Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Truffa SMS del CUP: una nuova campagna di smishing che sfrutta la sanità pubblica

📌 Link all'articolo : redhotcyber.com/post/truffa-sm…

#redhotcyber #news #truffaviaSMS #SMS truffa #cuptrova #tariffaaggiuntiva #numeroprefisso #899 #893 #892 #894

Cybersecurity & cyberwarfare ha ricondiviso questo.

U.S. #CISA adds #Apple, #Rockwell, and #Hikvision flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.com/189005/sec…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚀 ULTIMI POSTI DISPONIBILI PER IL CORSO "𝗖𝗬𝗕𝗘𝗥 𝗢𝗙𝗙𝗘𝗡𝗦𝗜𝗩𝗘 𝗙𝗨𝗡𝗗𝗔𝗠𝗘𝗡𝗧𝗔𝗟𝗦" 🚀

Per info e iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com
👉 redhotcyber.com/linksSk2L/cybe…

#redhotcyber #formazione #pentesting #pentest #formazionelive #ethicalhacking #hacking #cybersecurity

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Scoperto Genisys: app innocue trasformate in strumenti di traffico web nascosto sul tuo smartphone

📌 Link all'articolo : redhotcyber.com/post/scoperto-…

#redhotcyber #news #intelligenzaartificiale #sitiweb #trafficioweb #monetizzazione #app #cybersecurity #hacking

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Google #GTIG: 90 zero-day flaws exploited in 2025 as enterprise targets grow
securityaffairs.com/188993/sec…
#securityaffairs #hacking #malware
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

245 – La truffa che parte dall’AI per diventare un contratto di carta camisanicalzolari.it/245-la-tr…
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Gli hacker iraniani puntano alle telecamere. Il segnale prima dei missili?

📌 Link all'articolo : redhotcyber.com/post/gli-hacke…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #telemetricasorveglianza #dispositivihikvision

reshared this

Ebike Charges At Car Charging Stations


The media in this post is not displayed to visitors. To view it, please log in.

Electric vehicles are everywhere these days, and with them comes along a whole slew of charging infrastructure. The fastest of these are high-power machines that can deliver enough energy to charge a car in well under an hour, but there are plenty of slower chargers available that take much longer. These don’t tend to require any specialized equipment which makes them easier to install in homes and other places where there isn’t as much power available. In fact, these chargers generally amount to fancy extension cords, and [Matt Gray] realized he could use these to do other things like charge his electric bicycle.

To begin the build, [Matt] started with an electric car charging socket and designed a housing for it with CAD software. The housing also holds the actual battery charger for his VanMoof bicycle, connected internally directly to the car charging socket. These lower powered chargers don’t require any communication from the vehicle either, which simplifies the process considerably. They do still need to be turned on via a smartphone app so the energy can be metered and billed, but with all that out of the way [Matt] was able to take his test rig out to a lamppost charger and boil a kettle of water.

After the kettle experiment, he worked on miniaturizing his project so it fits more conveniently inside the 3D-printed enclosure on the rear rack of his bicycle. The only real inconvenience of this project, though, is that since these chargers are meant for passenger vehicles they’re a bit bulky for smaller vehicles like e-bikes. But this will greatly expand [Matt]’s ability to use his ebike for longer trips, and car charging infrastructure like this has started being used in all kinds of other novel ways as well.

youtube.com/embed/i6IyukCIia8?…


hackaday.com/2026/03/05/ebike-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Self-Attention: il segreto dietro ChatGPT e i modelli di linguaggio

📌 Link all'articolo : redhotcyber.com/post/self-atte…

#redhotcyber #news #intelligenzaartificiale #deep learning #rete neurale #tokenizzazione #embedding #selfattention

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

La guerra cibernetica tra Iran, Israele e Stati Uniti: 15 anni di conflitto digitale

📌 Link all'articolo : redhotcyber.com/post/la-guerra…

#redhotcyber #news #cybersecurity #hacking #malware #stuxnet #guerraDigitale #iran #israele #statiunitidamerica

California’s Problematic Attempt to add Age-Verification to Software


The media in this post is not displayed to visitors. To view it, please log in.

Last year California’s Digital Age Assurance Act (AB 1043) was signed into law, requiring among other things that operating system providers implement an API for age verification purposes. With the implementation date of January 1, 2027 slowly encroaching this now has people understandably agitated. So what are the requirements, and what will its impact be, as it affects not only OS developers but also application stores and developers?

The required features for OS developers include an interface at account setup during which the person indicates which of the four age brackets they fit into. This age category then has to be used by application developers and application stores to filter access to the software. Penalties for non-compliance go up to $2,500 per affected child if the cause is neglect and up to $7,500 if the violation was intentional.

As noted in the Tom’s Hardware article, CA governor Newsom issued a statement when signing the unanimously passed bill, saying that he hopes the bill gets amended due to how problematic it would be to implement and unintended effects. Of course, the bigger question is whether this change requires more than adding a few input fields and checkboxes to an OS’ account setup and an API call or two.

When we look at the full text of this very short bill, the major questions are whether this bill has any teeth at all. From reading the bill’s text, we can see that the person creating the account is merely asked to provide their birth date, age or both. This makes it at first glance as effective as those ‘pick your age’ selection boxes before entering an age-gated part of a website. What would make this new ‘age-verification feature’ any more reliable than that?

Although the OS developer is required to provide this input option and an API feature of undefined nature that provides the age bracket in some format via some method, the onus is seemingly never put on the user who creates or uses the OS account. Enforcement as defined in section 1798.503 is defined as a vague ‘[a] person that violates this title’, who shall have a civil action lawsuit filed against them. What happens if a 9-year old child indicates that they’re actually 35, for example? Or when a user account is shared on a family computer?

All taken together, this bill looks from all angles to add a lot of nuisance and potential for catching civil lawsuit flak for in particular FOSS developers, all in order to circuitously reimplement the much beloved age dropdown selection widget that’s been around since at least the 1990s.

They could give this bill real teeth by requiring that photo ID is required for registering an (online-only) OS account, much like with the recent social media restrictions and Discord age-verification kerfuffle, but that’d run right over the ‘privacy-preserving’ elements in this same bill.


hackaday.com/2026/03/05/califo…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Utilizzo del nuovo strumento open source di @Bellingcat per esplorare i dati di volo storici e spaziali

I dati di tracciamento dei voli sono uno strumento importante nella ricerca open source, ma con 100.000 voli giornalieri , può essere difficile contestualizzare cosa indicano i movimenti di un particolare aereo.

bellingcat.com/resources/2026/…

@pirati

Grazie a @iam0day per la segnalazione

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Il fondatore di Intellexa e altri tre condannati a 8 anni di carcere per lo scandalo dello spyware greco

Un tribunale greco ha condannato al carcere quattro dirigenti di Intellexa per il loro ruolo in uno scandalo del 2022 che ha coinvolto l'uso dello spyware Predator contro oltre 90 personaggi pubblici del Paese.

citizenlab.ca/intellexa-founde…

@informatica

Grazie a @iam0day per la segnalazione

Prevent your Denon Receiver Turning on From Rogue Nvidia Shield CEC Requests


The media in this post is not displayed to visitors. To view it, please log in.

In theory HDMI’s CEC feature is great, as it gives HDMI devices the ability to do useful things such as turning on multiple HDMI devices with a single remote control. Of course, such a feature will inevitably feature bugs. A case in point is the Nvidia Shield which has often been reported to turn on other HDMI devices that should stay off. After getting ticked off by such issues one time too many, [Matt] decided to implement a network firewall project to prevent his receiver from getting messed with by the Shield.

The project is a Python-based network service that listens for the responsible rogue HDMI-CEC Zone 2 requests and talks with a Denon/Marantz receiver to prevent it from turning on unnecessarily. Of course, when you want these Zone 2 requests to do their thing you need to disable the script.

That said, HDMI-CEC is such a PITA that people keep running into issues like these over and over again, to the point where people are simply disabling the feature altogether. That said, Nvidia did recently release a Shield update that’s claimed to fix CEC issues, so maybe this is one CEC bug down already.


hackaday.com/2026/03/05/preven…

Railway End Table Powered By Hand Crank


The media in this post is not displayed to visitors. To view it, please log in.

Most end tables that you might find in a home are relatively static objects. However, [Peter Waldraff] of Tiny World Studios likes to build furniture that’s a little more interesting. Thus came about this beautiful piece with a real working railway built right in.

The end table was built from scratch, with [Peter] going through all the woodworking steps required to assemble the piece. The three-legged wooden table is topped with a tiny N-scale model railway layout, and you get to see it put together including the rocks, the grass, and a beautiful epoxy river complete with a bridge. The railway runs a Kato Pocket Line trolley, but the really neat thing is how it’s powered.

[Peter] shows us how a small gearmotor generator was paired with a bridge rectifier and a buck converter to fill up a super capacitor that runs the train and lights up the tree on the table. Just 25 seconds of cranking will run the train anywhere from 4 to 10 minutes depending on if the tree is lit as well. To top it all off, there’s even a perfect coaster spot for [Peter]’s beverage of choice.

It’s a beautiful kinetic sculpture and a really fun way to build a small model railway that fits perfectly in the home. We’ve featured some other great model railway builds before, too.

youtube.com/embed/9cLuf6BuB3A?…


hackaday.com/2026/03/05/railwa…

Capacitor Memory Makes Homebrew Relay Computer Historically Plausible


The media in this post is not displayed to visitors. To view it, please log in.

It’s one thing to create your own relay-based computer; that’s already impressive enough, but what really makes [DiPDoT]’s design special– at least after this latest video— is swapping the SRAM he had been using for historically-plausible capacitor-based memory.

A relay-based computer is really a 1940s type of design. There are various memory types that would have been available in those days, but suitable CRTs for Williams Tues are hard to come by these days, mercury delay lines have the obvious toxicity issue, and core rope memory requires granny-level threading skills. That leaves mechanical or electromechanical memory like [Konrad Zeus] used in the 30s, or capacitors. he chose to make his memory with capacitors.

It’s pretty obvious when you think about it that you can use a capacitor as memory: charged/discharged lets each capacitor store one bit. Charge is 1, discharged is 0. Of course to read the capacitor it must be discharged (if charged) but most early memory has that same read-means-erase pattern. More annoying is that you can’t overwrite a 1 with a 0– a separate ‘clear’ circuit is needed to empty the capacitor. Since his relay computer was using SRAM, it wasn’t set up to do this clear operation.

He demonstrates an auto-clearing memory circuit on breadboard, using 3 relays and a capacitor, so the existing relay computer architecture doesn’t need to change. Addressing is a bit of a cheat, in terms of 1940s tech, as he’s using modern diodes– though of course, tube diodes or point-contact diodes could conceivably pressed into service if one was playing purist. He’s also using LEDs to avoid the voltage draw and power requirements of incandescent indicator lamps. Call it a hack.

He demonstrates his circuit on breadboard– first with a 4-bit word, and then scaled up to 16-bit, before going all way to a massive 8-bytes hooked into the backplane of his Altair-esque relay computer. If you watch nothing else, jump fifteen minutes in to have the rare pleasure of watching a program being input via front panel with a complete explanation. If you have a few extra seconds, stay for the satisfyingly clicky run of the loop. The bonus 8-byte program [DiPDoT] runs at the end of the video is pure AMSR, too.

Yeah, it’s not going to solve the rampocalypse, any more than the initial build of this computer helped with GPU prices. That’s not the point. The point is clack clack clack clack clack, and if that doesn’t appeal, we don’t know what to tell you.

youtube.com/embed/EtDyzEDMOoo?…


hackaday.com/2026/03/05/capaci…

Keebin’ with Kristina: the One With the Beginner’s Guide to Split Keyboards


The media in this post is not displayed to visitors. To view it, please log in.

Illustrated Kristina with an IBM Model M keyboard floating between her hands.

Curious about split keyboards, but overwhelmed by the myriad options for every little thing? You should start with [thehaikuza]’s excellent Beginner’s Guide to Split Keyboards.

Three different split keyboards.Image by [thehaikuza] via redditYour education begins with the why, so you can skip that if you must, but the visuals are a nice refresher on that front.

He then gets into the types of keyboards — you got your standard row-staggered rectangles that we all grew up on, column-staggered, and straight-up ortholinear, which no longer enjoy the popularity they once did.

At this point, the guide becomes a bit of a Choose Your Own Adventure story. If you want a split but don’t want to learn to change much if at all about your typing style, keep reading, because there are definitely options.

But if you’re ready to commit to typing correctly for the sake of ergonomics, you can skip the Alice and other baby ergo choices and get your membership to the light side. First are features — you must decide what you need to get various jobs done. Then you learn a bit about key map customization, including using a non-QWERTY layout. Finally, there’s the question of buying versus DIYing. All the choices are yours, so go for it!

Via reddit

Is That a Bat In Your Pocket?


Need something ultra-portable for those impromptu sessions at the coffee shop (when you can actually find a table)? You can’t get much smaller than the 28-key Koumori by [fata1err0r81], which means “bat” in Japanese. Here’s the repo.

A black and purple bat-shaped monoblock split with a 40 mm track pad.Image by [fata1err0r81] via redditThis unibody beauty runs on an RP2040 Zero using QMK firmware. That 40 mm Cirque track pad has a glass overlay, which is a really nice touch. It’s actually a screen protector for a smart watch, and the purple bit is some craft vinyl cut to size.

Protecting that glass overlay is a case with a handle and a magnetic lid. Both the PCB and the case were designed in Ergogen, which as you know, I really like to see people using.

As you might have guessed, those are Kailh V1 choc switches with matching key caps. If you want a bat for your pocket, the build guide is simple, and there aren’t even any microscopic parts involved.

The Centerfold: [arax20]’s Been Workin’ On the Railroader


A very long (or wide) keyboard. Like three 40% keyboards wide.Image by [arax20] via redditOkay, before you do anything, go check out the image gallery to see this baby glowing and being worn like a katana or something. Yeah.

So [arax20] built this as a gift for an ex. She likes the ergonomics of splits, but didn’t want cables between the halves and feels the space between is otherwise wasted. Really? There’s so much you can put there, from cats to mice to coffee mugs.

Do you rock a sweet set of peripherals on a screamin’ desk pad? Send me a picture along with your handle and all the gory details, and you could be featured here!

Historical Clackers: the Mysterious Rico


Frustratingly little is known about the Rico, a 1932 index machine out of Nuremburg, Germany. But the Antikey Chop has over a dozen books on typewriters, and only two have any mention of the Rico: Adler’s Antique Typewriters, From Creed to QWERTY, and Dingwerth’s Kleines Lexikon Historischer Schreibmaschinen.
The Rico, a wide index typewriter with nice details.Image via The Antikey Chop
Adler calls it a “pleasant toy typewriter with indicator selecting letters from a rectangular index”, saying nothing more descriptive. Dingwerth’s volume both dates the Rico and lists the maker as Richard Koch & Co. of Nuremburg.

The Rico was ambitiously declared the No. A1 model, though there is no evidence of any other model in existence. It was made mostly of stamped tin, though the type element was made of brass. The type element looked like a tube cut in half lengthwise, and worked in a similar fashion to the Chicago typewriter with its type sleeve.

There are some interesting things about the Rico nonetheless. The platen could not accommodate paper wider than 4″, for one thing. There is also no inking system to speak of. Weirder still, this oversight isn’t mentioned in the original instructions. Most people just taped a couple inches of typewriter ribbon between the element and the platen and called it good .

To use the thing, you would move the center lever to the character you wanted. The lever has a pin in the bottom, and each character has a dimple in it for the pin to sit. The lever on the left side was used to pivot the carriage toward the type element in order to print. In total, the Rico typed 74 characters plus Space.

Finally, Someone’s Made a Braille Keyboard, and It’s Inexpensive


Once upon a time, New Jersey high schooler Umang Sharma saw an ad for a Braille keyboard. The price? A cool seven grand. For a keyboard. No problem, he thought. I can build my own.
High school senior Umang Sharma and his affordable Braille keyboard.Image via NJ.com
The astute among you will notice that there’s a Logitech keyboard in the picture, with what look like key cap hats. That is exactly what’s happening here. Sharma starts with a standard keyboard base, one that is usually either donated or was previously discarded.

He then focuses on the most important accessibility layer, which is tactile Braille key caps that are both readable and durable. In 2022, Sharma launched the non-profit Jdable to bring affordable, accessible design to people with disabilities.

He designed the key caps himself, and uses a combination of 3D printing and other materials to create them in bulk. They’re printed using a combination of PETG for toughness, TPU for grippiness, and resin for definition. The key caps are attached to the standard set with a strong adhesive.

Sharma has a team of student volunteers that help him build the keyboards and distribute them, and they have reached nearly 1,000 blind or visually-impaired students in the U.S. and abroad.


Got a hot tip that has like, anything to do with keyboards? Help me out by sending in a link or two. Don’t want all the Hackaday scribes to see it? Feel free to email me directly.


hackaday.com/2026/03/05/keebin…

A Live ISO For Those Vibe Coding Experiments


The media in this post is not displayed to visitors. To view it, please log in.

Vibe coding is all the rage at the moment if you follow certain parts of the Internet. It’s very easy to dunk upon it, whether it’s to mock the sea of people who’ve drunk the Kool-Aid and want the magic machine to make them a million dollar app with no work, or the vibe coded web apps with security holes you could drive a bus through.

But AI-assisted coding is now a thing that will stick around whether you like it or not, and there are many who want to dip a toe in the water to see what the fuss is about. For those who don’t quite trust the magic machines in their inner sanctum, [jscottmiller] is here with Clix, a bootable live Linux environment which puts Claude Code safely in a sandbox away from your family silver.

Physically it’s a NixOS live USB image with the Sway tiling Wayland compositor, and as he puts it: “Claude Code ready to go”. It has a shared partition for swapping files with Windows or macOS machines, and it’s persistent. The AI side of it has permissive settings, which means the mechanical overlord can reach parts of the OS you wouldn’t normally let it anywhere near; the point of having it in a live environment in the first place.

We can see the attraction of using an environment such as this one for experimenting without commitment, but we’d be interested to hear your views in the comments. It’s about a year since we asked you all about vibe coding, has the art moved forward in that time?


hackaday.com/2026/03/05/a-live…

SpyTech: The Underwater Wire Tap


The media in this post is not displayed to visitors. To view it, please log in.

In the 1970s, the USSR had an undersea cable connecting a major naval base at Petropavlovsk to the Pacific Fleet headquarters at Vladivostok. The cable traversed the Sea of Okhotsk, which, at the time, the USSR claimed. It was off limits to foreign vessels, heavily patrolled, and laced with detection devices. How much more secure could it be? Against the US Navy, apparently not very secure at all. For about a decade starting in 1972, the Navy delivered tapes of all the traffic on the cable to the NSA.

Top Secret


You need a few things to make this a success. First, you need a stealthy submarine. The Navy had the USS Halibut, which has a strange history. You also need some sort of undetectable listening device that can operate on the ocean floor. You also need a crew that is sworn to secrecy.

That last part was hard to manage. It takes a lot of people to mount a secret operation to the other side of the globe, so they came up with a cover story: officially, the Halibut was in Okhotsk to recover parts of a Soviet weapon for analysis. Only a few people knew the real mission. The whole operation was known as Operation Ivy Bells.

The Halibut


The Halibut is possibly the strangest submarine ever. It started life destined to be a diesel sub. However, before it launched in 1959, it had been converted to nuclear power. In fact, the sub was the first designed to launch guided missiles and was the first sub to successfully launch a guided missile, although it had to surface to launch.

Oddly enough, the sub carried nuclear cruise missiles and its specific target, should the world go to a nuclear war, was the Soviet naval base at Petropavolvsk.

By 1965, the sub had been replaced for missile duty by newer submarines. It was tapped to be converted for “special operations.” Under the guise of being a deep-sea recovery vehicle, the Halibut received skids to settle on the seabed, side thrusters, specialized anchors, and a host of electronic equipment, including “the Fish” a 12-foot-long array of cameras, sonar, and strobe lights weighing nearly two tons. The “rescue vehicle” on its stern didn’t actually detach. It was a compartment for deploying saturation divers.

An early mission was Operation Sand Dollar. Halibut found the wreck of the Soviet K-129, which the US would go on to recover in another top secret mission, looking for secrets and Soviet technology.

When it came time to deploy the listening device on an underwater cable, Halibut was perfect. It could park a safe distance away, deploy saturation divers, and recover them. If you want to see more about the Halibut, check out the [Defence Central] video below.

youtube.com/embed/mrgR8cMWKVo?…

The Listening Device

A later undersea wire tap device (Soviet photograph)
This wasn’t a hidden microphone in a briefcase. It was a 20-foot, six-ton pressure vessel parked on the ocean floor. Details are murky, but there was another part, probably smaller, that clamped around the cable. Working inductively, it didn’t pierce the cable for fear the Soviets would notice that. In addition, if they raised the cable for maintenance, the device was made to break away and sink to the bottom.

Needless to say, tapping a cable on the ocean floor isn’t easy. First, they had to locate the cable. Luckily, there were signs at either end telling fishing vessels to avoid the area. That helped, but they still had to search for the 5-inch wide cables. They found them at least 400 feet below the surface, some 120 miles offshore.

Saturation diving was a relatively new idea at the time, and the Navy’s SeaLab experiments had given them several years of experience with the technology. While commercial saturation dives started in 1965, it was still exotic technology in 1971. The first mission simply recorded a bit of data on the submarine and returned it. Once it was proven, the sub returned with the giant tap device and installed it.

It took four divers to position the big tap. Even then, you couldn’t just leave it there. The device used tapes and required service once a month. So Halibut or another sub had to visit each month to swap tapes out. We couldn’t find out what the power source for the bug was, so they probably had to change the batteries, too.

The Soviets didn’t consider the cable to be at risk for eavesdropping, so much of the traffic on the cable was in the clear. It was a gold mine of intelligence information, and many credit the information gained as crucial to closing the SALT II treaty talks.

Secondary Mission


Most of the crews participating in Operation Ivy Bells didn’t have clearance to know what was going on. Instead, they thought they were on a different secret mission to retrieve debris from Soviet anti-ship missiles.

To keep the story believable, the crew actually did recover a large number of parts from the subject Soviet missiles. Turns out, analysis of the debris did reveal some useful information, so two spy missions for the price of one.

Presumably, the assumption would be that if the Soviets heard a sub was scavenging missile parts, it might qualify as a secret, but it would hardly be a surprise. They couldn’t have imagined the real purpose of the submarine.

Future Taps


Later undersea taps were created that used radioisotope batteries and could store a year’s data between visits that tapped other Soviet phone lines. Submarines Parche, Richard B. Russel, and Seawolf saw duty with some of these other taps as well as taking over for Halibut when it retired four years after the start of Operation Ivy Bells.

The original Okhotsk tap would have operated for many more years if it were not for [Ronald Pelton]. A former NSA employee, he found himself bankrupt over $65,000 of debt. In 1980, he showed up at the Soviet embassy in Washington and offered to sell what he knew.

He knew a number of things, including what was going on with Operation Ivy Bells. That data netted him $5,000 and, overall, he got about $35,000 or so. Oh, he also got life in prison when, in 1985, a Soviet defector revealed he had been the initial contact for [Pelton].

The Soviets didn’t immediately act on [Pelton’s] intel, but by 1981, the Americans knew something was up. A small fleet of ships was parked right over the device. The USS Parche was sent to retrieve it, but they couldn’t find it. Today, it (or, perhaps, a replica) is in the Great Patriotic War Museum in Moscow.

A surprising amount of the Cold War was waged under the sea. Not to mention in the air.


hackaday.com/2026/03/05/spytec…

bagigio reshared this.

LEGO Space Computer Made Full Size, 47 Years On


The media in this post is not displayed to visitors. To view it, please log in.

The LEGO-lookalike displaying [Paul]'s dashboard

There’s just something delightful about scaled items. Big things shrunk down, like LEGO’s teeny tiny terminal brick? Delightful. Taking that terminal brick and scaling it back to a full-sized computer? Even better. That’s what designer [Paul Staal] has done with his M2x2 project.

In spite of the name, it actually has a Mac Mini M4 as its powerful beating heart. An M2 might have been more on-brand, but it’s probably a case of wanting the most horsepower possible in what [Paul] apparently uses as his main workstation these days. The build itself is simple, but has some great design details. As you probably expected, the case is 3D printed. You may not have expected that he can use the left stud as a volume control, thanks to an IKEA Symfonisk remote hidden beneath. The right stud comes off to allow access to a wireless charger.
The minifigs aren’t required to charge those airpods, but they’re never out of place.
The 7″ screen can display anything, but [Paul] mostly uses it either for a custom home assistant dashboard, or to display an equalizer, both loosely styled after ‘screen’ on the original brick. We have to admit, as cool as it looked with the minifigs back in the day, that sharp angle to the screen isn’t exactly ergonomic for humans.

Perhaps the best detail was putting LEGO-compatible studs on top of the 10:1 scaled up studs, so the brick that inspired the project can sit securely atop its scion. [Paul] has provided a detailed build guide and the STLs necessary to print off a brick, should anyone want to put one of these nostalgic machines on their own desk.

We’ve covered the LEGO computer brick before, but going the other way–putting a microcontroller and display in the brick it to run DOOM. We’ve also seen it scaled up before, but that project was a bit more modest in size and computing power.


hackaday.com/2026/03/05/lego-s…

Cybersecurity & cyberwarfare ha ricondiviso questo.

NEW: The FBI said it is investigating a hack on its networks.

The breach affected the FBI's systems to manage wiretaps and surveillace requests, according to CNN.

techcrunch.com/2026/03/05/fbi-…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

NEW: Italian prosecutors confirm that the phone of journalist Francesco Cancellato was hacked with Paragon spyware at the same time as the phones of two immigration activists.

The Italian government admitted the hack on the activists, but said it wasn't behind Cancellato's hack.

So who was? The mystery continues. And Cancellato, as well as his colleague Ciro Pellegrino, who was also allegedly hacked, are demanding answers.

techcrunch.com/2026/03/05/ital…

Questa voce è stata modificata (1 mese fa)

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Phobos #Ransomware admin faces up to 20 years after guilty plea
securityaffairs.com/188984/sec…
#securityaffairs #hacking #malware
Cybersecurity & cyberwarfare ha ricondiviso questo.

NEW: Google said that last year, and for the first time, it found more zero-days used by spyware makers (15) rather than government-backed espionage groups (12) in the wild.

The shift demonstrated “a slow but sure movement in the landscape” of how governments hack targets, according to the company.

techcrunch.com/2026/03/05/goog…

reshared this

Neutralizzata Tycoon 2FA, il kit phishing che aggirava l’MFA e ha compromesso migliaia di account


@Informatica (Italy e non Italy)
Questi attacchi informatici, che consentono il takeover completo degli account, possono avere conseguenze devastanti, tra cui attacchi ransomware o la perdita di dati sensibili. Ecco come è stata neutralizzata Tycoon

Cybersecurity & cyberwarfare ha ricondiviso questo.

È di nuovo giovedì, e su #SocialDebug cerco di capire come uomo e donna riescano a funzionare anche quando sembrano parlare lingue differenti.

Sul giradischi un Pezzali coi capelli e tutte le emozioni della cassetta nell'autoradio ♥️

open.substack.com/pub/signorin…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Vietato criticare il sionismo? Non più, ma quasi: il nuovo testo del DDL Romeo commentato continua a essere un problema

Il testo del DDL Romeo approvato al Senato differisce significativamente da quello originario, ma mantiene tratti ambigui ed eccezionalisti.

kritica.it/politica/ddl-romeo-…

@politica

Cybersecurity & cyberwarfare ha ricondiviso questo.

GDPR Omnibus: La "semplificazione" dell'UE lontana dalle reali esigenze delle imprese

«...la maggior parte dei professionisti non vuole che le protezioni vengano ridotte, ma che si riducano i compiti di documentazione e le pratiche burocratiche. In molti casi, chiedono addirittura leggi più chiare invece di una maggiore "flessibilità", che è difficile da gestire per la maggior parte delle aziende.»

noyb.eu/it/gdpr-omnibus-eu-sim…

@privacypride

Cybersecurity & cyberwarfare ha ricondiviso questo.

Russin APT targets Ukraine with BadPaw and MeowMeow #malware
securityaffairs.com/188974/apt…
#securityaffairs #hacking #Russia #Ukraine

Guerra cognitiva. Rizzi (DIS): “Il libero arbitrio è l’infrastruttura critica più importante”


@Informatica (Italy e non Italy)
La centralità delle minacce multidominio e multidimensionali nella tutela della sovranità nazionale “Governare il cambiamento” è il titolo della relazione annuale del DIS presentata alla Camera. La tecnologia e l’innovazione tecnologica

Cybersecurity & cyberwarfare ha ricondiviso questo.

Sostenibilità e sovranità digitale nella scuola del 21° secolo. Convegno in occasione dei 20 anni del Progetto FUSS

Il Progetto #FUSS (Free Upgrade for a Digitally Sustainable School) celebra quest’anno il suo ventesimo anniversario (2005-2025) e per l'occasione organizzerà un convegno lunedì 20 aprile 2026 dalle 15:00 alle 18:00 presso l’Aula Magna della Facoltà di Ingegneria della Libera Università di #Bolzano in via Bruno Buozzi 1 a Bolzano.

fuss.bz.it/post/2026-04-20_fus…

@gnulinuxitalia

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Scoperto “Coruna”: il kit di exploit che ha hackerato iPhone per anni senza farsi notare

📌 Link all'articolo : redhotcyber.com/post/scoperto-…

#redhotcyber #news #cybersecurity #hacking #malware #ios #vulnerabilità #google #coruna #iphone #truffacinese

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Decisioni Artificiali: La rubrica che spiega l’AI prima che lei cambi la tua vita

📌 Link all'articolo : redhotcyber.com/post/divulgazi…

#redhotcyber #news #intelligenzaartificiale #decisioniartificiali #marcoCamisaniCalzolari #aibusiness #divulgazione #ai

Using a Solid-State Elastocaloric Cooler to Freeze Water


The media in this post is not displayed to visitors. To view it, please log in.

Elastocaloric materials are a class of materials that exhibit a big change in temperature when exposed to mechanical stress. This could potentially make them useful as solid-state replacement for both vapor-compression refrigeration systems and Peltier coolers.
The entire assembled elastocaloric device. (Credit: Guoan Zhou, Nature, 2026)The entire assembled elastocaloric device. (Credit: Guoan Zhou, Nature, 2026)
So far one issue has been that reaching freezing temperatures was impossible, but a recently demonstrated solution (online PDF via IEEE Spectrum) using NiTi-based shape-memory alloys addressed that issue with a final temperature of -12°C achieved within 15 minutes from room temperature.

In the paper by [Guoan Zhou] et al. the cascade cooler is described, with eight stages of each three tubular, thin-walled NiTi structures. Each of these stages is mechanically loaded by a ceramic head that provides the 900 MPa mechanical stress required to transfer thermal energy via the stages from one side to the other of the device, alternately absorbing or releasing the energy with CaCl2 as the heat-exchange fluid.

NiTi alloys are known as about the ideal type of SMA for this elastocaloric purpose, so how much further this technology can be pushed remains to be seen. For stationary refrigeration applications it might just be the ticket, but we’ll have to see as the technology is developed further.


hackaday.com/2026/03/05/using-…

Running Video Through A Guitar Effects Pedal


The media in this post is not displayed to visitors. To view it, please log in.

Guitar pedals are designed to take in a sound signal, do fun stuff to it, and then spit it out to your amplifier where it hopefully impresses other people. However, [Liam Taylor] decided to see what would happen if you fed video through a guitar pedal instead.

The device under test is a Boss ME-50 multi-effects unit. It’s capable of serving up a wide range of effects, from delay to chorus to reverb, along with compression and distortion and a smattering of others. [Liam] hooked up the composite video output from an old Sony camcorder from the 2000s to a 3.5 mm audio jack, and plugged it straight into the auxiliary input of the ME-50 (notably, not the main guitar input of the device).

The multi-effects pedal isn’t meant to work with an analog video signal, but it can pass it through and do weird things to it regardless. Using the volume pedal on the ME-50 puts weird lines on the signal, while using a wah effect makes everything a little wobbly. [Liam] then steps through a whole range of others, like ring modulation, octave effects, and reverb, all of which do different weird things to the visuals. Particularly fun are some of the periodic effects which create predictable variation to the signal. True to its name, the distortion effect did a particularly good job of messing things up overall.

It’s a fun experiment, and recalls us of some of the fantastic analog video synths of years past. Video after the break.

youtube.com/embed/WG0KVxWWH18?…


hackaday.com/2026/03/04/runnin…

AI Act, un anno dopo i primi divieti: il bilancio della conformità e le nuove scadenze della governance


@Informatica (Italy e non Italy)
A un anno dall'interdizione dei sistemi a rischio inaccettabile, il mercato UE si interroga sull'equilibrio tra innovazione e oneri di conformità. Mentre le sanzioni per i trasgressori possono erodere fino al 7% del fatturato

reshared this

Ciardi (ACN): “AI, servono anticorpi per affrontare le minacce cyber”


@Informatica (Italy e non Italy)
“La cybersicurezza è una responsabilità istituzionale, grandissima. Noi parliamo sempre dei dati come la nuova moneta, ma più dati insieme hanno un valore diverso dato dalla loro relazione e non dalla loro quantità”. Lo ha detto Nunzia Ciardi, Vice Direttrice Generale ACN, nel suo

Iran, Russia e non solo: l’architettura della repressione digitale


@Informatica (Italy e non Italy)
I regimi autoritari fanno sempre più spesso affidamento agli spegnimenti di internet per reprimere il dissenso e bloccare le informazioni: ecco come funzionano i blackout della rete
L'articolo Iran, Russia e non solo: l’architettura della repressione digitale proviene da Guerre di Rete.

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚀 Scopri il Corso "Dark Web & Cyber Threat Intelligence" in modalità E-Learning sulla nostra Academy!🚀

📖 Argomenti del corso academy.redhotcyber.com/course…

📌 𝗔𝗰𝗰𝗲𝘀𝘀𝗼 𝗳𝗹𝗲𝘀𝘀𝗶𝗯𝗶𝗹𝗲: Corso in e-learning con contenuti sempre disponibili
📌 𝗦𝘂𝗽𝗽𝗼𝗿𝘁𝗼 𝗱𝗮𝗹 𝗽𝗿𝗼𝗳𝗲𝘀𝘀𝗼𝗿𝗲: docente disponibile via email
📌 𝗔𝗰𝗰𝗲𝘀𝘀𝗼 𝗮 𝗗𝗮𝗿𝗸𝗟𝗮𝗯: Completata la formazione è possibile fare richiesta per accedere a DarkLab, il gruppo di Red Hot Cyber sulla Cyber Threat Intelligence: redhotcyber.com/post/nasce-dar…

Scrivi a formazione@redhotcyber.com o Whatsapp al 3791638765

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence
#OnlineCourses #Elearning #DigitalLearning #RemoteCourses #VirtualClasses #CourseOfTheDay #LearnOnline #OnlineTraining #Webinars #academy

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Operation #Leak: #FBI and #Europol dismantle #LeakBase #Cybercrime forum
securityaffairs.com/188958/cyb…
#securityaffairs #hacking