Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Google usa Gemini per spiare il Dark Web: sicurezza rivoluzionata o nuova minaccia?

📌 Link all'articolo : redhotcyber.com/post/google-us…

#redhotcyber #news #cybersecurity #darkweb #gemini #googlesicurezza #monitoraggiodarkweb #minacceinformatiche #profilaziendale

Cybersecurity & cyberwarfare ha ricondiviso questo.

Patch now: TP-Link Archer NX routers vulnerable to firmware takeover
securityaffairs.com/189980/sec…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

[RISOLTO: IL PROBLEMA NON DIPENDE DA NOI] Potete controllare se riuscite a raggiungere il sito Fedinews.it

fedinews.it/

::::::AGGIORNAMENTO. Forse il problema potrebbe riguardare chi sta utilizzando opendns e dns4eu::::::

Se non riuscite ad accdere:
- mi dite con quale operatore vi state connettendo?
- mi dite se collegandovi con TOR riuscite ad accedere?

Questa voce è stata modificata (1 settimana fa)

The Most Secure, Modern Computer Might Be A Mac


The media in this post is not displayed to visitors. To view it, please log in.

The Linux world is currently seeing an explosion in new users, thanks in large part to Microsoft turning its Windows operating system into the most intrusive piece of spyware in modern computing. For those who value privacy and security, Linux has long been the safe haven where there’s reasonable certainty that the operating system itself isn’t harvesting user data or otherwise snooping where it shouldn’t be. Yet even after solving the OS problem, a deeper issue remains: the hardware itself. Since around 2008, virtually every Intel and AMD processor has included coprocessors running closed-source code known as the Intel Management Engine (IME) or AMD Platform Security Processor (PSP).
M1 MacBook Air, now with more freedom
These components operate entirely outside the user’s and operating system’s control. They are given privileged access to memory, storage, and networking and can retain that access even when the CPU is not running, creating systemic vulnerabilities that cannot be fully mitigated by software alone. One practical approach to minimizing exposure to opaque management subsystems like the IME or PSP is to use platforms that do not use x86 hardware in the first place. Perhaps surprisingly, the ARM-based Apple M1 and M2 computers offer a compelling option, providing a more constrained and clearly defined trust model for Linux users who prioritize privacy and security.

Before getting into why Apple Silicon can be appealing for those with this concern, we first need to address the elephant in the room: Apple’s proprietary, closed-source operating system. Luckily, the Asahi Linux project has done most of the heavy lifting for those with certain Apple Silicon machines who want to go more open-source. In fact, Asahi is one of the easiest Linux installs to perform today even when compared to beginner-friendly distributions like Mint or Fedora, provided you are using fully supported M1 or M2 machines rather than attempting an install on newer, less-supported models. The installer runs as a script within macOS, eliminating the need to image a USB stick. Once the script is executed, the user simply follows the prompts, restarts the computer, and boots into the new Linux environment. Privacy-conscious users may also want to take a few optional steps, such as verifying the Asahi checksum and encrypting the installation with LUKS but these steps are not too challenging for experienced users.

Black Boxes


Changing the operating system on modern computers is the easy part, though. The hard part is determining exactly how much trust should be placed in the underlying hardware and firmware of any given system, and then deciding what to do to make improvements. This is where Apple Silicon starts to make a compelling case compared to modern x86 machines. Rather than consolidating a wide range of low-level functionality into a highly privileged black box like the IME or PSP, Apple splits these responsibilities more narrowly, with components like the Secure Enclave focusing on specific security functions instead of being given broad system access.

Like many modern systems, Apple computers include a dedicated security coprocessor alongside the main CPU, known as the Secure Enclave Processor (SEP). It runs a minimal, hardened operating system called sepOS and is isolated from the rest of the system. Its primary roles include securely storing encryption keys, handling sensitive authentication data, and performing cryptographic operations. This separation helps ensure that even if the main operating system is compromised, secrets managed by the SEP remain protected.

The Chain of Trust


To boot an Apple Silicon computer, a “chain of trust” is followed in a series of steps, each of which verifies the previous step. This is outlined in more detail in Apple’s documentation, but starts with an immutable boot ROM embedded in the system-on-chip during manufacturing. It first verifies early boot stages, including the low-level bootloader and iBoot, which in turn authenticate and verify the operating system kernel and system image before completing the boot process. If any of these verification steps fail, the system halts booting to prevent unauthorized or compromised code from executing.

Perhaps obvious at this point is that Apple doesn’t sign Asahi Linux images. But rather than allowing unrestricted execution like many PCs, or fully locking down the device like a smartphone, Apple’s approach takes a middle way. They rely on another critical piece of “security hardware” required to authorize that third-party OS: a human user. The Asahi Linux documentation discusses this in depth, but Apple’s secure boot system allows the owner of the computer to explicitly authorize additional operating systems by creating a custom boot policy within the user-approved trust chain. In practice, this means that the integrity of the boot process is still enforced, but the user ultimately decides what is trusted. If a boot component is modified outside of this trust chain, the system will refuse to execute it. In contrast to this system, where secure boot is enforced by default and only relaxed through explicit user action, x86 systems can treat these protections as optional. A motivated x86 user can achieve a comparable level of security, but they must assemble and maintain it themselves, as well as figure it out in the first place.

Reducing the Attack Surface


The limited scope of Apple’s Secure Enclave gives it a much smaller attack surface compared to something like the Intel Management Engine. As mentioned before, the IME combines a wider range of functionality, including features designed for low-level remote system management. This broader scope increases its complexity and, by extension, its attack surface which has led to several high-profile vulnerabilities. Apple’s Secure Enclave, by contrast, is designed with a much narrower focus. That’s not to say it’s a perfect, invulnerable system since it’s also a closed-source black box, but its limited responsibilities inherently reduce that attack surface.

It’s also worth mentioning that there are a few other options for those who insist on x86 hardware or who refuse to trust Apple even in the most minimal amount, but who still consider the IME and its equivalents as unacceptable security risks. Some hardware manufacturers like NovaCustom and even Dell have given users the option of disabling the IME (although this doesn’t remove it entirely), and some eight and ninth generation Intel machines can have their management engines partially disabled by the user as well. In fact these are the computers that my own servers are based on for this reason alone. Going even further, it is possible to get a 2018-era Thinkpad to run the open-source libreboot firmware. However, libreboot installations can become extremely cumbersome, and even then you’ll be left with a computer that lacks the performance-per-watt and GPU capabilities of even the lowest-tier M1 machines. In my opinion, this compromise of placing a kernel of trust in Apple is the lesser evil for most people in most situations, at least until libreboot is able to support more modern machines and/or until the libreboot installation process is able to be streamlined.

I’ll also note here that Apple is far from a perfect company. Their walled garden approach is inherently anti-consumer, and they’ve rightly taken some criticism for inflating hardware costs, deliberately making their computers difficult to repair, enforcing arbitrary divisions between different classes of products to encourage users to buy more devices, and maintaining a monopolistic and increasingly toxic app store.

But buying an M1 or M2 machine on the used market won’t directly give Apple any money, and beyond running the Asahi installer script doesn’t require interacting with any Apple software or their ecosystem in any way, beyond the initial installation. I’ve argued in the past that older Apple computers make excellent Linux machines for these reasons as well, and since the M1 and M2 machines eliminate the IME risk of these older computers they’re an even better proposition, even without considering the massive performance gains possible.

Ultimately, though, the best choice of hardware depends on one’s threat model and priorities. If the goal is to minimize exposure to IME/PSP-level risks while retaining semi-modern performance, an M1/M2 Mac with Asahi Linux is one of the best options available today. But if fully open hardware is non-negotiable, you’ll need to accept older or less powerful machines… for now.


hackaday.com/2026/03/25/the-mo…

INTELLIGENZA ARTIFICIALE, GIORNALISMO E DEMOCRAZIA


The media in this post is not displayed to visitors. To view it, please log in.

Giovedì 15 aprile 2026, ore 9.30

Fondazione Paolo Murialdi, via Nizza 35, Roma

Seminario in collaborazione con la Fondazione sul giornalismo italiano “Paolo Murialdi”

Intervengono

Domenico Affinito, “Dataroom” Corriere della Sera

Arturo Di Corinto, giornalista e consigliere Agenzia per la Cybersicurezza Nazionale

Paola Marsocci, prof.ssa di Diritto costituzionale, CoRiS Sapienza

Michele Mezza, giornalista e saggista, autore di “Guerre in codice” (Donzelli, 2025)

Vittorio Roidi, già Presidente della Fondazione sul giornalismo italiano “Paolo Murialdi”

Christian Ruggiero, Presidente Laurea Magistrale Media, comunicazione digitale e

giornalismo, CoRiS Sapienza

Giancarlo Tartaglia, Segretario Generale Fondazione sul giornalismo italiano “Paolo Murialdi”


dicorinto.it/formazione/intell…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Tecnologia quantistica: acceleratore della rivoluzione digitale in Europa

📌 Link all'articolo : redhotcyber.com/post/tecnologi…

#redhotcyber #news #sicurezzainformatica #cybersecurity #quantumeurope #strategiequantistiche #transizioneobbligatoria

Cybersecurity & cyberwarfare ha ricondiviso questo.

Recent Navia data breach impacts HackerOne employee data
securityaffairs.com/189969/dat…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

AI Omnibus, così l’UE vuole riscrivere le regole: cosa cambia per privacy e compliance


@Informatica (Italy e non Italy)
Le commissioni IMCO e LIBE del Parlamento UE hanno adottato il mandato negoziale sul cosiddetto “omnibus digitale” che modifica l’AI Act: tra le proposte il rinvio delle scadenze per i sistemi ad alto rischio, più flessibilità per le

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

🤔SONDAGGIO SUI GRUPPI ACTIVITYPUB ITALIANI🇮🇹

👥 Lo sai che esistono gruppi tematici nel #Fediverso?

🌐 Sono i gruppi Activitypub e sono gestiti da software come #Lemmy, #NodeBB, #Friendica, #Piefed o #Mbin; ma la cosa bella è che possono esssere utilizzati anche da chi ha un account #Mastodon!

⁉️ E tu utilizzi i gruppi Activitypub? E su quali istanze italiane?

  • Gruppi tematici di feddit.it (68%, 39 votes)
  • Gruppi cittadini di citiverse.it (50%, 29 votes)
  • Gruppi di diggita.com (40%, 23 votes)
  • Gruppi Friendica di poliverso.org (19%, 11 votes)
57 voters. Poll end: 4 giorni fa

Cybersecurity & cyberwarfare ha ricondiviso questo.

FCC targets foreign router imports amid rising cybersecurity concerns
securityaffairs.com/189959/sec…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

FCC targets foreign router imports amid rising cybersecurity concerns
securityaffairs.com/189959/sec…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

📢 Il convegno nazionale Dev. Conference Italia prende il via.

Abbiamo già definito il programma, che verrà reso pubblico nei prossimi giorni sul sito web ufficiale.

Tanti i temi trattati:
❤️ Open Source & Linux
❤️ Sicurezza
❤️ Didattica & Informatica
❤️ Sviluppo di software
❤️ Software in ambito medicale
❤️ Sovranità digitale
❤️ Fediverso

@devconf@citiverse.it

devconf.it

#devconfita #boostmedia #opensource #conference #security #devconf

Anatomy of a Cyber World Global Report 2026


The media in this post is not displayed to visitors. To view it, please log in.

Kaspersky Security Services provide a comprehensive cybersecurity ecosystem, taking enterprise threat protection to another level. Services like Kaspersky Managed Detection and Response and Compromise Assessment allow for timely detection of threats and cyberattacks. SOC Consulting provides a practical approach ensuring the corporate infrastructure stays secured, while Incident Response is suited for timely remediation with a maximized recovery rate.

High-level overview of the MDR, IR and CA connection
High-level overview of the MDR, IR and CA connection

This new report brings together statistics across regions and industries from our Managed Detection and Response and Incident Response services, and for the first time, it also includes insights from our Compromise Assessment and SOC Consulting services — all to provide you with more comprehensive view of different aspects of corporate information security worldwide.

The scope of MDR and IR services


Provision of Kaspersky’s MDR and IR services follows a global approach. The majority of customers accounted for the CIS (34.7%), the Middle East (20.1%), and Europe (18.6%).

Distribution of customers by geographical region, 2025
Distribution of customers by geographical region, 2025

MDR telemetry


Following the previous year’s numbers, in 2025, the MDR infrastructure received and processed an average of 15,000 telemetry events per host every day, generating security alerts as a result. These alerts are first processed by AI-powered detection logic, after which Kaspersky SOC analysts handle them as required. Overall, a total of approximately 400,000 alerts were generated in 2025. After counting out false positives, 39,000 alerts were further investigated.

MDR telemetry statistics, 2025
MDR telemetry statistics, 2025

Incident statistics


The distribution of remediation requests by industry has slightly changed as compared to previous years’ pattern. Government (18.5%) and industrial (16.6%) organizations are still the most targeted industries in regards to cyberattacks that require incident response activities. However, this year, the IT sector saw a growth in the number of IR requests, eventually being placed third in the overall industry distribution rankings and thus replacing financial organizations, which were targeted less often than in 2024. This is equally true for smaller-scale attacks that can be contained and remediated through automated means — the only difference is that medium- and low-severity incidents are more often experienced by financial organizations.

Distribution of all incidents by industry sector, 2025
Distribution of all incidents by industry sector, 2025

Key trends and statistics


This section presents key findings and trends in cyberattacks in 2025:

  • The number of high-severity incidents decreased, following a downward trend that we’ve been observing since 2021. The majority of those incidents account for APT attacks and red teaming exercises, which indicates two landscape trends. On the one hand, skilled adversaries make efforts to increase impact, while on the other, organizations spend more resources on probing their defense systems.
  • The most common vulnerabilities exploited in the wild were related to Microsoft products. Half of all identified CVEs led to remote code execution, notably without authentication in some cases.
  • Exploitation of public-facing applications, valid accounts, and trusted relationships remain the most popular initial vectors, and their overall share has increased, accounting to over 80% of all attacks in 2025. In particular, attacks through trusted relationships are evolving: their share has increased to 15.5% from 12.8% in 2024. They are also becoming more complex: for instance, we witnessed a case where adversaries had compromised more than two organizations in sequence to ultimately gain access to a third target.
  • Standard Windows utilities remain a popular LotL tool. Adversaries use those to minimize the risk of detection during delivery to a compromised system. The most popular LOLBins we observed in high-severity incidents were powershell.exe (14.4%), rundll32.exe (5.9%), and mshta.exe (3.8%). Among the most popular legitimate tools used in incidents we flag Mimikatz (14.3%), PowerShell (8.1%), PsExec (7.5%), and AnyDesk (7.5%).

The full 2026 Global Report provides additional information about cyberattacks, including real-world cases discovered by Kaspersky experts. We also describe SOC Consulting projects and Compromise Assessment requests. The report includes comprehensive analysis of initial attack vectors in correlation with the MITRE ATT&CK tactics and techniques and the full list of vulnerabilities that we detected during Incident Response engagements.


securelist.com/global-report-s…

Electric Motorcycles Don’t Have To Be Security Nightmares, But This One Was


The media in this post is not displayed to visitors. To view it, please log in.

Once upon a time, they told us we wouldn’t download a car, and they were wrong. Later, Zero Motorcycles stated in their FAQ that you cannot hack an electric motorcycle, a statement which [Persephone Karnstein] and collaborator [Mitchell Marasch] evidently took issue with. Not only can you hack an electric motorcycle, it is — in [Persephone]’s words — a security nightmare.

You should absolutely go over to [Persephone]’s website and check out the whole write-up, which is adapted from a talk given at BSides Seattle 2026. There’s simply way more detail than we can get into here. Everything from “what horridly toxic solvents would I need to unpot this PCB?” to the scripts used in de-compiling and understanding code, it’s all there, and in a lively and readable style to boot. Even if you have no interest in security, or electric motorcycles, you should check it out.

The upshot is that not only were Zero Motorcycles wrong when they said their electric motorcycles could not be hacked, they were hilariously wrong. The problem isn’t the motorcycle alone: it has an app that talks to the electronics on the bike, which take over-the-air (OTA) updates. What about the code linked to the VIN alluded to in that screenshot? Well, it turns out you just need a code structured like a VIN, not an actual number. Oops. By the end of it, [Persephone] and [Mitchell] have taken absolute control of the bike’s firmware, an so have them full control over all its systems.

Why cut the brake lines when you can perform an OTA update that will do the same thing invisibly? And don’t think you can just reset the bike to factory settings to fix it: they thought of this, and the purely-conceptual, never-deployed malware has enough access to prevent that. Or they could just set the battery on fire. That was an option, too, because the battery management system gets OTA updates as well.

To be clear, we don’t have any problem with a motorcycle that’s dependent on electronics to operate. After all, we’ve seen many projects that would meet that definition over the years. But the difference is none of those projects fumbled the execution this badly. Even this 3 kW unicycle, which has a computer for balance control, doesn’t see the need to expose itself. It’s horribly unsafe in very different ways.


hackaday.com/2026/03/25/electr…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Documento trapelato: la guerra in Iran incontra il "piccolo fratello". Le informazioni sulla guerra vengono censurate, con l'aiuto di aziende private.


Il Pentagono ha silenziosamente dettato alle società che gestiscono i satelliti spia cosa dire sulla guerra con l'Iran, esercitando una censura su ciò che il pubblico americano può sapere.

Fonti militari mi riferiscono che il livello di segretezza che circonda i dettagli della guerra con l'Iran è senza precedenti, con pochissimi dati diffusi sull'entità dei bombardamenti, sugli obiettivi colpiti o sugli effetti stimati. Ora l'amministrazione Trump sta cercando di controllare ulteriormente ciò che le aziende private dicono, in un'operazione dietro le quinte finora inedita.

kenklippenstein.com/p/leaked-d…

@news

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🇩🇪EU-Regierungen glauben, sie können unsere Volksvertreter zu Kapitulation und JA zur #Chatkontrolle mobben.

🛑 Heute 15 Uhr (Tagesordnung) und morgen 11 Uhr (Sachentscheidung) können wir die #Chatkontrolle killen!

📞 Ruft JETZT Abgeordnete an: fightchatcontrol.de

in reply to Patrick Breyer

The media in this post is not displayed to visitors. To view it, please go to the original post.

🇪🇺EU governments confident they can bully our representatives into surrendering and voting YES to indiscriminate #ChatControl.

🛑 Today at 3 PM (agenda vote) and tomorrow at 11 AM (final vote) we can kill #ChatControl!

📞 Call your MEPs NOW: fightchatcontrol.eu #NoMeansNo

Questa voce è stata modificata (1 settimana fa)
in reply to Patrick Breyer

The media in this post is not displayed to visitors. To view it, please go to the original post.

🇫🇷Les gouvernements de l'UE pensent pouvoir forcer nos représentants à capituler et à voter OUI au #ChatControl.

🛑Aujourd'hui à 15h (ordre du jour) et demain à 11h (vote final) nous pouvons tuer le #ChatControl !

📞Appelez vos eurodéputés MAINTENANT: fightchatcontrol.eu

Questa voce è stata modificata (1 settimana fa)
in reply to Patrick Breyer

The media in this post is not displayed to visitors. To view it, please go to the original post.

🇮🇹I governi dell'UE pensano di poter bullizzare i nostri rappresentanti per farli capitolare e votare SÌ al #ChatControl.

🛑 Oggi alle 15:00 (ordine del giorno) e domani alle 11:00 possiamo uccidere il #ChatControl!

📞 Chiama ORA i tuoi eurodeputati: fightchatcontrol.eu

Questa voce è stata modificata (1 settimana fa)
Cybersecurity & cyberwarfare ha ricondiviso questo.

#Cybercrime group #Lapsus$ claims the hack of pharma giant #AstraZeneca
securityaffairs.com/189936/dat…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

L’AI non ha ancora distrutto posti di lavoro… ma sta cambiando tutto silenziosamente

📌 Link all'articolo : redhotcyber.com/post/lai-non-h…

#redhotcyber #news #intelligenzaartificiale #mercatoDelLavoro #cambiamentosilenzioso #lavorointelligente #giovanielavoro #ruolilavorativi

Cybersecurity & cyberwarfare ha ricondiviso questo.

Malicious #LiteLLM versions linked to #TeamPCP supply chain attack
securityaffairs.com/189948/hac…
#securityaffairs #hacking

The media in this post is not displayed to visitors. To view it, please log in.

Daua, una spy story contemporanea. È il nuovo libro di Sebastiano Caputo il cui protagonista, Giovanni Scorretti, è un agente dei servizi segreti italiani abituato a muoversi nell’ombra del potere. Quando il suo amico Alessandro viene rapito in Iraq, nel pieno di una crisi geopolitica che attraversa tutto il Medio Oriente, gli viene affidata una missione complicata e difficile: riportarlo a casa. Inizia così un viaggio tra i palazzi vaticani, night club romani e salotti aristocratici, fino ai confini del mondo. Il protagonista resta impigliato in una ragnatela invisibile fatta di diplomazie parallele, criminalità organizzata, monaci ribelli, milizie armate, amori romantici. Ma dietro l’operazione che deve portare a termine si nasconde qualcosa di più profondo: Daua, il grande gioco che muove gli uomini, le idee, e il loro destino. Un romanzo tra intelligence, fede e guerre, dove il vero campo di battaglia è la natura umana.

Pubblicato da Paesi Edizioni, casa editrice diretta dal giornalista di Panorama Luciano Tirinnanzi, è un peculiare romanzo che trasforma la geopolitica in fiction, per raccontare come le dinamiche del potere siano sempre legate alle passioni umane, laddove queste dipendono dalla struttura materiale della realtà che ci costruiamo intorno. Nelle intenzioni dell’autore, giornalista, il libro è uno strumento per ravvivare il filone giallo della narrativa di genere.

Daua, una spy story, è stato presentato in anteprima al Festival di Geopolitica di Ascoli Piceno con il giornalista Alberto Negri, reporter di guerra ed esperto di Medio Oriente.

«Daua, una spy story contemporanea», Sebastiano Caputo, 2026, Pesi Edizioni, Roma.


dicorinto.it/articoli/recensio…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Gli USA credevano davvero di essere i soli in grado di spiare attraverso i propri router? 🤣 È quello che sembrerebbe a giudicare dal ban immediato di tutti i nuovi dispositivi costruiti all'estero


Gli Stati Uniti hanno annunciato nelle scorse ore un ban per tutti i router consumer costruiti all'estero, in una analogia piuttosto diretta con quanto visto negli scorsi mesi con i droni. La decisione proviene dalla FCC Federal Communications Commission), ed è attiva con effetto immediato: tutti i modelli già in commercio possono continuare a essere venduti, ma i modelli nuovi no.

hdblog.it/hardware/articoli/n6…

@informatica

in reply to macfranc

@macfranc

Mi sembra solo un dazio con valore infinito sui router stranieri.

Se veramente ponessero un problema di sicurezza che senso avrebbe continuare a usare quelli già installati e continuare a vendere quelli già importati?

Questa voce è stata modificata (1 settimana fa)

reshared this

in reply to Max - Poliverso 🇪🇺🇮🇹

@max sì, c'è sicuramente la componente protezionistica, ma c'è anche un problema di sicurezza attiva (vogliono roba utilizzabile da loro) e di sicurezza passiva (no a dispositivi controllabili da Pechino).
I vecchi router stranieri? Hanno mediamente un anno e mezzo di vita e non sono un grande problema.
Considera poi che, grazie alle politiche sulle importazioni, sostituire i router stranieri così, dall'oggi al domani, sarebbe tecnicamente impossibile, dal momento che non ci sono abbastanza articoli in magazzino per farlo e la produzione non è così veloce
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

264 – Il cloud non esiste camisanicalzolari.it/264-il-cl…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

📢 Boost Media APS dà il via al progetto Oikos!!!

Il progetto solidale cerca di aiutare persone, studenti ed associazioni che non possono permettersi di acquistare un pc ad avere il loro, riducendo così il digital divide.

❤️ Ti serve un pc? Vai sul sito e compila il modulo Ricevi-PC
💚 Vuoi donare un pc? Vai sul sito e compila il modulo Dona-PC

Riduciamo insieme il Digital Divide!

@informatica@feddit.it

boostmedia.it/it/oikos

#trashware #oikos #boostmedia #ufficiozero #digitaldivide

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

📢 Boost Media APS dà il via al progetto Oikos!!!

Il progetto solidale cerca di aiutare persone, studenti ed associazioni che non possono permettersi di acquistare un pc ad avere il loro, riducendo così il digital divide.

❤️ Ti serve un pc? Vai sul sito e compila il modulo Ricevi-PC
💚 Vuoi donare un pc? Vai sul sito e compila il modulo Dona-PC

Riduciamo insieme il Digital Divide!

@informatica

boostmedia.it/it/oikos

#trashware #oikos #boostmedia #ufficiozero #digitaldivide

reshared this

You Can Now Run MS-DOS Applications on the Apple IIe


The media in this post is not displayed to visitors. To view it, please log in.

After a lot of debugging, [Seth Kushniryk] has managed to get the last issuess shaken out of his port of MS-DOS 2.0 to the Apple II, and has released the project to the public. If you have the requisite AD8088 or similar co-processor expansion card with onboard x86 CPU, this should be all you need to get started.

Although this co-processor card contains effectively a self-contained x86 system, its only I/O goes via the expansion bus, so it has to play nice with the 6502 CPU of the Apple II system. When we last reported on [Seth]’s efforts he had just managed to get MS-DOS 2.0 booting and basically in a barebones working state.

Since then he’s been working on the bridge program that provides communication between the 8088 on the card and the Apple II’s 6502, relocating it in RAM to enable high-resolution graphics, as well as other tweaks and optimizations. Also a lot of bug hunting, including an undocumented ProDOS constraint with a request count.

With all of this done it’s now possible to run basically any MS-DOS 2.0 compatible software, assuming it doesn’t try to write directly to video memory. This does limit the software selection somewhat, but back in the day it would probably have been amazing to have that 8 MHz 8088 purring along the 6502 to run both Apple and DOS software titles. Props to [Seth] for restoring this software functionality that had been lost to the ages.

youtube.com/embed/3nBONHGQg64?…


hackaday.com/2026/03/25/you-ca…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Esce Kali 2026.1! innovazione e novità, ma la stabilità alla fine, conta più delle novità

📌 Link all'articolo : redhotcyber.com/post/esce-kali…

#redhotcyber #news #kaliLinux #cybersecurity #hacking #linux #nuovaversione #kalilinux20261 #backtrack

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Il cloud non è libero: la verità nascosta dietro gli hyperscaler, l’intelligence e la geopolitica

📌 Link all'articolo : redhotcyber.com/post/il-cloud-…

#redhotcyber #news #cloudfirst #geopatriation #cloudneutralita #assetstrategico #crisideiLimiti #dipendenzadallestero #interferenzestraniere

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚀 RHC Conference 2026: Workshop "Hands On" di Lunedì 18 Maggio

Di seguito le informazioni sull'evento:

📍Quando: Lunedì 18 Maggio 2026 (Mattina workshop "hands-on" e pomeriggio workshop "skill-on")
📍Dove: Teatro Italia, Via Bari 18, Roma (Metro Piazza Bologna)
📍Programma: redhotcyber.com/linksSk2L/prog…
📍Iscriviti ai Workshop di lunedì 18 maggio : rhc-conference-2026-workshop.e…

#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Abbiamo perso il controllo dei robot domestici: migliaia di utenti spiati dentro casa

📌 Link all'articolo : redhotcyber.com/post/abbiamo-p…

#redhotcyber #news #sicurezzainformatica #hacking #robotaspirapolvere #cybersecurity #vulnerabilita #datipersonali #sorveglianza #informatica

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Il più grande supply chain attack è servito! 1000 ambienti SaaS Compromessi

📌 Link all'articolo : redhotcyber.com/post/il-piu-gr…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #supplychain #attacchinformatici #sicurezzainformatica #furtoinformatico

3D Printed Robot Arm Built For Learning Purposes


The media in this post is not displayed to visitors. To view it, please log in.

If you want to work with robots you can do all sorts of learning with software and simulation, but nothing quite beats getting to grips with real machinery. That was the motivation for [James Gullberg] to build this impressive robot arm.

Featuring six degrees of freedom, the robot arm is mostly constructed of 3D printed components. This let [James] experiment with a wide variety of joint and reducer designs for the sake of learning and investigation. The base of the robot uses a fairly conventional planetary gear drive, while shoulder and elbow joints rely on split-ring planetary gearboxes to allow for high torque density with regards to size. [James] implemented a neat sensing technique here, integrating alternating magnets into the output ring gear which are monitored via a magnetic encoder. The wrist joint switches things up again, running via an inverted belt differential.

Running the show is an STM32 microcontroller, which talks to all the encoders, communicates with a Raspberry Pi over CAN bus, and handles all the necessary PID control loops and step generation for the drive motors. The plan is to run higher-level control on the Raspberry Pi which will run a ROS 2-based software stack. Already, the various joints look smooth and impressive in motion.

If you’re looking to learn about robot arms, you really can’t beat building one. We’ve featured a few projects along these lines before. Most of them aren’t exactly production-line ready, but they will teach you a ton about control, motion planning, and all sorts of associated skills. That experience can be invaluable if you intend to work with robots in industry.

My (mostly) 3D printed Robot Arm
byu/SPACE-DRAGON772 inEngineeringPorn

Thanks to [JohnU] for the tip!


hackaday.com/2026/03/24/3d-pri…

Testing Expensive Graphene-Reinforced Nylon Filament


The media in this post is not displayed to visitors. To view it, please log in.

Although usually nylon (generally PA6) filament is pretty cheap, there are some more exotic variants out there, such as the PA12-based Lyten 3D graphene filament that comes in at a cool $150 for a 1 kg spool. Worse for [Dr. Igor Gaspar] here was that the company doesn’t ship to the EU, and didn’t respond to emails about obtaining a sample for testing. Fortunately he got a spool via a different route, so that he could test whether this is the strongest nylon filament or not.

The full name for this filament is PA1205, though it’s not certain what the ’05’ part stands for. PA12 is a less moisture-sensitive version of PA6, however. Among the manufacturer’s claims are that it’s the strongest nylon filament, as well as very lightweight and heat-resistant. Interestingly the datasheet recommends printing with an 0.6 mm nozzle, which is the only major deviation from typical nylon FDM filaments. Of course, printing with an 0.4 mm nozzle had to be tried.

With a standard PA-CF preset in Bambu Lab’s slicer the printing of test parts worked without issues, which was promising. With load testing the filament made a good showing compared to average PA filaments, though as with most fiber reinforced filaments it’s more brittle than the pure material. Compared to PA-CF this PA1205 was much less brittle than PA-CF, however. Overall it’s not a bad filament, but for the asking price it’s a tough ask.

youtube.com/embed/pvOWv06N5h8?…


hackaday.com/2026/03/24/testin…

Cybersecurity & cyberwarfare ha ricondiviso questo.

A US judge dismisses a lawsuit against Meta by Attaullah Baig, former head of cybersecurity at WhatsApp, who alleged Meta ignored critical security flaws (Carly Nairn/Courthouse News Service)

courthousenews.com/meta-dodges…
techmeme.com/260324/p52#a26032…

reshared this

Heating a Woodshop With Sawdust


The media in this post is not displayed to visitors. To view it, please log in.

Most carpenters and woodworkers find themselves with the problem of disposing of all the sawdust they create when performing their craft. There are lots of creative solutions to this problem, such as adding it compost, using it as groundcover in a garden, adding it as filler in a composting toilet, or pressing it into bricks to burn in a stove. All of these have their uses, but involve either transporting the sawdust somewhere or performing some intermediate step to process it. [Greenhill Forge] wanted to make more direct use of it so he built this stove which can burn the sawdust directly and which provides enough heat for his woodshop.

The design is based on one which is somewhat common in Japan and involves building a vessel with a central tube for airflow, with the sawdust packed around it. The tube is made from a hardware cloth or screen to allow air to reach the sawdust. The fire is lit from the top, closed, and then allowed to burn through the stack. [Greenhill Forge] welded the entire stove from various pieces of sheet metal and bar stock, with a glass plate at the top of the stove to close off the fire and a baffle to control the airflow and rate of burn.

Initially, [Greenhill Forge] thought that the fire would burn from the top down, but this turned out to create a smoldery, messy fire instead of a hot, clean burn. Eventually, though, an ember fell down to the bottom and let the stack burn from the top up, and then it started generating serious heat. He estimates that with around 5 kg of sawdust burning for three hours that it’s about equivalent to a 6 kW stove. While a woodworker might not have enough sawdust to run this stove every day, it could be good to have on hand to use once every few weeks when the sawdust builds up enough. [Greenhill Forge] has been hard at work building unique wood burning stoves lately, like this one we recently featured which generates and then uses charcoal as fuel.

youtube.com/embed/uVT4jgqO-co?…


hackaday.com/2026/03/24/heatin…

Cybersecurity & cyberwarfare ha ricondiviso questo.

seisola.it/

Ecco il mio sito fotografico, che ho in condivisione con René seindal
Curiosateci se volete
#fotografia
#venezia #streetphotography #blackandwhite

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

A 24h ore dalla sconfitta al referendum, la destra ha calendarizzato la #leggeelettorale truffa in Commissione alla Camera martedì 31.

@politica

Meloni aveva detto che rispettava il voto degli elettori…

Firma x difendere il tuo voto con #preferenze

✍️ votolibeguale.it

US FCC Prohibits Approval of New Foreign-Made Consumer Routers


The media in this post is not displayed to visitors. To view it, please log in.

The US Federal Communications Commission (FCC) is tasked with regulating both wired and wireless communications, which also includes a national security component. This is how previously the FCC tossed networking gear made by Huawei and foreign-manufactured drones onto its Covered List, effectively banning it from sale in the US. Now foreign-made consumer routers have been added to this list, barring explicit conditional approval on said list that would exempt them during a ‘transition phase’.

As per the FCC fact sheet, this follows after determination by an interagency body that such routers “pose unacceptable risks to the national security of the United States [..]”. This document points us to the National Security Determination PDF, which attempts to lay out the reasoning. In it is noted that routers are an integral part of every day life, and compromised routers are a major risk factor, ergo it follows that only US-manufactured routers are to be trusted.

These – so far fictional – US-manufactured consumer routers would have to feature ‘trusted supply chains’, which would seem to imply onshoring a large industrial base, though without specifying how deep this would have to go it’s hard to say what would be involved. The ‘supporting evidence’ section also only talks about firmware-related vulnerabilities, which would imply that US firmware developers do not produce CVEs.

Currently there do not appear to be any specific details on what router manufacturers are supposed to do about this whole issue, though they can continue to sell previously FCC-approved routers in the US.

Although hardware backdoors are definitely a possibility, this requires a fair bit of effort within the supply chain that should generally also fairly easily to detect. Yet after for example Bloomberg claimed in 2018 that Supermicro gear had been infested with hardware backdoors, this started a years-long controversy.

Meanwhile actually verified issues with Supermicro hardware are boringly due to software CVEs. In that particular issue from 2024 two CVEs were discovered involving a lack of validation of a newly uploaded firmware image.

All of which is reminiscent of an early 2024 White House ‘memory safety appeal’ that smelled very strongly of red herring. Although it’s easy to point at compromised hardware with scary backdoors and sneaky software backdoors hidden deep inside firmware of servers and networking devices, the truth of the matter is that sloppy input validation is still by far the #1 cause of fresh CVEs each year, especially if you look at the CVEs that are actually being actively exploited.

As for this de-facto ban on new routers being sold in the US, this will correspondingly not change much here. The best defense against issues with networking equipment is still to practice network hygiene by keeping tabs on what is being sent on the LAN and WAN sides, while a government could e.g. force consumer routers to pass a strict independent hardware and software audit paid for by the manufacturer.

Speaking as someone who used to run DIY routers for the longest time built around FreeSCO and Smoothwall Linux, there’s also always the option of turning any old PC into a router by putting a bunch of NICs and WNICs into it and run SmoothWall, OpenWRT, etc.. A router is after all just a specialized computer, regardless of what the government feels that it identifies as.


hackaday.com/2026/03/24/us-fcc…

#1