Salta al contenuto principale

Cybersecurity & cyberwarfare ha ricondiviso questo.


NEW: An alleged ransomware attack has taken the computer systems of one of the largest universities in Europe offline for three days.

La Sapienza university in Rome is still working to restore the systems, and an Italian newpaper reported that the hackers behind the attack are a new ransomware gang called Femwar02.

techcrunch.com/2026/02/05/one-…



msgvault: un sistema di archiviazione e ricerca di posta elettronica privato e velocissimo, con interfaccia utente terminale e server MCP, basato su DuckDB

In breve, msgvault è un motore di archiviazione e recupero local-first per suddividere, analizzare e interrogare un'intera vita di dati di email e messaggistica in millisecondi. Utilizza SQLite e DuckDB e opera completamente in locale utilizzando gli indici dei metadati Parquet, consentendo di interrogare milioni di email alla velocità del pensiero. È dotato di un'interfaccia utente terminale intuitiva e veloce e di un server MCP e CLI altrettanto veloci, che puoi utilizzare a tuo piacimento con LLM locali, Claude Desktop o qualsiasi altra interfaccia agente tu preferisca.

Qui è possibile leggere l'annuncio mentre qui c'è la pagina del progetto

@Informatica (Italy e non Italy 😁)

wesmckinney.com/blog/announcin…

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Installazione minima di FreeBSD da 150 MB

"Ciò che condividerò con voi oggi non è supportato , probabilmente non è consigliato : potreste compromettere il vostro sistema . Usatelo solo in ambienti di test, come ho fatto io con una nuova VM Bhyve. Siete stati avvisati ."

Il post di @vermaden

vermaden.wordpress.com/2026/02…

@informatica


Cybersecurity & cyberwarfare ha ricondiviso questo.


SOCIAL VIETATI UNDER 16: di chi è la COLPA e qual è la SOLUZIONE?

La vera soluzione non è tecnologica, ma passa per la responsabilizzazione dei genitori che forniscono l'accesso, possibilmente con una sana deterrenza economica.
Perché quando non si è in grado di esercitare la responsabilità individuale, la prospettiva è sempre la sorveglianza di Stato.

Inutile dire che sono TOTALMENTE d'accordo con @lastknight

youtu.be/PLjnxix224Q

@eticadigitale

in reply to informapirata ⁂

@lastknight@sociale.network @eticadigitale ma se genitori sono quei venti milioni di astenuti quale compito educativo possiamo suggerirgli?

Etica Digitale (Feddit) reshared this.


Cybersecurity & cyberwarfare ha ricondiviso questo.


Tor Browser 15.0.5 nasce da un incidente imprevisto scoperto dalla community

📌 Link all'articolo : redhotcyber.com/post/tor-brows…

#redhotcyber #news #torbrowser #android #localizzazione #sicurezza #cybersecurity #risoluzioneproblemi



Cybersecurity & cyberwarfare ha ricondiviso questo.


Da ascoltare con "Roulette" dei SOAD in sottofondo: rsi.ch/s/3481507


La disputa tra Agcom e Cloudflare è un assaggio del futuro della rete


@Informatica (Italy e non Italy 😁)
Lo scontro tra l’istituzione italiana e il colosso dell’IT mostra le difficoltà di regolamentare in chiave nazionale un’infrastruttura globale, con il rischio di minare alle fondamenta la libertà di internet
L'articolo La disputa tra Agcom e Cloudflare è un assaggio del futuro


Cybersecurity & cyberwarfare ha ricondiviso questo.


Vulnerabilità critica in n8n: eseguiti comandi di sistema indesiderati

📌 Link all'articolo : redhotcyber.com/post/vulnerabi…

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence


Cybersecurity & cyberwarfare ha ricondiviso questo.


Un paio di considerazioni sull'attacco a #Sapienza, non ultima, l'ipotesi di ShinyHunters che si allontana, alla luce del probabile arresto di cui si vocifera sui social.

ransomnews.online/blog/sapienz…


Cybersecurity & cyberwarfare ha ricondiviso questo.


Il 2026 sarà l’anno dell’industrializzazione del cybercrime

📌 Link all'articolo : redhotcyber.com/post/il-2026-s…

#redhotcyber #news #cybercrime #intelligenzaartificiale #minacceinformatiche #cybersecurity #hacking #malware



Cybersecurity & cyberwarfare ha ricondiviso questo.


🚀 APERTE LE ISCRIZIONI ALLA PRIMA LIVE CLASS DEL CORSO "CYBER OFFENSIVE FUNDAMENTALS" – LIVELLO BASE 🚀

Per info e iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com
#redhotcyber #formazione #pentesting #pentest #formazioneonline #ethicalhacking #hacking #cybersecurity


in reply to Claudia

... il loro 'Social Media Manager'? chi non lo ha oggi....🤓
in reply to victor

@victor_59 coerente tbh: se sei impegnato nel cybercrime, servirà qualcuno che gestisca i social.

Mica come Smelly che fa tutto lui 🤣


Cybersecurity & cyberwarfare ha ricondiviso questo.


Allarme rosso in Italia! Migliaia di impianti senza password: un incubo a portata di click

📌 Link all'articolo : redhotcyber.com/post/allarme-r…

#redhotcyber #news #sicurezzainformatica #cybersecurity #iotsecurity #vnc #paragonsec #rischioinformatico


Cybersecurity & cyberwarfare ha ricondiviso questo.


219 – Anthropic pubblica la sua costituzione etica, ma c’è un problema… camisanicalzolari.it/219-anthr…

Cybersecurity & cyberwarfare ha ricondiviso questo.


Attacchi informatici tramite NGINX: una nuova minaccia per il traffico web

📌 Link all'articolo : redhotcyber.com/post/attacchi-…

#redhotcyber #news #cybersecurity #hacking #malware #nginx #server #sicurezzainformatica #vulnerabilita

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


HackerHood di RHC scopre un nuovo 0day nei Firewall ZYXEL: il rischio è l’accesso Root

📌 Link all'articolo : redhotcyber.com/post/hackerhoo…

#redhotcyber #news #cybersecurity #hacking #vulnerabilita #sicurezzainformatica #zyxel #codicearbitrario #root


Cybersecurity & cyberwarfare ha ricondiviso questo.


La vera storia degli hacker: dai trenini del MIT, alla voglia di esplorare le cose

📌 Link all'articolo : redhotcyber.com/post/la-vera-s…

#redhotcyber #news #storiaDellInformatica #originiDelHacking #hacking #intaccare #MIT #TechModelRailroadClub


Cybersecurity & cyberwarfare ha ricondiviso questo.


LibreOffice 26.2: la suite per ufficio open source si evolve

📌 Link all'articolo : redhotcyber.com/post/libreoffi…

#redhotcyber #news #libreoffice #softwarelibero #ufficiogratuito #opensource #alternativaoffice #microsoftoffice



Kei Truck Looks Like a Giant Power Tool


A small white work truck sitting on a faded road with trees in the background. In its bed is what looks like an enormous drill battery in an upside down position. The "battery" is black with red and yellow stripes. It has the words "125V, 500 Ah, 52 kWh" and "Mr. G's Workshop" emblazoned on the side.

Kei trucks are very versatile vehicles, but their stock powerplant can leave a bit to be desired. If you need more power, why not try an electric conversion?

[Ron “Mr. G” Grosinger] is a high school auto shop and welding teacher who worked with his students to replace the 40 hp gas motor in this Daihatsu Hijet with the 127 hp of a Hyper 9 electric motor. The motor sits in the original engine bay under the cab and is mated to the stock transmission with a custom adapter plate made from plate steel for less than $150. We really appreciate how they left all the electronics exposed to see what makes the conversion tick.

The faux battery was made by a foam sculptor friend out of urethane foam shaped with a carving knife and then painted. It slides on a set of unistrut trolleys and reveals the 5 salvaged Tesla battery modules that power the vehicle. The fold down sides of the truck bed allow easy access to anything not already exposed if any tweaking is necessary.

We’ve seen a kei truck become a camper as well or an ebike powered with actual power tool batteries. If you’re thinking of your own electric conversion, which battery is best?

youtube.com/embed/usfm76aCqd4?…


hackaday.com/2026/02/04/kei-tr…



Keebin’ with Kristina: the One with the RollerMouse Keyboard


Illustrated Kristina with an IBM Model M keyboard floating between her hands.

I just love it when y’all send in your projects, so thanks, [Kai]! But were do I even begin with this one? Okay, so, first of all, you need to know that [Kai Ruhl] built an amazing split keyboard with plenty of keys for even someone like me. Be sure to check it out, because the build log is great reading.

A lovely split keyboard on a pair of rails that doubles as a mouse.Image by [Kai Ruhl] via Land of KainBut that wasn’t enough — a mousing solution was in order that didn’t require taking [Kai]’s hands off of the keyboard. And so, over the course of several months, the RollerMouse Keyboard came into being. That’s the creation you see here.

Essentially, this is an ortholinear split with a built-in roller bar mouse, which basically acts like a cylindrical trackball. There’s an outer pipe that slides left/right and rolls up and down, and this sits on a stationary inner rod. The actual mouse bit is from a Logitech M-BJ69 optical number.

[Kai] found it unpleasant to work the roller bar using thumbs, so mousing is done via the palm rests. You may find it somewhat unpolished with all that exposed wiring in the middle. But I don’t. I just worry about dust is all. And like, wires getting ripped out accidentally.

All Work and No Play Makes Jack a Dull Boy


As I write this, a terrible snowpocalypse is snuggling up to the southern and mid-western states. What a time to watch The Shining and check out the dullboy prototype by [Blind_Heim].

Image by [Blind_Heim] via redditThis is [Blind_Heim]’s first project, and I think it looks mighty fine, especially with those slanty thumb keys. They are [Blind_Heim]’s own creation and were inspired by the design of the 1959 Adler Universal featured in The Shining. (Hence the name of the keyboard.) In case it isn’t obvious, they are meant for Kailh choc v1 switches.

Rev 1 shown here has a nice!nano and supports v1 chocs only. Rev 2 will support v1 and v2, and will have a 40 mm Cirque trackpad in that middle space there. Rev 2 will also be open-source and entirely free of copyright, so watch out for that.

Regarding those thumb keys, [Blind_Heim] says that they wanted something ergonomic and monoblock at first, and so the angles were just for looks. But after using it, he realized they were actually quite useful when it comes to determining which key is which without having to look.

The Centerfold: Downtown Busy Town Is the Place to Be


A colorful rectangle on a busy town desk mat.Image by [OrinNY] via redditThis desk mat ought to bring back some memories. Hopefully good ones, of daycare and snacks and nap time. Here it is for sale if you feel the need to drive little cars around on it.

As for the keyboard, that’s a Norbauer Heavy Grail Ghost of Christmas Future edition, which was of course a limited release that’s long sold out. I’m sure there are other transparent bodies out there, but good luck finding a bug-eyed, duck-faced keycap.

Do you rock a sweet set of peripherals on a screamin’ desk pad? Send me a picture along with your handle and all the gory details, and you could be featured here!

Historical Clackers: the Saturn


The Virtual Typewriter Museum calls the 1899 Saturn “one of the most impractical machines ever, built with proverbial precision in Switzerland”.
The Saturn typewriter, a highly impractical machine of Swiss precision.Image via The Virtual Typewriter Museum
The operation of this blind writer is pretty interesting, and that’s putting it politely. There are nine U-shaped type bars: four on each side beneath the carriage, and one in the middle that swings up from behind.

Each of these type bars holds eight characters, and these are selected by moving a wire up and down the index card using that giant round selector button the left side. The you would strike one of the nine keys corresponding to the column your character appears in.

Evidently the lower case characters were laid out differently than the upper case, which made it even more difficult to use. But hey, Swiss precision.

There is not a lot of information out there about the Saturn, but the Virtual Typewriter Museum does have more shots of various angles.

Finally, a Keyboard Made of Marble and Ceramic


Apparently there was a Kickstarter near the end of 2025 for this thing. Well, this is the first I’ve heard of it. This here is the Keychron Q16 HE 8K ceramic and marble keyboard, which debuted at CES.
A marble TKL keyboard with ceramic keycaps.Image via Tweak Town
This is a luxury keyboard for sure, right down to the pre-lubed Keychron ultra-fast Lime magnetic switches which features Tunnel Magnetoresistance (TMR) and per-key adjustable actuation.

They say it’s built for gaming, but I don’t know. I think it’s built for whatever you want to use it for. It will be available in April. I sincerely hope that it’s like typing on little coffee cups, and it probably sounds amazingly thocky.

Now Tweak Town doesn’t have a whole lot to say about this keyboard, so I found a review to go with it. [YouallareToxic] has quite a bit to say about the keyboard. I think the biggest takeaway from this review is that this keyboard sounds like no other. [YouallareToxic] likens it to a frog guiro. A what? Check out the video below.

youtube.com/embed/X32OXzj6pPo?…


Got a hot tip that has like, anything to do with keyboards? Help me out by sending in a link or two. Don’t want all the Hackaday scribes to see it? Feel free to email me directly.


hackaday.com/2026/02/04/keebin…



FLOSS Weekly Episode 863: Opencast: That Code is There for a Reason


This week Jonathan chats with Olaf Andreas Schulte and Lars Kiesow about Opencast, the video management system for education. What does Opencast let a school or university accomplish, how has that changed over the last decade, and what exciting new things are coming? Watch to find out!


youtube.com/embed/vgiw87_EEJo?…

Did you know you can watch the live recording of the show right on our YouTube Channel? Have someone you’d like us to interview? Let us know, or have the guest contact us! Take a look at the schedule here.

play.libsyn.com/embed/episode/…

Direct Download in DRM-free MP3.

If you’d rather read along, here’s the transcript for this week’s episode.

Places to follow the FLOSS Weekly Podcast:


Theme music: “Newer Wave” Kevin MacLeod (incompetech.com)

Licensed under Creative Commons: By Attribution 4.0 License


hackaday.com/2026/02/04/floss-…



A Keyboard for Anything, Without a Keyboard


There are many solutions for remote control keyboards, be they Bluetooth, infrared, or whatever else. Often they leave much to be desired, and come with distinctly underwhelming physical buttons. [konkop] has a solution to these woes we’ve not seen before, turning an ESP32-S3 into a USB HID keyboard with a web interface for typing and some physical keyboard macro buttons. Instead of typing on the thing, you connect to it via WiFi using your phone, tablet, or computer, and type into a web browser. Your typing is then relayed to the USB HID interface.

The full hardware and software for the design is in the GitHub repository. The macro buttons use Cherry MX keys, and are mapped by default to the common control sequences that most of us would find useful. The software uses Visual Studio Code, and PlatformIO.

We like this project, because it solves something we’ve all encountered at one time or another, and it does so in a novel way. Yes, typing on a smartphone screen can be just as annoying as doing so with a fiddly rubber keyboard, but at least many of us already have our smartphones to hand. Previous plug-in keyboard dongles haven’t reached this ease of use.


hackaday.com/2026/02/04/a-keyb…



I, Integrated Circuit


In 1958, the American free-market economist Leonard E Read published his famous essay I, Pencil, in which he made his point about the interconnected nature of free market economics by following everything, and we mean Everything, that went into the manufacture of the humble writing instrument.

I thought about the essay last week when I wrote a piece about a new Chinese microcontroller with an integrated driver for small motors, because a commenter asked me why I was featuring a non-American part. As a Brit I remarked that it would look a bit silly were I were to only feature parts made in dear old Blighty — yes, we do still make some semiconductors! — and it made more sense to feature cool parts wherever I found them. But it left me musing about the nature of semiconductors, and whether it’s possible for any of them to truly only come from one country. So here follows a much more functional I, Chip than Read’s original, trying to work out just where your integrated circuit really comes from. It almost certainly takes great liberties with the details of the processes involved, but the countries of manufacture and extraction are accurate.

First, There’s The Silicon

A mirror-like disc of silicon, with visible IC patterns and a rainbow pattern from diffraction.A silicon wafer, here bearing a grid of integrated circuits. Peellden, CC BY-SA 3.0.
An integrated circuit, or silicon chip, is as its name suggests, made of silicon. Silicon is all around us in rocks and minerals, as silicon dioxide, which we know in impure form as sand. The world’s largest producer of silicon metal is China, followed by Russia, then Brazil. So if China and Russia are off the table then somewhere in Brazil, a Korean-made continuous bucket excavator scoops up some sand from a quarry.

That sand is taken to a smelting plant and fed with some carbon, probably petroleum coke as a by-product from a Brazilian oil refinery, into a Taiwanese-made submerged-arc furnace. The smelting plant produces ingots of impure silicon, which are shipped to a wafer plant in Taiwan. There they pass through a German-made zone refining process to produce the ultra-pure silicon which is split into wafers. Taiwan is a global centre for semiconductor foundries so the wafers could be shipped locally, but our chip is going to be made in the USA. They’re packed in a carton made from Canadian wood pulp, and placed in a container on a Korean-made ship bound for an American port. There it’s unloaded by a German-made container handling crane, and placed on a truck for transport to the foundry. The truck is American, made in the great state of Washington.

Then, There’s The Package And Leads

A copper sheet cut into a spiders-web-like pattern of copper fingers, which converge on the square space in the centre where the chip will go.Lead frames for TQFP integrated circuits. I, NobbiP, CC BY-SA 3.0.
Our integrated circuit is the chip itself, but in most cases it’s not just the bare chip. It’s supplied potted in an epoxy case, and with its contacts brought out to some kind of pins. The epoxy is a petrochemical product, while the lead frame is either stamped or chemically etched from metal sheet and plated.

So, somewhere in the Chilean Atacama desert, an American-made dragline excavator is digging out copper ore from the bottom of a huge pit. The ore is loaded into Japanese-made dump trucks, from where it’s driven to a rail head and loaded into ore carrier cars. The American-made locomotives take it to a refining plant where machinery installed by a Finnish company smelts and refines it into copper ingots. These are shipped to Sweden aboard a German-made ship, unloaded by a German-made crane, and delivered to a specialised metal refiner on a Swedish-made truck.
Two NE555 intgrated circuits, one in a DIP-8 package, the other in an SOIC package.You all know the 555. The black stuff is epoxy moulding compound. Swift.Hg, commons.wikimedia.org/wiki/Fil….
Meanwhile underground in Ontario, Canada, Swedish-made machinery scoops up nickel ore and loads it onto a Swedish-made mine truck. At the nickel refining plant, which is Canadian-made, the sulphur and iron impurities are removed, and the resulting nickel ingots travel by rail behind a Canadian-made (but American designed) locomotive to a port, where an American made crane loads them into an Italian-made ship bound for Sweden. Another German crane and Swedish truck deliver it to the metal refiner, where a Swedish-made plant is used to create a copper-nickel alloy.

A German-made rolling plant then turns the alloy into a thin sheet, shipped in a roll inside a container on a Japanese-made container ship bound for the USA. Eventually after another round of cranes, trains, and trucks, all American this time, it arrives at the company who makes lead frames. They use a Japanese-made machine to stamp the sheet alloy and create the frames themselves. An American-made truck delivers them to the chip foundry.

At a petrochemical plant in China, bulk epoxy resin, plasticisers, pigments, and other products are manufactured. They are supplied in drums, which are shipped on a Chinese-made container ship to an American port where American cranes and trucks do the job of delivering them to an epoxy formulation company. There they are mixed in carefully-selected proportions to produce American-made epoxy semiconductor moulding compound, which is delivered to the chip foundry on an American-made truck.

Bringing all Those Countries’ Parts Together


The foundry now has the silicon wafers, lead frames, and epoxy it needs to make an integrated circuit. There are many other chemicals used in its process, but for simplicity we’ll take those three as being the parts which make an IC. What they don’t yet have is an integrated circuit to make. For that there’s a team of high-end engineers in a smart air-conditioned office of an American semiconductor company in California. They are integrated circuit designers, but they don’t design everything. Instead they buy in much of the circuit as intellectual property, which can come from a variety of different countries. Banging the drum as a Brit I’m sure you’ll all know that ARM cores come from Cambridge here in the UK, just to name the most obvious example. So British, German, Dutch, American, and Canadian IP is combined using American software and the knowledge of American engineers, and the resulting design is sent to the foundry.
An aerial view of a very large factory surrounded by farmlandThis is the Globalfoundries semiconductor plant in Dresden, Germany. Fensterblick., CC BY-SA 3.0.
The process machinery of an integrated circuit foundry lies probably at the most bleeding edge of human technology. The machines this foundry uses are mostly from Eindhoven in the Netherlands, but they are joined by American, German, Japanese, and even British ones. Even then, those machines themselves contain high-precision parts from all those countries and more, so that Dutch machine is also in part American and German too.

Whatever magic the semiconductor foundry does is performed, and at the loading bay appear cartons made from Canadian wood pulp containing reels made from Chinese bulk polymer, that have hundreds of packaged American-made integrated circuits in them. Some of them are shipped on an American truck to an airport, from where they cross the Atlantic in the hold of a pan-European-manufactured jet aircraft to be shipped from the British airport in a German-made truck to an electronics distributor in Northamptonshire. I place an order, and the next day a Polish bloke driving an American-badged van that was made in Turkey delivers a few of them to my door.

The above path from a dusty quarry in Brazil to my front door in Oxfordshire is excessively simplified, and were you to really try to find every possible global contribution it’s likely there would be few countries left out and this document would be hundreds of pages long. I hope mining engineers, metallurgists, chemists, and semiconductor process engineers will forgive me for any omissions or errors. What I hope it does illustrate though is how connected the world of manufacturing is, and how many sources come together to produce a single product. Read’s 1958 pencil is alive and well.


hackaday.com/2026/02/04/__tras…


Cybersecurity & cyberwarfare ha ricondiviso questo.


CVE-2025-22225 in VMware ESXi now used in active ransomware Attacks
securityaffairs.com/187637/cyb…
#securityaffairs #hacking



WhatsApp introduce le impostazioni restrittive dell’account: come attivarle


@Informatica (Italy e non Italy 😁)
Offrendo un ulteriore livello di sicurezza, dedicato a giornalisti e personaggi pubblici, WhatsApp introduce le impostazioni restrittive dell'account, per tutelare i dati personali e le informazioni sensibili. Ecco quali vantaggi fornisce la funzionalità


Cybersecurity & cyberwarfare ha ricondiviso questo.


NEW: The notorious cybercrime gang ShinyHunters claimed responsibility for last year's data breaches at Harvard University and University of Pennsylvania.

The hackers also published some stolen personal information from the two schools, saying the universities refused to pay a ransom.

We saw the data published by ShinyHunters, and it appears to match the type of information that both universities said was stolen last year.

techcrunch.com/2026/02/04/hack…

in reply to Lorenzo Franceschi-Bicchierai

UPDATE: ShinyHunters hackers told us the Harvard University and University of Pennsylvania breaches were linked, both part of the recent phishing attacks targeting companies that rely on Okta and single sign-on providers.

techcrunch.com/2026/02/04/hack…

in reply to Lorenzo Franceschi-Bicchierai

These people are some of the most effective information security leaded product marketing managers. The history of capitalism will remember them as unsung heros.

Cybersecurity & cyberwarfare ha ricondiviso questo.


Hacking Moltbook: il social network basato sull'intelligenza artificiale che chiunque può controllare

Il database esposto. 35.000 email. 1,5 milioni di chiavi API. E 17.000 esseri umani dietro la rete di intelligenza artificiale non proprio autonoma

@aitech

wiz.io/blog/exposed-moltbook-d…


Cybersecurity & cyberwarfare ha ricondiviso questo.


Si aspettano lo stesso livello di sincerità del taco? 🤔


Comparing a Clone Raspberry Pi Pico 2 With an Original One


Although [Thomas] really likes the Raspberry Pi Pico 2 and the RP2350 MCU, he absolutely, totally, really doesn’t like the micro-USB connector on it. Hence he jumped on the opportunity to source a Pico 2 clone board with the same MCU but with a USB-C connector from AliExpress. After receiving the new board, he set about comparing the two to see whether the clone board was worth it after all. In the accompanying video you can get even more details on why you should avoid this particular clone board.

In the video the respective components of both boards are analyzed and compared to see how they stack up. The worst issues with the clone Pico 2 board are an improper USB trace impedance at 130 Ω with also a cut ground plane below it that won’t do signal integrity any favors.

There is also an issue with the buck converter routing for the RP2350 with an unconnected pin (VREG_FB) despite the recommended layout in the RP2350 datasheet. Power supply issues continue with the used LN3440 DC-DC converter which can source 800 mA instead of the 1A of the Pico 2 version and performed rather poorly during load tests, with one board dying at 800 mA load.

youtube.com/embed/MxgPmbocAF4?…


hackaday.com/2026/02/04/compar…


Cybersecurity & cyberwarfare ha ricondiviso questo.


#Paris raid on #X focuses on child abuse material allegations
securityaffairs.com/187619/cyb…
#securityaffairs #Grok

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


#GreyNoise tracks massive #Citrix Gateway recon using 63K+ residential proxies and AWS
securityaffairs.com/187615/cyb…
#securityaffairs #hacking

Cybersecurity & cyberwarfare ha ricondiviso questo.


Il guasto di Microsoft Teams che ha bloccato le immagini nelle chat enterprise
#CyberSecurity
insicurezzadigitale.com/il-gua…


Il guasto di Microsoft Teams che ha bloccato le immagini nelle chat enterprise


Si parla di:
Toggle


Microsoft ha appena risolto un outage che ha colpito il caricamento delle immagini inline nei chat di Teams, riportando milioni di utenti enterprise alla normalità. L’incidente, identificato con il codice TM1226769 nel pannello admin di Microsoft 365, ha provocato ritardi o fallimenti totali nel retrieval di immagini incorporate nei thread di conversazione.

Impatto su utenti e workflow


L’anomalia si è manifestata su client desktop, web e mobile di Teams, interrompendo flussi critici per organizzazioni in settori come finanza, sanità e cybersecurity. Immagini inline, spesso screenshot di dashboard di threat intelligence o scan di vulnerabilità, non si caricavano, costringendo a workaround come link esterni o allegati file. Questo ha generato disruption in Security Operations Center (SOC), dove la condivisione real-time di visuals è essenziale per response a incidenti.

Esperti di cybersecurity hanno notato che tali intoppi potrebbero essere sfruttati da threat actor per phishing tramite immagini corrotte o ritardate, amplificando rischi in piattaforme usate per threat sharing. Con oltre 320 milioni di utenti attivi mensili a fine 2025, l’evento sottolinea vulnerabilità scalabili in collaborazione cloud-based.

Dettagli tecnici dell’incidente


Il problema derivava da bottleneck infrastrutturali backend, senza evidenze di attività maligne o breach di sicurezza. La status page di Microsoft indicava “indaghiamo su ritardi o fallimenti nel loading/retrieval di immagini inline nei chat Teams”, con triage iniziale su routing traffico e parametri performance. L’ID TM1226769 fornisce log dettagliati, timeline e mitigation per admin, inclusi tool di monitoraggio proattivo per anomalie simili.

Utenti enterprise hanno riportato icone spezzate per immagini, richiedendo download manuali, un sintomo ricorrente legato a cache o sync con OneDrive/SharePoint. Nessuna perdita dati o compromissione sessioni, ma si raccomanda audit log per outlier.

Cosa ci racconta questo incidente


Ingegneri Microsoft hanno ottimizzato routing e parametri, confermando risoluzione completa. “Impatto risolto”, annuncia l’azienda, invitando admin a consultare TM1226769. Per professionisti cybersecurity, l’episodio rammenta di diversificare canali durante outage e audit dipendenze single-vendor.

Segnalazioni recenti su forum Microsoft e Reddit confermano pattern simili, con fix temporanei via clear cache (cartella Roaming in AppData) o reset app, ma ricorrenti entro 24 ore, suggerendo persistenza in client desktop su Windows 10/11.




Il guasto di Microsoft Teams che ha bloccato le immagini nelle chat enterprise


@Informatica (Italy e non Italy 😁)
Microsoft ha appena risolto un outage che ha colpito il caricamento delle immagini inline nei chat di Teams, riportando milioni di utenti enterprise alla normalità. L’incidente, identificato con il codice TM1226769 nel pannello admin di Microsoft 365, ha


Il guasto di Microsoft Teams che ha bloccato le immagini nelle chat enterprise


Si parla di:
Toggle


Microsoft ha appena risolto un outage che ha colpito il caricamento delle immagini inline nei chat di Teams, riportando milioni di utenti enterprise alla normalità. L’incidente, identificato con il codice TM1226769 nel pannello admin di Microsoft 365, ha provocato ritardi o fallimenti totali nel retrieval di immagini incorporate nei thread di conversazione.

Impatto su utenti e workflow


L’anomalia si è manifestata su client desktop, web e mobile di Teams, interrompendo flussi critici per organizzazioni in settori come finanza, sanità e cybersecurity. Immagini inline, spesso screenshot di dashboard di threat intelligence o scan di vulnerabilità, non si caricavano, costringendo a workaround come link esterni o allegati file. Questo ha generato disruption in Security Operations Center (SOC), dove la condivisione real-time di visuals è essenziale per response a incidenti.

Esperti di cybersecurity hanno notato che tali intoppi potrebbero essere sfruttati da threat actor per phishing tramite immagini corrotte o ritardate, amplificando rischi in piattaforme usate per threat sharing. Con oltre 320 milioni di utenti attivi mensili a fine 2025, l’evento sottolinea vulnerabilità scalabili in collaborazione cloud-based.

Dettagli tecnici dell’incidente


Il problema derivava da bottleneck infrastrutturali backend, senza evidenze di attività maligne o breach di sicurezza. La status page di Microsoft indicava “indaghiamo su ritardi o fallimenti nel loading/retrieval di immagini inline nei chat Teams”, con triage iniziale su routing traffico e parametri performance. L’ID TM1226769 fornisce log dettagliati, timeline e mitigation per admin, inclusi tool di monitoraggio proattivo per anomalie simili.

Utenti enterprise hanno riportato icone spezzate per immagini, richiedendo download manuali, un sintomo ricorrente legato a cache o sync con OneDrive/SharePoint. Nessuna perdita dati o compromissione sessioni, ma si raccomanda audit log per outlier.

Cosa ci racconta questo incidente


Ingegneri Microsoft hanno ottimizzato routing e parametri, confermando risoluzione completa. “Impatto risolto”, annuncia l’azienda, invitando admin a consultare TM1226769. Per professionisti cybersecurity, l’episodio rammenta di diversificare canali durante outage e audit dipendenze single-vendor.

Segnalazioni recenti su forum Microsoft e Reddit confermano pattern simili, con fix temporanei via clear cache (cartella Roaming in AppData) o reset app, ma ricorrenti entro 24 ore, suggerendo persistenza in client desktop su Windows 10/11.



Cybersecurity & cyberwarfare ha ricondiviso questo.


Impiegati infedeli: Ex Ingegnere Google rubava i segreti sulle AI per mandarli in Cina

📌 Link all'articolo : redhotcyber.com/post/insider-e…

#redhotcyber #news #intelligenzaartificiale #spionaggioindustriale #cybersecurity #google #tribunale #sanjose

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Diversi mesi fa (era novembre direi) ho messo in piedi ddosia.rfeed.it per monitorare i nuovi target della botnet ddosia, con una certa tempestività!

Oggi sembra essere molto attuale, da stamattina c’è dentro molta Italia

#Olimpiadi #milanocortina2026



Symbian On Nokia Lives Again, In 2026


Do you remember Nokia phones, with their Symbian OS? Dead and gone, you might think, but even they have dedicated enthusiasts here in 2026. Some of them have gone so far as to produce a new ROM for the daddy of Symbian phones, the Nokia N8, and [Janus Cycle] is giving it a spin.

For many people, the smartphone era began when the first Apple iPhones and Android devices reached the market, but the smartphone itself can be traced back almost two decades earlier to an IBM device. In the few years before the birth of today’s platforms many people even had smartphones without quite realizing what they had, because Nokia, the market leader in the 2000s, failed to make their Symbian platform user friendly in the way that Apple did. The N8 was their attempt to produce an iPhone competitor, but its lack of an on-device app store and that horrific Windows-based installation system meant it would be their last mass-market flagship before falling down the Microsoft Windows Phone rabbit hole.

In the video below the break he takes a pair of N8s and assembles one with that beautiful camera fully working, before installing the new ROM and giving it a spin. We get to see at last what the N8 could have been but wasn’t, as it gains the last Symbian release from Nokia, and the crucial missing app store. Even fifteen years later it’s a very slick device, enough to make us sorry that this ROM won’t be made for the earlier N-series sitting in a drawer where this is being written. We salute its developers for keeping the N8 alive.

Oddly, this isn’t the only Nokia from that era that’s received a little 2020s love.

youtube.com/embed/xyVjWu4T0eU?…


hackaday.com/2026/02/04/symbia…