Hackaday Podcast Episode 361: Hackaday Podcast Mailbag, A Phone is Not a Computer, 3D Printing History is New Again


The media in this post is not displayed to visitors. To view it, please log in.

Join Hackaday Editors Elliot Williams and Tom Nardi as they cover their favorite hacks and stories from the week. The episode kicks off with some updates about Hackaday Europe and the recently announced Green Power contest, as well as the proposal of a new feature of the podcast where listeners are invited to send in their questions and comments. After the housekeeping is out of the way, the discussion will go from spoofing traffic light control signals and the line between desktop computers and smartphones, all the way to homebrew e-readers and writing code with chocolate candies. You’ll hear about molding replacement transparent parts, a collection of fantastic tutorials on hardware hacking and reverse engineering, and the recent fireball that lit up the skies over Germany. The episode wraps up with a fascinating look at how the developer of Pokemon Go is monetizing the in-game efforts of millions of players.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

html5-player.libsyn.com/embed/…

Download this episode in DRM-free MP3 so you can listen to it while doing unpaid labor in Pokemon Go.

Where to Follow Hackaday Podcast

Places to follow Hackaday podcasts:



News:



What’s that Sound?



Interesting Hacks of the Week:



Quick Hacks:



Can’t-Miss Articles:



hackaday.com/2026/03/13/hackad…

Running a PC off AA Cells With Buck Converters Really Boosts Performance


The media in this post is not displayed to visitors. To view it, please log in.

After the previous attempt of running a PC off AA cells got a lot of comments, [ScuffedBits] decided to do the scientifically responsible thing and re-ran the experiment with all the peer-reviewed commentary in mind. Although we noted with the previous experiment that only alkaline cells were used, [ScuffedBits] rectified this by stating that both carbon and alkaline AA cells were used the first time around.

For this second experiment a number of changes were made, though still both carbon and alkaline cells were put into the mix. To these a third string was added, consisting of NiMH cells, for a total of 64 cells with each of the three strings outputting around 25 VDC when fully charged. These fed a cheap buck regulator module to generate the 12 VDC for the DC-DC converter on the mainboard’s ATX connector.

Although it appears that the same thin Cat-5e-sourced wiring was used, with the higher voltage this meant a lower current, making it significantly less sketchy. Unlike with the first experiment, this time around the Core i3 530 based PC could run much longer and even boot off the DIY battery pack. After a quick game and pushing through a Cinebench run for 64 Watts maximum power usage, it turned out that there was still plenty of time for more fun activities, such as troubleshooting Minecraft and even playing it.

After a total runtime of 33 minutes and 19 seconds the voltage finally dropped too low to continue. A quick check of cells in each string, it turned out that the carbon cells were the most drained with significant terminal voltage drop. The alkaline cells had been pushed down to a level where they could still probably run a wall clock, but the NiMH cells showed a healthy 1.2 V, meaning that a fully NiMH battery pack could go a lot longer.

This probably isn’t too surprising when we look at the history of battery packs in laptops, where NiCd quickly got pushed out by NiMH-based packs for having significantly higher power density and none of the problems with recharging and disposal. Even today 1.5 V Li-ion-based AA cells do not have significantly more capacity than NiMH AA cells, making this chemistry still very relevant today. Even if you’re not trying to build your own battery pack for running a desktop PC off.

youtube.com/embed/gjh34YvYS-c?…


hackaday.com/2026/03/13/runnin…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Tutti a casa, arriva Digital Optimus! L’AI che lavora al posto tuo. Ci riuscirà?

📌 Link all'articolo : redhotcyber.com/post/tutti-a-c…

#redhotcyber #news #digitaloptimus #intelligenzaartificiale #agentidigitali #automazione #lavoro #aziende #tecnologia

Cybersecurity & cyberwarfare ha ricondiviso questo.

US and European authorities disrupt socksEscort proxy service tied to #AVrecon #botnet
securityaffairs.com/189391/cyb…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

NEW: The FBI is looking for a hacker who published several video games on Steam that were laced with malware in the last two years.

The bureau is aslo looking for gamers who fell victim and installed these games on their computers.

techcrunch.com/2026/03/13/valv…

This Week in Security: Plenty of Patches, Replacing Old Gear, and Phrack Calls for Papers


The media in this post is not displayed to visitors. To view it, please log in.

When Friday the Thirteenth and Patch Tuesday happen on the same week, we’re surely in for a good time.

Anyone who maintains any sort of Microsoft ecosystem knows by now to brace for impact come Patch Tuesday; March brings the usual batch of “interesting” issues, including:

  • Two high-risk Microsoft Office vulnerabilities (CVE-2026-26110 and CVE-2026-26113), both of which allow execution of arbitrary code with no user interaction other than opening a hostile file. Vulnerabilities like these are especially dangerous in environments where transferring Office documents is considered normal, such as (unsurprisingly) offices, but also for home users who may not be savvy enough to avoid opening hostile files. Arbitrary code execution allows the attacker to run essentially any commands the user would be able to run themselves, typically leveraging it to install remote access or keyboard logging malware.
  • Excel gets a different vulnerability, CVE-2026-26144, which allows leaking of data through a cross-site scripting vulnerability. Coupled with CoPilot Agent, this can be used to leak contents of spreadsheets, again with no direct user interaction.

On the server and container side, this month includes a fairly typical collection of patches for SQL Server, and vulnerabilities in the Microsoft-hosted device pricing and payment orchestrator services, which have been automatically patched by Microsoft.

When it’s Time to Replace Old Gear


We all love getting every ounce of usability from our old gear, but sometimes enough is enough – at least with the stock firmware. The FBI has issued a warning about decommissioning end-of-life routers made by several large companies, with eleven Linksys and one Cisco branded routers being specifically called out for vulnerabilities under active exploitation.

A notice such as this that an exploit is under active exploitation means that a theoretical vulnerability has been commoditized into specific attacks, typically used against all devices accessible from the Internet. It’s generally safe to assume that at this point, if a vulnerable device is exposed to the Internet, it’s been compromised.

The FBI notice doesn’t call out the specific vulnerabilities used, however there’s a wide variety to pick from:

  • CVE-2025-60690 is a simple buffer overflow allowing code execution from parameters passed to the web UI.
  • CVE-2025-60692 is a buffer overflow allowing arbitrary code execution from the local network via control of entries in /proc/net/arp – unlikely to be used for a remote compromise, but still amusing.
  • CVE-2025-60694 and CVE-2025-60693 are both additional stack overflow and code execution from web bugs, which sets a real pattern for the quality of the webserver in the stock firmware.
  • CVE-2025-60689, CVE-2025-60691 and CVE-2025-34037 however appear to be the most likely culprits, both allowing arbitrary execution on the router without authentication, with CVE-2025-34037 rated a full 10/10 on the vulnerability scale and explicitly mentioning being used to deploy worm firmware.

Once an attacker is inside your router, the possible havoc they might cause is extensive:

  • Redirecting requests to malicious or fake websites by taking control of the DNS or rewriting requests at other layers.
  • Exposing systems on your private network – such as less secured IoT devices or other local devices with weak internal passwords – to the attackers.
  • Using your Internet connection to perform other attacks or pivots. Installing proxies on home equipment is a common method used for international attackers to appear as a normal home user in a target country.
  • Reselling your Internet access. Ever wonder how “free” VPN apps are able to offer access in random countries? Often an international VPN is just an infected home user!
  • Adding you to a botnet. Some of the largest distributed denial of service (DDoS) attacks have been carried out not by systems with huge bandwidth, but by tens of thousands (or more) of comrpomised small home routers, cameras, and other IoT type devices acting together.

If you have a Linksys E1200, E2500, E1000, E4200, E1500, E3000, E3200, E1550, WRT320N, WRT160N, WRT310N, or a Cisco M10 router still in use, the time is now to finally upgrade it – or at least explore the options of third-party firmware like OpenWRT. Unfortunately, many of these devices are so old that even OpenWRT may have difficulty running well on them, but all the more reason to update to something a little newer!

State-level Exploits in the Wild


In a pattern which should be familiar to anyone who had to deal with the leak of the Eternal Blue exploit as part of a dump of tools from the NSA which later evolved into the Wannacry and NotPetya global ransomware campaigns, another government-backed exploit toolkit has been captured and converted to a more generic criminal exploit.

Google Threat Intelligence documents the “Coruna” exploit kit, a rare public example of an attack against iPhones from iOS 13 to iOS 17.2.1. Often we see “advanced attack methods” or “targeted specific attacks” in release notes; rarely do we get further insight into the actual attacks!

Evolving from a government-backed tool to a financial crimeware exploit deployed widely to steal cryptocurrencies is interesting on its own, but perhaps the most fascinating aspect is the insight into how difficult modern exploits can be. Coruna combines 23 exploits into 5 chained attacks to be able to actually execute code from a web page. The final payload of the exposed version doesn’t deliver a spy payload, but instead focuses on cryptocurrency: searching for QR codes on disk to discover wallet addresses and saved recovery keys, wallet recovery phrases, and mentions of bank accounts, and leveraging those to steal cryptocurrency.

In true Google fashion, they’ve published indicators of compromise (IOCs) to inspect if a device has been attacked and a map of the control domains. Additional work deobfuscating the attacks and payloads can be found on GitHub here.

More Government Warnings


The US Government Cyber Defense Agency (CISA) has added additional warnings to the Known Exploited Vulnerabilities database (KEV) database. The KEV attempts to distill the torrent of security issues assigned a CVE into the most actionable vulnerabilities which have been observed being used in the wild. CISA advises not only federal and government agencies, but offers guidance for businesses of all sizes.

Many vulnerabilities on the KEV already have fixes. Paradoxically, this can sometimes make a vulnerability higher risk. Attackers have two advantages: a patch to reverse engineer to discover the exact mechanisms to trigger the flaw, and a motivation to use any exploits on a massive scale, knowing that the window of opportunity is about to close. Most of these vulnerabilities will likely be of interest mostly to readers who are in the enterprise space, but the first one regarding Android is a good reminder to everyone that the KEV isn’t just for giant companies.

As for the latest known exploited issues:

  • CVE-2026-21385 sounds very boring – an integer overflow in Qualcomm graphics drivers – except that those chipsets and drivers are found in a huge percentage of Android phones, tablets, set-top boxes, and likely more than a few smart TVs. This fix is bundled into the March Android security release and may prove critical. Remember to keep your devices up to date!
  • CVE-2026-22719 is a patched vulnerability in VMWare enterprise software (Aria Operations, specifically); if you need to care about enterprise-scale VMWare, you’ll care about this one!
  • CVE-2021-22054 resurfaces from 2021, again in VMWare enterprise consoles. The number of unpatched systems exposing a vulnerability from 2021 must be quite scary.
  • CVE-2025-26399 is a vulnerability in SolarWinds help desk sofware, which is a return of a bug not fully fixed in CVE-2024-28988. Which is, itself, the return of a bug not fully fixed in CVE-2024-28986. Look, bug fixing can be hard.
  • CVE-2026-1603 is an authentication bypass in Ivanti Endpoint Manager which allows access to stored credential secrets. Ivanti is an endpoint and device management system, used for monitoring, patching, upgrading, and controlling access on corporate device fleets.


Phrack Calls for Papers


The venerable Phrack has an open call for papers to be contributed to the summer issue. Released since 1985, Phrack has been a font of telecom and computer security hackery, including the critical “Smashing the Stack for Fun and Profit”, one of the first explanations of the now-ubiquitous buffer overflow and stack smashing attack.

If you think you’ve got something to contribute, or just want to check out their awesome retro demo scene loading page and some back issues, head over to the Phrack website.


hackaday.com/2026/03/13/this-w…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Banca Intesa Sanpaolo, maxi sanzione privacy: perché il problema è la base giuridica


@Informatica (Italy e non Italy)
L’Autorità garante per la protezione dei dati ha comminato una sanzione di oltre 17 milioni di euro all'istitutodi credito Intesa Sanpaolo per aver profilato illegittimamente quasi 2,5 milioni di correntisti, nella cessione a favore di Isybank, controllata

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

The media in this post is not displayed to visitors. To view it, please go to the original post.

13-03-2026 – In tendenza su poliversity.it
@fediverso@citiverse.it
poliverso.org/display/a88f9d2f…

13-03-2026 – In tendenza su poliversity.itEcco le tendenze di oggi 13 marzo 2026 su Poliversity informapirata.it/2026/03/13/13…


13-03-2026 – In tendenza su poliversity.it

Ecco le tendenze di oggi 13 marzo 2026 su Poliversity
informapirata.it/2026/03/13/13…


Cybersecurity & cyberwarfare ha ricondiviso questo.

La Commissione europea valuta la possibilità di introdurre un limite ai design che creano dipendenza.

Il dibattito su un possibile divieto dei social media è una preoccupazione anche per la Commissione europea nella sua bozza di legge sull'equità digitale (Digital Fairness Act). L'obiettivo è quello di garantire una maggiore protezione a tutti, senza escludere i minori. Questo è quanto ha spiegato uno degli ideatori della legge durante una tavola rotonda.

netzpolitik.org/2026/digital-f…

@informatica

Cybersecurity & cyberwarfare ha ricondiviso questo.

Sto scrivendo un paper per uno speech presso le Nazioni Unite, per l'AI for Good Global Summit.

"Training Humanity Against Digital Deception: Using AI to Neutralize Phishing Before It Reaches People"

Alla domanda: "Have supporting data?"
Sono tentata di rispondere: "Hold my beer"

Ma non so se potrebbe essere presa nel modo giusto - perché c' un solo modo in cui la si può prendere =)

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

🚔 La polizia globale ha smantellato SocksEscort, una botnet proxy creata a partire da router domestici hackerati.

Il malware AVrecon ha trasformato i dispositivi SOHO in gateway anonimi per frodi, ransomware e DDoS.

L'operazione Lightning ha sequestrato 34 domini, 23 server e congelato 3,5 milioni di dollari. 369.000 IP in 163 paesi.

thehackernews.com/2026/03/auth…

Se vuoi pubblicare notizie sull'informatica, puoi creare un nuovo messaggio con un primo paragrafo di <200 caratteri che farà da titolo e menzionare alla fine del messaggio l'utente @informatica@feddit.it; se invece vuoi solo essere agiornato su questo tipo di notizie ti basta seguire l'account @Informatica (Italy e non Italy)

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Mini Multi-Arcade Game Cabinets with an ESP32 and Galagino


The media in this post is not displayed to visitors. To view it, please log in.

Most people love arcade games, but putting a full-sized arcade cabinet in the living room can lead to certain unpleasant complications. Ergo the market for fun-sized cabinets has exploded alongside the availability of cheap SBCs and MCUs that can run classical arcade titles. Microcontrollers like the ESP32 with its dual 240 MHz cores can run circles around the CPU grunt of 1980s arcade hardware. Cue [Till Harbaum]’s Galagino ESP32-based arcade emulator project, that recently saw some community versions and cabinet takes.

There was a port to the PlatformIO framework by [speckhoiler] which also added a few more arcade titles and repurposed the enclosure of an off-the-shelf ‘My Arcade’ by stuffing in an ESP32-based ‘Cheap Yellow Display‘ (CYD) board instead. These boards include the ESP32 module, a touch display, micro SD card slot, sound output, and more; making it an interesting all-in-one solution for this purpose.

Most recently [Davide Gatti] and friends ported the Galagino software to the Arduino platform and added a 3D printed enclosure, though you will still need to source a stack of parts which are listed in the bill of materials. What you do get is a top display that displays the current game title in addition to the display of the usual CYD core, along with an enclosure that can be printed both in single- or multi-color.

There’s also a build video that [Davide Gatti] made, but it’s only in Italian, so a bit of a crash course in this language may be required for some finer details.

youtube.com/embed/Nz3LRrY3Ukw?…

Thanks to [ZT] for the tip.


hackaday.com/2026/03/11/mini-m…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

⚠️ ATTENZIONE: Google ha corretto 2 bug sfruttati di Chrome (CVSS 8.8) in Skia e nel motore V8.


Le pagine HTML create possono innescare il danneggiamento della memoria o l'esecuzione di codice sandbox. Aggiorna ora a Chrome v146.

Seguiranno le patch Edge, Brave, Opera e Vivaldi.

thehackernews.com/2026/03/goog…

@informatica

Cybersecurity & cyberwarfare ha ricondiviso questo.

Microsoft afferma che gli aggressori stanno avvelenando i risultati di ricerca per diffondere falsi client VPN che rubano le credenziali.

La campagna reindirizza le ricerche software agli installatori trojanizzati su GitHub che mostrano falsi prompt VPN mentre Hyrax ruba le credenziali.

thehackernews.com/2026/03/stor…

@informatica

Cybersecurity & cyberwarfare ha ricondiviso questo.

AI error jails innocent grandmother for months in North Dakota fraud case
L: grandforksherald.com/news/nort…
C: news.ycombinator.com/item?id=4…
posted on 2026.03.12 at 16:55:51 (c=5, p=9)

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

AI-assisted #Slopoly #malware powers #Hive0163’s #ransomware campaigns
securityaffairs.com/189378/mal…
#securityaffairs #hacking #AI

OS/2 Never Went Away. Its Successor Has Received An Update


The media in this post is not displayed to visitors. To view it, please log in.

ArcaOS is an operating system you might not have heard of, but you will recognize it when we tell you that it’s the direct descendant of IBM’s OS/2. It’s just received a major update, and delivers this persuasive argument for its uptake:

“How about a commercial operating system which doesn’t spy on you, does not report your online activity to anyone, and gives you complete freedom to choose the applications you want to use, however you want to use them?”


We’re guessing that a higher-than-average number of Hackaday readers use open-source operating systems, but in a world in which the commercial OS everyone loves to hate is ever more turning the Play button into the Pay button, we have to admit that’s attractive if you pay for your software.

This update, version 5.1.2, brings support for the very latest UEFI systems to the table, keeping the platform alive in a manner we’d never have guessed would happen back in the 1990s. It’s true it’s a 32-bit system rather than 64-bit, and you’d be unlikely to buy it for your high-end gaming machine, but we remember OS/2 Warp back in the day as being very nice indeed and particularly stable. We’re interested enough to have put in a cheeky request for a review ISO, so should that come off we’d love to give it the Jenny’s Daily Drivers treatment.

ArcaOS has been mentioned here before. Do any of our readers encounter it in your daily lives? We’d love to hear in the comments.


hackaday.com/2026/03/13/os-2-n…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Sventato un cyber attacco iraniano alla centrale nucleare di ricerca Polacca

📌 Link all'articolo : redhotcyber.com/post/attacco-d…

#redhotcyber #news #sicurezzainformatica #hacking #iran #attacchinformatici #cybersecurity #polonia

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Google fixed two new actively exploited flaws in the #Chrome browser
securityaffairs.com/189373/hac…
#securityaffairs #hacking #AI
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Cyber war: i gruppi statali Iraniani utilizzano malware già pronti per velocizzare gli attacchi

📌 Link all'articolo : redhotcyber.com/post/cyber-war…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #attacchiinformatici #intelligenzaartificiale

Cybersecurity & cyberwarfare ha ricondiviso questo.

Beyond File Servers: Securing Unstructured Data in the Era of AI
securityaffairs.com/189368/sec…
#securityaffairs #hacking #AI
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚀 TRA POCHI GIORNI AL VIA IL CORSO "𝗖𝗬𝗕𝗘𝗥 𝗢𝗙𝗙𝗘𝗡𝗦𝗜𝗩𝗘 𝗙𝗨𝗡𝗗𝗔𝗠𝗘𝗡𝗧𝗔𝗟𝗦" 🚀

🔗 Programma e dettagli: redhotcyber.com/linksSk2L/cybe…
🔗 Introduzione al corso del prof. Alessio Lauro: youtube.com/watch?v=0y4GYsJMoX…
🔗 Webinar introduttivo al corso: youtube.com/watch?v=z92gaV2zgN…

✅Lezioni in diretta e supervisionate (niente video preregistrati abbandonati a metà).
✅Laboratori pratici su ambienti reali.
✅Un percorso strutturato per chi parte da zero.

💎 Essendo la prima "Live Class" su questo argomento, i prezzi sono imbattibili.
Ma affrettatevi perché il corso è a numero chiuso

Info 📞 379 163 8765 ✉️ formazione@redhotcyber.com

#redhotcyber #formazione #pentesting #pentest #formazionelive #ethicalhacking #hacking #cybersecurity #penetrationtesting #cti #cybercrime #infosec #corsi #liveclass #hackerhood #pentesting

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Zombie ZIP: la nuova tecnica di attacco che aggira antivirus e EDR

📌 Link all'articolo : redhotcyber.com/post/zombie-zi…

Chris Aziz, ricercatore di #sicurezza presso Bombadil Systems, ha sviluppato e dimostrato una tecnica di #attacco chiamata Zombie ZIP, la quale consente di nascondere payload dannosi all’interno di archivi ZIP in modo che non vengano rilevati dai #sistemi antivirus e EDR. Lo specialista spiega che l’attacco consiste nella manipolazione delle intestazioni del file ZIP.

A cura di Bajram Zeqiri

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #antivirus #edr #sicurezzainformatica #zombiezip #archivizip #payloaddannosi #tecnichidiattacco #minacceinformatiche

Perfecting the Shape-Changing Fruit Bowl


The media in this post is not displayed to visitors. To view it, please log in.

Fruit bowls have an unavoidable annoyance– not flies and rotten fruit, those would be avoidable if your diet was better. No, it’s that the bowl is never the right size. Either your fruit is sad and lonely in a too-large bowl, or it’s falling out. It’s the kind of existential nightmare that can only be properly illustrated by a late-night infomercial. [Simone Giertz] has a solution to the problem: a shape-changing fruit bowl.

See, it was one thing to make a bowl that could change shape. That was easy, [Simone] had multiple working prototypes. There are probably many ways to do it, but we like [Simone]’s use of an iris mechanism in a flat base to allow radial expansion of the walls. The problem was that [Simone] has that whole designer thing going on, and needs the bowl to be not only functional, but aesthetically pleasing. Oh, and it would be nice if expanding the bowl didn’t create escape routes for smaller fruits, but that got solved many prototypes before it got pretty.

It’s neat to see her design process. Using 3D printing and CNC machining for prototyping is very familiar to Hackaday, but lets be honest — for our own projects, it’s pretty common to stop at “functional”. Watching [Simone] struggle to balance aesthetics with design-for-manufacturing makes for an interesting 15 minutes, if nothing else. Plus she gives us our inspirational quote of the day: “As much as I feel like I’m walking in circles, I know that product development is a spiral”. Something to keep in mind next time it seems like you’re going around the drain in your own projects. Just be warned, she does have a bit of a potty mouth.

We’ve featured [Simone]’s design decisions here, if you’re interested in seeing how she goes the rest of the way from project to product. We’re pretty sure her face-slapping-alarm clock never made it into the SkyMall catalog, though.

youtube.com/embed/9jPVsWPs4p8?…


hackaday.com/2026/03/13/perfec…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🔴 Benvenuta Erminia in Red Hot Cyber Cyber Angels 🔴

👉 Ultimo contributo qui: redhotcyber.com/post/ti-sei-ma…
📩 Per chi fosse interessata a partecipare : redazione@redhotcyber.com

#redhotcyber #rhccyberangels #hacking #benesseredigitale #cti #ai #online #it #cybercrime #cybersecurity

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

252 – Le aziende di AI decidono chi muore camisanicalzolari.it/252-le-az…
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Microsoft slitta ancora il passaggio al nuovo Outlook: addio al classico… forse nel 2029

📌 Link all'articolo : redhotcyber.com/post/microsoft…

#redhotcyber #news #nuovoutlook #outlookperwindows #transizioneoutlook #clientunificato #supportooutlook

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Veeam nel mirino: una Remote Code Execution espone i server di Backup

📌 Link all'articolo : redhotcyber.com/post/veeam-nel…

#redhotcyber #news #cybersecurity #hacking #veam #backup #replication #vulnerabilita #rce #sicurezzainformatica

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Corea del Sud: 3% del fatturato per le aziende che hanno incidenti informatici ricorrenti

📌 Link all'articolo : redhotcyber.com/post/corea-del…

#redhotcyber #news #cybersecurity #sanzionipersevere #aziendeirresponsabili #spamillegale #sicurezzainformatica

Nintendo’s Family BASIC Keyboard Gets USB Upgrade


The media in this post is not displayed to visitors. To view it, please log in.

America knew it as the Nintendo Entertainment System, but in Japan, it was the Family Computer (Famicom). It was more than just a home console—it was intended to actually do a whole lot more. All you had to do was plug in the keyboard and chuck in the right Family BASIC cartridge, and you had a computer hooked up to your TV! [Lucas Leadbetter] came across an old Family BASIC keyboard recently, and set about making it more useful in our modern age with a simple USB upgrade.

[Lucas] started with research, and soon found plenty of schematics and details on the keyboard on the NESdev wiki page. Hunting further turned up a video from [Circuit Rewind], who demonstrated how to hook up the keyboard to a Raspberry Pi Pico, including how to interface with the onboard chips to scan the keys. These resources told [Lucas] enough to get going—and that it should be as simple as wiring some custom hardware up to the internal keyboard matrix connector to get it speaking to USB.

[Lucas] went a slightly different path to [Circuit Rewind], implementing the popular QMK firmware to suit the Family Basic keyboard on an Adafruit KB2040. The Adafruit part is basically an RP2040 microcontroller slapped onto a tiny PCB in a form factor that’s ideal for making custom keyboards. [Lucas] was able to reimplement the scanning logic that [Circuit Rewind] had reverse engineered previously, and had the keyboard up and running in short order with all the usability benefits of the QMK firmware. Files are on Github for those eager to recreate the work.

As far as usability goes, [Lucas] notes that the Family BASIC keyboard is more of a conversation piece than a daily driver, thanks to its rather poor feel. Duly noted. We’ve explored how software development is done in Family BASIC before, too. Video after the break.

youtube.com/embed/t6OEFQlg0Nc?…


hackaday.com/2026/03/12/ninten…

Replicating a Nuclear Event Detector For Fun and Probably Not Profit


The media in this post is not displayed to visitors. To view it, please log in.

Last year, we brought you a story about the BhangmeterV2, an internet-of-things nuclear war monitor. With a cold-war-era HSN-1000 nuclear event detector at its heart, it had one job: announce to everything else on the network than an EMP was inbound, hopefully with enough time to shut down electronics. We were shocked to find out that the HSN-1000 detector was still available at the time, but that time has now passed. Fortunately [Bigcrimping] has stepped up to replicate the now-unobtainable component at the heart of his build with his BHG-2000 Nuclear Event Detector — but he needs your help to finish the job.

The HSN-1000, as reported previously, worked by listening for the characteristic prompt gamma ray pulse that is the first sign of a nuclear blast. The Vela Satellites that discovered Gamma Ray Bursts were watching for the same thing, though almost certainly not with that specific component. With the HSN-1000 unavailable, [Bigcrimping] decided he might as well make his own gamma ray detector, using four BPW34S PIN diodes coated with black paint. The paint blocks all visible light that might trigger photocurrent inside diode, but not Gamma Rays, while using four acts increases the area and may inadvertently act as a sort of coincident detector. You wouldn’t want your homemade Dead Hand to be triggered by a cosmic ray, would you?

That tiny photocurrent is then amplified by a transimpedance amplifier based on the LTC6244 op-amp, which then goes into a second-stage based on a LT1797 op amp that drives a LOW pulse to indicate an event has occurred. [Bigcrimping] fit all of this onto a four-layer PCB that is a pin-compatible replacement for the HSN-1000L event detector called for in his BhangmeterV2.
Paired with a Pico 2 W, the BHG-2000 is ready to defend your devices. At least until the EMP and blast wave hits.
There’s only one problem: without exposing this thing to gamma rays, we really don’t know if it will work. [Bigcrimping] is looking for anyone in Europe with a Cs-137 or Co-60 source willing to help out with that. His contact info is on the GitHub page where the entire project is open sourced. Presumably a nuclear detonation would work for calibration, too, but we at Hackaday are taking the bold and perhaps controversial editorial stance that nuclear explosions are best avoided. If the Bhangmeter– which we wrote up here, if you missed it–or some equivalent does warn you of a blast, do you know where to duck and cover?


hackaday.com/2026/03/12/replic…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Yay test vectors!

I will write properly about this, but we are going pretty far to test ML-DSA *and make it easy to test,* so I am hopeful ML-DSA bugs will be rare compared to classical [EC|Ed]DSA bugs.

These test gaps were identified by writing multiple alternative ML-DSA implementations and mutation testing *those* to find missing vectors to then bring back to the Go implementation, and share on Wycheproof.

Building a Robot Partner to Play Air Hockey With


The media in this post is not displayed to visitors. To view it, please log in.

Air hockey is one of those sports that’s both incredibly fun, but also incredibly frustrating as playing it by yourself is a rather lonely and unfulfilling experience. This is where an air hockey playing robot like the one by [Basement Builds] could come in handy. After all, after you finished building an air hockey table from scratch, how hard could it be to make a robot that merely moves the paddle around to hit the puck with?

An air hockey table is indeed not extremely complicated, being mostly just a chamber that has lots of small holes on the top through which the air is pushed. This creates the air layer on which the puck appears to float, and allows for super-fast movement. For this part countless chamfered holes were drilled to get smooth airflow, with an inline 12VDC duct fan providing up to 270 CFM (~7.6 m3/minute).

Initially the robot used a CoreXY gantry configuration, which proved to be unreliable and rather cumbersome, so instead two motors were used, each connected to its own gearbox. These manipulate the paddle position by changing the geometry of the arms. Interestingly, the gearbox uses TPU for its gears to absorb any impacts and increase endurance as pure PLA ended up falling apart.

The position of the puck is recorded by an overhead camera, from where a Python script – using the OpenCV library running on a PC – determines how to adjust the arms, which is executed by Arduino C++ code running on a board attached to the robot. All of this is available on GitHub, which as the video makes clear is basically cheating as you don’t get to enjoy doing all the trigonometry and physics-related calculating and debugging fun.

youtube.com/embed/GLsDLgj8Q5E?…


hackaday.com/2026/03/12/buildi…

Cybersecurity & cyberwarfare ha ricondiviso questo.

If you're reading up on #Stryker and the wipe that was done on their systems, you can get a pretty good idea of your threat landscape by navigating to the Intune admin center > Tenant Administration > Roles >Roles by Permission > Category: "Remote Tasks" Permission "Wipe"

This should show Help Desk Operator and School Administrator. You can click through to see who's in those roles.

#CTI #InfoSec #Microsoft #Intune #Iran #Cybersecurity

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

In a major win for digital privacy, the European Parliament just (again) limited all scanning of communications for child abuse material to specific suspects. No mass surveillance, no #chatcontrol. Now the negotiations with Member States will be interesting. They are already supposed to start tomorrow morning.

Mapping The Sound Field Of An Acoustic Levitator


The media in this post is not displayed to visitors. To view it, please log in.

Sound! It’s a thing you hear, moreso than something you see with your eyes. And yet, it is possible to visualize sound with various techniques. [PlasmatronX] demonstrates this well, using a special scanning technique to visually capture the sound field inside an acoustic levitation device.

If you’re unfamiliar, acoustic levitation devices like this use ultrasound to create standing waves that can hold small, lightweight particles in mid-air. The various nodes of the standing wave are where particles will end up hovering. [PlasmatronX] was trying to calibrate such a device, but it proved difficult without being able to see what was going on with the sound field. Hence, the desire to image it!

Imaging the sound field was achieved with a Schlieren optical setup, which can capture variations in air density as changes in brightness in an image. Normally, Schlieren imaging only works in a two-dimensional slice. However, [PlasmatronX] was able to lean on computed tomography techniques to create a volumetric representation of the sound field in 3D. He refers to this as “computerized acoustical tomography.” Images were captured of the acoustic levitation rig from different angles using the Schlieren optics rig, and then the images were processed in Python to recreate a 3D image of the sound field.

We’ve seen some other entertaining applications of computed tomography techniques before, like inspecting packets of Pokemon cards. Video after the break.

youtube.com/embed/Ky7AWh8nd-A?…


hackaday.com/2026/03/12/mappin…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Una donna Bisessuale spesso viene esclusa sia dalle comunità etero che omosessuali. Può sviluppare una bifobia specifica. E come al solito i problemi medici peculiari sono pressoché ignorati dai medici di medicina generale. Trova un medic* che ti ascolti e non ti giudichi per poter confidare senza stigma la tua vita sessuale ed i problemi legati al minority stress.