Ikea desk, you may rethink that.

The PDP-11 is vintage hardware that actually lived inside of a different desk, once upon a time, serving as the control unit for an FTIR spectrometer. While the lab equipment has thankfully survived the decades, the desk did not and when [Dave] got the unit it was as a pile of parts. He revived it, of course– it’s kind of what he does– but it didn’t get a new desk for years, until his latest shop re-organization.

The one concession to modernity– and missing parts– is using switching power supplies rather than the bulky linear PSU that would have originally powered the unit. It’s a good thing, too, or we have trouble picturing how everything would fit! This particular PDP-11 comes with the high performance vector processing unit in order to crunch those spectrographs, and apparently those chips idle at about 60C, so the desk-case got some decent-sized 120V fans to keep everything cool and running for years to come.

This isn’t the most aesthetic or fanciest case-mod we’ve seen, mostly being made of surplus plywood and scrap metal fittings, but it certainly gets the job done. Given that the PDP-11 has been crammed into every form-factor known to man, from a system-on-a-chip (before anybody really talked about SOCs) to desktop workstations, and of course the hulking cabinets with their iconic blinkenlights-– it’s hard to say that this installation isn’t reasonably authentic, even if it isn’t the original desk.

youtube.com/embed/mG3XGbbvWH8?…


hackaday.com/2026/03/30/pdp-11…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

L’intelligenza artificiale rivoluziona lo sviluppo software, ma a quale costo? Velocità e sicurezza sono davvero compatibili…

📌 Link all'articolo : redhotcyber.com/post/allarme-n…

A cura di Silvia Felici

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity

See The Computers That Powered The Voyager Space Program


The media in this post is not displayed to visitors. To view it, please log in.

A Univac 1219 cabinet

Have you ever wanted to see the computers behind the first (and for now only) man-made objects to leave the heliosphere? [Gary Friedman] shows us, with an archived tour of JPL building 230 in the ’80s.

A NASA employee picks up a camcorder and decides to record a tour of the place “before they replace it all with mainframes”. They show us computers that would seem prehistoric compared to anything modern; early Univac and IBM machines whose power is outmatched today by even an ESP32, yet made the Voyager program possible all the way back in 1977. There are countless peripherals to see, from punch card writers to Univac debug panels where you can see the registers, and from impressive cabinets full of computing hardware to the zip-tied hacks “attaching” a small box they call the “NIU”, dangling off the inner wall of the cabinet. And don’t forget the tape drives that are as tall as a refrigerator!

We could go on ad nauseum, nerding out about the computing history, but why don’t you see it for yourself in the video after the break?

youtube.com/embed/T_bqc76_3xU?…

Thanks to [Michael] for the tip!


hackaday.com/2026/03/30/see-th…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Sekoia looks at a new Phishing-as-a-Service platform named EvilTokens that has been spotted running campaigns since February.

The platform is one of the few that can run device-code phishing operations against Microsoft accounts, so expect this to become very popular in the coming months.

blog.sekoia.io/new-widespread-…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The ISO C++ committee has completed work on the C++26 specification of the C++ programming language.

This will be the biggest overhaul to C++ since the 2011 specification.

herbsutter.com/2026/03/29/c26-…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Lorenzo Meacci introduces InsomniacUnwinding, a new technique to hide and sleep malicious code, even from EDR solutions that continuously scan the memory for malicious code

lorenzomeacci.com/unwind-data-…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Trump convenes "God Squad" to override Endangered Species Act, up oil production
Administration wants to exempt all federally regulated offshore oil from protections.
arstechnica.com/tech-policy/20…
Cybersecurity & cyberwarfare ha ricondiviso questo.

CNET is being brought back after the AI articles fiasco

linkedin.com/posts/david-katzm…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Despite losing the US and EU market, Kaspersky reported a record revenue of $836 million last year

kaspersky.ru/about/press-relea…

reshared this

This Front Panel Makes Its Own Clean-Edged Drill Guides


The media in this post is not displayed to visitors. To view it, please log in.

We haven’t seen an instrument panel quite like [bluesyann]’s, which was made by curing UV resin directly onto plywood with the help of a 3D printer and a bit of software work. The result is faintly-raised linework that also makes hand drilling holes both cleaner and more accurate.

The process begins by designing the 2D layout in Inkscape, which has the advantage of letting one work in 1:1 dimensions. A 10 mm diameter circle will print as 10 mm; a nice advantage when designing for physical components. After making the layout one uses OpenSCAD to import the .svg and turn it into a 3D model that’s 0.5 mm tall. That 3D model gets loaded into the resin printer, and the goal is to put it directly onto a sheet of plywood.
A little donut shape makes a drill centering feature, and the surrounding ring keeps the edges of the hole clean.
To do that, [bluesyann] sticks the plywood directly onto the 3D printer’s build platform with double-sided tape. With the plywood taking the place of the usual build surface, the printer can cure resin directly onto its surface. Cleanup still involves washing uncured resin off the board, but it’s nothing a soak in isopropyl alcohol and an old toothbrush can’t take care of.

[bluesyann] has a few tips for getting the best results, and one of our favorites is a way to make drilling holes easier and cleaner. Marking the center of a drill hit with a small donut-shaped feature makes a fantastic centering guide, making hand drilling much more accurate. And adding a thick ring around the drill hole ensures clean edges with no stray wood fibers, so no post-drilling cleanup required. Don’t want the ring to stick around after drilling? Just peel it off. There’s a load of other tips too, so be sure to check it out.

A nice front panel really does make a project better, and we’ve seen many different approaches over the years. One can stick laminated artwork onto an enclosure, or one can perform toner transfer onto 3D printed surfaces by putting the design on top of the 3D printer’s build surface, and letting the heat of molten plastic do the work of transferring the toner. And if one should like the idea of a plywood front panel but balk at resin printing onto it, old-fashioned toner transfer works great on wood.


hackaday.com/2026/03/30/this-f…

Retro Open Source Camera Straight from the ’90s


The media in this post is not displayed to visitors. To view it, please log in.

In our modern society, we have started to take the humble camera for granted. Perhaps because of this, trendy standalone cameras have started to take off. Unfortunately, most of the time these cameras are expensive and not any better than those in our everyday smartphones. If only there were some open-source solution where you could build and customize your own standalone device? [Yutani] has done just that with the SATURNIX.

Simple microcontrollers and cameras meant for Raspberry Pis are a dime a dozen these days. Because of this, it’s no surprise to hear that the SATURNIX is based on recognizable hardware, a Raspberry Pi Zero 2W and an Arducam 16MP sensor. The Pi Zero powers both the sensors’ capture abilities and the interactive LCD display.

Some sample filtered shots from the SATURNIX
With a simple visual design, the device could certainly fit into the same market we see so many other standalone cameras. Pictures from the camera look great without or with the included filter options if you want a more retro look. While currently there do appear to be some speed improvements needed, the best part of open source is that you yourself can help out!

We always love ambitious open source projects that look to build a true base for others to work on, and this seems like no exception! If you want similarly impressive feats of optical trickery, look no further than using scotch tape as a camera lens!


hackaday.com/2026/03/30/retro-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Intesa Sanpaolo, multa da 31,8 milioni per un data breach durato oltre due anni


@Informatica (Italy e non Italy)
Un data breach protratto per più di due anni, migliaia di accessi indebiti e sistemi di controllo ritenuti inadeguati. Con queste motivazioni il Garante per la protezione dei dati personali ha sanzionato Intesa Sanpaolo con una multa da 31,8 milioni di euro,

reshared this

Questo account è gestito da @informapirata ⁂ e propone e ricondivide articoli di cybersecurity e cyberwarfare, in italiano e in inglese

I post possono essere di diversi tipi:

1) post pubblicati manualmente
2) post pubblicati da feed di alcune testate selezionate
3) ricondivisioni manuali di altri account
4) ricondivisioni automatiche di altri account gestiti da esperti di cybersecurity

NB: purtroppo i post pubblicati da feed di alcune testate includono i cosiddetti "redazionali"; i redazionali sono di fatto delle pubblicità che gli inserzionisti pubblicano per elogiare i propri servizi: di solito li eliminiamo manualmente, ma a volte può capitare che non ce ne accorgiamo (e no: non siamo sempre on line!) e quindi possono rimanere on line alcuni giorni. Fermo restando che le testate che ricondividiamo sono gratuite e che i redazionali sono uno dei metodi più etici per sostenersi economicamente, deve essere chiaro che questo account non riceve alcun contributo da queste pubblicazioni.

reshared this