🚨 La sicurezza “temporanea” 🚨
#redhotcyber #online #it #web #ai #hacking #privacy #cybersecurity #cybercrime #intelligence #intelligenzaartificiale
reshared this
I tool per di Red team si evolvono: l’open source entra in una nuova fase
📌 Link all'articolo : redhotcyber.com/post/i-tool-pe…
#redhotcyber #news #penetrationtesting #sicurezzainformatica #cybersecurity #testingdisicurezza
I tool per di Red team si evolvono: l'open source entra in una nuova fase
I tool agentici per il penetration testing stanno aumentando, open source in crescitaMassimiliano Brolli (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Addio a NTLM! Microsoft verso una nuova era di autenticazione con kerberos
📌 Link all'articolo : redhotcyber.com/post/addio-a-n…
Per oltre tre decenni è stato una colonna silenziosa dell’ecosistema Windows. Ora però il tempo di NTLM sembra definitivamente scaduto.
Microsoft ha deciso di avviare una transizione profonda che segna la fine di un’era e l’inizio di un nuovo #modello di #autenticazione più sicuro. NTLM, acronimo di New Technology #LAN Manager, nasce nel 1993 come uno dei primi #sistemi di #autenticazione basati su password sviluppati da #Microsoft.
A cura di Silvia Felici
#redhotcyber #news #microsoft #ntlm #sicurezzainformatica #protocollodiautenticazione #password #cybersecurity #hacking #malware #ransomware #sicurezzadigital #transizioneinformatica #protezionedeidati
Addio a NTLM! Microsoft verso una nuova era di autenticazione con kerberos
Microsoft annuncia la fine dell'era NTLM e l'inizio di una nuova era di autenticazione più sicura con Kerberos.Silvia Felici (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
❌ SE PENSI CHE UN FIREWALL BASTI, QUESTO CORSO NON FA PER TE. ❌
Se invece vuoi capire:
✅ come ragiona un attaccante
✅ perché certi sistemi cadono sempre
✅ cosa c’è prima del pentest
allora sei nel posto giusto.
🔥 Cyber Offensive Fundamentals – Live Class
40 ore. Live. Niente scorciatoie.
🔗 Programma: redhotcyber.com/linksSk2L/cybe…
🎥 Intro del prof: youtube.com/watch?v=0y4GYsJMoX…
💎 Prima edizione = prezzo irripetibile
⛔ Numero chiuso
Per info e iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com
#redhotcyber #formazione #pentesting #pentest #formazionelive #ethicalhacking #hacking #cybersecurity #penetrationtesting #cti #cybercrime #infosec #corsi #liveclass #hackerhood #pentesting
Cyber Offensive Fundamentals - Corso ethical hacking, penetration test
Corso in Live Class di Cyber Offensive Fundamentals: scopri penetration testing, vulnerabilità e strumenti pratici per la sicurezza informatica offensiva.Red Hot Cyber
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187503/apt…
#securityaffairs #hacking #Poland #Rusia
Cyberattacks Disrupt Communications at Wind, Solar, and Heat Facilities in Poland
CERT Polska said cyberattacks hit 30+ wind and solar farms, a manufacturer, and a major CHP plant supplying heat to nearly 500,000 people.Pierluigi Paganini (Security Affairs)
reshared this
🚨 WalutaTu car valuation platform hit by data breach
Italian car valuation platform WalutaTu suffered a data breach with customer data allegedly exposed on dark web forums.
Cybersecurity & cyberwarfare reshared this.
Azienda italiana all’asta nel Dark Web: bastano 1.500 dollari per il controllo totale
📌 Link all'articolo : redhotcyber.com/post/azienda-i…
#redhotcyber #news #cybercrime #mercatonero #trasformazionedigitale #cybersecurity #hacking #ransomware
Azienda italiana all'asta nel Dark Web: bastano 1.500 dollari per il controllo totale
Un'azienda italiana del settore manifatturiero è stata messa all'asta su un forum underground per 700 dollari, con un valore stimato di 6 milioni di dollari.Bajram Zeqiri (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
🔎 The AI social network risk nobody is watching
AI-driven social networks amplify manipulation, data harvesting and behavioral profiling. Algorithmic feedback loops, opaque models and weak governance could turn AI platforms into large-scale influence and surveillance systems.
We’ve dissected a bit, over the rising #ClawBot phenomenon: ransomnews.online/blog/theaiso…
BLOG @ ransomNews - When your AI assistant asks for root access
ransomNews, your go-to source for ransomware news, insights, and analysis, also home of RedACT monthly threat reportransomnews.online
Ricardo Antonio Piana likes this.
Cybersecurity & cyberwarfare reshared this.
Sistemi SCADA a rischio: perché la sicurezza del file system conta più che mai
📌 Link all'articolo : redhotcyber.com/post/sistemi-s…
#redhotcyber #news #sicurezzainformatica #cybersecurity #vulnerabilita #scadasicurezza #iconicsvulnerabilità
Sistemi SCADA a rischio: perché la sicurezza del file system conta più che mai
Scopri la vulnerabilità CVE-2025-0921 nella Suite ICONICS e come può compromettere l'integrità dei sistemi SCADA. Leggi l'analisi tecnica e le azioni di mitigazione.Carolina Vivianti (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Vulnerabilità critica in Apache bRPC: esecuzione di comandi arbitrari sul server
📌 Link all'articolo : redhotcyber.com/post/vulnerabi…
Un team di ricerca di #CyberArk Labs ha individuato una falla critica nel diffuso #framework Apache bRPC, che permette l’esecuzione remota di comandi su un #server. Il problema di #sicurezza è stato classificato con l’identificatore CVE-2025-60021 e un livello di gravità pari a 9,8 secondo la scala #CVSS.
A cura di Bajram Zeqiri
#redhotcyber #news #cyberattack #cybersecurity #hacking #vulnerabilita #apache #brpc #sicurezzainformatica #ciberattacchi #vulnerabilitaapertura #protezioneinformatica #safetyinformatica #malware
Vulnerabilità critica in Apache bRPC: esecuzione di comandi arbitrari sul server
Scoperta vulnerabilità critica in Apache bRPC che consente esecuzione comandi arbitrari. Il problema è stato risolto nella versione 1.15.0.Bajram Zeqiri (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Crouching Typewriter, Hidden PC
Go back a couple of generations, and rather than a laptop or a luggable, the office accessory of choice was a portable typewriter. As the 20th century wore on, the typewriter became electric before eventually being eclipsed by luggable and laptop computers. On YouTube, [Prototype] is turning back the clock, by turning an old Smith-Corona electric typewriter into a luggable computer– with a stretch goal of still being able to type.
Yeah, just gutting the typewriter and shoving an SBC inside wasn’t ambitious enough for [Prototype]: his goal is a working typewriter and an x86 gaming PC. To facilitate this, he guts the Smith-Corona keyboard, and 3D-prints a new top plate to add a little more vertical space in the old typewriter. The new top does recreate the original layout and the Corona switches get printed adapters to fit them to mechanical switches [Prototype] is using with a vibe-coded Arduino. Why one would bother with ChatGPT when QMK is right there, we could not say, but feel free to skip 6:20 to 15:00 if you’re watching the video but want to avoid that side quest.
Unfortunately, the “get the keyboard working” side-quest is either faked or deferred to video part II, which has not been posted yet. In this video he demonstrates that he can actuate a single hammer with a servo, but that’s a far cry from a working typewriter so, we’re really hoping he comes through on that promise in Part Two. Even if the build stops with just one hammer, that would give the tactile sound-and-feel that other builds turn to solenoids for. Squeezing a small-form-factor motherboard and graphics card into the old Smith-Corona is also going to be an interesting challenge. It’s certainly going to be a step up from using the keyboard as a terminal.
If you like this project but balk at the idea of destroying a working piece of vintage office equipment, it is possible to turn a typewriter into a USB keyboard non-invasively.
If you like this project at all, join us in thanking [Katie] for the tip. Not your cup of tea? Tell us what is, with a tip of your own.
youtube.com/embed/Bgk944awGcQ?…
Writing an Optimizing Tensor Compiler from Scratch
Not everyone will write their own optimizing compiler from scratch, but those who do sometimes roll into it during the course of ever-growing project scope creep. People like [Michael Moroz], who wrote up a long and detailed article on the why and how. Specifically, a ‘small library’ involving a few matrix operations for a Unity-based project turned into a static optimizing tensor compiler, called TensorFrost, with a Python front-end and a shader-like syntax, all of which is available on GitHub.
The Python-based front-end implements low-level NumPy-like operations, with development still ongoing. As for why Yet Another Tensor Library had be developed, the reasons were that most of existing libraries are heavily focused on machine learning tasks and scale poorly otherwise, dynamic flow control is hard to implement, and the requirement of writing custom kernels in e.g. CUDA.
Above all [Michael] wanted to use a high-level language instead of pure shader code, and have something that can output graphical data in real-time. Taking the gamble, and leaning on LLVM for some parts, there is now a functional implementation, albeit with still a lot of work ahead.
Need a Curved Plastic Mesh? Print Flat, Curve Later
Need a plastic mesh in a custom pattern? 3D print it, no problem. But what if one needs a curved plastic mesh? That’s considerably harder to 3D print, but [Uncle Jessy]’s figured out a simple approach: 3D print the mesh flat, then break out a mold and a heat gun.
Of course, there are a few gotchas, but [Uncle Jessy] shares his tips for getting the most reliable results. The important part is to design and 3D print a mold that represents the final desired shape. Then print the mesh, and fit it into a frame. Heat things up with a heat gun, and press into the mold to deform the mesh while it’s still soft. It’s much easier seen than explained, so take a few moments to check out the video, embedded below the page break.Custom eye inserts become a breeze.
Because the plastic in a mesh is so thin, [Uncle Jessy] says to keep the heat low and slow. The goal is to have the mesh stretch and deform, not melt.
Speaking of heat, when thermoforming, one usually needs to make the mold out of heat-resistant material. But the thermal mass of a mesh is so small that it really doesn’t matter much — there just isn’t enough heat trapped in the mesh to really damage a mold. As long as the mold is reasonably dense, there’s no need to go overboard with making it heat resistant.
The whole process takes a little practice, but since the meshes are so fast to print and use so little plastic it’s easy to experiment a little.
As for the meshes themselves, a simple way to print a mesh is just to print a disc with no top or bottom layers, only infill. Set the infill pattern to honeycomb, for example, for an easy hexagon mesh. We’ve seen a variant of this “exposed infill” idea used to create a desiccant container, and using it to print a mesh pattern easily is a neat trick, too.
Why might one need to reshape a mesh into a curve? Perhaps to custom-fit a costume piece, or make custom eye inserts for masks, as shown here. In any case, it’s a good technique to keep in the back of one’s mind, and if you put it to good use, drop us a tip!
youtube.com/embed/TsG89NgZJO8?…
Ordering Pizza On Your Sega Dreamcast Is Very Clunky Indeed
If you’re ordering pizza these days, you’re probably using a smartphone app or perhaps still making a regular old phone call. If you’re creative and a little bit tricky, though, you can order pizza right from your Sega Dreamcast. You just need to jump through a few hoops, as demonstrated by [Delux] and [The Dreamcast Junkyard] in the recent past.
You used to be able to order pizza on the Dreamcast natively, all the way back in 1999. However, the modern Domino’s website doesn’t really work on the ancient Dreamcast browser anymore. The simple fact is that web technology has advanced a long way in the last couple of decades, and Sega didn’t exactly spend a lot of time maintaining a browser on a console that died mere months after its rivals hit the market.
Thus, to place a pizza order on the Dreamcast these days, you need to work within its limitations. [Delux] uses the Dreamcast with the Broadband Adapter to access a PC on the local network via the XDP web browser. That PC is hosting Web Rendering Proxy, a tool which converts complicated modern websites into something a simpler machine can parse. From there, it’s a matter of connecting to the Domino’s website, and slowly clicking through the online ordering pages. Between the proxy delay, the Dreamcast’s glacial processing speed, and the clunky Domino’s ordering interface, it takes ages. Never before has adding coupons felt like such a hassle. Still, after 15 minutes of fuss, the order is completed… and a short time later, a hot fresh pizza arrives.
It’s a fun hack, but really it’s the PC running the proxy that’s doing the heavy lifting. In 2026, it’s far more elegant to order a pizza from your Nintendo Wii.
youtube.com/embed/dEMqq7-8K5s?…
Do Expensive Filaments Make 3D Printed Wrenches Better?
What filament is strongest? The real answer is “it depends”, but sometimes you have a simple question and you just want a simple answer. Like, which material makes the best 3D printed wrench? [My Tech Fun] printed a bunch of options to find out — including some expensive filaments — and got some interesting insights in the process.
His setup is simple: he printed a bunch of 13 mm open-end wrenches, and tested each one to failure by cranking on a clamped digital torque meter until the wrench failed by breaking, or skipping.
[My Tech Fun] tested a total of eighteen filaments, from regular basic PLA, PETG, ABS and ASA, and a variety of carbon fiber-infused filaments including PPA-CF. TPU is included for fun, and there’s also a wrench printed with continuous carbon fiber, which requires a special printer. More on that in a moment. First, let’s get to the results!PETG wrench reinforced with continuous carbon fiber. The result is extremely stiff compared to without.
Unsurprisingly, TPU fared the worst at 0.8 nM which is roughly “unscrewing the cap of a water bottle” territory. Top performers included the wrench printed with continuous carbon fiber reinforcement (failing at 3.7 nM) and a couple printed in expensive PPA-CF (high-temperature nylon filament with carbon fiber) topped the list at 4.3 nM. Everything else landed somewhere in between, with plain PLA surprisingly outperforming some CF blends.
The continuous carbon fiber wrench was printed on a FibreSeeker printer, which reinforces a print with solid fibers embedded into the plastic instead of chopped particles, and such prints are noticeably more resistant to bending. Check out our earlier coverage for a closer look at what the FibreSeeker does.
This is a good time to mention that the wrench 3D model used is not at all optimized for best results with 3D printing. But that’s okay; this is really about the filaments, not the wrench.
The wrench model is just a way to test things in a familiar and highly visual, relatable way. You can see each one in action in the video below, and seeing [My Tech Fun] turn the wrenches gives a very good idea of just how much force is involved, with a relatable display of just how strong the different filaments are.
youtube.com/embed/b2a1h-bc2Zw?…
Ex alleato avverte che il declino di Trump è "significativo" dopo il discorso disastroso
L'ex avvocato della Casa Bianca Ty Cobb ha affermato che il declino cognitivo di Donald Trump è "palpabile".
newrepublic.com/post/205474/do…
Ex-Ally Warns Trump’s Decline Is “Significant” After Disastrous Speech
Former White House lawyer Ty Cobb said Donald Trump’s cognitive decline is “palpable.”The New Republic
Rozaŭtuno likes this.
reshared this
No, ma dai!
Non sembrava assolutamente prima del discorso!
Politica interna, europea e internazionale reshared this.
Secondo un rapporto, gli hacker russi hanno violato la rete elettrica polacca a causa della scarsa sicurezza.
Venerdì, il Computer Emergency Response Team (CERT) polacco, che fa parte del Ministero degli Affari Digitali, ha pubblicato un rapporto tecnico su un incidente avvenuto alla fine dello scorso anno, in cui presunti hacker del governo russo hanno hackerato parchi eolici e solari e una centrale termoelettrica.
techcrunch.com/2026/01/30/russ…
Russian hackers breached Polish power grid thanks to bad security, report says | TechCrunch
The Polish government accused a Russian government hacking group of hacking into energy facilities taking advantage of default usernames and passwords.Lorenzo Franceschi-Bicchierai (TechCrunch)
Auster likes this.
reshared this
Sei senatori accusano il vice procuratore generale di un conflitto “evidente” sulle criptovalute, citando l’indagine di ProPublica
I senatori hanno presentato una lettera chiedendo al funzionario di alto livello del Dipartimento di Giustizia, Todd Blanche, di chiarire la legalità delle sue azioni, facendo riferimento al rapporto di ProPublica secondo cui possedeva almeno 159.000 dollari in asset correlati quando ha chiuso le indagini sulle criptovalute.
propublica.org/article/todd-bl…
Six Senators Accuse Deputy Attorney General of “Glaring” Crypto Conflict, Cite ProPublica Investigation
The senators presented a letter demanding that top DOJ official Todd Blanche clarify the legality of his actions, pointing to ProPublica reporting that found he owned at least $159,000 in related assets when he shut down crypto investigations.Diego Sorbara (ProPublica)
reshared this
Le aziende dell'euro devono abbandonare il cloud dello Zio Sam e diventare native dell'UE
Nell'era di Trump-redux del 2026, le aziende europee stanno finalmente prendendo sul serio i dati, e questo significa fare i bagagli da Redmond a Seattle e trasferire i carichi di lavoro più sensibili a casa. Non si tratta solo di una messa in scena di conformità; è una vera e propria messa in scena di sicurezza economica nazionale.
theregister.com/2026/01/30/eur…
Euro firms must ditch Uncle Sam's clouds and go EU-native
Opinion: Just because you're paranoid about digital sovereignty doesn't mean they're not after youSteven J. Vaughan-Nichols (The Register)
reshared this
L'EFF chiuderà venerdì in solidarietà con la chiusura nazionale
@eff rimarrà chiusa venerdì 30 gennaio nell'ambito della chiusura nazionale in segno di protesta contro ICE e CBP e contro la brutalità e il terrore che loro e altre agenzie federali continuano a infliggere alle comunità di immigrati e a chiunque si schieri con loro.
«Non prendiamo questa decisione alla leggera, ma non resteremo in silenzio.»
eff.org/deeplinks/2026/01/eff-…
EFF to Close Friday in Solidarity with National Shutdown
On January 30, EFF will be closed as part of the national shutdown in opposition to ICE, CBP, and the brutality and terror they and other federal agencies continue to inflict on immigrant communities and any who stand with them.Electronic Frontier Foundation
reshared this
NEW: An informant told the FBI in 2017 that Jeffrey Epstein had a "personal hacker," according to a document released today.
The document does not name the hacker, but says he is Italian, developed and sold zero-days (iOS and Blackberry) to governments such as the U.K. and the United States, and even Hezbollah, which paid him with “a trunk of cash.”
techcrunch.com/2026/01/30/info…
Informant told FBI that Jeffrey Epstein had a ‘personal hacker’ | TechCrunch
A document published by the Justice Department quotes an FBI informant in 2017 that alleged Jeffrey Epstein had a “personal hacker.”Lorenzo Franceschi-Bicchierai (TechCrunch)
reshared this
Hackaday Podcast Episode 355: Person Detectors, Walkie Talkies, Open Smartphones, and a WiFi Traffic Light
Another chilly evening in Western Europe, as Elliot Williams is joined this week by Jenny List to chew the fat over the week’s hacks.
It’s been an auspicious week for anniversaries, with the hundredth since the first demonstration of a working television system in a room above a London coffee shop. John Logie Baird’s mechanically-scanned TV may have ultimately been a dead-end superseded by the all-electronic systems we all know, but the importance of television for the later half of the 20th century and further is beyond question.
The standout hacks of the week include a very clever use of the ESP32’s WiFi API to detect people moving through a WiFi field, a promising open-source smartphone, another ESP32 project in a comms system for cyclists, more cycling on tensegrity spokes, a clever way to smooth plaster casts, and a light sculpture reflecting Wi-Fi traffic. Then there are a slew of hacks including 3D printed PCBs and gem-cut dichroic prisms, before we move to the can’t-miss articles. There we’re looking at document preservation, and a wallow in internet history with a look at the Netscape brand.
As usual all the links you need can be found below, so listen, and enjoy!
html5-player.libsyn.com/embed/…
Or download the podcast old-school, with a direct link to the MP3 file in question.
Where to Follow Hackaday Podcast
Places to follow Hackaday podcasts:
Episode 354 Show Notes:
What’s that Sound?
- Jenny got the sound right. Did you? Only one way to find out: put your handle and guess in here.
News
Interesting Hacks of the Week:
- Make Your Own ESP32-Based Person Sensor, No Special Hardware Needed
- espectre/micro-espectre at main · francescopace/espectre · GitHub
- GitHub – francescopace/micropython-esp32-csi: MicroPython – a lean and efficient Python implementation for microcontrollers and constrained systems
- Heart Rate Monitoring Via WiFi
- Heart Rate Measurement Via WiFi, The DIY Way
- Pi Compute Module Powers Fully Open Smartphone
- These Ultra-Cute, Handsfree Walkie-Talkies Are Built For Cycling
- PLA Mold To Plaster Bust, No Silicone Needed
- Building A Light That Reacts To Radio Waves
- Bike Spokes, Made Of Rope
Quick Hacks:
- Elliot’s Picks:
- Using 3D Printing And Copper Tape To Make PCBs
- X-Cube Prism Becomes Dichroic Disco Ball
- Light Following Robot Does It The Analog Way
- Jenny’s Picks:
- Post-rampocalyptic Chip-Swap Provides Desktop Memory At Laptop Prices
- Wikipedia As A Storage Medium
- The Defunct Scooter Company, And The Default Key
Can’t-Miss Articles:
- Ask Hackaday: How Do You Digitize Your Documents?
- Gears Are Old And Busted, Capstans Are Cool
- Page-turning Book Scanner Roundup
- DIY Book Scanner Processes 600 Pages/hour
- Zombie Netscape Won’t Die
hackaday.com/2026/01/30/hackad…
Whipping Up A Quick Adapter To Hack The Xbox 360
[Androxilogin] had a problem. An Xbox 360 Slim had shown up in the post, but failed to give much more than a beep when turned on. Disassembly revealed some missing components, but replacing them failed to breathe life into the beleaguered console. Deeper repair was needed, and that would require a special adapter which [Androxilogin] was able to whip up from scratch.
When it comes to the Corona models of the Xbox 360, it’s often necessary to use something called a “post-fix adapter” to do certain diagnostic and repair tasks. These adapters consist of a bracket which wraps around the CPU, and probes the solder ball for the POST_OUT signal which is otherwise difficult to access on the motherboard itself. Adapters are readily available online, and are usually manufactured as a PCB with a protruding contact to make a connection.
For [Androxilogin], though, time was short. Rather than wait for adapters to ship, it was quicker to whip up a custom piece to do the same job. This was achieved with a 3D print which was able to clamp around the CPU, while snugly holding a piece of tinned 30 AWG wire to poke the critical point beneath the chip. After a couple of attempts to get the sizing just right, [Androxilogin] was able to make the necessary connection which enabled installing Xell Loader on to the machine to bring it back to life.
If you’re eager to make your own post-fix adapter, files are available on Printables, with more details over on Reddit to boot. While the Xbox 360 is starting to suffer some awkward symptoms of age. we nevertheless still see a steady stream of hacks come in for this vintage machine. If you’re tackling your own retro console mods, be sure to notify the tipsline.
Building Natural Seawalls To Fight Off The Rising Tide
These days, the conversation around climate change so often focuses on matters of soaring temperatures and extreme weather events. While they no longer dominate the discourse, rising sea levels will nonetheless still be a major issue to face as global average temperatures continue to rise.
This poses unique challenges in coastal areas. Municipalities must figure out how to defend their shorelines, or decide which areas they’re willing to lose. The City of Palo Alto is facing just this challenge, and is building a natural kind of seawall to keep the rising tides at bay.
Seawalls That Breathe
The traditional way to fight back against the sea is with seawalls. These typically consist of steep slopes constructed on the shoreline, which are designed to reflect wave energy back to the sea and stop it from eating away at the land. They are normally built using rocks, steel, or concrete walls to dissipate the energy of incoming waves. They are typically simple to design and construct, and prove relatively effective at staving off erosion. However, they can also be quite imposing and unsightly, and often do very little to support native fauna and flora.The horizontal levee design (left) compared to a traditional rock-based seawall (right). The latter is simpler and quicker to construct, but is far less visually appealing and does little to support the local ecosystem. Credit: City of Palo Alto
The City of Palo Alto is taking an altogether different approach by building a horizontal levee to protect the shore of Harbor Marsh. It eschews the usual steeply sloped seawall concept entirely. Instead, the coast is to be given a gentle gradient constructed of earth, creating a so-called “ecotone slope”—a long, sloping habitat down to the water line. Where the tide meets the shore, native plantings will support a tidal marsh, transitioning to a freshwater marsh with different plants farther up the slope, with volunteers planting 35 species in all. It’s hoped that restoring these habitats in the area will provide support to species like the Ridgway’s rail and the salt marsh harvest mouse.Wastewater is used to support the growth of native plant species, helping to create the transition between the freshwater marsh and the tidal marsh along the “ecotone slope.” Credit: City of Palo Alto
Furthermore, from the top of the horizontal levee, wastewater will be fed in to support the growth of native plants, which will work with the soil to filter out pollutants as it makes its way to the sea in a process referred to as “polishing treatment”. It’s not intended to remove heavy pollutants from the water; this work is handled at existing municipal water treatment facilities. What the levee can handle is soaking up some of the nitrogen and phosphorous content to support plants on the slope. This reduces the amount of these nutrients that gets released out into the bay, which can cause fish die-offs, algal blooms, and other undesirable consequences.Volunteers came together to plant native species on the horizontal levee. Construction is expected to be completed by summer this year. Credit: City of Palo Alto
Due to its limited size, the horizontal levee will only handle 100,000 gallons of wastewater per day, which isn’t much against the 20 million gallons that currently flows out into the bay. Ultimately, that’s because the work at Harbor Marsh is a pilot project for the City of Palo Alto. Ideally, it will prove effective in both limiting coastal erosion as well as supporting native plants and animals. If it proves successful, it could become a strategy used elsewhere along the San Francisco coastline and beyond. The Bay Area as a whole needs to be protected against rising sea levels, as the name implies, so projects like this are a key focus as authorities plan for the future.
As it stands, large artificial seawalls probably aren’t going anywhere. It’s very straightforward to build massive concrete and steel structures to defend a piece of coastline. The engineering involved is well understood, and the construction process does not require particular finesse in the selection of plants or the maintenance of native habitats. However, in areas where it’s desirable to slow erosion in a greener fashion, horizontal levees could become popular. After all, it’s a lot nicer to stroll on a path alongside a burgeoning native marshland than it is to feel the sun bouncing off acres of harsh concrete. If the Harbor Marsh experiment works, expect to see similar projects take off in coastal areas around the world.
Aperti i battenti del primo negozio di robot umanoidi al mondo in Cina. Saremo pronti?
📌 Link all'articolo : redhotcyber.com/post/aperti-i-…
#redhotcyber #news #robotumanoidi #negozidelfuturo #assistenzarobot #intrattenimentorobot #wuhan
Aperti i battenti del primo negozio di robot umanoidi al mondo in Cina. Saremo pronti?
Inaugurato a Wuhan il negozio 7S, dove sono esposti 17 modelli di robot umanoidi per varie applicazioni, dall'industria alla sanità.Carolina Vivianti (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
NEW: Russian government hackers were able to break into parts of Poland's energy infrastructure thanks to default usernames and passwords and no multi-factor authentication, the Polish government said in a report.
facepalm.gif
techcrunch.com/2026/01/30/russ…
Russian hackers breached Polish power grid thanks to bad security, report says | TechCrunch
The Polish government accused a Russian government hacking group of hacking into energy facilities taking advantage of default usernames and passwords.Lorenzo Franceschi-Bicchierai (TechCrunch)
reshared this
Gli Stati Uniti hanno indagato sulle affermazioni secondo cui le chat di WhatsApp non sono private
Secondo alcune interviste e il rapporto di un agente visionati da Bloomberg News, le forze dell'ordine statunitensi stanno indagando sulle accuse mosse da ex collaboratori di Meta Platforms Inc. secondo cui il personale di Meta potrebbe accedere ai messaggi di WhatsApp, nonostante l'azienda abbia dichiarato che il servizio di chat è privato e crittografato.
reshared this
Azienda automotive italiana nel mirino degli hacker: in vendita l’accesso per 5.000 dollari
📌 Link all'articolo : redhotcyber.com/post/azienda-a…
#redhotcyber #news #cybersecurity #hacking #automotive #sicurezzainformatica #venditaaccesso
Azienda automotive italiana nel mirino degli hacker: in vendita l'accesso per 5.000 dollari
Un accesso amministrativo a una presunta car company italiana è in vendita sul dark web. Ma il fatturato dichiarato solleva dubbi sulla reale natura del target.Luca Stivali (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Comprehensive Power Management for the Raspberry Pi
The Raspberry Pi has been a revolutionary computer in the maker space, providing a full Linux environment, GUI, and tons of GPIO and other interfacing protocols at a considerably low price. This wasn’t its original intended goal, though. Back in the early 2010s it was supposed to be an educational tool for students first, not necessarily a go-to for every electronics project imaginable. As such there are a few issues with the platform when being used this way, and [Vin] addresses his problems with its power management in his latest project.
[Vin]’s main issue is that, unlike a microcontroller, the Raspberry Pi doesn’t have a deep sleep function. That means that even when the operating system is shut down the computer is still drawing an appreciable amount of current, which will quickly drain some batteries. We’ve covered [Vin]’s farm and his use case for the Raspberry Pi in the past, but a quick summary is that these boards are being used in a very rugged environment where utility power isn’t as reliable as he would like.
In [Vin]’s post he not only outlines his design for the board but goes through his design process, starting by using discrete logic components and then trying out various microcontrollers until settling on an ATmega88. The microcontroller communicates with the Raspberry Pi over I2C where the Pi can request a power-down as well as a time for future power-on. A latching relay controlled by the microcontroller ensures the Pi doesn’t drain any battery while the ATmega can put itself into actual sleep in the meantime.
The build for this project goes into an impressive amount of detail, and not only are the designs and code available on the project’s GitHub page but [Vin] also wrote another blog post which uses this project to go over his design philosophy more broadly.
Malware diffusi su LinkedIn. Cosa sapere e a cosa fare attenzione
@Informatica (Italy e non Italy 😁)
I cyber criminali sfruttano i messaggi privati di LinkedIn per diffondere malware contenuti in finti documenti aziendali dai nomi pertinenti con le aziende e le attività professionali delle vittime designate. Cosa sapere, cosa fare e cosa non fare
L'articolo Malware diffusi su LinkedIn. Cosa sapere e a cosa fare
like this
Sabrina Web 📎 reshared this.
I replaced eight different 5V, 12V, and 20V power supplies (for network gear, ext. hard drive, Milk-V board, air monitor) with two large USB-C ones (and various USB-C PD trigger cables).
It might be the most satisfying thing I've done all year.
Cybersecurity & cyberwarfare reshared this.
I ordered a batch of those with the same goal in mind. Unfortunately they didn't work at all. Tried various USB-PD supplies, cables, etc, no dice. They'd just power cycle at 5Hz.
Today I returned them and ordered some more from a different aliexpress seller. I hope the next batch work.
Ivanti corre ai ripari: falle zero-day colpiscono l’Endpoint Manager Mobile
📌 Link all'articolo : redhotcyber.com/post/ivanti-co…
#redhotcyber #news #cybersecurity #hacking #vulnerabilita #patch #ivanti #endpointmanager #mobile
Ivanti corre ai ripari: falle zero-day colpiscono l'Endpoint Manager Mobile
Ivanti rilascia aggiornamenti di sicurezza per due falle nel Endpoint Manager Mobile, utilizzate per attacchi zero-day. Scopri come proteggerti.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187496/sec…
#securityaffairs #hacking
SmarterTools patches critical SmarterMail flaw allowing code execution
SmarterTools fixed two SmarterMail flaws, including a critical bug (CVE-2026-24423) that could allow arbitrary code execution.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187488/sec…
#securityaffairs #hacking
U.S. CISA adds a flaw in Ivanti EPMM to its Known Exploited Vulnerabilities catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Ivanti EPMM to its Known Exploited Vulnerabilities catalog.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Buon Compleanno Ingegnere!
📌 Link all'articolo : redhotcyber.com/post/rhc-inter…
#redhotcyber #online #it #web #ai #hacking #privacy #cybersecurity #cybercrime #innovazione #intelligenzaartificiale
Intervista Leonardo Chiariglione, padre dell'MPEG e dell'MP3: "l’Italia deve essere rifondata, a partire dalla scuola"
Scopri il Genio dietro gli Standard MPEG ed MP3. Intervista Esclusiva di Red Hot Cyber a Leonardo Chiariglione, grande innovatore italiano.Redazione RHC (Red Hot Cyber)
Ricardo Antonio Piana likes this.
reshared this
Companion MIDI Pedal Helps Roland Groovebox Along
The Roland SP-404 Mk2 is a popular groovebox that can deliver a great beat if you know how to use it. If you’re seeking greater control than is available out of the box, though, you might like to try a custom pedal built by [Romain Dereu].
The concept is simple enough—[Romain] whipped up a bespoke MIDI device to specifically control various features of the SP-404. It’s based on an Arduino Nano, though it could also be built with an Arduino Uno if so desired. The microcontroller sends the requisite MIDI messages out via its serial UART. The microcontroller is built into a pedal-style enclosure with a big toggle switch and a foot switch. This enables the triggering of various pads on the SP-404, with modes selected via the toggle.
It’s a simple build that opens up new possibilities when playing with the SP-404. If you’ve ever wanted a custom device to spit out some specific MIDI commands to control the synths or drum machines in your performance rig, this project is a great example of how easy this is to achieve. Meanwhile, if you’re whipping your own custom MIDI gear at home, we always love to see it land on our tipsline!

DigiDavidex
in reply to Redhotcyber • • •td reshared this.