Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

AI fuori controllo: cancellano file, ignorano ordini e scatta l’allarme globale

📌 Link all'articolo : redhotcyber.com/post/ai-fuori-…

A cura di Carolina Vivianti

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚀 RHC Conference 2026: Workshop "Hands On" di Lunedì 18 Maggio

Di seguito le informazioni sull'evento:

📍Quando: Lunedì 18 Maggio 2026 (Mattina workshop "hands-on" e pomeriggio workshop "skill-on")
📍Dove: Teatro Italia, Via Bari 18, Roma (Metro Piazza Bologna)
📍Programma: redhotcyber.com/linksSk2L/prog…
📍Iscriviti ai Workshop di lunedì 18 maggio : rhc-conference-2026-workshop.e…

#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Android 2026: non è la fine della mobile forensics. È la fine dell’illusione che sia semplice

📌 Link all'articolo : redhotcyber.com/post/android-2…

A cura di Diego Fasano

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Oltre la metà dei CEO non vede profitti dall’IA: ecco cosa sta andando storto

📌 Link all'articolo : redhotcyber.com/post/oltre-la-…

A cura di Silvia Felici

#redhotcyber #news #intelligenzaartificiale #formazioneaziendale #innovazionetecnologica #supportoconcreto

Writing an Open-World Engine for the Nintendo 64


The media in this post is not displayed to visitors. To view it, please log in.

Anyone who has ever played Nintendo 64 games is probably familiar with the ways that large worlds in these games got split up, with many loading zones. Another noticeable aspect is that of the limited drawing distance, which is why even a large open area such as in Ocarina of Time‘s Hyrule Field has many features that limit how far you can actually see, such as hills and a big farming homestead in the center. Yet as [James Lambert] demonstrates in a recent video, it’s actually possible to create an open world on the N64, including large drawing distances.

As explained in the video, the drawing distance is something that the developer controls, and thus may want to restrict to hit certain performance goals. In effect he developer sets where the far clipping plane is set, beyond which items are no longer rendered. Of course, there are issues with just ramping up the distance to the far clipping plane, as the N64 only has a 15-bit Z-buffer, after which you get ‘Z fighting’, where render order becomes an issue as it’s no longer clear what is in front of what.

One fix is to push the near clipping plane further away from the player, but this comes with its own share of issues. Ergo [James] fixed it by doing two render passes: first all the far-away objects with Z-buffer disabled, and then all the nearby objects. These far-away objects can be rendered back-to-front with low level-of-detail (LoD), so this is relatively fast and also saves a lot of RAM, as the N64 is scraping by in this department at the best of times.

In the video the full details of this rendering approach, as well as a new fog rendering method, are explained, with the code and such available on GitHub for those who wish to tinker with it themselves. [James] and friends intend to develop a full game using this engine as well, so that’s definitely something to look forward to.

youtube.com/embed/lXxmIw9axWw?…


hackaday.com/2026/03/29/writin…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Sei settimane di vantaggio sul ransomware: il colpo di fortuna di AWS sul RaaS Interlock

📌 Link all'articolo : redhotcyber.com/post/sei-setti…

A cura di Carolina Vivianti

#redhotcyber #news #cisco #vulnerabilita #ransomware #cybersecurity #hacking #malware #sicurezzainformatica

Training a Transformer with 1970s-era Technology


The media in this post is not displayed to visitors. To view it, please log in.

Although generative language models have found little widespread, profitable adoption outside of putting artists out of work and giving tech companies an easy scapegoat for cutting staff, their their underlying technology remains a fascinating area of study. Stepping back to the more innocent time of the late 2010s, before the cultural backlash, we could examine these models in their early stages. Or, we could see how even older technology processes these types of machine learning algorithms in order to understand more about their fundamentals. [Damien] has put a 60s-era IBM as well as a PDP-11 to work training a transformer algorithm in order to take a closer look at it.

For such old hardware, the task [Damien] is training his transformer to do is to reverse a list of digits. This is a trivial problem for something like a Python program but much more difficult for a transformer. The model relies solely on self-attention and a residual connection. To fit within the 32KB memory limit of the PDP-11, it employs fixed-point arithmetic and lookup tables to replace computationally expensive functions. Training is optimized with hand-tuned learning rates and stochastic gradient descent, achieving 100% accuracy in 350 steps. In the real world, this means that he was able to get the training time down from hours or days to around five minutes.

Not only does a project like this help understand these tools, but it also goes a long way towards demonstrating that not every task needs a gigawatt datacenter to be useful. In fact, we’ve seen plenty of large language models and other generative AI running on computers no more powerful than an ESP32 or, if you need slightly more computing power, on consumer-grade PCs with or without GPUs.


hackaday.com/2026/03/29/traini…

Hackaday Links: March 29, 2026


The media in this post is not displayed to visitors. To view it, please log in.

Hackaday Links Column Banner

Whether it’s a new couch or a rare piece of hardware picked up on eBay, we all know what it feels like to eagerly await a delivery truck. But the CERN researchers involved in a delivery earlier this week weren’t transporting anyone’s Amazon Prime packages, they were hauling antimatter.

Moving antimatter, specifically antiprotons, via trucks might seem a bit ridiculous. But ultimately CERN wants to transfer samples between various European laboratories, and that means they need a practical and reliable way of getting the temperamental stuff from point A to B. To demonstrate this capability, the researchers loaded a truck with 92 antiprotons and drove it around for 30 minutes. Of course, you can’t just put antiprotons in a cardboard box, the experiment utilized a cryogenically cooled magnetic containment unit that they hope will eventually be able to keep antimatter from rudely annihilating itself on trips lasting as long as 8 hours.

Speaking of deliveries, anyone building a new computer should be careful when ordering components. Shady companies are looking to capitalize on the currently sky high prices of solid-state drives by counterfeiting popular models, and according to the Japanese site AKIBA PC Hotline, there are some examples in the wild that would fool all but the most advanced users. They examine a bootleg drive that’s a nearly identical replica of the Samsung 990 PRO — the unit and its packaging are basically a mirror image of the real deal, the stated capacity appears valid, and it even exhibits similar performance when put through a basic benchmark test.

But while the drive’s sequential read and write speeds are within striking distance of the official numbers from Samsung, things start to fall apart when doing random speed tests or performing real-world operations. It took the fake drive over 25 minutes to write a 370 GB file, while the authentic one ripped through the same file in less than 4: giving a true write speed of 261 MB/s and 1,861 MB/s, respectively.

Luckily you don’t have to time how long it takes to dump 100+ GB of data on the drive just to see if it’s legitimate, Samsung offers a tool that can communicate with the drive and determine if it’s an original or not. If they don’t already, we imagine other manufacturers will roll out similar capabilities in an effort to combat these sophisticated clones.

Of course, computers aren’t the only things in our modern world that are impacted by the rising prices of memory and flash storage. On Friday, Sony announced that they would be implementing higher prices across their PlayStation line starting this week to compensate for what they call “pressures in the global economic landscape.”

Starting April 2nd (presumably they didn’t want consumers to think this was a joke), the base model PS5 will be bumped up to $649.99 in the US and €649.99 in Europe, while the PS5 Pro will be set at an eye-watering 899.99 in both currencies. Admittedly we’ve done absolutely no research to support this, but surely that must make the latter system the most expensive home game console in history by a considerable margin. In comparison, Microsoft’s top of the line Xbox Series X is currently priced at $799, though the model with the smaller 1 TB drive is still available for $649.

One might think that the skyrocketing cost of memory would force developers to take a lesson from the early days of computing, and usher in a new era of highly optimized code that manages to do more with less. That would be nice. Instead, we have now have DOOM rendered in the browser using CSS.

As Niels Leenheer explains in the write-up, the original goal was to have the entire game running in CSS. But he quickly ran into issues trying to implement the game logic. So he settled for letting Claude port the open source C code for the base game over to JavaScript, which freed him up to work on doing the graphics in CSS.
NASA Astronaut Mike Fincke
If you’re interested in web development it’s a fascinating look at how far the modern browser can be pushed, and even if you don’t, it’s a surprisingly smooth way to play the classic shooter without having to install anything.

Lastly, the public is finally getting some information about the health scare aboard the International Space Station that triggered the first-ever medical evacuation from the orbiting laboratory back in January. As we predicted in our previous coverage, NASA was unwilling to put personal information about one of their astronauts on the public record, and have remained tight-lipped about the situation. So it was Crew-11 Pilot Mike Fincke himself that decided to not only come forward as the individual who experienced the issue, but to detail what he went through in an interview with the Associated Press.

So what happened? Well, nobody is quite sure yet. Fincke says he was eating dinner the night before he was scheduled to go on a spacewalk outside the Station, and suddenly realized he couldn’t speak. His crewmates realized he was in distress, and contacted medical personnel at Mission Control on his behalf. Testing performed both on the Station and back on Earth has yet to provide any explanation for the episode. It lasted approximately 20 minutes, and he’s experienced no issues since. Space is kinda crazy like that sometimes.


See something interesting that you think would be a good fit for our weekly Links column? Drop us a line, we’d love to hear about it.


hackaday.com/2026/03/29/hackad…

Laser Ranging Makes GPS Satellites More Accurate


The media in this post is not displayed to visitors. To view it, please log in.

Although GNSS systems like GPS have made pin-pointing locations on Earth’s sphere-approximating surface significantly easier and more precise, it’s always possible to go a bit further. The latest innovation involves strapping laser retroreflector arrays (LRAs) to newly launched GPS satellites, enabling ground-based lasers to accurately determine the distance to these satellites.

Similar to the retroreflector array that was left on the Moon during the Apollo missions, these LRAs will be most helpful with scientific pursuits, such as geodesy. This is the science of studying Earth’s shape, gravity and rotation over time, which is information that is also incredibly useful for Earth-observing satellites.

Laser ranging is also essential for determining the geocentric orbit of a satellite, which enables precise calibration of altimeters and increasing the accuracy of long-term measurements. Now that the newly launched GPS III SV-09 satellite is operational this means more information for NASA’s geodesy project, and increased accuracy for GPS measurements as more of its still to be launched satellites are equipped with LRAs.


hackaday.com/2026/03/29/laser-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Telegram says it is not affected by a supposed zero-day in its IM client that can be exploited to run malicious code via a malicious custom sticker

x.com/telegram/status/20380697…

zerodayinitiative.com/advisori…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Israele vieta l'accesso al Santo Sepolcro al card #Pizzaballa

Tajani:"inaccettabile"
Meloni:"offensivo"

A #Gaza abbiamo avuto:
-70 mila morti
-190 mila feriti
-2 milioni sfollati
-negazione delle cure per 20 mila pazienti
-1,8 milioni di persone a rischio carestia
-80% delle strutture sanitarie distrutte
-70% degli edifici civili colpiti
-centinaia di ONG espulse
-oltre 200 giornalisti uccisi

Ma il #governo convoca l'ambasciatore israeliano per il divieto al cardinale.
Game over

Cybersecurity & cyberwarfare ha ricondiviso questo.

NO a Palantir in Europa: ecco l'iniziativa europea per chiedere all'Unione Europea di sospendere ogni rapporto con Palantir

Chiediamo ai governi europei di:

- Bloccare la firma di nuovi contratti con Palantir.
- Rivedere e rescindere gradualmente i contratti in essere con l’azienda.
- Investire in alternative europee trasparenti e pubblicamente responsabili.

@eticadigitale

action.wemove.eu/sign/2026-03-…

(SEGUE)

in reply to informapirata ⁂

Che cosa curiosa!

Dopo avere firmato la petizione l'ho condivisa su Facebook e del tutto casualmente il link è svanito dal mio post, c'è solo il testo che ho scritto io. Chissà come mai!

Aggiungete che Tiel, il fondatore di Palantir, è stato uno dei primi e più importanti finanziatori di Facebook, e fate 1+1.

reshared this

in reply to Carlo Bencini =/\=

Sensitive content

reshared this

in reply to Elena Brescacin

@elettrona @m3nhir @ilsimoneviaggiatore infatti.
Però ho anche smesso di usare Google come motore di ricerca e Chrome come browser, ormai da 2 anni con DuckDuckGo mi trovo benissimo 🤷‍♀️
Lo so, non è molto, ma se cisscuno di noi riduce la propria impronta è tanto di guadagnato

reshared this

in reply to Carlo Bencini =/\=

Sensitive content

reshared this

in reply to Elena Brescacin

@elettrona @cgbencini @m3nhir @ilsimoneviaggiatore ad esempio puoi degoogleare quanto ti pare, ma se devi cercare un pdi su una mappa hai una sola scelta! Maps.

Poi che in autostrada here we go dallo schermo del telefono, quando non canna le interruzioni, sia 100 volte meglio, o in città grandi a piedi organic maps si il migliore è un discorso diverso.

Ma se mi dicono che lo studio di tizio si trova di fianco al bar di caio, la scelta è una.

Etica Digitale (Feddit) reshared this.

Cybersecurity & cyberwarfare ha ricondiviso questo.

La situazione dei bot su Internet è in realtà peggiore di quanto si possa immaginare. Ecco perché:

Come forse saprete, su Glade Art tendiamo a prendere molto sul serio le misure anti-bot; una delle nostre massime priorità è proteggere gli altri utenti dal fatto che la loro arte venga sottoposta ad addestramento automatico. Tendiamo anche a trollare i bot utilizzando infiniti labirinti di dati inutili per intrappolarli. Questi sono comunemente indicati come "honeypot" o "fosse di catrame digitali" E così, dopo 6,8 milioni di richieste negli ultimi 55 giorni al momento in cui scrivo, abbiamo alcuni dati sostanziali, quindi restate in attesa e lasciate che li condividiamo con voi. : )

gladeart.com/blog/the-bot-situ…

@Informatica (Italy e non Italy)

Questa voce è stata modificata (1 giorno fa)

Clean Enclosures, No Printing Necessary


The media in this post is not displayed to visitors. To view it, please log in.

Unless you’re into circuit sculptures, generally speaking, a working circuit isn’t the end-point of a lot of electronics projects. To protect your new creation from grabby hands, curious paws, and the ravages of nature, you’ll probably want some kind of enclosure. These days a lot of us would probably run it off on the 3D printer, but some people would rather stay electronics hobbiests without getting into the 3D printing hobby. For those people, [mircemk] shares how he creates professonal-looking enclosures with handtools.

The name [mircemk] will seem familiar to longtime readers– we’ve featured many of his projects, and they’ve always stood out for the simple but elegant enclosures he uses. The secret, it turns out, is thin PVC sheeting from a sign shop. At thicknesses upto and including 5 mm, the material can be bent by hand and cut with hobby knives. It’s obviously also amenable to drilling and cutting with woodworking tools as well. Drilling is especially useful to make holes for indicator LEDs. [mircemk] recommends cyanoacrylate ‘crazy’ glue to hold pieces together. For holding down the PCB, the suggestion of double-sided tape will work for components that won’t get too hot.

Rather than paint, the bold contrasting colours we’ve become used to are applied using peel-and-stick wallpaper, which is a great idea. It’s quick, zero mess, and the colour is guaranteed to be evenly applied. It might even help hold the PVC enclosure together ever so slightly. You can watch him do it in the video embedded below.

We hate to say it, but for a one-off project, this technique probably does beat a 3D printed box for professional looks, assuming you have [mircemk]’s motorskills. If you don’t have said motor skills, check out this parametric project box generator. If you’d rather avoid PVC while making a square box to hold a PCB, have you considered using PCBs?

Thanks to [mircemk] for the tip! If you have a tip or technique you want to share, please box it up and send it to the tipsline

youtube.com/embed/t9KfsZ-eU5M?…


hackaday.com/2026/03/29/clean-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Bluesky punta sull'intelligenza artificiale con Attie, un'app per la creazione di feed personalizzati

Il team di #Bluesky ha creato un'altra app, e questa volta non si tratta di un social network, bensì di un assistente basato sull'intelligenza artificiale che permette di progettare il proprio algoritmo, creare feed personalizzati e, un giorno, persino "codificare" la propria app.

techcrunch.com/2026/03/28/blue…

@bluesky

reshared this

in reply to Poliverso & Poliversity

Nope. Am I the only one who find this app a bit dangerous? There is no more need (for the company who is social owner) to guess what a person likes or a person wants. Is the person who says clear and loud for what kind of content is a perfect target.
No, thanks. No.

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

I Social sono una parte fondamentale della nostra vita? Cosa ci insegnano tutte le multe alle big tech e le controversie degli ultimi giorni? Io mi sono chiesto tutte queste cose ed ho deciso di fare detox da tutti i social.

Vi racconto la mia esperienza senza filtri:

youtu.be/T2EUHE-X_e4

#mastodon #linux #opensource

@opensource

in reply to Simone Spinedi

credo che siamo arrivati al punto in cui c'è bisogno che l'OMS intervenga, perché ormai queste piattaforme non sono più un tramite per gli esseri umani, ma sono strumenti per manipolare lo stato emotivo e sociale. E non lo dico tanto per dire, l'ho vissuto sulla mia pelle. Ci sarebbe così tanto da far conoscere su molti aspetti di salute mentale che stanno colpendo queste piattaforme... speriamo che qualcuno intervenga il prima possibile.
Cybersecurity & cyberwarfare ha ricondiviso questo.

Più di 1.500 matematici chiedono che il convegno più prestigioso del loro settore venga spostato dagli Stati Uniti

Sta circolando tra i matematici una petizione per spostare l'evento altrove. La petizione cita le recenti azioni militari americane in Venezuela e Iran, la sospensione dei visti per i cittadini di 75 paesi e la continua presenza di agenti federali dell'Immigration and Customs Enforcement (ICE) nelle principali città statunitensi, elementi che contrastano con l'obiettivo dell'ICM di promuovere "un senso di unità internazionale tra i matematici".

scientificamerican.com/article…

@matematica

Cybersecurity & cyberwarfare ha ricondiviso questo.

Security firm Cybereason has open-sourced owLSM, an EDR-like agent for Linux, an eBPF LSM agent to run Sigma rules

github.com/Cybereason-Public/o…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Buongiorno.

Inauguro i #consiglidifollow, suddivisi per argomento.
Non sono elenchi esaustivi. Semplicemente condivido gli account che mi è capitato d'incontrare per caso e che piacciono a me.

Primo elenco: Letteratura.


@WeirdWriter
@WedaleBooks
@internetarchive
@differx
@Umbertogaetani
@jeffjarvis
@Fbrzvnrnd
@lisavag
@viadellabarca
@huss
@m
@TGioiellieri
@libri@feddit.it
@lucianofloridi
@overholt
@gutenberg_new
@giuliocavalli
@cctmwebsite
@libri@poliverso.org
@slowforward.net
@Ricciotto
@antoniovigilante

Self-healing CMOS Imager to Withstand Jupiter’s Radiation Belt


The media in this post is not displayed to visitors. To view it, please log in.

Ionizing radiation damage from electrons, protons and gamma rays will over time damage a CMOS circuit, through e.g. degrading the oxide layer and damaging the lattice structure. For a space-based camera that’s inside a probe orbiting a planet like Jupiter it’s thus a bit of a bummer if this will massively shorted useful observation time before the sensor has been fully degraded. A potential workaround here is by using thermal energy to anneal the damaged part of a CMOS imager.

The first step is to detect damaged pixels by performing a read-out while the sensor is not exposed to light. If a pixel still carries significant current it’s marked as damaged and a high current is passed through it to significantly raise its temperature. For the digital logic part of the circuit a similar approach is used, where the detection of logic errors is cause for a high voltage pulse that should also result in annealing of any damage.

During testing the chip was exposed to the same level of radiation to what it would experience during thirty days in orbit around Jupiter, which rendered the sensor basically unusable with a massive increase in leakage current. After four rounds of annealing the image was almost restored to full health, showing that it is a viable approach.

Naturally, this self-healing method is only intended as another line of defense against ionizing radiation, with radiation shielding and radiation-resistant semiconductor technologies serving as the primary defenses.


hackaday.com/2026/03/29/self-h…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Un nuovo malware Linux si evolve con l’aiuto dell’intelligenza artificiale e diventa quasi impossibile da rilevare...

📌 Link all'articolo : redhotcyber.com/post/voidlink-…

A cura di Bajram Zeqiri

#redhotcyber #hacking #cti #cybercrime #cybersecurity #news #cyberthreatintelligence

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Urgent Alert: #NetScaler bug CVE-2026-3055 probed by attackers could leak sensitive data
securityaffairs.com/190131/hac…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

Nasce Botèp, l'istanza gancio di Bergamo e provincia


botep.org/ è l'istanza gancio di Bergamo e provincia dove tutti possono condividere eventi di qualsiasi tipo. Può essere seguita direttamente dalle piattaforme del fedi verso tramite l'account @relay@botep.org
Cybersecurity & cyberwarfare ha ricondiviso questo.

SECURITY AFFAIRS #MALWARE #NEWSLETTER ROUND 90
securityaffairs.com/190123/mal…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

#Apple issues urgent lock screen warnings for unpatched #iPhones and #iPads
securityaffairs.com/190109/sec…
#securityaffairs #hacking

Multicolor 5-Axis 3D Printing


The media in this post is not displayed to visitors. To view it, please log in.

A 3D printer is shown, with the print bed pitched sharply toward the camera. The hotend is depositing plastic on a model at a sharp angle to the print bed.

Usually, when we see non-planar 3D printers, they’re rather rudimentary prototypes, intended more as development frames than as workhorse machines. [multipoleguy]’s Archer five-axis printer, on the other hand, breaks this trend with automatic four-hotend toolchanging, a CoreXY motion system, and print results as good-looking as any Voron’s.

The print bed rests on three ball joints, two on one side and one in the center of the opposite side. Each joint can be raised and lowered on an independent rail, which allows the bed to be tilted on two axes. The dimensions of the extruders their motion system limit how much the bed can be angled when the extruder is close to the bed, but it can reach sharp angles further out.

The biggest difficulty with non-planar printing is developing a slicer; [multipoleguy] is working on a slicer (MaxiSlicer), but it’s still in development. It looks as though it’s already working rather well, to the point that [multipoleguy] has been optimizing purge settings for tool changes. It seems that when a toolhead is docked, the temperature inside the melt chamber rises above the normal temperature in use, which causes stringing. To compensate for this, the firmware runs a more extensive purge when a hotend’s been sitting for a longer time. The results for themselves: a full three-color double helix, involving 830 tool changes, could be printed with as little as six grams of purge waste.

As three-axis 3D printers become consumer products, hackers have kept looking for further improvements to make, which perhaps explains the number of non-planar printing projects appearing recently, including a few five-axis machines. Alternatively, some have experimented with non-planar print ironing.

youtube.com/embed/Y44QV1gQqq0?…


hackaday.com/2026/03/29/multic…

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Telegram: rilevata vulnerabilità 0-Click

Rilevata una vulnerabilità 0‑click in Telegram, nota applicazione di messaggistica istantanea. Tale vulnerabilità potrebbe consentire a utente malintenzionato di eseguire codice arbitrario su istanze applicative Android e Linux, tramite l’invio di contenuti multimediali opportunamente predisposti

acn.gov.it/portale/w/telegram-…

Grazie a @nemeyes per la segnalazione

in reply to Devil

@devil
x.com/telegram/status/20380700…
Telegram smentisce
Quindi la notizia diventa che l'Agenzia per la Cybersicurezza Nazionale ripete a pappagallo quello che trova scritto online e spara raccomandazioni senza nessuna verifica di accuratezza, wow, bene

La fonte indicata è un blog di sicurezza "AI" (tale TrendAI) che non ha pubblicato neanche un proof of concept

👆 TrendAi è una divisione di Trend Micro, leggo online

reshared this

in reply to GNU/ Paolo Metal

@lichingyun @devil ma non funzione sempre così? Si avvisa il responsabile del software e si rende pubblico se non viene mitigato. La falla è stata trovata da zeroday
zerodayinitiative.com/advisori…

Il fatto che Telegram dica che la falla (gli sticker animati possono essere usati per eseguire codice) non esiste perchè gli sticker passano dai loro server mi sembra strano e non del tutto rassicurante. Anche le app malevole si installano dal play store.

informapirata ⁂ reshared this.

Cybersecurity & cyberwarfare ha ricondiviso questo.

Security Affairs #newsletter Round 569 by #Pierluigi #Paganini – INTERNATIONAL EDITION
securityaffairs.com/190104/unc…
#securityaffairs #hacking

Soviet CDs And CD Players Existed, And They Were Strange


The media in this post is not displayed to visitors. To view it, please log in.

Until the fall of the Soviet Union around 1990 you’d be forgiven as a proud Soviet citizen for thinking that the USSR’s technology was on par with the decadent West. After the Iron Curtain lifted it became however quite clear how outdated especially consumer electronics were in the USSR, with technologies like digital audio CDs and their players being one good point of comparison. In a recent video by a railways/retro tech YouTube channel we get a look at one of the earliest Soviet CD players.

A good overall summary of how CD technology slowly developed in the Soviet Union despite limitations can be found in this 2025 article by [Artur Netsvetaev]. Soviet technology was characterized mostly by glossy announcements and promises of ‘imminent’ serial production prior to a slow fading into obscurity. Soviet engineers had come up with the Luch-001 digital audio player in 1979, using glass discs. More prototypes followed, but with no means for mass-production and Soviet bureaucracy getting in the way, these efforts died during the 1980s.

During the 1980s CD players were produced in Soviet Estonia in small batches, using Philips internals to create the Estonia LP-010. Eventually sanctions on the USSR would strangle these efforts, however. Thus it wouldn’t be until 1991 that the Vega PKD-122 would become the first mass-produced CD player, with one example featured in this video.

The video helpfully includes a teardown of the player after a rundown of its controls and playback demonstration, so that we can ogle its internals. This system uses mostly localized components, with imported components like the VF display and processors gradually getting replaced over time. The DAC and optical-mechanical assembly would still be imported from Japan until 1995 when the factory went bankrupt.
Insides of the Vega 122S CD player. (Credit: Railways | Retro Tech | DIY, YouTube)Insides of the Vega 122S CD player. (Credit: Railways | Retro Tech | DIY, YouTube)
This difference between the imported and localized part is captured succinctly in the video with the comparison to Berlin in 1999, in that you can clearly see the difference between East and West. The CD mechanism is produced by Sanyo, with a Sanyo DAC IC on the mainboard. The power supply, display and logic board (using Soviet TTL ICs) are all Soviet-produced. A sticker inside the case identifies this unit as having been produced in 1994.

Amusingly, the front buttons are directly coupled into the mainboard without ESD protection, which means that in a Siberian winter with practically zero relative humidity inside you’d often fry the mainboard by merely using these buttons.

After this exploration the video goes on to explain how Soviet CD production began in the 1989, using imported technology and know-how. This factory was set up in Moscow, using outdated West-German CD pressing equipment and makes for a whole fascinating topic by itself.

Finally, the video explores the CD player’s manual and how to program the player, as well as how to obtain your own Soviet CD player. Interestingly, a former employee of the old factory has taken over the warehouse and set up a web shop selling new old stock as well as repaired units and replacement parts.

youtube.com/embed/utcfnmQtGxA?…


hackaday.com/2026/03/29/soviet…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

L’Europa è in allarme: Cina e Russia stanno facendo una mossa strategica per l’indipendenza tecnologica…

📌 Link all'articolo : redhotcyber.com/post/chi-contr…

A cura di Carolina Vivianti

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

C’è un nuovo mercato online che sta cambiando le regole del gioco per i criminali informatici...

📌 Link all'articolo : redhotcyber.com/post/arriva-le…

A cura di Bajram Zeqiri

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #news #cyberthreatintelligence

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

268 – Stiamo mettendo like su milioni di foto finte! O la smettiamo o faremo danni irreversibili camisanicalzolari.it/268-stiam…

reshared this

Play a .WAV Instead of Typing Line After Line Into Vintage Microcomputer


The media in this post is not displayed to visitors. To view it, please log in.

[Casey Bralla] got his hands on a Rockwell AIM 65 microcomputer, a fantastic example of vintage computing from the late 70s. It sports a full QWERTY keyboard, and a twenty character wide display complemented by a small thermal printer. The keyboard is remarkably comfortable, but doing software development on a one-line, twenty-character display is just not anyone’s idea of a good time. [Casey] made his own tools to let him write programs on his main PC, and transfer them easily to the AIM 65 instead.
A one-line, twenty-character wide display was a fantastic feature, but certainly lacking for development work.
Moving data wasn’t as straightforward in 1978 as it is today. While the Rockwell AIM 65 is a great machine, it has no disk drive and no filesystem. Programs can be written in assembler or BASIC (which had ROM support) but getting them into running memory where they could execute is not as simple as it is on modern machines. One can type a program in by hand, but no one wants to do that twice.

Fortunately the AIM 65 had a tape interface (two, actually) and could read and store data in an audio-encoded format. Rather than typing a program by hand, one could play an audio tape instead.

This is the angle [Casey]’s tools take, in the form of two Python programs: one for encoding into audio, and one for decoding. He can write a program on his main desktop, and encode it into a .wav file. To load the program, he sets up the AIM 65 then hits play on that same .wav file, sending the audio to the AIM 65 and essentially automating the process of typing it in. We’ve seen people emulate vintage tape drive hardware, but the approach of simply encoding text to and from .wav files is much more fitting in this case.

The audio encoding format Rockwell used for the AIM is very well-documented but no tools existed that [Casey] could find, so he made his own with the help of Anthropic’s Claude AI. The results were great, as Claude was able to read the documentation and, with [Casey]’s direction, generate working encoding and decoding tools that implemented the spec perfectly. It went so swimmingly he even went on to also make a two-pass assembler and source code formatter for the AIM, as well. With them, development is far friendlier.

Watch a demonstration in the video [Casey] made (embedded under the page break) that shows the encoded data being transferred at a screaming 300 baud, before being run on the AIM 65.

youtube.com/embed/C5hO1vE4pxM?…


hackaday.com/2026/03/28/play-a…

Watch Electricity Slosh: Visualizing Impedance Matching


The media in this post is not displayed to visitors. To view it, please log in.

Y-circuit comparison for a water and real electrical circuit

It’s one thing to learn about transmission lines in theory, and quite another to watch a voltage pulse bounce off an open connector. [Alpha Phoenix] bridges the gap between knowledge and understanding in the excellent videos after the break. With a simple circuit, he uses an oscilloscope to visualize the propagation of electricity, showing us exactly how signals travel, reflect, and interfere.

The experiment relies on a twisted-pair Y-harness, where one leg is left open and the other is terminated by a resistor. By stitching together oscilloscope traces captured at regular intervals along the wire, [Alpha Phoenix] constructs a visualization of the voltage pulse propagating. To make this intuitive, [Alpha Phoenix] built a water model of the same circuit with acrylic channels, and the visual result is almost identical to the electrical traces.

For those who dabble in the dark art of RF and radio, the real payoff is the demonstration of impedance matching in the second video. He swaps resistors on the terminated leg to show how energy “sloshes” back when the resistance is too high or too low. However, when the resistor matches the line’s characteristic impedance, the reflection vanishes entirely—the energy is perfectly dissipated. It really makes it click how a well-matched, low SWR antenna is crucial for performance and protecting your radio.

[Alpha Phoenix] is a genius at making physics visible. He even managed “film” a laser beam traveling at light speed.

youtube.com/embed/2AXv49dDQJw?…

youtube.com/embed/RkAF3X6cJa4?…


hackaday.com/2026/03/28/watch-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Hackers inserted malicious code in the desktop client of Chinese webdev service Apifox.

The attacker compromised JavaScript files hosted in the app's CDN and added code to steal user credentials to a remote server

slowmist.medium.com/security-a…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The Balancer DeFi platform has shut down after hackers stole $110 million last November

forum.balancer.fi/t/on-the-fut…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

⚠️Se siete incappati in un post di #Esperia Italia, ci sono un po’ di cose che dovreste sapere⚠️

Dietro l’ascesa della nuova voce della destra su Instagram e TikTok c’è la mano di professionisti della comunicazione e legami che arrivano fino a uno dei più stretti collaboratori di Giorgia Meloni

wired.it/article/esperia-itali…

@politica

in reply to informapirata ⁂

Sensitive content

reshared this

in reply to informapirata ⁂

@informapirata ⁂ da quello che ho capito leggendo l'articolo Zavalani è un uomo buono per tutte le stagionei sale sempre sul carro del vincitore e se alle prossime elezioni dovesse vincere il campo largo tornerà sulle sue posizioni iniziali.

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

New, from our @deepfield ERT: found a new botnet dressing its C2 traffic as camera management.

#Drifter names its domains after Hikvision products, blending with surveillance traffic on the same VLAN as the Android TV boxes it infects. DNS queries go through an Australian resolver, which somewhat undermines the cover if your bot is in São Paulo.

71 KB binary, already linked to attacks exceeding 2 Tbps from 80k sources. At least six operators are now competing for the same devices.

github.com/deepfield/public-re…

#threatintel #ddos

reshared this