Cybersecurity & cyberwarfare ha ricondiviso questo.

Appalti truccati, blitz Gdf al Ministero Difesa, Terna e Rfi nell'inchiesta Sogei

Si ipotizzano i reati di corruzione, riciclaggio e autoriciclaggio. Le indagini rappresentano un ulteriore sviluppo del filone investigativo già avviato su Sogei

rainews.it/articoli/2026/03/ap…

@informatica

Cybersecurity & cyberwarfare ha ricondiviso questo.

🇪🇺


Fine del ChatControl: il Parlamento UE ferma la sorveglianza di massa delle chat con una maggioranza risicatissima di un solo voto

Dopo che il Parlamento Europeo aveva già respinto il #chatcontrol indiscriminato e generalizzato da parte delle aziende tecnologiche statunitensi il 13 marzo, ieri le forze conservatrici hanno tentato una manovra per imporre comunque una nuova votazione e prorogare la legge.

marcosbox.com/2026/03/26/fine-…

@privacypride


reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

U.S. CISA adds a Langflow flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.com/190018/sec…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

Cybersecurity & cyberwarfare ha ricondiviso questo.

Dutch Police disclose breach from phishing incident

politie.nl/nieuws/2026/maart/2…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Russian security firm F6 has spotted a new trend in Russia where online fraud and scam groups are targeting children, social-engineering them into taking photos of their parents' e-banking apps and verification codes in exchange for in-game currencies.

f6.ru/media-center/press-relea…

reshared this

Looking at a bike built for the apocalypse


The media in this post is not displayed to visitors. To view it, please log in.

So-called bug out cars are a rather silly venture that serve little purpose more than snagging your jumper. The odds of a car working well through a nuclear winter are rather minimal. But what about a bicycle? On paper it’s a better choice, with extreme efficiency, reliability, and runs off whatever sustenance you can find in the barren landscape of a collapsed society. But [Seth] over at Berm Peak proved an apocalypse bike is at least as silly as a bug out car.

While a utilitarian bike fit for a cross-country trek across a nuclear wasteland can certainly be a reasonable venture, this particular bicycle is not that. This three wheeled monstrosity of a bicycle (is it still a bicycle if it has three wheels?) was built by [TOMO] for the Bespoked bike show’s apocalypse buildoff. It placed second among a number of strange bikes with features ranging from pedal driven circular saws to beer keg grills. But this particular example of apocalypse bike is easily the strangest example of the lot.

The features on this custom build are rather extensive, but the star of the show is the trailing link two wheel drive rear end. The third wheel was thrown on last minute with a random shock providing some measure of compliance to the rather unwieldy system. But while adding unnecessary complexity, the third wheel does offer the benefit of bringing along a number of spare parts on the last bikepacking trip of a lifetime. Moreover, it can be easily removed to get something resembling bicycle.

The aforementioned front of the bike while being an actual bike, is likewise a rather strange build. It’s best described as a fat-tired long nosed tall cargo bike. The removable cargo rack is quite effective in storing heavy loads by keeping the center of gravity near or below the axles, it can remain rideable with quite heavy loads. But, if ground clearance is needed, then simply remove the cargo rack, and the bike becomes a bike capable of navigating the nuclear wasteland it was made for.

While this is a silly and questionable bike, it’s certainly not the first strange bike we have seen.

youtube.com/embed/BlP_RAKlTAk?…


hackaday.com/2026/03/26/lookin…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Rapid7 links BPFDoor deployments on telco networks to Chinese APT Red Menshen

rapid7.com/blog/post/tr-bpfdoo…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Four former high-ranking NSA officials warned that the US is losing its advantage in cyberspace as the government is failing to keep up with foreign adversaries

The four cited "brain drain" across the public sector and disintegrating relations with the private sector

cyberscoop.com/former-nsa-chie…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Data-wiping attacks were reported at 50 Israeli organizations

Attacks were linked to 20 different groups

israelnationalnews.com/news/42…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Security firm Palo Alto Networks says a threat actor is impersonating its recruiters in a phishing campaign

unit42.paloaltonetworks.com/ph…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Coruna exploit reveals evolution of #Triangulation #iOS exploitation framework
securityaffairs.com/190010/mal…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

Fatemi fare il meloniano: complimenti a @GiorgiaMecojoni per avere sfanculato i personaggi oghi più dannosi per l'interesse di partito, mentre il PD, inspiegabilmente, se li tiene stretti.

Meloni sarà pure opportunista e votata all'autoconservazione, ma il PD brilla per la sua incredibile determinazione a demolire la propria credibilità e, soprattutto, a umiliare costantemente la credulità dei propri elettori. Poi c'è chi si chiede perché i fasci resistano

@politica

poliversity.it/@mau/1162966144…


Hybris e dura realtà

@politica - Il risultato del referendum ha semplicemente scoperchiato la pentola che bolliva già da parecchio.

wp.me/p6hcSh-9uB


Reconstructed SC62015 Opcode Reference For Sharp Pocket Computers


The media in this post is not displayed to visitors. To view it, please log in.

Pocket computers like Sharp’s 8-bit computing marvels were a big part of the 1980s, providing super-portable processing power to anyone who wanted a bit more than what something like a scientific calculator could provide at the time. These days they are mostly just a collector’s item for retrocomputing enthusiasts, which also means that a lot of the knowledge about how to program the CPUs in them is at risk of being lost.

This is why [gikonekos] decided to combine as much knowledge they can glean from official documentation into a reference project on GitHub for the SC62015 equipped Sharp pocket computers like the PC-E550.

Generally you’d program in Sharp’s dialect of BASIC on these computers, such as the ‘PLAY3’ program that [gikonekos] recently unearthed from a November 1993 copy of ‘Pocket Computer Journal’ using which you can create polyphonic tunes. This only unlocks a small part of what the hardware can do, of course, so having a full opcode reference like this is important.

While still a work in progress, it’ll eventually contain the full opcode and register tables, addressing modes, instruction summaries and of course a full accounting of how all of this was reconstructed. As the original Sharp documentation wasn’t released to the public, providing these scans is also not a goal, especially not under any kind of free license.

A cursory search reveals an instruction table for the PC-E500 from 1995 by [Andrew Woods], so documenting this is not a new thing, although at the time these Sharp pocket PCs didn’t count as ‘retro systems’ yet.


hackaday.com/2026/03/26/recons…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Gemini sul Dark Web: strumento di difesa o nuova frontiera del controllo?


@Informatica (Italy e non Italy)
Google ha integrato Gemini in Google Threat Intelligence per monitorare automaticamente il Dark Web: fino a 10 milioni di post al giorno analizzati con una precisione dichiarata del 98%. Un salto tecnologico reale che pone domande scomode su cosa significhi

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Fine del ChatControl: il Parlamento UE ferma la sorveglianza di massa delle chat con una maggioranza risicatissima di un solo voto

Dopo che il Parlamento Europeo aveva già respinto il #chatcontrol indiscriminato e generalizzato da parte delle aziende tecnologiche statunitensi il 13 marzo, ieri le forze conservatrici hanno tentato una manovra per imporre comunque una nuova votazione e prorogare la legge.

marcosbox.com/2026/03/26/fine-…

@privacypride

Cybersecurity & cyberwarfare ha ricondiviso questo.

Elastic's security team has come across "a data dump containing source code, compiled binaries, and deployment scripts for the kernel rootkit components of VoidLink, a cloud-native Linux malware framework first documented by Check Point Research in January 2026."

elastic.co/security-labs/illum…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Got a cool ActivityPub or ATProtocol project that can be demo'd? We are always looking to showcase what the Open Social Web can do when smart people create great software, in our speed demo track at FediForum. A few projects have been recommended for the end of April event by our community already.

If you think you have such a cool open social web demo, get in touch!

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Hybris e dura realtà

@politica - Il risultato del referendum ha semplicemente scoperchiato la pentola che bolliva già da parecchio.

wp.me/p6hcSh-9uB

Cybersecurity & cyberwarfare ha ricondiviso questo.

NEW: We spoke to a few iPhone security experts about what the discovery of DarkSword means to the long-held assumption that iPhones are very hard to hack.

The answer is nuanced, and not simple. Apple has made significant strides in making iPhones more secure, but DarkSword may change how we think.

techcrunch.com/2026/03/26/appl…

Questa voce è stata modificata (1 ora fa)
Cybersecurity & cyberwarfare ha ricondiviso questo.

Last year, my position was that we still had time to design PQ authentication mechanisms.

Now, based on the pace of progress and on statements like Google's, I believe:

1. we need to finish rolling out PQ key exchange yesterday
2. we need to start rolling out PQ auth now
3. it's too late to ship any new non-PQ design or system

blog.google/innovation-and-ai/…

reshared this

in reply to Filippo Valsorda

Interesting, I just cam across infosec.exchange/@mttaggart/11… the other day, basically saying that it won't be feasible any time soon.


As of 2026-03-02, the state of the art in quantum decryption has cracked a:
  • 22-bit RSA key
  • 6-bit elliptic curve key

forklog.com/en/quantum-compute…

The IBM QC that cracked the 6-bit key uses 133 qubits.

Some new research suggests that RSA-2048 could be cracked with as "few" as 100,000 qubits.

newscientist.com/article/25164…

(Paywall-free)

Such a machine...is not feasible to build any time soon.

So when your CISO or a vendor starts going off about "post-quantum" security, feel free to use this to remind them that we still have SMB1 in some places and Telnet in others. Plenty of work to do around the house.


in reply to Filippo Valsorda

You got me interested to know what it would look like in authorized_keys, and can it be this short! Looks neat.

ssh-mldsa44-ed25519 434f4d505349472d4d4c44534134342d456432353531392d534841353132

datatracker.ietf.org/doc/draft…

Cybersecurity & cyberwarfare ha ricondiviso questo.

That hack of the National Super Computer Center of China (NSCC) is becoming more real by the day

"the overall details we received so far seem like that this operation is more in the realm of "real” than “fake"."

netaskari.substack.com/p/nscc-…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Dopo aver sentito in radio l’ennesima difesa delle piattaforme social da parte di irriducibili liberali (“la colpa è dei genitori”), vale la pena ricordare che sì, i genitori devono vigilare.
Ma se i social mainstream sono progettati per creare dipendenza, come riconosciuto da un tribunale USA, la responsabilità non può ricadere solo sulle famiglie.
Come per alcol e sigarette, serve anche l’intervento della UE e dichiarare apertamente: i social algoritmici nuociono gravemente alla psiche.
Cybersecurity & cyberwarfare ha ricondiviso questo.

Cisco now has semiannual security updates for IOS and IOS XE

"In direct response to customer feedback, Cisco releases bundles of Cisco IOS and IOS XE Software Security Advisories on the fourth Wednesday of the month in March and September of each calendar year."

sec.cloudapps.cisco.com/securi…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Kaspersky has linked Coruna with Operation Triangulation. This somes a few weeks after we reported that L3Harris Trenchant was the company behind some components of Coruna.

And we also reported that it was possible Coruna was used in Operation Triangulation.

securelist.com/coruna-framewor…

in reply to Lorenzo Franceschi-Bicchierai

The media in this post is not displayed to visitors. To view it, please go to the original post.

A former Trenchant employee told us that when Triangulation was first revealed, other employees at the company believed that at least one of the zero-days caught by Kaspersky “were from us."

Also both Kaspersky and Trenchant seemed to wink at the fact that they both knew.

techcrunch.com/2026/03/10/us-m…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Russian intelligence managed to install a wire-taping device as part of a thermostat at a Ukrainian drone factory

en.interfax.com.ua/news/genera…

reshared this

3D Print Becomes Cast Iron Wrench Via Microwave


The media in this post is not displayed to visitors. To view it, please log in.

Consumer-grade 3D printing is good for prototyping and making relatively soft plastic stuff. If you wanna make tough things, though, it’s really hard to beat the strength of metal. [Shake the Future] has produced a guide on using 3D printing in a process to produce solid parts out of actual cast iron.

The concept is simple. [Shake the Future] uses silicon carbide crucibles, which can heat up by absorbing microwave energy. Put one in an insulated container, dump some metal in, and throw it in a microwave, and soon enough you have a pot of molten metal you can use to cast stuff.

Let’s say you want to make an adjustable wrench, which is how [Shake the Future] demonstrates this technique. The first step is to print the wrench parts in plastic, such as PLA. These parts are then packed into fine sand to create casting molds. The PLA is burned out of the mold, leaving a negative imprint of the geometry. Molten cast iron can then be poured into the mold to create the part in solid metal.

It’s a messy technique that requires a lot of manual labor, but it does work quite well. There are some tricks to learn, though, particularly when it comes to successfully casting parts with holes or fine geometric features.

And before you think that you’re going to put the hardware store out of business, it should also be noted that it failed on first encounter with a real-world nut. The thinnest part by the screw just wasn’t strong enough.

Still, it’s a great demo, and if you’ve ever wanted to make a bespoke cast iron part of your own, this work may be very relevant to you. Alternatively, consider learning about DIY aluminium castingjust consider the pitfalls involved.

youtube.com/embed/FyhaeVi05io?…


hackaday.com/2026/03/26/3d-pri…

Cybersecurity & cyberwarfare ha ricondiviso questo.

NEW: Here's everything you need to know about the new iPhone hacking tool DarkSword.

What is DarkSword? How does it work? Where did it come from? How did it leak online? What can you do about it?

We break it all down in this explainer.

techcrunch.com/2026/03/26/a-ma…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

OpenAI chiude Sora: il futuro dell’AI non è più Video! Scopriamo cosa sta accadendo

📌 Link all'articolo : redhotcyber.com/post/openai-ch…

#redhotcyber #news #openai #intelligenzaartificiale #soraplatform #generazionevideoai #monetizzazione #riskichilegali #copyright #robotica #agentiautonomi #probleminormativi #reputazioneonline #tecnologia

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Hungarian opposition leader Peter Magyar has accused the ruling government of using the Candiru spyware against his TISZA party

x.com/magyarpeterMP/status/203…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Il Ransomware è ora Democratico! TeamPCP e BreachForums assieme per elevare il RaaS

📌 Link all'articolo : redhotcyber.com/post/il-ransom…

#redhotcyber #news #cybercrime #ransomware #sicurezzainformatica #hacking #malware #attacchinformatici #vulnerabilita #supplychain

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Attacco informatico all’ospedale Papardo di Messina. Urzì: La Sicilia sempre più esposta

📌 Link all'articolo : redhotcyber.com/post/attacco-i…

Succede tutto in fretta. I #sistemi si fermano e, nel giro di poco, l’intera macchina sanitaria inizia a rallentare fino a bloccarsi.

All’ospedale Papardo di Messina è andata così, come riportato da Messina Today. Un #attacco #informatico ha mandato fuori uso terminali, #database e #piattaforme interne, creando problemi immediati: prenotazioni più lente, difficoltà operative e una #gestione dei pazienti decisamente più complicata.

A cura di Chiara Nardini

#redhotcyber #news #attacchinformatico #cybersecurity #hacking #malware #ransomware #ospedalipapardo #messina #problemidisicurezza #gestionepazienti #prenotazionionline #sicurezzainformatica #attacchihacker

Cybersecurity & cyberwarfare ha ricondiviso questo.

LibreOffice e l'arte di reagire in modo eccessivo. Un banner di donazione non è un attacco agli utenti. Il post di Italo Vignoli

Troppo misurato il buon @italovignoli

Per noi, invece gli utenti che si lamentano delle richieste di donazione da parte di chi produce applicazioni in software libero sono un significativo distillato di stupidità, sapientemente barriccato in anni e anni di stronzaggine. Un elisir per le BigTech!

blog.documentfoundation.org/bl…

@eticadigitale

in reply to informapirata ⁂

@max Il bello è che c'è gente (verificato personalmente) che si fa un PC da +2000€ e poi non vuole spendere 5€ per un software.
Ma te lo immagini? Uno compra la Ferrari e poi pretende il carburante a gratis 😂
...e se gli chiedi i soldi della benzina si incazza pure! 🤣