NEW: An alleged ransomware attack has taken the computer systems of one of the largest universities in Europe offline for three days.
La Sapienza university in Rome is still working to restore the systems, and an Italian newpaper reported that the hackers behind the attack are a new ransomware gang called Femwar02.
techcrunch.com/2026/02/05/one-…
One of Europe's largest universities knocked offline for days after cyberattack | TechCrunch
An alleged ransomware attack has taken down the systems of the Sapienza University of Rome.Lorenzo Franceschi-Bicchierai (TechCrunch)
Cybersecurity & cyberwarfare reshared this.
msgvault: un sistema di archiviazione e ricerca di posta elettronica privato e velocissimo, con interfaccia utente terminale e server MCP, basato su DuckDB
In breve, msgvault è un motore di archiviazione e recupero local-first per suddividere, analizzare e interrogare un'intera vita di dati di email e messaggistica in millisecondi. Utilizza SQLite e DuckDB e opera completamente in locale utilizzando gli indici dei metadati Parquet, consentendo di interrogare milioni di email alla velocità del pensiero. È dotato di un'interfaccia utente terminale intuitiva e veloce e di un server MCP e CLI altrettanto veloci, che puoi utilizzare a tuo piacimento con LLM locali, Claude Desktop o qualsiasi altra interfaccia agente tu preferisca.
Qui è possibile leggere l'annuncio mentre qui c'è la pagina del progetto
reshared this
Installazione minima di FreeBSD da 150 MB
"Ciò che condividerò con voi oggi non è supportato , probabilmente non è consigliato : potreste compromettere il vostro sistema . Usatelo solo in ambienti di test, come ho fatto io con una nuova VM Bhyve. Siete stati avvisati ."
Il post di @vermaden
vermaden.wordpress.com/2026/02…
150 MB Minimal FreeBSD Installation
Sometimes an article starts with a simple question or a single message on one of the available social platforms. This is the case today with this article where @ooberober asked: How small can the r…𝚟𝚎𝚛𝚖𝚊𝚍𝚎𝚗
reshared this
SOCIAL VIETATI UNDER 16: di chi è la COLPA e qual è la SOLUZIONE?
La vera soluzione non è tecnologica, ma passa per la responsabilizzazione dei genitori che forniscono l'accesso, possibilmente con una sana deterrenza economica.
Perché quando non si è in grado di esercitare la responsabilità individuale, la prospettiva è sempre la sorveglianza di Stato.
Inutile dire che sono TOTALMENTE d'accordo con @lastknight
reshared this
Tor Browser 15.0.5 nasce da un incidente imprevisto scoperto dalla community
📌 Link all'articolo : redhotcyber.com/post/tor-brows…
#redhotcyber #news #torbrowser #android #localizzazione #sicurezza #cybersecurity #risoluzioneproblemi
Tor Browser 15.0.5 nasce da un incidente imprevisto scoperto dalla community
Tor Browser rilascia la versione 15.0.5 per risolvere un problema di sicurezza legato a sostituzioni di traduzione nella localizzazione vietnamita per Android.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187654/hac…
#securityaffairs #hacking #Russia
Pro-Russian group Noname057(16) launched DDoS attacks on Milano Cortina 2026 Winter Olympics
Italy stopped Russian-linked cyberattacks targeting Foreign Ministry offices and Winter Olympics websites and hotels, Foreign Minister said.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
RIP New START, addio all’ultimo argine atomico - RSI
Dalla prudenza di Reagan al fatalismo di Trump, con la scadenza dell’ultimo trattato Russia e Stati Uniti mettono fine a quattro decenni di smantellamento degli arsenali nuclearirsi
Cybersecurity & cyberwarfare reshared this.
La disputa tra Agcom e Cloudflare è un assaggio del futuro della rete
@Informatica (Italy e non Italy 😁)
Lo scontro tra l’istituzione italiana e il colosso dell’IT mostra le difficoltà di regolamentare in chiave nazionale un’infrastruttura globale, con il rischio di minare alle fondamenta la libertà di internet
L'articolo La disputa tra Agcom e Cloudflare è un assaggio del futuro
Informatica (Italy e non Italy) reshared this.
Vulnerabilità critica in n8n: eseguiti comandi di sistema indesiderati
📌 Link all'articolo : redhotcyber.com/post/vulnerabi…
#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence
Vulnerabilità critica in n8n: eseguiti comandi di sistema indesiderati
Scopri la vulnerabilità critica CVE-2026-25049 in n8n e come proteggere il tuo sistema da comandi di sistema indesiderati.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Un paio di considerazioni sull'attacco a #Sapienza, non ultima, l'ipotesi di ShinyHunters che si allontana, alla luce del probabile arresto di cui si vocifera sui social.
ransomnews.online/blog/sapienz…
BLOG @ ransomNews - Ransomware incident at Sapienza University of Rome
ransomNews, your go-to source for ransomware news, insights, and analysis, also home of RedACT monthly threat reportransomnews.online
Cybersecurity & cyberwarfare reshared this.
Il 2026 sarà l’anno dell’industrializzazione del cybercrime
📌 Link all'articolo : redhotcyber.com/post/il-2026-s…
#redhotcyber #news #cybercrime #intelligenzaartificiale #minacceinformatiche #cybersecurity #hacking #malware
Il 2026 sarà l'anno dell'industrializzazione del cybercrime
Il 2026 sarà l'anno in cui il cybercrime diventerà completamente industrializzato, con l'intelligenza artificiale e l'automazione che trasformeranno l'economia del crimine informatico.Marcello Filacchioni (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187647/hac…
#securityaffairs #hacking #APT41
China-linked Amaranth-Dragon hackers target Southeast Asian governments in 2025
China-linked hackers tracked as Amaranth-Dragon targeted government and law enforcement agencies across Southeast Asia in 2025.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
🚀 APERTE LE ISCRIZIONI ALLA PRIMA LIVE CLASS DEL CORSO "CYBER OFFENSIVE FUNDAMENTALS" – LIVELLO BASE 🚀
Per info e iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com
#redhotcyber #formazione #pentesting #pentest #formazioneonline #ethicalhacking #hacking #cybersecurity
Cybersecurity & cyberwarfare reshared this.
Allarme rosso in Italia! Migliaia di impianti senza password: un incubo a portata di click
📌 Link all'articolo : redhotcyber.com/post/allarme-r…
#redhotcyber #news #sicurezzainformatica #cybersecurity #iotsecurity #vnc #paragonsec #rischioinformatico
Allarme rosso in Italia! Migliaia di impianti senza password: un incubo a portata di click
L'Italia si trova davanti a una sfida digitale senza precedenti. La sicurezza dei sistemi connessi è diventata l'anello debole della catena nazionale.Bajram Zeqiri (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
219 - Anthropic pubblica la sua costituzione etica, ma c'è un problema... - Marco Camisani Calzolari
Anthropic pubblica la sua costituzione etica, ma c'è un problema... Claude ha creato e pubblicato la sua costituzione etica, un documento che promette di guidare l'Intelligenza Artificiale verso saggezza, benessere e responsabilità.Web Staff MCC (Marco Camisani Calzolari)
Cybersecurity & cyberwarfare reshared this.
Attacchi informatici tramite NGINX: una nuova minaccia per il traffico web
📌 Link all'articolo : redhotcyber.com/post/attacchi-…
#redhotcyber #news #cybersecurity #hacking #malware #nginx #server #sicurezzainformatica #vulnerabilita
Attacchi informatici tramite NGINX: una nuova minaccia per il traffico web
Gli attaccanti stanno usando configurazioni NGINX legittime per intercettare e reindirizzare traffico web. Scopri come funziona questa nuova minaccia.Redazione RHC (Red Hot Cyber)
reshared this
HackerHood di RHC scopre un nuovo 0day nei Firewall ZYXEL: il rischio è l’accesso Root
📌 Link all'articolo : redhotcyber.com/post/hackerhoo…
#redhotcyber #news #cybersecurity #hacking #vulnerabilita #sicurezzainformatica #zyxel #codicearbitrario #root
HackerHood di RHC scopre un nuovo 0day nei Firewall ZYXEL: il rischio è l'accesso Root
Scoperta vulnerabilità critica nei dispositivi ZYXEL che consente l'esecuzione di codice remoto con privilegi massimi tramite il servizio DDNS.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
La vera storia degli hacker: dai trenini del MIT, alla voglia di esplorare le cose
📌 Link all'articolo : redhotcyber.com/post/la-vera-s…
#redhotcyber #news #storiaDellInformatica #originiDelHacking #hacking #intaccare #MIT #TechModelRailroadClub
La vera storia degli hacker: dai trenini del MIT, alla voglia di esplorare le cose
L’hacking non nasce con Internet. Nasce al MIT, tra trenini, mainframe e menti geniali. La vera storia del Tech Model Railroad Club.Massimiliano Brolli (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
LibreOffice 26.2: la suite per ufficio open source si evolve
📌 Link all'articolo : redhotcyber.com/post/libreoffi…
#redhotcyber #news #libreoffice #softwarelibero #ufficiogratuito #opensource #alternativaoffice #microsoftoffice
LibreOffice 26.2: la suite per ufficio open source si evolve
LibreOffice 26.2 è la nuova versione della suite per ufficio gratuita e open source, con miglioramenti nelle prestazioni, compatibilità e stabilità.Carolina Vivianti (Red Hot Cyber)
Ricardo Antonio Piana likes this.
Cybersecurity & cyberwarfare reshared this.
Kei Truck Looks Like a Giant Power Tool
Kei trucks are very versatile vehicles, but their stock powerplant can leave a bit to be desired. If you need more power, why not try an electric conversion?
[Ron “Mr. G” Grosinger] is a high school auto shop and welding teacher who worked with his students to replace the 40 hp gas motor in this Daihatsu Hijet with the 127 hp of a Hyper 9 electric motor. The motor sits in the original engine bay under the cab and is mated to the stock transmission with a custom adapter plate made from plate steel for less than $150. We really appreciate how they left all the electronics exposed to see what makes the conversion tick.
The faux battery was made by a foam sculptor friend out of urethane foam shaped with a carving knife and then painted. It slides on a set of unistrut trolleys and reveals the 5 salvaged Tesla battery modules that power the vehicle. The fold down sides of the truck bed allow easy access to anything not already exposed if any tweaking is necessary.
We’ve seen a kei truck become a camper as well or an ebike powered with actual power tool batteries. If you’re thinking of your own electric conversion, which battery is best?
youtube.com/embed/usfm76aCqd4?…
Kei Trucks North America likes this.
Keebin’ with Kristina: the One with the RollerMouse Keyboard
I just love it when y’all send in your projects, so thanks, [Kai]! But were do I even begin with this one? Okay, so, first of all, you need to know that [Kai Ruhl] built an amazing split keyboard with plenty of keys for even someone like me. Be sure to check it out, because the build log is great reading.
Image by [Kai Ruhl] via Land of KainBut that wasn’t enough — a mousing solution was in order that didn’t require taking [Kai]’s hands off of the keyboard. And so, over the course of several months, the RollerMouse Keyboard came into being. That’s the creation you see here.
Essentially, this is an ortholinear split with a built-in roller bar mouse, which basically acts like a cylindrical trackball. There’s an outer pipe that slides left/right and rolls up and down, and this sits on a stationary inner rod. The actual mouse bit is from a Logitech M-BJ69 optical number.
[Kai] found it unpleasant to work the roller bar using thumbs, so mousing is done via the palm rests. You may find it somewhat unpolished with all that exposed wiring in the middle. But I don’t. I just worry about dust is all. And like, wires getting ripped out accidentally.
All Work and No Play Makes Jack a Dull Boy
As I write this, a terrible snowpocalypse is snuggling up to the southern and mid-western states. What a time to watch The Shining and check out the dullboy prototype by [Blind_Heim].
Image by [Blind_Heim] via redditThis is [Blind_Heim]’s first project, and I think it looks mighty fine, especially with those slanty thumb keys. They are [Blind_Heim]’s own creation and were inspired by the design of the 1959 Adler Universal featured in The Shining. (Hence the name of the keyboard.) In case it isn’t obvious, they are meant for Kailh choc v1 switches.
Rev 1 shown here has a nice!nano and supports v1 chocs only. Rev 2 will support v1 and v2, and will have a 40 mm Cirque trackpad in that middle space there. Rev 2 will also be open-source and entirely free of copyright, so watch out for that.
Regarding those thumb keys, [Blind_Heim] says that they wanted something ergonomic and monoblock at first, and so the angles were just for looks. But after using it, he realized they were actually quite useful when it comes to determining which key is which without having to look.
The Centerfold: Downtown Busy Town Is the Place to Be
Image by [OrinNY] via redditThis desk mat ought to bring back some memories. Hopefully good ones, of daycare and snacks and nap time. Here it is for sale if you feel the need to drive little cars around on it.
As for the keyboard, that’s a Norbauer Heavy Grail Ghost of Christmas Future edition, which was of course a limited release that’s long sold out. I’m sure there are other transparent bodies out there, but good luck finding a bug-eyed, duck-faced keycap.
Do you rock a sweet set of peripherals on a screamin’ desk pad? Send me a picture along with your handle and all the gory details, and you could be featured here!
Historical Clackers: the Saturn
The Virtual Typewriter Museum calls the 1899 Saturn “one of the most impractical machines ever, built with proverbial precision in Switzerland”.Image via The Virtual Typewriter Museum
The operation of this blind writer is pretty interesting, and that’s putting it politely. There are nine U-shaped type bars: four on each side beneath the carriage, and one in the middle that swings up from behind.
Each of these type bars holds eight characters, and these are selected by moving a wire up and down the index card using that giant round selector button the left side. The you would strike one of the nine keys corresponding to the column your character appears in.
Evidently the lower case characters were laid out differently than the upper case, which made it even more difficult to use. But hey, Swiss precision.
There is not a lot of information out there about the Saturn, but the Virtual Typewriter Museum does have more shots of various angles.
Finally, a Keyboard Made of Marble and Ceramic
Apparently there was a Kickstarter near the end of 2025 for this thing. Well, this is the first I’ve heard of it. This here is the Keychron Q16 HE 8K ceramic and marble keyboard, which debuted at CES.Image via Tweak Town
This is a luxury keyboard for sure, right down to the pre-lubed Keychron ultra-fast Lime magnetic switches which features Tunnel Magnetoresistance (TMR) and per-key adjustable actuation.
They say it’s built for gaming, but I don’t know. I think it’s built for whatever you want to use it for. It will be available in April. I sincerely hope that it’s like typing on little coffee cups, and it probably sounds amazingly thocky.
Now Tweak Town doesn’t have a whole lot to say about this keyboard, so I found a review to go with it. [YouallareToxic] has quite a bit to say about the keyboard. I think the biggest takeaway from this review is that this keyboard sounds like no other. [YouallareToxic] likens it to a frog guiro. A what? Check out the video below.
youtube.com/embed/X32OXzj6pPo?…
Got a hot tip that has like, anything to do with keyboards? Help me out by sending in a link or two. Don’t want all the Hackaday scribes to see it? Feel free to email me directly.
Giuseppe likes this.
FLOSS Weekly Episode 863: Opencast: That Code is There for a Reason
This week Jonathan chats with Olaf Andreas Schulte and Lars Kiesow about Opencast, the video management system for education. What does Opencast let a school or university accomplish, how has that changed over the last decade, and what exciting new things are coming? Watch to find out!
youtube.com/embed/vgiw87_EEJo?…
Did you know you can watch the live recording of the show right on our YouTube Channel? Have someone you’d like us to interview? Let us know, or have the guest contact us! Take a look at the schedule here.
play.libsyn.com/embed/episode/…
Direct Download in DRM-free MP3.
If you’d rather read along, here’s the transcript for this week’s episode.
Places to follow the FLOSS Weekly Podcast:
Theme music: “Newer Wave” Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 4.0 License
hackaday.com/2026/02/04/floss-…
A Keyboard for Anything, Without a Keyboard
There are many solutions for remote control keyboards, be they Bluetooth, infrared, or whatever else. Often they leave much to be desired, and come with distinctly underwhelming physical buttons. [konkop] has a solution to these woes we’ve not seen before, turning an ESP32-S3 into a USB HID keyboard with a web interface for typing and some physical keyboard macro buttons. Instead of typing on the thing, you connect to it via WiFi using your phone, tablet, or computer, and type into a web browser. Your typing is then relayed to the USB HID interface.
The full hardware and software for the design is in the GitHub repository. The macro buttons use Cherry MX keys, and are mapped by default to the common control sequences that most of us would find useful. The software uses Visual Studio Code, and PlatformIO.
We like this project, because it solves something we’ve all encountered at one time or another, and it does so in a novel way. Yes, typing on a smartphone screen can be just as annoying as doing so with a fiddly rubber keyboard, but at least many of us already have our smartphones to hand. Previous plug-in keyboard dongles haven’t reached this ease of use.
I, Integrated Circuit
In 1958, the American free-market economist Leonard E Read published his famous essay I, Pencil, in which he made his point about the interconnected nature of free market economics by following everything, and we mean Everything, that went into the manufacture of the humble writing instrument.
I thought about the essay last week when I wrote a piece about a new Chinese microcontroller with an integrated driver for small motors, because a commenter asked me why I was featuring a non-American part. As a Brit I remarked that it would look a bit silly were I were to only feature parts made in dear old Blighty — yes, we do still make some semiconductors! — and it made more sense to feature cool parts wherever I found them. But it left me musing about the nature of semiconductors, and whether it’s possible for any of them to truly only come from one country. So here follows a much more functional I, Chip than Read’s original, trying to work out just where your integrated circuit really comes from. It almost certainly takes great liberties with the details of the processes involved, but the countries of manufacture and extraction are accurate.
First, There’s The Silicon
A silicon wafer, here bearing a grid of integrated circuits. Peellden, CC BY-SA 3.0.
An integrated circuit, or silicon chip, is as its name suggests, made of silicon. Silicon is all around us in rocks and minerals, as silicon dioxide, which we know in impure form as sand. The world’s largest producer of silicon metal is China, followed by Russia, then Brazil. So if China and Russia are off the table then somewhere in Brazil, a Korean-made continuous bucket excavator scoops up some sand from a quarry.
That sand is taken to a smelting plant and fed with some carbon, probably petroleum coke as a by-product from a Brazilian oil refinery, into a Taiwanese-made submerged-arc furnace. The smelting plant produces ingots of impure silicon, which are shipped to a wafer plant in Taiwan. There they pass through a German-made zone refining process to produce the ultra-pure silicon which is split into wafers. Taiwan is a global centre for semiconductor foundries so the wafers could be shipped locally, but our chip is going to be made in the USA. They’re packed in a carton made from Canadian wood pulp, and placed in a container on a Korean-made ship bound for an American port. There it’s unloaded by a German-made container handling crane, and placed on a truck for transport to the foundry. The truck is American, made in the great state of Washington.
Then, There’s The Package And Leads
Lead frames for TQFP integrated circuits. I, NobbiP, CC BY-SA 3.0.
Our integrated circuit is the chip itself, but in most cases it’s not just the bare chip. It’s supplied potted in an epoxy case, and with its contacts brought out to some kind of pins. The epoxy is a petrochemical product, while the lead frame is either stamped or chemically etched from metal sheet and plated.
So, somewhere in the Chilean Atacama desert, an American-made dragline excavator is digging out copper ore from the bottom of a huge pit. The ore is loaded into Japanese-made dump trucks, from where it’s driven to a rail head and loaded into ore carrier cars. The American-made locomotives take it to a refining plant where machinery installed by a Finnish company smelts and refines it into copper ingots. These are shipped to Sweden aboard a German-made ship, unloaded by a German-made crane, and delivered to a specialised metal refiner on a Swedish-made truck.You all know the 555. The black stuff is epoxy moulding compound. Swift.Hg, commons.wikimedia.org/wiki/Fil….
Meanwhile underground in Ontario, Canada, Swedish-made machinery scoops up nickel ore and loads it onto a Swedish-made mine truck. At the nickel refining plant, which is Canadian-made, the sulphur and iron impurities are removed, and the resulting nickel ingots travel by rail behind a Canadian-made (but American designed) locomotive to a port, where an American made crane loads them into an Italian-made ship bound for Sweden. Another German crane and Swedish truck deliver it to the metal refiner, where a Swedish-made plant is used to create a copper-nickel alloy.
A German-made rolling plant then turns the alloy into a thin sheet, shipped in a roll inside a container on a Japanese-made container ship bound for the USA. Eventually after another round of cranes, trains, and trucks, all American this time, it arrives at the company who makes lead frames. They use a Japanese-made machine to stamp the sheet alloy and create the frames themselves. An American-made truck delivers them to the chip foundry.
At a petrochemical plant in China, bulk epoxy resin, plasticisers, pigments, and other products are manufactured. They are supplied in drums, which are shipped on a Chinese-made container ship to an American port where American cranes and trucks do the job of delivering them to an epoxy formulation company. There they are mixed in carefully-selected proportions to produce American-made epoxy semiconductor moulding compound, which is delivered to the chip foundry on an American-made truck.
Bringing all Those Countries’ Parts Together
The foundry now has the silicon wafers, lead frames, and epoxy it needs to make an integrated circuit. There are many other chemicals used in its process, but for simplicity we’ll take those three as being the parts which make an IC. What they don’t yet have is an integrated circuit to make. For that there’s a team of high-end engineers in a smart air-conditioned office of an American semiconductor company in California. They are integrated circuit designers, but they don’t design everything. Instead they buy in much of the circuit as intellectual property, which can come from a variety of different countries. Banging the drum as a Brit I’m sure you’ll all know that ARM cores come from Cambridge here in the UK, just to name the most obvious example. So British, German, Dutch, American, and Canadian IP is combined using American software and the knowledge of American engineers, and the resulting design is sent to the foundry.This is the Globalfoundries semiconductor plant in Dresden, Germany. Fensterblick., CC BY-SA 3.0.
The process machinery of an integrated circuit foundry lies probably at the most bleeding edge of human technology. The machines this foundry uses are mostly from Eindhoven in the Netherlands, but they are joined by American, German, Japanese, and even British ones. Even then, those machines themselves contain high-precision parts from all those countries and more, so that Dutch machine is also in part American and German too.
Whatever magic the semiconductor foundry does is performed, and at the loading bay appear cartons made from Canadian wood pulp containing reels made from Chinese bulk polymer, that have hundreds of packaged American-made integrated circuits in them. Some of them are shipped on an American truck to an airport, from where they cross the Atlantic in the hold of a pan-European-manufactured jet aircraft to be shipped from the British airport in a German-made truck to an electronics distributor in Northamptonshire. I place an order, and the next day a Polish bloke driving an American-badged van that was made in Turkey delivers a few of them to my door.
The above path from a dusty quarry in Brazil to my front door in Oxfordshire is excessively simplified, and were you to really try to find every possible global contribution it’s likely there would be few countries left out and this document would be hundreds of pages long. I hope mining engineers, metallurgists, chemists, and semiconductor process engineers will forgive me for any omissions or errors. What I hope it does illustrate though is how connected the world of manufacturing is, and how many sources come together to produce a single product. Read’s 1958 pencil is alive and well.
securityaffairs.com/187637/cyb…
#securityaffairs #hacking
CVE-2025-22225 in VMware ESXi now used in active ransomware attacks
Ransomware groups now exploit VMware ESXi vulnerability CVE-2025-22225, patched by Broadcom in March 2025..Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187623/dee…
#securityaffairs #darkwev
Taiwanese operator of Incognito Market sentenced to 30 years over $105M darknet drug ring
A Taiwanese man was sentenced to 30 years for running Incognito Market, a major darknet drug site that sold over $105M in illegal drugs.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
WhatsApp introduce le impostazioni restrittive dell’account: come attivarle
@Informatica (Italy e non Italy 😁)
Offrendo un ulteriore livello di sicurezza, dedicato a giornalisti e personaggi pubblici, WhatsApp introduce le impostazioni restrittive dell'account, per tutelare i dati personali e le informazioni sensibili. Ecco quali vantaggi fornisce la funzionalità
Informatica (Italy e non Italy) reshared this.
NEW: The notorious cybercrime gang ShinyHunters claimed responsibility for last year's data breaches at Harvard University and University of Pennsylvania.
The hackers also published some stolen personal information from the two schools, saying the universities refused to pay a ransom.
We saw the data published by ShinyHunters, and it appears to match the type of information that both universities said was stolen last year.
techcrunch.com/2026/02/04/hack…
Hackers publish personal information stolen during Harvard, UPenn data breaches | TechCrunch
The prolific cybercrime group ShinyHunters took responsibility for hacking Harvard and the University of Pennsylvania, and published the stolen data on its extortion website.Lorenzo Franceschi-Bicchierai (TechCrunch)
Cybersecurity & cyberwarfare reshared this.
UPDATE: ShinyHunters hackers told us the Harvard University and University of Pennsylvania breaches were linked, both part of the recent phishing attacks targeting companies that rely on Okta and single sign-on providers.
techcrunch.com/2026/02/04/hack…
Hackers publish personal information stolen during Harvard, UPenn data breaches | TechCrunch
The prolific cybercrime group ShinyHunters took responsibility for hacking Harvard and the University of Pennsylvania, and published the stolen data on its extortion website.Lorenzo Franceschi-Bicchierai (TechCrunch)
Hacking Moltbook: il social network basato sull'intelligenza artificiale che chiunque può controllare
Il database esposto. 35.000 email. 1,5 milioni di chiavi API. E 17.000 esseri umani dietro la rete di intelligenza artificiale non proprio autonoma
wiz.io/blog/exposed-moltbook-d…
Hacking Moltbook: The AI Social Network Any Human Can Control
1 exposed database. 35,000 emails. 1.5M API keys. And 17,000 humans behind the not-so-autonomous AI network.Gal Nagli (Wiz.io)
reshared this
Comparing a Clone Raspberry Pi Pico 2 With an Original One
Although [Thomas] really likes the Raspberry Pi Pico 2 and the RP2350 MCU, he absolutely, totally, really doesn’t like the micro-USB connector on it. Hence he jumped on the opportunity to source a Pico 2 clone board with the same MCU but with a USB-C connector from AliExpress. After receiving the new board, he set about comparing the two to see whether the clone board was worth it after all. In the accompanying video you can get even more details on why you should avoid this particular clone board.
In the video the respective components of both boards are analyzed and compared to see how they stack up. The worst issues with the clone Pico 2 board are an improper USB trace impedance at 130 Ω with also a cut ground plane below it that won’t do signal integrity any favors.
There is also an issue with the buck converter routing for the RP2350 with an unconnected pin (VREG_FB) despite the recommended layout in the RP2350 datasheet. Power supply issues continue with the used LN3440 DC-DC converter which can source 800 mA instead of the 1A of the Pico 2 version and performed rather poorly during load tests, with one board dying at 800 mA load.
youtube.com/embed/MxgPmbocAF4?…
securityaffairs.com/187619/cyb…
#securityaffairs #Grok
Paris raid on X focuses on child abuse material allegations
French prosecutors raided X offices in Paris over illegal content; Elon Musk and CEO summoned for voluntary interviews in April.Pierluigi Paganini (Security Affairs)
reshared this
securityaffairs.com/187615/cyb…
#securityaffairs #hacking
GreyNoise tracks massive Citrix Gateway recon using 63K+ residential proxies and AWS
GreyNoise spotted a dual-mode Citrix Gateway recon campaign using 63K+ residential proxies and AWS to find login panels and enumerate versionsPierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Il guasto di Microsoft Teams che ha bloccato le immagini nelle chat enterprise
#CyberSecurity
insicurezzadigitale.com/il-gua…
reshared this
Il guasto di Microsoft Teams che ha bloccato le immagini nelle chat enterprise
@Informatica (Italy e non Italy 😁)
Microsoft ha appena risolto un outage che ha colpito il caricamento delle immagini inline nei chat di Teams, riportando milioni di utenti enterprise alla normalità. L’incidente, identificato con il codice TM1226769 nel pannello admin di Microsoft 365, ha
Informatica (Italy e non Italy) reshared this.
Impiegati infedeli: Ex Ingegnere Google rubava i segreti sulle AI per mandarli in Cina
📌 Link all'articolo : redhotcyber.com/post/insider-e…
#redhotcyber #news #intelligenzaartificiale #spionaggioindustriale #cybersecurity #google #tribunale #sanjose
Impiegati infedeli: Ex Ingegnere Google rubava i segreti sulle AI per mandarli in Cina
Ex ingegnere Google condannato per spionaggio industriale e furto di segreti commerciali relativi all'intelligenza artificiale.Carolina Vivianti (Red Hot Cyber)
reshared this
Diversi mesi fa (era novembre direi) ho messo in piedi ddosia.rfeed.it per monitorare i nuovi target della botnet ddosia, con una certa tempestività!
Oggi sembra essere molto attuale, da stamattina c’è dentro molta Italia
Dashboard - DDoSia Monitor - CTI Platform
Cyber Threat Intelligence platform for monitoring DDoSia botnet targets. Real-time OSINT tool for SOC teams to proactively defend against DDoS attacks.DDoSia Monitor
reshared this
Symbian On Nokia Lives Again, In 2026
Do you remember Nokia phones, with their Symbian OS? Dead and gone, you might think, but even they have dedicated enthusiasts here in 2026. Some of them have gone so far as to produce a new ROM for the daddy of Symbian phones, the Nokia N8, and [Janus Cycle] is giving it a spin.
For many people, the smartphone era began when the first Apple iPhones and Android devices reached the market, but the smartphone itself can be traced back almost two decades earlier to an IBM device. In the few years before the birth of today’s platforms many people even had smartphones without quite realizing what they had, because Nokia, the market leader in the 2000s, failed to make their Symbian platform user friendly in the way that Apple did. The N8 was their attempt to produce an iPhone competitor, but its lack of an on-device app store and that horrific Windows-based installation system meant it would be their last mass-market flagship before falling down the Microsoft Windows Phone rabbit hole.
In the video below the break he takes a pair of N8s and assembles one with that beautiful camera fully working, before installing the new ROM and giving it a spin. We get to see at last what the N8 could have been but wasn’t, as it gains the last Symbian release from Nokia, and the crucial missing app store. Even fifteen years later it’s a very slick device, enough to make us sorry that this ROM won’t be made for the earlier N-series sitting in a drawer where this is being written. We salute its developers for keeping the N8 alive.
Oddly, this isn’t the only Nokia from that era that’s received a little 2020s love.
youtube.com/embed/xyVjWu4T0eU?…
DK 10x20 - Decoupling, la lista della spesa
Si fa presto adire sovranità digitale, da dove partiamo? E in che direzione andiamo? Più tre notiziole per distrarsi.
spreaker.com/episode/dk-10x20-…
giuglionasi
in reply to informapirata ⁂ • • •Etica Digitale (Feddit) reshared this.