Resin Injection CRT Cataract Surgery On Macintosh Monitor


The media in this post is not displayed to visitors. To view it, please log in.

Nothing lasts forever, but you’d think the leaded-glass face of a CRT would not be a place you’re likely to see Father Time causing failures. Alas, the particle accelerators we all lovingly stared at were very often not unitary pieces of glass: in case of implosion, safety glass was glued onto the front of the CRT. That glue will inevitably fail, as happened to the 20″ Mac-branded Triniton [Epictronics] had with a PowerPC 6100 that needed a few other repairs.

His version of cataract surgery was the most interesting. Usually cataracts are an issue for much older CRTs than the 90s-era Macintosh display featured here, but this particular display was literally pulled out of the trash and not stored well before that, so that’s probably what accounts for its accelerated aging. Usually what people do with CRT Cataracts is use heat to remove the safety glass and failing adhesive. [Epictronics] has a safer technique, however: inject fresh adhesive into the gap that’s forming around the edge of the display.

With a syringe and UV cure resin, he slowly and laboriously goes around the edge of the display to fill in the bubbles that can be reached. Luckily, the delamination on this CRT doesn’t extend very far beyond the edges, so a standard syringe tip could reach all the problem areas.

It looks good now, but if it doesn’t hold, [Epictronics] points out he can still remove the glass with the traditional hot-air technique. We hope it holds up; this is a nice technique to try if you have a CRT with the early stages of cataract delamination. For future reference, it took about one milliliter of resin to fill each square millimeter of affected area.

Having repaired the monitor by about fifteen minutes into the video, [Epictronics] spends the remaining seventeen minutes getting the Mac running with its original CD-ROM drive (that needed recapped) and a DOS compatibility card.

We’ve featured [Epictronics] repairs here before, like when he tore down and rebuilt an IBM Model F keyboard.

youtube.com/embed/b5Aw3wqwa0M?…


hackaday.com/2026/03/21/resin-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Ieri ho scoperto che su LibreOffice si possono generare codici QR


cross-posted from: feddit.it/post/27786611

TIL you can easily create a QR Code inside LibreOffice

I needed a QR Code generator for a document. After long wandering on the web without finding a QR Code generator that doesn't use a proprietary URL shortener, I discovered that you can easily do it inside LibreOffice.



TIL you can easily create a QR Code inside LibreOffice


I needed a QR Code generator for a document. After long wandering on the web without finding a QR Code generator that doesn't use a proprietary URL shortener, I discovered that you can easily do it inside LibreOffice.


Cybersecurity & cyberwarfare ha ricondiviso questo.

NEW RESEARCH - I'm pretty proud we were able to pound out and ship a piece on this within 3 days. But its importance may get lost in the news cycle.

While we continue to struggle with things like keeping private keys secret, we're also busy introducing autonomous, nondeterministic agents into every place possible that are subject both to all the problems we still struggle with *AND* largely interminable new problems that can't be easily guardrailed-away.

Sure, this is a Chinese company so it's difficult for many folks to envision the same thing happening in the US, but we are 100% setting ourselves up for it, and companies and professionals not gleefully joining in the regressions are being continually punished.

This is a warning sign, and unfortunately, we will fail to heed it.

dti.domaintools.com/research/e…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

#PolyShell flaw exposes #Magento and #Adobe #Commerce to file upload Attacks
securityaffairs.com/189744/sec…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Signal nel mirino avverte il CERT-FR. Attacchi mirati contro politici e giornalisti europei

📌 Link all'articolo : redhotcyber.com/post/signal-ne…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #ingegneriasociale #appdimessaggistica #signal

Cybersecurity & cyberwarfare ha ricondiviso questo.

Pokémon Go, i giocatori hanno addestrato l’AI di Niantic per mappare il mondo senza saperlo


reshared this

3D Printed Clock Just Taps It In


The media in this post is not displayed to visitors. To view it, please log in.

The famous cuckoo clock, with its moving, chirping mechanical bird indicating various divisions of time, has been around since at least the 1600s. The most famous of them come from the Black Forest area of Germany, and are still being made worldwide even today. Other clocks with different themes take their inspiration from the standard bird-based clocks from history, and thanks to modern 3D printing and other technologies we can make clocks with almost any type of hour indicator we’d like with relative ease like [Jason]’s golf clock.

While the timekeeping mechanism is a fairly standard analog clock, the hour indicator mechanism in this build is a small figure which putts a golf ball into a hole once every hour. It uses an ESP32-C3 at its core, which controls a pair of servos. One controls the miniature golfer, and the other lifts the ball up into position on the green at the appointed time. Once the ball is in place, the figure rotates, striking the ball towards the hole. Although it looks almost like the ball is guided by a magnet of some sort at first glance, the ball naturally finds its way into the hole by the topography of the green alone.

Almost all of the parts in this build are 3D printed, including the green, the golfer, the frame, and a number of the servo components. There’s also a small sensor that detects if the ball has actually made it into the hole and back to the lifting mechanism, and to that end there’s also a number of configurations that can be made in the software to ensure that the servos controlling everything all work together to putt the ball properly.

While not a cuckoo clock in the strict sense, we always appreciate a unique clock around here, but if you demand your clocks have ideological purity we’ll point you to this cuckoo clock built into a wristwatch.

youtube.com/embed/kwCGFGd-UFI?…


hackaday.com/2026/03/21/3d-pri…

Joe Vinegar reshared this.

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

260 – I robot hanno bisogno di una targa camisanicalzolari.it/260-i-rob…
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Bug da 9.8 di score in Oracle Identity Manager e Web Services Manager. Aggiornare subito

📌 Link all'articolo : redhotcyber.com/post/bug-da-9-…

#redhotcyber #news #cybersecurity #hacking #vulnerabilità #oracle

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Quando i dati diventano intelligence: la lezione strategica della Charles de Gaulle

📌 Link all'articolo : redhotcyber.com/post/quando-i-…

#redhotcyber #news #intelligenza #datipubblici #gps #strava #sicurezzainformatica #hacking #cybersecurity #portaerei

Portable CRT TV Becomes Retro Cyberdeck


The media in this post is not displayed to visitors. To view it, please log in.

These days, it’s pretty easy to slap together a single-board computer and a cheap LCD screen to whip up a cool cyberdeck fast. But what if you wanna go more retro? [Manu] found a portable TV straight out of the original Blade Runner film, and decided this would be the perfect base for a cyberdeck rocking a whole-ass CRT screen.

The build started with a Panasonic TR-545 television. Back in the day, it took many large batteries to power this thing up—no surprise given how power hungry CRTs are. This gave [Manu] a neat opportunity to sneak all the new cyberdeck hardware into the original battery tray, including a new lithium-ion battery pack that is much more compact than the original. A Raspberry Pi 5 is running the show, computer-wise, and it’s hooked up to an HDMI RF modulator that allows the video output signal to be hooked up to the TV’s original antenna input. It’s not the cleanest way to go, but it allowed [Manu] to make the mod entirely reversible. All the new hardware slots neatly into the repurposed battery tray, and can be removed quite easily without damage to this vintage specimen. Even the keyboard fits nicely into the setup, as [Manu] was able to find a suitable 60% layout foldable unit right off the shelf.

Check out the slide deck for more details on the build, but be warned—it’s a 241 MB PDF. Bonus points if you calculate what that would cost to store on a hard drive in 1979 when the Panasonic TR-545 was on the market. We’ve seen a similar build before, too, with a classic black & white Magnavox unit. If you like squinting at a tiny blurry screen, a CRT cyberdeck is absolutely the way to go. Just be warned that the other screenwriters at your local coffee shop will be more interested in your hardware than whatever you’re actually working on. Good luck with your next pitch all the same. Video after the break.

youtube.com/embed/KwKU10y6Pnw?…


hackaday.com/2026/03/20/portab…

Slug Algorithm for On-GPU Rendering of Fonts with Bézier Curves now in Public Domain


The media in this post is not displayed to visitors. To view it, please log in.

The Slug Algorithm has been around for a decade now, mostly quietly rendering fonts and later entire GUIs using Bézier curves directly on the GPU for games and other types of software, but due to its proprietary nature it didn’t see much adoption outside of commercial settings. This has now changed with its author, [Eric Lengyel], releasing it to the public domain without any limitations.

Originally [Eric] had received a software patent in 2019 for the algorithm that would have prevented anyone else from implementing it until the patent’s expiration in 2038. Since 2016 [Eric] and his business have however had in his eyes sufficient benefit from the patent, making it unnecessary to hold on to it any longer and retain such exclusivity.

To help anyone with implementing their own version of the algorithm, there is a GitHub repository containing reference shader implementations with plenty of inline comments that should help anyone with some shader experience get started.

Although pretty niche in the eyes of the average person, the benefits of using on-GPU rendering of elements like fonts are obvious in terms of rendering optimization. With this change open source rendering engines for games and more can finally also use it as well.

Thanks to [Footleg] for the tip.


hackaday.com/2026/03/20/slug-a…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

That's right folks, it is now easier to buy a firearm than to load open source software on your phone in America.


Android will require a 24-hour wait before sideloading apps

android-developers.googleblog.…


Cybersecurity & cyberwarfare ha ricondiviso questo.

Social Debug: il Crystal Ball e la generazione che sapeva soffiare

Crystal Ball, Slime, Exogini, Palla Pazza, Clic-Clac. Noi soffiavamo in una cannuccia e imparavamo la fisica. La GenAlpha scrolla. Chi è cresciuto davvero?

Il post di @signorina37

signorina37.substack.com/p/soc…

@eticadigitale

Conway’s Game of Life With Physical Buttons


The media in this post is not displayed to visitors. To view it, please log in.

Conway’s Game of Life excels in its simplicity, creating a cellular automaton on a 2D grid where each cell obeys a set of very simple rules that determine whether a cell is ‘alive’ or ‘dead’. After setting an initial condition the ‘game’ then evolves naturally from there, creating an endless series of patterns as a simplified form of bacterial evolution. Of course, setting an initial state and then watching cells light up or fade away seems like a natural fit for light-up buttons. After struggling with intrusive thoughts related to such a project for a while, [Michal Zalewski] finally gave in, creating a pretty amazing looking result.

Although there is no set size for the game board, [Michal] was constrained by his budget for the selected NKK JB15LPF-JF tactile buttons, resulting in a 17×17 matrix. That’s 289 buttons, for those keeping score, which comes down to over $1,000 over at e.g. Digikey even with quantity-based pricing. Add to this the custom PCB and a Microchip AVR128DA64 squeezed in a corner of said PCB to run the whole show and it’s quite the investment.

Finishing up the PCB, driving the lights is done with a duty cycle as the matrix is scanned along with detecting inputs in a similar manner. This required the addition of MOSFETs and transistors, the details of which can be found in the downloadable project files, along with the firmware source code. In the article a video of the board in action can be watched, allowing one to admire the very pretty wooden enclosure as well.


hackaday.com/2026/03/20/conway…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Poliverso.org vive, Metaverso no! Meta ""chiude"" il metaverso e vince l'Oscar per la peggiore strategia di rebranding della storia

L'unico che ci credeva cosi tanto era Zuckerberg che ha pure cambiato nome alla sua società fondata nel 2004; da Facebook a Meta perché secondo lui "il metaverso era il futuro". Dal 2020 bruciati 80 miliardi di dollari.

Lunga vita e prosperità al Fediverso! 🖖

key4biz.it/meta-chiude-il-meta…

@informatica

in reply to Elena Brescacin

@elettrona quella su poliverso.org è una battuta ripiena di rancore stagionato, dovuta al fatto che il nome metaverso è stato lanciato tre mesi dopo che io aprii l'istanza poliverso.org e tutti quelli che iniziavano a conoscere il mio server da allora pensavano che io avessi voluto scopiazzare il termine metaverso 🤣

@informatica

Cybersecurity & cyberwarfare ha ricondiviso questo.

7,500+ Magento sites defaced in global hacking campaign
securityaffairs.com/189734/hac…
#securityaffairs #hacking

How Long Can a Quadcopter Drone Fly on Just Solar?


The media in this post is not displayed to visitors. To view it, please log in.


The final second prototype flying. (Credit: Luke Maximo Bell, YouTube)The final second prototype flying. (Credit: Luke Maximo Bell, YouTube)
The dream of fully powering everything from aircraft to cars on just the power generated from solar panels attached to the machine remains a tempting one, but always seems to require some serious engineering including putting the machine on a crash diet. The quadcopter that [Luke Maximo Bell] tried to fly off just solar power is a good case in point, as the first attempt crashed after three minutes and wrecked its solar panels. Now he’s back with a second attempt that ought to stay airborne for as long as the sun is shining.

Among the flaws with the first prototype were poor support for the very thin and fragile PV panels, requiring much better support on the carbon fiber frame of the drone. To support the very large solar array, the first drone’s arms were made to be very long, but this interfered with maneuvering, so the second version got trimmed down and the array raised above the frame. This saved 70 grams of weight from the shortened tubs, which could then be added to the new panel supports.

After an initial test flight resulted in a crash when the PV output dropped, the need for a small battery buffer was clear, so this was added, along with a reduction of the array to 4×7 panels to get the same 20V as the battery. The array also had to be reinforced, as the thin array was very wobbly in addition to making it impossible to fly with any significant wind.

The power circuit as implemented on the second prototype. (Credit: Luke Maximo Bell, YouTube)The power circuit as implemented on the second prototype. (Credit: Luke Maximo Bell, YouTube)
During the subsequent five hours long test flight it was clear that the resulting PV-powered drone was at the limits of its performance, with even some mild cloud cover forcing the battery to provide backup power.

For the test location a tree-sheltered site far away from windy Cape Town was also selected to provide the best possible shot, as keeping position with this drone was very hard. With the low weight and the big surface area of the solar panel array catching any little bit of wind, the GPS-based position keeping was essential. Unfortunately a few hours into the test this feature failed.

Manual position keeping is definitely possible, but [Luke] had to constantly counteract the drone wanting to drift off somewhere else. Ultimately the test flight ended when it was still very much a sunny South African summer’s day, due to the current provided by the array no longer keeping up with the power demands of the motors.

What this perhaps demonstrates best is that if you want to use PV solar power for your flying drone – especially with a significant payload – it’s probably best to use it for recharging while idle, or to extend the battery life by an appreciable amount. That said, props to [Luke] for persevering and making it work in the end.

youtube.com/embed/gx5DA8qEfHY?…


hackaday.com/2026/03/20/how-lo…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚨 ShinyHunters is dead but… This message was sent in a TG channel, allegedly from a person with access to Shinyhunters social; it offers a "free tool" for website enumeration and exploits. Tho, a closer look could reveal the psychological patterns of a much more sinister intent.

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Navia data breach impacts nearly 2.7 Million people
securityaffairs.com/189726/dat…
#securityaffairs #hacking

User Repair of a Not User-Repairable Victron CCGX Issue


The media in this post is not displayed to visitors. To view it, please log in.

Power banks come in many sizes, and those that target construction sites are probably among the largest. The massive four ton unit based around lead-acid batteries which the [Buy it Fix it] YouTube channel got handed is a good example. Inside it are Victron CCGX inverters among a lot of other Victron electronics, with the control panel for the system throwing up an error that was deemed to be not user-serviceable. Naturally, this makes for a good challenge.

The exact error as thrown up on the central control panel is error #42, indicating a storage corruption issue on the device. According to the manual this means an issue with the internal flash memory that stores settings, serial numbers and WiFi credentials, requiring it to be shipped back to the manufacturer.

To further diagnose the issue, this Color Control unit was taken out of the power bank and coaxed onto a repair bench. This device has a whole host of Ethernet, CAN and other buses on the back, along with a USB host feature, but using the latter to reflash the firmware made no difference. Fortunately it’s just an embedded Linux system running on the System-on-Module and gaining remote SSH access was a snap due to easy root access.

Interestingly, running a diagnostic on the flash IC showed it to be still in good condition. Instead an ECC issue was logged that caused it to be marked as bad. This seems to have been due to the flash IC requiring 4 bits of ECC per 528 bytes, but the software using only a single bit. After reformatting and clearing the error it seems to have fixed the issue. Apparently it was just a weird configuration error that soft-bricked the device, raising the question of how that happened.

youtube.com/embed/o-rMvnAotQI?…


hackaday.com/2026/03/20/user-r…

#42
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Nuova truffa via Google Forms! Gli annunci di lavoro puntano ad installare RAT sui PC

📌 Link all'articolo : redhotcyber.com/post/nuova-tru…

#redhotcyber #news #cybersecurity #hacking #malware #phishing #spearphishing #sicurezzainformatica

Cybersecurity & cyberwarfare ha ricondiviso questo.

È stata pubblicata l'analisi sul blackout spagnolo del 2025

Per ENTSO-E la causa principale fu un’instabilità di sovratensione (overvoltage) e la perdita di controllo della potenza reattiva, non un deficit di produzione. Il collasso è avvenuto per disconnessioni a catena. Per il futuro, le strategie chiave sono: aggiornare i piani di difesa, migliorare il monitoraggio transfrontaliero e integrare le rinnovabili nella regolazione dinamica della tensione.

@energia

entsoe.eu/publications/blackou…

Questa voce è stata modificata (1 settimana fa)
Cybersecurity & cyberwarfare ha ricondiviso questo.

PikaPods allarga il catalogo: arrivano Vikunja e Ocular, più aggiornamenti per Ghost, Docmost e BookStack


La piattaforma di hosting per app open source aggiunge un gestore di attività e un'app di bilancio personale, insieme ad aggiornamenti sostanziosi per Ghost, Docmost, BookStack e NocoDB.
The media in this post is not displayed to visitors. To view it, please go to the original post.

PikaPods, la piattaforma che permette di installare applicazioni open source con un paio di clic e senza mettere mano a un server, ha aggiornato il proprio catalogo con due nuove app e diversi aggiornamenti importanti.

La prima novità è Vikunja, un gestore di attività e progetti rilasciato sotto licenza AGPLv3 che punta a sostituire strumenti proprietari come Todoist, Trello o Microsoft To-Do. Si può lavorare con quattro viste diverse (lista, kanban, Gantt, tabella), condividere progetti con altri utenti, impostare promemoria e importare le proprie attività direttamente da Todoist, Trello o Microsoft To-Do. Vikunja è disponibile anche come app web progressiva, ha un’interfaccia rapida e supporta la sincronizzazione tramite CalDAV. Per chi vuole gestirlo in autonomia su un proprio server, basta un container Docker.

La seconda aggiunta è Ocular, un’applicazione di bilancio personale pensata per chi non ha bisogno di un software contabile completo ma vuole tenere sotto controllo entrate e uscite su base annuale. Supporta il tracciamento su più anni, l’importazione da Google Sheets, l’esportazione in JSON e una modalità privacy per consultare i dati in pubblico senza mostrare cifre a chi sta intorno. Anche Ocular funziona come PWA e non richiede database esterni.

Gli aggiornamenti


Tra le app già presenti nel catalogo, gli aggiornamenti più interessanti riguardano Docmost, che con la versione 0.70.0 aggiunge commenti sulle pagine, un sistema di notifiche integrato e layout a più colonne. Ghost arriva alla 6.22.0 con le offerte di fidelizzazione per trattenere gli iscritti in procinto di cancellarsi e un editor più flessibile per le email di benvenuto. BookStack 26.03 introduce un sistema di moduli per estensioni riutilizzabili, mentre NocoDB 0.301.4 semplifica la gestione dei permessi estendendoli automaticamente a livello di spazio di lavoro.

Tutte le app sono disponibili su PikaPods a partire da 1,20 dollari al mese, con 5 dollari di credito alla registrazione. Chi preferisce gestire tutto in proprio su un VPS dedicato può valutare fornitori come Hetzner, molto usato nella comunità open source europea, oppure Webdock.


FONTE pikapods.com


FONTE vikunja.io


FONTE simonwep.github.io

Hackaday Podcast Episode 362: Compression Molding, IPv4x, and Wired Headphones


The media in this post is not displayed to visitors. To view it, please log in.

As the sun goes down on a glorious spring evening on the western edge of Europe, Elliot Williams is joined by Jenny List for a look at the week in all things Hackaday.

First up: Hackaday Europe tickets are on sale! Bad luck folks, the early bird tickets disappeared in an instant, but regular ones are still available for now. We’re really looking forward to making our way to Lecco for a weekend of hacks, and it would be great to see you there too.

Then we have a new feature for the podcast, the Hackaday Mailbag. This week’s contribution comes from [Kenny], a longtime friend of Hackaday and probably our most regular conference attendee.

To the hacks, and we have some good ones. An air hockey robot might not seem like a challenge, but the engineering which went into [BasementBuilds’] one proves it’s not a job for the faint hearted. Then we look at compression molding of recycled plastic using 3D-printed molds, something that seems surprisingly accessible and we’d like to try, too. We’ve got a new DOS, a 3D-printed zipper repair, the IPv4 replacement we didn’t get, and the mind-bending logic of ternary computing. It’s one of those weeks where the quick hacks could all deserve their own in-depth look, but perhaps the stand-outs are and Arduino style compiler that includes the source code compressed within the binary, and a beautifully-done revival of a 1980s brick cellphone as a modern 5G unit.

Finally in the longer reads we’ve got an examination of wired versus Bluetooth headphones — we’re both in the wired camp — and a look back at the age of free dialup. As is so often the case, the experience there differed between Brits and Americans. Anyway, enjoy the episode, and we have another week to look forward to.

html5-player.libsyn.com/embed/…

Download your own personal copy of the Podcast in glorious 192 kB MP3.

Where to Follow Hackaday Podcast

Places to follow Hackaday podcasts:



News:



What’s that Sound?


  • Congrats to [Captain Click-Clack] who got it wrong, but just as right as anyone else.
  • NASA’s Sounds From Beyond


Interesting Hacks of the Week:



Quick Hacks:



Can’t-Miss Articles:



hackaday.com/2026/03/20/hackad…

Cybersecurity & cyberwarfare ha ricondiviso questo.

NEW: The U.S. accused Iran's government of being behind the hacktivist group Handala, which claimed responsibility for the destructive hack on medical tech giant Stryker.

The Justice Department said Handala and other fake hacktivist groups —including one allegedly behind the hack on the Albanian government in 2022 — are run by Iran’s Ministry of Intelligence and Security (MOIS).

techcrunch.com/2026/03/20/u-s-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

La direttrice dell'allineamento di Meta AI racconta il suo incubo con l'eliminazione delle email da OpenClaw: "Ho dovuto CORRERE sul mio Mac mini"

@Intelligenza Artificiale

La direttrice dell'allineamento di Meta, Summer Yue, ha usato OpenClaw per gestire la casella di posta, ma il bot ha provato a cancellare le sue email."Ho dovuto CORRERE verso il mio Mac mini come se stessi disinnescando una bomba", ha scritto Yue su X. Alcuni critici si sono chiesti perché un ricercatore sulla sicurezza dell’intelligenza artificiale abbia utilizzato OpenClaw. Il vivace progetto ha suscitato preoccupazioni in materia di sicurezza.


https://www.businessinsider.com/meta-ai-alignment-director-openclaw-email-deletion-2026-2

Grazie a [URL=https://t.me/ppComunicazione/27793]nemeyes per la segnalazione

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

So uh, apparently $288/year is not enough to run a Mastodon service for ~3 users, and this is a known issue (masto.host/mastodon-content-re…) with no solution (github.com/mastodon/mastodon/d…)?!

I just want to own my identity. On Bluesky, it takes a TXT record and a did:plc rotation key. A PDS takes like $25/yr. For $300/yr you can run a whole-network relay.

Also, it's unclear if I can move to non-Mastodon software without losing all my posts, despite owning the domain??

And this ecosystem sneers at atproto?

in reply to Filippo Valsorda

it’s low hanging fruit that needs the right person to just step up and fix.

I’ve been begging for a while shlee.fedipress.au/2024/call-t…

Powering USB Devices with a Bench Supply Adapter Board


The media in this post is not displayed to visitors. To view it, please log in.

Sometimes you wanna test a piece of USB hardware, but you don’t just want to plug it into a random old phone charger. [KS-Elektronikdesign] has whipped up a useful tool for just that case, allowing one to easily power USB hardware from a common bench supply.

It would have been simple enough to whip up an adapter board to connect banana jacks to the power pins of a regular USB port. Easing the hookup process was indeed a part of the motivation for this project, in making it easy to power hardware that hooks up via USB-A and USB-C. However, it also goes a little further. It includes TUSB319 chip to handle the all-important power negotiation, without which many USB devices will not feel confident drawing their required amount of current.

There is also polarity protection and over-voltage protection to stop you from blowing stuff up if you hook the board up wrong, which might save you a smartphone or three in the lab. The board will allow negotiated output power up to 10 W via USB-A and 15 W via USB-C, which isn’t heaps, but will be fine for lots of smaller devices. You can up that to 25 W and 35 W respectively if the board is switched to pass-through mode. We particularly like the physical design—the board will plug straight into the banana plugs on any supply with a jack spacing of 19 to 23 mm.

Overall, this is a useful tool to have in the lab if you want to run USB hardware with the flexibility of the voltage and current limits available on your bench supply. There are other ways to power modern USB devices, too, and you can do all kinds of wild stuff if you learn about USB PD and USB PPS. If you’re working up your own nifty lab tools for similar purposes, we’d love to know about it on the tipsline.


hackaday.com/2026/03/20/poweri…

Cybersecurity & cyberwarfare ha ricondiviso questo.

New, by me: A cyberattack on a vehicle breathalyzer company called Intoxalock has left drivers across the United States stranded and unable to start their cars.

techcrunch.com/2026/03/20/cybe…

reshared this

in reply to Neil E. Hodges

@tk Yeah I've heard. It'll be interesting to see how people react to deployment of that shit.

Absolutely no way I am letting model for how normies' faces are supposed to look and react watch mine and judge me based on it.

(Or worse, exfiltrate private video of me to further train that bs.)

But I don't think I'd be in that position anyway except maybe in a rental car since I have no intention of ever buying a vehicle made after 2015 or so (or really ever buying a car again at all).

Questa voce è stata modificata (1 settimana fa)
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

L’IA ti sta mentendo: ecco come gli hacker nascondono comandi dannosi sotto i tuoi occhi

📌 Link all'articolo : redhotcyber.com/post/lia-ti-st…

#redhotcyber #news #intelligenzaartificiale #cybersecurity #hacking #ia #chatgpt #gemini #sicurezzainformatica

This Week in Security: Linux Flaws, Python Ownage, and a Botnet Shutdown


The media in this post is not displayed to visitors. To view it, please log in.

The ides of security March are upon us — Qualys reports the discovery by their threat research unit of vulnerabilities in the Linux AppArmor system used by SUSE, Debian, Ubuntu, and Kubernetes as an additional security mechanism and application firewall.

AppArmor was added to Linux in 2010, and the vulnerabilities Qualys discovered have been present since 2017, and allow unprivileged (non-root) local users to elevate privileges by executing arbitrary code in the kernel, gaining root access, or perform a denial-of-service attack across the entire system by replacing all AppArmor behavior with “deny all” rules.

All Linux kernels since Linux 4.11 are vulnerable. If your Linux distribution enables AppArmor, and quite a few do, you’ll want to be updating as soon as fixes are available from your distribution maintainers. On systems with untrusted users, such as shared environments, VPS server environments, and the like, this is even more critical and urgent. Even on single-user systems, vulnerabilities like these allow other exploits, like the Python attack below, mechanisms to elevate their access and persistence.

At the time of writing, the full details of the AppArmor vulnerability are limited until the Linux Kernel team releases a stable version with the fixes for distribution maintainers. Qualys has published the technical write-up with the currently public information.

Python Projects Compromised


StepSecurity reports on a new campaign to infect Python projects on GitHub with a complex malware that, once deployed, appears to be yet another crypto and login stealer.

The attacker first gains access to the GitHub credentials via another info stealing worm – the Glassworm stealer infects VSCode extensions with over 35,000 downloads of infected extensions in October of 2025. Glassworm harvests NPM, GitHub, and OpenVSX credentials and sends them to a remote command and control (C2) server. It also harvests a wide range of crypto currency wallet extensions to steal crypto directly.

Once it’s harvested all the credentials it can find, Glassworm then installs a SOCKS proxy, a standard connection proxy protocol used to re-route connections, multiple remote desktop control tools, and redundant control networks. The “ForceMemo” worm (as StepSecurity dubs it) then targets Python repositories, infecting every repository the credentials have access to, using credentials from VS Code, git credential storage, GITHUB_TOKEN, and any other discovered credentials.

The actual mechanism of compromise is the most interesting aspect of what is otherwise an aggressive malware, but in many ways, just another crypto stealer. ForceMemo gains its name by using a series of Git tricks to attempt to hide its activity: instead of simply generating a git push or GitHub pull request, the malware rebases the last commit in the repository, injects the malware into the Python scripts, and performs a force push to silently replace the last commit record.

Once infected, a Python project runs the payload as soon as a consumer runs the setup.py command to build and install the package. The payloads are heavily obfuscated and encrypted, but StepSecurity believes once triggered, ForceMemo harvests SSH keys, GitHub tokens, and crypto wallet tokens, as well as connecting to multiple C2 servers and installing remote access and proxy tools for future activity.

With the malware infecting Python projects indiscriminately, this exposes developer workstations with internal credentials and CI/CD environments with production credentials equally.

Ubuntu Snapd flaws


Apparently on a roll, Qualys also discovered that the Ubuntu Snapd system — the service responsible for managing packages and services in the Snap format — allows for privilege escalation. The Ubuntu report is low on details, stating only that improper handling of “certain operations” in a snap package tmp directory could cause systemd-tmpfiles to recreate the files, allowing replaying commands and gaining “escalated privileges”.

Fixes are available for all recent Ubuntu releases, however Ubuntu 20.04 and older require the paid “Ubuntu Pro” subscription to get them. As always, the advice is to patch as soon as possible – once a vulnerability is known it becomes a vector for malware and other attacks, such as a credential stealer gaining root access to reinstall itself.

UniFi Network Application


UniFi is often a popular networking choice for home lab and networking geeks, and probably has a higher-than-average usage rate among readers here. The company reports a high-risk vulnerability in the UniFi Network Application component of the management service and a second high risk vulnerability in the NoSQL implementation.

UniFi lists the vulnerability as a path traversal bug allowing access to files on the server. Path traversal bugs are validation bugs involve forming URLs which reference files outside of directories the web server would normally be allowed to serve files from. In a properly paranoid server, paths are resolved to the final file, then checked to make sure that serving that file is allowed, but in a naive implementation the paths are simply concatenated, allowing a requested file path – for instance “../../../../../../../../../etc/passwd” – to escape the web server directory and serve a file directly from the filesystem. Because it’s always possible to go back a directory, even from the base of the filesystem, so often an attacker will simply add a dozen, or more, “../” references to brute force assume that it will find the root of the system eventually.

On the NoSQL side, there are even fewer details, but UniFi lists it as a SQL injection vulnerability which can lead to elevated privileges. Fortunately, the vulnerability seems to require access to a network which can reach the UniFi controller – this won’t open every install to a drive-by attack from the parking lot or the Internet at large.

If you run a UniFi system, still be sure to get the latest updates – it’s never a good idea to leave vulnerabilities in place, even on an internal network. Increasingly, complex attacks are taking advantage of multiple vulnerabilities to access internal services once a single external vulnerability is found, and this is taking place on home networks as well as corporate!

Gov Collab Shuts Down Botnets


Finally, Brian Krebs reports on a multi-national effort by Germany, Canada, and the United States to shut down the Kimwolf, Aisuru, Jackskid, and Mossad botnets, credited with being the source of world-record-breaking denial of service attacks.

The majority of devices forming the Kimwolf botnet appear to be Android TV devices with poor security, sold by major US retailers. Residential proxy networks, malware disguised as cheap or free VPNs, or other malware infections installing proxy servers, allowed attackers access to the internal home networks of infected users, exposing the vulnerable set-top boxes.

The shutdown of the botnets appear to be coordinated with the arrests of operators of the botnet services in multiple countries and seizure or shutdown of the C2 servers operating the network. When patching hundreds of thousands of infected devices is impractical, taking control of the infrastructure to prevent further abuse is usually the next best step.


hackaday.com/2026/03/20/this-w…

Cybersecurity & cyberwarfare ha ricondiviso questo.

il ricordo commosso di Bersani: “L'avversario più dignitoso che ho avuto in vita mia”, scrive postando una foto col senatùr. Per Conte, “un protagonista della storia politica recente del nostro Paese”. Pur nella distanza politica, “ne riconosco il ruolo nella storia istituzionale italiana e l'impegno per il suo partito”, sottolinea Bonelli da Verdi e Sinistra.

Si può anche stare zitti eh, non è che bisogna per forza dire qualcosa sempre e comunque.

rainews.it/video/2026/03/morte…