Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Attacco informatico all’ospedale Papardo di Messina. Urzì: La Sicilia sempre più esposta

📌 Link all'articolo : redhotcyber.com/post/attacco-i…

Succede tutto in fretta. I #sistemi si fermano e, nel giro di poco, l’intera macchina sanitaria inizia a rallentare fino a bloccarsi.

All’ospedale Papardo di Messina è andata così, come riportato da Messina Today. Un #attacco #informatico ha mandato fuori uso terminali, #database e #piattaforme interne, creando problemi immediati: prenotazioni più lente, difficoltà operative e una #gestione dei pazienti decisamente più complicata.

A cura di Chiara Nardini

#redhotcyber #news #attacchinformatico #cybersecurity #hacking #malware #ransomware #ospedalipapardo #messina #problemidisicurezza #gestionepazienti #prenotazionionline #sicurezzainformatica #attacchihacker

Cybersecurity & cyberwarfare ha ricondiviso questo.

LibreOffice e l'arte di reagire in modo eccessivo. Un banner di donazione non è un attacco agli utenti. Il post di Italo Vignoli

Troppo misurato il buon @italovignoli

Per noi, invece gli utenti che si lamentano delle richieste di donazione da parte di chi produce applicazioni in software libero sono un significativo distillato di stupidità, sapientemente barriccato in anni e anni di stronzaggine. Un elisir per le BigTech!

blog.documentfoundation.org/bl…

@eticadigitale

in reply to informapirata ⁂

@max Il bello è che c'è gente (verificato personalmente) che si fa un PC da +2000€ e poi non vuole spendere 5€ per un software.
Ma te lo immagini? Uno compra la Ferrari e poi pretende il carburante a gratis 😂
...e se gli chiedi i soldi della benzina si incazza pure! 🤣
Cybersecurity & cyberwarfare ha ricondiviso questo.

Researchers uncover #WebRTC #skimmer bypassing traditional defenses
securityaffairs.com/190002/mal…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Typosquatting: la trappola invisibile che svuota i conti con un refuso

📌 Link all'articolo : redhotcyber.com/post/typosquat…

#redhotcyber #news #typosquatting #ciberpirateria #sicurezzainformatica #hacking #malware #phishing #brandhijacking #dominiomografi

Modern Smartphone vs. 80s Supercomputer


The media in this post is not displayed to visitors. To view it, please log in.

One of the most common ways of comparing the processing power of some microcontroller or older smartphone in a fantastical way was to say that they had more processing power than the Apollo Guidance Computer. While this sounds impressive on the surface, the AGC was the first integrated circuit computer ever built and is predictably under-powered by almost all modern standards. A more apt comparison would be to compare a smartphone to a supercomputer from some bygone era, and someone has recently done just that.
Cray 2
The linked article looks at a modern iPhone 17 compared to the Cray 2 supercomputer. When the Cray 2 was first built in the mid 80s, it was the fastest computer in the world at 1.9 GFLOPS using four vector processors. A modern iPhone is estimated to have slightly more than that, so in some ways the iPhone comes out on top.

However, the Cray 2 was built with vector processors, a specialized type of processor meant to perform rapid calculations on specific types of data sets. So the Cray 2 may have been faster at these types of tasks than the more general-purpose A19 processor, and the A19 may have the edge in other tasks.

The other major difference the article doesn’t discuss is what software runs on these computers. The Cray 2 supercomputer ran a modified version of UNIX System V, which at the time was owned by AT&T (and which ran on plenty of other computers as well). Although proprietary in some sense, it was much more open than Apple’s iOS operating system, allowing users to run whatever software they wanted to run on the supercomputers that they bought and paid for, and to modify many parts of the operating system itself. In that sense, the Cray will always maintain the edge over Apple and their walled garden.


hackaday.com/2026/03/26/modern…

An AI gateway designed to steal your data


The media in this post is not displayed to visitors. To view it, please log in.

A significant proportion of cyber incidents are linked to supply chain attacks, and this proportion is constantly growing. Over the past year, we have seen a wide variety of methods used in such attacks, ranging from creation of malicious but seemingly legitimate open-source libraries or delayed attacks in such seemingly legitimate libraries, to the simplest yet most effective method – compromising the accounts of popular library owners to subsequently release malicious versions of their libraries. Such libraries are used by developers everywhere and are included in many solutions and services. The consequences of an attack can vary widely, ranging from delivering malware to a developer’s device to compromising an entire infrastructure if the malicious library has made its way into the code of a service or product.

This is exactly what happened in March 2026, when attackers injected malicious code into the popular Python library LiteLLM, which serves as a multifunctional gateway for a large set of AI agents. The attackers released two trojanized versions of LiteLLM that delivered malicious scripts to the victim’s system. Both versions made their way into the PyPI repository for Python. A technical analysis revealed that the attackers’ primary targets were servers storing confidential data related to AWS, Kubernetes, NPM, etc., as well as various databases (MySQL, PostgreSQL, MongoDB, etc.). In the latter case, the attackers were primarily interested in database configurations. In addition, the malware’s logic included functionality for stealing confidential data from crypto wallets and techniques for establishing a foothold in the Kubernetes cluster.

Repository compromise


The compromise affected the package distribution channel via PyPI: on March 24, 2026, malicious LiteLLM versions litellm==1.82.7 and litellm==1.82.8 were uploaded to the registry. It was specifically the package’s distribution contents that were compromised: in the version 1.82.7, the malicious code was embedded in proxy_server.py, and in 1.82.8, the file litellm_init.pth was added.

Technical analysis


Both versions of the library contained the same malicious code, but its execution was implemented differently. In the version 1.82.7, it was executed only when the proxy functionality was imported, while in 1.82.8, a .pth file was added that was able to execute the code every time the interpreter started.

Example of the malicious code in proxy_server.py
Example of the malicious code in proxy_server.py

The malicious code in the proxy_server.py and litellm_init.pth files contained Python code encoded in Base64. After execution, the infected script saved this code alongside itself as a p.py file and immediately executed it.

The p.py script launched the main payload – another script, also encoded in Base64 – without saving it to disk. At the same time, it wrote the output of this payload to a file in the directory from which it was launched. Before being written, the output was encrypted using the AES-256-CBC algorithm with a random key generated in the code, which was saved to the session.key file. The key file was also encrypted – using a pre-initialized public RSA key.

The encrypted key and the output were combined into a tpcp.tar.gz archive and sent to the attackers’ remote server.

What exactly happened within the malicious payload, whose output was sent to the C2 server? After it was launched, a recursive scan of the working directories on the victim’s system (/root, /app/, /var/www, etc.) began. In each directory, the script scanned the contents of files, which it output to the stdout buffer, from where it was then saved to the aforementioned file as the result. Next, the script collected system information and also saved it to a file. After that, it proceeded to search for sensitive data. It was interested in the following data located on servers and within the infrastructures of various services:

  • SSH keys
  • GIT accounts
  • .env files
  • AWS, Kubernetes, email service, database, and WireGuard configurations
  • files related to Helm, Terraform, and CI
  • TLS keys and certificates


A notable feature of this malware is that it does not limit itself to stealing files and configurations from the disk, but also attempts to extract runtime secrets from the cloud infrastructure.

The code above uses the addresses 169.254.169.254 and 169.254.170.2. The first corresponds to the AWS Instance Metadata Service (IMDS), through which an EC2 instance (a virtual server in AWS, a machine running in the cloud) can retrieve metadata and temporary IAM role credentials (an AWS account with a set of permissions that a service or application can use to obtain temporary credentials for calls to the AWS API). The second is used in Amazon ECS to issue temporary credentials to a container during execution. Thus, the malicious script targets not only static secrets but also those issued by the cloud that can grant direct access to AWS resources at the moment of infection.

Additionally, the script searches for crypto wallet configurations, as well as webhooks associated with Slack and Discord messengers. The latter indicate that attackers are interested not only in infrastructure secrets and accounts, but also in communication channels within the development team.

In the next stage, the malware moves from data collection to establishing a foothold in the Kubernetes cluster infrastructure: if it has enough access, it configures a privileged pod (the smallest execution unit in Kubernetes, containing one or more containers) by enabling the securityContext.privileged=true option and mounts the node’s root filesystem via hostPath. This allows it to escape the container and perform actions at the node level.

Next, the malware executes another stage of infection – it saves a base64-encoded script disguised as a legitimate system component to the Kubernetes node’s disk at the path /root/.config/sysmon/sysmon.py, and registers it via systemd. After launching, the script waits for an initial delay of 300 seconds, then begins periodically contacting the C2 node checkmarx[.]zone/raw, retrieving a link to the next payload from there. If the received value differs from the state previously saved in /tmp/.pg_state, the script downloads a new file to /tmp/pglog, makes it executable, and runs it in the background. At this stage, the attackers gain a foothold in the system and is capable of regularly delivering updated payloads without the need for re-injection. Since the malicious payload is written not to the container’s temporary file directory but directly to the Kubernetes cluster node, the attackers will retain access to the infrastructure even after the container has terminated.

A similar scenario is used for local persistence: in the absence of Kubernetes, the sysmon.py script is deployed in the user’s directory at ~/.config/sysmon/sysmon.py and is also registered as a service via systemd.

OpenVSX version of the malware


While analyzing files communicating with the C2 server, we discovered malicious versions of two common Checkmarx software extensions: ast-results 2.53.0 and cx-dev-assist 1.7.0. Checkmarx is used for application security assessment. These trojanized extensions contained malicious code that delivered the NodeJS version of the malware described above.

This version is downloaded from checkmarx[.]zone/static/checkmarx-util-1.0.4.tgz using NodeJS package installation utilities and is named checkmarx-util. Its key difference from the Python version is that it does not attempt to elevate privileges to the Kubernetes node level and does not create a privileged pod for persistence. Instead, it implements local persistence within the current environment. This means that the NodeJS variant persists only where it is already running.

Additionally, the list of folders to search for and steal secrets from is significantly smaller in this version than in the Python variant.

Checkmarx extensions are used to scan code and infrastructure configurations, so their compromise is quite dangerous: an attacker gains access not only to project files but also to a significant portion of the development environment, tokens, and local configurations.

Victimology


While assessing the attack’s impact, we saw victims all over the world. Most infection attempts occurred in Russia, China, Brazil, Netherlands and UAE.

Conclusion


As the technical analysis shows, the malicious scripts found in the LiteLLM versions are dangerous not only because they steal files containing sensitive data, but also because they target multiple critical infrastructure components simultaneously: the local system, cloud runtime secrets, the Kubernetes cluster, and even cryptographic keys. Such a broad scope of data collection allows an attacker to quickly move from compromising a single system and Python environment to seizing service accounts, secrets, and entire infrastructures.

Prevention and protection


To protect against infections of this kind, we recommend using a specialized solution for monitoring open-source components. Kaspersky provides real-time data feeds on compromised packages and libraries, which can be used to secure the supply chain and protect development projects from such threats.

Home security solutions, such as Kaspersky Premium, help ensure the security of personal devices by providing multi-layered protection that prevents and neutralizes infection threats. Additionally, our solution can restore a device’s functionality in the event of a malware infection.

To protect corporate devices, we recommend using a complex solution such as Kaspersky NEXT, which allows you to build a flexible and effective security system. The products in this line provide threat visibility and real-time protection, as well as EDR and XDR capabilities for threat investigation and response.

At the time of writing, the compromised versions of LiteLLM have already been removed from PyPI and OpenVSX. If you have used them, and as a proactive response to the threat, we recommend taking the following measures on your systems and infrastructure:

  • Perform a full system scan using a reliable security solution.
  • Rotate all potentially compromised credentials – API keys, environment variables, SSH keys, Kubernetes service account tokens, and other secrets.
  • Check hosts and clusters for signs of compromise – the presence of ~/.config/sysmon/sysmon.py files, suspicious pods in Kubernetes.
  • Clear the cache and conduct an inventory of PyPI modules: check for malicious ones and roll back to clean versions.
  • Check for indicators of compromise (files on the system or network signs).


Indicators of Compromise:


URLs
models[.]litellm[.]cloud
checkmarx[.]zone

Infected packages
85ED77A21B88CAE721F369FA6B7BBBA3
2E3A4412A7A487B32C5715167C755D08
0FCCC8E3A03896F45726203074AE225D

Scripts
F5560871F6002982A6A2CC0B3EE739F7
CDE4951BEE7E28AC8A29D33D34A41AE5
05BACBE163EF0393C2416CBD05E45E74


securelist.com/litellm-supply-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Attacco alla sanità: ecco perché una cartella clinica vale fino a mille euro nel dark web


@Informatica (Italy e non Italy)
I dati sanitari non sono solo dati sottratti, ma una chiave capace di aprire molte porte. Ed è proprio questa versatilità criminale a determinarne il valore di una cartella clinica che, in seguito ad un cyber attacco, finisce nel

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Anche oggi è giovedì, e, come sempre, c'è il mio #SocialDebug 🦄

C'è qualcosa che non funziona in tutto il meccanismo: un rimbalzo di responsabilità, una sentenza e un classico agnello sacrificale.

Guardate anche il video di Matteo Flora su questa faccenda (sempre nei commenti) perché c'è davvero di più.

Intanto, se non sapete come fare un bonifico e siete il CEO dell'azienda, il Pongo è in offerta al Carrefour 😶

Qui il mio contenuto: signorina37.substack.com/p/soc…

E qui il video di Matteo: youtube.com/watch?v=OhCOPjG73G…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Deregolamentazione accelerata oggi: l' Omnibus sull'IA sarà sottoposto al voto plenario del Parlamento europeo, con i negoziati tra le istituzioni dell'UE che inizieranno entro poche ore

Questo approccio "muoviti in fretta, rompi le cose" dimostra ancora una volta che la procedura AI Omnibus è profondamente imperfetta.

eupolicy.social/@edri/11629498…

@pirati


1/5 🚨 🏃🏽‍➡️Deregulation speedrun today: #AI Omnibus to undergo European Parliament plenary vote, with negotiations between EU institutions starting within hours 🚨

🙅🏽‍♀️ This ‘move fast, break things’ approach shows once again that the AI Omnibus procedure is deeply flawed.

We have been urging EU lawmakers to reject the re-opening of core #HumanRights and safety protects. Yet, the Parliament's position continues to weaken crucial parts of the #AIAct and fundamentally changes the structure of the law.


Cybersecurity & cyberwarfare ha ricondiviso questo.

I tuoi dati sono ovunque. E il governo USA li sta acquistando senza mandato.

Un intero settore di intermediari di dati acquista enormi quantità di informazioni elettroniche da app per cellulari e browser web e le rivende ai dipartimenti di polizia e alle agenzie governative federali, in modi che possono rivelare dettagli intimi sui cittadini americani senza un mandato.

npr.org/2026/03/25/nx-s1-57523…

@privacypride

Cybersecurity & cyberwarfare ha ricondiviso questo.

Kaspersky ties Operation Triangulation to Coruna exploit kit

securelist.com/coruna-framewor…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Una vulnerabilità Critica in Dell RecoverPoint Semina il Caos. Il malware GRIMBOLT in azione

📌 Link all'articolo : redhotcyber.com/post/una-vulne…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #vulnerabilita #zeroday #dellrecoverpoint #macchinevirtuali #accessoRoot

Cybersecurity & cyberwarfare ha ricondiviso questo.

Russian authorities arrest alleged #LeakBase admin behind stolen data marketplace
securityaffairs.com/189994/cyb…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

265 – Eventi gratuiti sul mondo digitale? Se i relatori non sono pagati, il prodotto sei tu camisanicalzolari.it/265-event…

Coruna: the framework used in Operation Triangulation


The media in this post is not displayed to visitors. To view it, please log in.


Introduction


On March 4, 2026, Google and iVerify published reports about a highly sophisticated exploit kit targeting Apple iPhone devices. According to Google, the exploit kit was first discovered in targeted attacks conducted by a customer of an unnamed surveillance vendor. It was later used by other attackers in watering-hole attacks in Ukraine and in financially motivated attacks in China. Additionally, researchers discovered an instance with the debug version of the exploit kit, which revealed the internal names of the exploits and the framework name used by its developers — Coruna. Analysis of the kit showed that it relies on the exploitation of many previously patched vulnerabilities and also includes exploits for CVE-2023-32434 and CVE-2023-38606. These two vulnerabilities particularly caught our attention because they had been first discovered as zero-days used in Operation Triangulation.

Operation Triangulation is a complex mobile APT campaign targeting iOS devices. We discovered it while monitoring the network traffic of our own corporate Wi-Fi network. We noticed suspicious activity that originated from several iOS-based phones. Following the investigation, we learned that this campaign employed a sophisticated spyware implant and multiple zero-day exploits. The investigation lasted for over six months, during which we disclosed our findings in connection to the attack. Kaspersky GReAT experts also presented these findings at the 37th Chaos Communication Congress (37C3).

Although all the details of both CVE-2023-32434 and CVE-2023-38606 have long been publicly available, and other researchers have developed their own exploits without ever seeing the Triangulation code, we decided to closely investigate the exploits used in Coruna. Some of the exploit kit distribution links provided by Google remained active at the time the report was published, which allowed us to collect, decrypt, and analyze all components of Coruna.

During our analysis, we discovered that the kernel exploit for CVE-2023-32434 and CVE-2023-38606 vulnerabilities used in Coruna, in fact, is an updated version of the same exploit that had been used in Operation Triangulation. The images below illustrate a high-level overview of the two attack chains. The exploit in question is highlighted with a red rectangle.

Attack chain of Operation Triangulation (simplified)
Attack chain of Operation Triangulation (simplified)

Attack chain of Coruna (simplified)
Attack chain of Coruna (simplified)

Moreover, we discovered that Coruna includes four additional kernel exploits that we had not seen used in Operation Triangulation, two of which were developed after the discovery of Operation Triangulation. All of these exploits are built on the same kernel exploitation framework and share common code. Code similarities from kernel exploits can also be found in other components of Coruna. These findings led us to conclude that this exploit kit was not patchworked but rather designed with a unified approach. We assume that it’s an updated version of the same exploitation framework that was used — at least to some extent — in Operation Triangulation.

Technical details


While we continue to investigate all exploits and vulnerabilities used by Coruna, this post provides a high-level overview of the exploit kit and attack chain.

Safari


Exploitation begins with a stager that fingerprints the browser and selects and executes appropriate remote code execution (RCE) and pointer authentication code (PAC) exploits depending on the browser version. It also contains a URL to an encrypted file with information about all available packages containing exploits and other components. The stager also includes a 256-bit key used to decrypt it. The URL and decryption key are passed to a payload embedded in PAC exploits.

Payload


The payload is responsible for initiating the exploitation of the kernel. After initialization, the payload first downloads a file with information about other available components. To extract it, the payload performs several steps processing multiple file formats.

First, the downloaded file is decrypted using the ChaCha20 stream cipher. Decryption yields a container with the magic number 0xBEDF00D, which stores LZMA-compressed data.

The file format used by the exploit kit to store compressed data

OffsetField
0x00Magic number (0xBEDF00D)
0x04Decompressed data size
0x08LZMA-compressed data

The decompressed data presents another container with the magic number 0xF00DBEEF. This file format is used in the exploit kit to store and retrieve files by their IDs.

The file format used by the exploit kit to store files

OffsetField
0x00Magic number (0xF00DBEEF)
0x04Number of entries
0x08Entry[0].File ID
0x0CEntry[0].Status
0x10Entry[0].File offset
0x14Entry[0].File size

We provide a description of all possible File ID values below. At this stage, when the payload gathers information about all available file packages, this container holds only one file, and its File ID is 0x70000.

Finally, we get to the file with information about all available file packages. It starts with the magic value 0x12345678. The exploit kit uses this file format to obtain URLs and decryption keys for additional components that need to be downloaded.

The file format used by the exploit kit to store information about file packages

OffsetField
0x00Magic number (0x12345678)
0x04Flags
0x08Directory path
0x108Number of entries
0x10CEntry[0].Package ID
0x110Entry[0].ChaCha20 key
0x130Entry[0].File name

The components required for exploiting a targeted device are selected using the Package ID. Its high byte specifies the package type and required hardware. We’ve seen the following package types:

  • 0xF2 – exploit for ARM64,
  • 0xF3 – exploit for ARM64E,
  • 0xA2 – Mach-O loader for ARM64,
  • 0xA3 – Mach-O loader for ARM64E,
  • 2 – implant for ARM64,
  • 0xE2 – implant for ARM64E.

The payload code also supports additional package types, such as 0xF1, an exploit for older ARM devices that do not support 64-bit architecture. Interestingly, however, the files for such exploits are missing.

Other bytes of the Package ID define the supported firmware version and CPU generation.

Some of the observed Package IDs (those with unique content)

Package IDDescription
0xF3300000Kernel exploit (iOS < 14.0 beta 7) and other components
0xF3400000Kernel exploit (iOS < 14.7) and other components
0xF3700000Kernel exploit (iOS < 16.5 beta 4) and other components
0xF3800000Kernel exploit (iOS < 16.6 beta 5) and other components
0xF3900000Kernel exploit (iOS < 17.2) and other components
0xA3030000Mach-O loader (iOS 16.X) (A13 – A16)
0xA3050000Mach-O loader (iOS 16.0 – 16.4)

The files inside these packages are also stored in encrypted and compressed 0xF00DBEEF containers, but this time compression is optional and is determined by the second bit in the Flags field. Different packages contain different sets of files. A description of all possible File IDs is given in the table below.

Observed File IDs

File IDDescription
0x10000Implant
0x50000Mach-O loader (default)
0x70000List of additional components
0x70005Launcher config
0x80000Launcher in 0xF2/0xF3 packages, or Mach-O loader in 0xA2/0xA3
0x90000Kernel exploit
0x90001Kernel exploit (for Mach-O loader)
0xA0000Logs cleaner
0xA0001Mach-O loader component
0xA0002Mach-O loader component
0xF0000RPC stager

After downloading the necessary components, the payload begins executing kernel exploits, Mach-O loaders, and the malware launcher. The payload selects an appropriate Mach-O loader based on the firmware version, CPU, and presence of the iokit-open-service permission.

Kernel exploits


We analyzed all five kernel exploits from the kit and discovered that one of them is an updated version of the same exploit we discovered in Operation Triangulation. There are many small changes, but the most noticeable are as follows:

  • The code takes into account more values ​​from XNU version strings, allowing for more accurate version checking.
  • Added a check for iOS 17.2. We assume that this was the latest version of iOS at the time of development (released in December 2023).
  • Added checks for newer Apple processors: A17, M3, M3 Pro, M3 Max (released in fall 2023).
  • Added a check for iOS version 16.5 beta 4. This version patched the exploit after our report to Apple.

Why does the exploit need to check for iOS 17.2 and newer CPUs if the targeted vulnerabilities were fixed in iOS 16.5 beta 4? The answer can be found by examining other exploits: they are all based on the same source code. The only difference is in the vulnerabilities they exploit, so these checks were added to support the newer exploits and appeared in the older version after recompilation.

Launcher


The launcher is responsible for orchestrating the post-exploitation activities. It also uses the kernel exploit and the interface it provides. However, since the exploit creates special kernel objects during its execution that provide the ability to read and write to kernel memory, the launcher simply reuses these objects without the need to trigger vulnerabilities and go through the entire exploitation path again. The launcher cleans up exploitation artifacts, retrieves the process name for injection from a config with the 0xDEADD00F magic number, injects a stager into the target process, uses it to execute itself, and launches the implant.

Conclusions


This case demonstrates once again the dangers associated with such malicious tools that lie in their potential wide usage. Originally developed for cyber-espionage purposes, this framework is now being used by cybercriminals of a broader kind, placing millions of users with unpatched devices at risk. Given its modular design and ease of reuse, we expect that other threat actors will begin incorporating it into their attacks. We strongly recommend that users install the latest security updates as soon as possible, if they have not already done so.


securelist.com/coruna-framewor…

3D Printed Wire Stripper Uses PLA Blades


The media in this post is not displayed to visitors. To view it, please log in.

One might think that [Da_Rius]’s mostly 3D printed wire stripper would count its insulation-shearing blades among the small number of metal parts required, but that turns out to not be the case. The blades are actually printed in PLA, seem to work just fine for this purpose. (We imagine they need somewhat frequent replacement, but still.)

Proper wire strippers are one of the most useful tools for a budding electronics enthusiast, because stripping hookup wire is a common task and purpose-built strippers make for quick and consistent results.

As far as tools go they are neither particularly expensive nor difficult to source, but making one’s own has a certain appeal to it. The process of assembling the tool is doubtless a rewarding one, and it looks like it results in a pretty good conversation starter if nothing else.

As mentioned, the tool is mostly 3D printed and does require some metal parts: fasteners, heat-set inserts, and a couple springs. Metal nuts and heat-set inserts are easy enough to obtain, but springs of particular size and shape are a bit trickier.

It is perfectly possible to make custom springs, and as it happens [Da_Rius] already has that covered with a separate project for using a hex key and printed jig to make exactly the right shapes and sizes from pre-tempered spring wire.


hackaday.com/2026/03/26/3d-pri…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Node.js rischia il crash remoto: aggiornamento urgente già disponibile

📌 Link all'articolo : redhotcyber.com/post/node-js-r…

#redhotcyber #news #nodejs #sicurezzainformatica #tls #http2 #webcrypto #vulnerabilita #cybersecurity #hacking #malware #sicurezzadelsistema

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚀 Workshop "Hands On" di Lunedì 18 Maggio
📍Quando: Lunedì 18 Maggio 2026 al Teatro Italia, Roma
📍Programma: redhotcyber.com/linksSk2L/prog…
📍Iscriviti ai Workshop di lunedì 18 maggio : rhc-conference-2026-workshop.e…
#redhotcyber #rhcconference #conferenza #informationsecurity
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Pioggia di bug da Mozilla scoperti dalle AI. Tre da score 10 e 14 da 9.8

📌 Link all'articolo : redhotcyber.com/post/pioggia-d…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #vulnerabilita #bugbounty #intelligenzaartificiale #sicherheitinformatica

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Le minacce informatiche stanno cambiando: l’era degli attacchi guidati dall’IA è ora!

📌 Link all'articolo : redhotcyber.com/post/le-minacc…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #intelligenzaartificiale #sicherheitainformatica #minacceinformatiche

Testing Severely Neglected VHS Tapes and CDs


The media in this post is not displayed to visitors. To view it, please log in.


Check your tape for spider nests before rewinding. (Credit: Brady Brandwood, YouTube)Check your tape for spider nests before rewinding. (Credit: Brady Brandwood, YouTube)
Physical media has a certain amount of durability associated with it, a quality which is naturally determined by the way that they’re stored. Generally this does not involve being abandoned on the porch of a delipidated, abandoned house where the elements and any passing critter can have their way with it.

Exactly how playable would these VHS tapes and CDs still be? Whether it was out of a sense of burning curiosity, or for a similar reason that [Brady Brandwood] has a habit of adopting former seafood critters like lobsters as adorable pets, these items got recently collected and put to the test.

Normally VHS tapes are kept safely in a little sleeve or box in a dry, cool place, similar to CDs and DVDs. These particular items had however been left for at least a decade out in the open amidst the ransacked remains of abandoned homes. This meant that the VHS tapes were full of dirt and debris, and at least in one case with a spider nest that jammed up the thrift-store VHS/DVD combo player.

The CDs were cleaned and tried in a G5 iMac, with the obvious results there being that as long as the shiny layer with the data was intact, they worked fine. While a damaged disc tried to play somewhat, even the amazing audio CD error-correcting algorithms can not compensate for see-through gashes.

Perhaps the real surprise came from the VHS tapes, none of which had any protection from the elements other than the little plastic flap that keeps human paws from touching the tape directly. Although one tape looked somewhat moldy, after evicting a spider nest and some general clean-up, it played mostly fine.

One tape apparently it had a copy of The Land Before Time movie on it, while others contained various recordings, including of a concert with [Jerry Lee Lewis] and a recording of a Cartoon Network episode. Although the VCR’s head needed to be cleaned once during this whole test to remove some black gunk, none of the tapes seemed to show any signs of sticking, delaminating or any other issue commonly associated with degraded tapes.

This difference in physical durability between CDs and VHS tapes ought to not come as a surprise to anyone who has ever dropped a CD and saw the Scratch of Death™ on its shiny surface, yet the fact that the tapes survived what must have been years of Appalachian seasons is definitely somewhat impressive.

youtube.com/embed/lh-a8bTkGtQ?…


hackaday.com/2026/03/25/testin…

Demonstrating Gray Codes With Industrial Display


The media in this post is not displayed to visitors. To view it, please log in.

Many people base huge swaths of their lives on foundational philosophical texts, yet few have read them in their entirety. The one that springs to the forefront of many of our minds is The Art of Computer Programming by Donald Knuth. Full of many clever and outright revolutionary algorithms and new ways of thinking about how computers work, [Attoparsec] has been attempting to read this tome from cover to cover, and has found some interesting tidbits. One of those is the various algorithms around Gray Codes, and he built this device as a visual aid.

Gray Codes, otherwise known as reflected binary, is a way of ordering an arbitrarily large set of binary values so that only one bit changes between any two of them. The most common place these are utilized is in things like rotary encoders, where it provides better assurance that the position of a shaft is in a known location. To demonstrate this in a more visual way [Attoparsec] hooked up an industrial signal light, normally used for communicating the status of machinery in a factory, and then programmed it to display the various codes. A standard binary counter is used as a reference, and it can also display standard Gray Code as well as a number of other algorithms used for solving similar problems.

[Attoparsec] built this as an interactive display for the Open Sauce festival in San Francisco. To that end it needed to be fairly rugged, so he built it out of old industrial equipment, which is also a fitting theme for the light itself. There’s also a speed controller and an emergency stop button which also add to the motif. For a deeper dive on Gray Codes and their uses, take a look at this feature from a few years back.

youtube.com/embed/Z9X3dH5LjrM?…


hackaday.com/2026/03/25/demons…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Probably the best account on Instagram right now: instagram.com/reel/DWVBRGZolJp…

You're welcome!

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

The EU and Chat Control is like a toddler insisting they want to touch the hot stove


The European Parliament is voting again THURSDAY 26th at 11:00 on Chat Control. The Commission, Council, multiple tech giants, the Conservatives (EPP), and several MEPs from S&D and Renew stand united in favouring indiscriminate mass surveillance.

Tell them NO: fightchatcontrol.eu/


Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

The European Parliament is voting again THURSDAY 26th at 11:00 on Chat Control. The Commission, Council, multiple tech giants, the Conservatives (EPP), and several MEPs from S&D and Renew stand united in favouring indiscriminate mass surveillance.

Tell them NO: fightchatcontrol.eu/

in reply to Fight Chat Control

interesting how the vote is refered to on the parliaments website

"Proposal for a regulation of the European Parliament and of the Council amending Regulation (EU) 2021/1232 as regards the extension of its period of application"

overlooked it at first...

europarl.europa.eu/plenary/en/…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Infosec news cycle:
CVE is in danger
CVE is saved
CVE is in danger
CVE is saved
CVE is in danger
CVE is saved
CVE is in danger
CVE is saved
CVE is in danger
CVE is saved
CVE is in danger
CVE is saved
CVE is in danger
CVE is saved
CVE is in danger
CVE is saved
CVE is in danger
CVE is saved

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Soccer/football club Ajax Amsterdam leaked supporters' personal data, including stadium bans

ajax.nl/artikelen/informatie-o…

reshared this

VGA Output From A PIC18


The media in this post is not displayed to visitors. To view it, please log in.

In the maker world, it’s the Arduino and ESP32 lines that get the lion’s share of attention. However, you can do fantastic things with PIC chips, too, if you put the dev time in—it’s just perhaps less likely another maker has done so before you. A great example is this VGA output project from [grecotron].

A PIC18F47K42 is perhaps not the first part you would reach for to pursue any sort of video-based project. However, with the right techniques, you can get the 8-bit microcontroller pumping out the pixels surprisingly well. [grecotron] was able to get the chip outputting to a VGA monitor at a resolution of 360 x 480 with up to 16 colors. It took some careful coding to ensure the chip could reliably meet the timing requirements for the standard and to get HSYNC, VSYNC, and the color signals all dancing in harmony. Aiding in this regard was that the chip was clocked with a 14.3182 MHz crystal to make it easy to divide down from all the internal timers as needed. Supporting hardware is light, too—primarily consisting of a VGA connector, a couple of multiplexers, and resistor ladder DACs for the color signals. Files are on Github for those interested in deeper detail on the work.

VGA output is possible to implement on all kinds of microcontrollers—and even a bunch of raw logic if you know what you’re doing. If you’re pursuing your own video output wizardry, be sure to let us know on the tipsline.


hackaday.com/2026/03/25/vga-ou…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The Russian government will expand the bandwidth of its national firewall system to 954 Tbps

The new bandwidth will be rolled out by 2030 and will be 2.5 times than what the system can handle today

kommersant.ru/doc/8533998

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

🇩🇪Sie haben es durchgedrückt: Morgen 11 Uhr entscheidende Wiederholungsabstimmung des EU-Parlaments zu #Chatkontrolle-Massenscans! SPD gespalten: mepwatch.eu/10/vote.html?v=189…
Morgen früh könnt ihr noch anrufen und nachfragen:
👉 fightchatcontrol.de #StopScanningMe
Questa voce è stata modificata (6 giorni fa)
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

TORTURA E GENOCIDIO. IL NUOVO RAPPORTO ONU DI FRANCESCA ALBANESE (A/HRC/61/71)

Scaricabile da qui: ohchr.org/sites/default/files/…

di Lavinia Marchetti

Sono ben conscia che l’Italia sembra in altre faccende affaccendata, tra referendum che non cambieranno di una virgola il nostro vivere quotidiano (tranne, forse, smorzare un po’ la deriva autoritaria di questo governo, e non è poco)) e la guerra contro l’Iran. Sono ben conscia che la Palestina, come argomento, ormai interessi a poche persone, come sempre succede con certe situazioni. Finché ne parlano i grandi media resta l’attenzione, appena i media si girano dall’altra parte e passano alla notizia successiva, resta una piccola porzione di persone a mantenere vigile l’attenzione e a protestare in piazza. Forse è fisiologico, forse è altro. Non è l’argomento che voglio trattare oggi. Infatti voglio parlare del recente rapporto della Relatrice Speciale ONU Francesca Albanese, report che si occupa di un tema importante (quello che anch’io ho trattato più estesamente nel mio testo) che è lo smascheramento del sistema di occupazione israeliano come un'entità biopolitica che utilizza la sofferenza e la tortura come strumento di pulizia etnica. Niente che non sapessimo. Ma dal sapere per sentito dire a mostrare le prove in sede ONU c’è una bella differenza. Nelle conclusioni Albanese arriva a formulazioni durissime e, a mio avviso, doverose: quando la tortura attraversa un intero territorio e viene sostenuta da politiche che distruggono le condizioni della vita, “the genocidal intent is apparent”; poco dopo aggiunge che il genocidio è diventato “the ultimate form of torture”.

LA TORTURA COME STRUTTURA GENERALIZZATA

Il rapporto demolisce l'idea che gli abusi siano "eccessi" individuali. La tortura viene definita come una funzione intenzionale e sistematica volta a spezzare la nazione palestinese in quanto tale.
Leggiamo da pag. 1:
"In questo rapporto, la Relatrice Speciale esamina l'uso sistematico da parte di Israele della tortura contro i palestinesi del territorio palestinese occupato dal 7 ottobre 2023, comprendendo pratiche detentive e non detentive che soddisfano la soglia del genocidio ai sensi della Convenzione sulla prevenzione e la punizione del crimine di genocidio. Documenta come la tortura sia diventata parte integrante del dominio e della punizione inflitti a uomini, donne e bambini, sia attraverso abusi in custodia che attraverso una spietata campagna di sfollamento forzato, uccisioni di massa, deprivazione e distruzione di tutti i mezzi di sussistenza per infliggere dolore e sofferenza collettiva a lungo termine. Viene imposto un regime continuo e territorialmente pervasivo di terrore psicologico, progettato per spezzare i corpi, privare un popolo della sua dignità e costringerlo ad abbandonare la propria terra. Questa non è violenza incidentale. È l'architettura del colonialismo d'insediamento, costruita su fondamenta di deumanizzazione e mantenuta da una politica di crudeltà e tortura collettiva."
Nel rapporto, la tortura non rientra in un quadro di eccezionalità e si rivela come la norma di una sovranità che non cerca l'obbedienza del suddito, ma la sua cancellazione esistenziale. Politicamente dobbiamo guardare al genocidio della popolazione palestinese e alla sua "deumanizzazione" come a una premessa logica del colonialismo. Infatti la tortura non serve quasi mai per ottenere informazioni. L’effetto che produce è quello di un corpo palestinese "frantumato", incapace di abitare e/o pensare il futuro. È il trionfo della forza che si fa "legge della giungla" in pieno XXI secolo.

IL DEGRADO ULTERIORE DELLA RIVOLUZIONE CARCERARIA

Il rapporto analizza come il sistema detentivo sia diventato un piano coordinato di vendetta collettiva, guidato esplicitamente da figure istituzionali come Itamar Ben-Gvir. Il report parla di oltre 18.500 arresti palestinesi dal 7 ottobre 2023, almeno 1.500 minori, 9.245 detenuti ancora in custodia a febbraio 2026, più di 4.000 casi di sparizione forzata, e fra 84 e 94 morti in detenzione.
A pagina 2 leggiamo che:
"L'escalation della tortura nei centri di detenzione israeliani è un piano coordinato. Il Ministro della Sicurezza Nazionale del Paese, Itamar Ben-Gvir, che sovrintende al Servizio Carcerario Israeliano, ha promosso la sua 'rivoluzione carceraria', che ha istituzionalizzato una politica di degradazione. Il 14 novembre 2023, il Ministro ha ordinato che i detenuti palestinesi etichettati come 'terroristi' siano tenuti ammanettati in celle buie con letti di ferro e latrine a terra e sottoposti all'inno nazionale israeliano trasmesso continuamente a tutto volume. Egli ha inoltre invocato la pena di morte per i detenuti palestinesi — una soluzione cinica al sovraffollamento creato dagli arresti di massa effettuati da Israele. Caratterizzate come necessarie per la 'sicurezza' di Israele, queste pratiche operano come un progetto ideologico di distruzione societaria, normalizzando la crudeltà e con l'obiettivo politico di debilitare la 'nazione' palestinese."
Siamo davanti alla burocratizzazione del sadismo. La "rivoluzione carceraria" di Ben-Gvir è l'estensione dello Stato d'Eccezione fin dentro le viscere della prigione, dove il tempo del detenuto viene deliberatamente abusato. L'uso dell'inno a volume assordante o delle latrine a terra è un tentativo di "riprogrammazione sensoriale" volto a annichilire l'io. Filosoficamente, la prigione qui funziona come il motore primo del sistema coloniale, un laboratorio dove il potere incide direttamente sulla "nuda vita" dei prigionieri, trasformandoli in "walking skeletons" per segnalare al resto della popolazione palestinese l'ineluttabilità della propria sottomissione. Recentemente, con l’introduzione della pena di morte per i “terroristi” palestinesi, il terrorismo psicologico è ulteriore peggiorato, e non era facile.
L'escalation coinvolge centri come Sde Teiman, Anatot e Ofer, definiti come spazi di totale illegalità. Il rapporto elenca pratiche sistematiche: detenuti tenuti bendati e ammanettati con fascette di plastica così strette da causare infezioni e rendere necessarie amputazioni; l'uso delle cosiddette "monkey cages" (gabbie per scimmie) o spazi sotterranei angusti come il centro Rakefet; la trasformazione dei detenuti in "walking skeletons" (scheletri ambulanti) attraverso l'inedia e l'isolamento prolungato. Viene documentata una violenza sessuale pervasiva: stupri di gruppo, anche con l'uso di oggetti come sbarre di ferro e manganelli, e scariche elettriche sui genitali. Il sistema colpisce strategicamente figure chiave per la sopravvivenza sociale: medici come Adnan al-Bursh e Iyad al-Rantisi sono stati uccisi in custodia.

LA STRUTTURAZIONE DELL’ "AMBIENTE TORTURANTE"

Il concetto più innovativo del rapporto è l'estensione della tortura allo spazio pubblico, dove è l'intero territorio palestinese ad essere stato trasformato in uno spazio di punizione collettiva.
Sempre da Pagina 2:
"La tortura non è confinata alle celle e alle stanze degli interrogatori. Attraverso l'impatto cumulativo dello sfollamento di massa, dell'assedio, del diniego di aiuti e cibo, della violenza militare e dei coloni senza freni e della sorveglianza e del terrore pervasivi, il territorio palestinese occupato è diventato uno spazio di punizione collettiva, dove la distruzione delle condizioni di vita trasforma la violenza genocida in uno strumento di tortura collettiva con conseguenze mentali e fisiche a lungo termine per la popolazione occupata. Abilitato dall'industria della sicurezza globale e dall'inazione di Stati terzi, questo regime deumanizza i palestinesi, li sottopone a molteplici umiliazioni e tipi di violenza e instilla la paura collettiva. In tutto il territorio palestinese occupato, le autorità israeliane hanno progettato un 'ambiente torturante', destinato a spezzare la resistenza, la dignità e la sumud (steadfastness)."
Albanese descrive il "terrore cartografico" a Gaza: l'uso di mappe contraddittorie e ordini di evacuazione impossibili che spingono milioni di persone verso "zone sicure" sistematicamente bombardate. Viene documentato il "medicide": l'attacco frontale al sistema sanitario, con ospedali rasi al suolo e neonati lasciati morire nelle incubatrici evacuate a forza. La distruzione totale di oltre un milione di case, musei e archivi storici mira ad annichilire la memoria collettiva e il senso di appartenenza. In Cisgiordania, la sorveglianza biometrica e le milizie dei coloni creano un "continuum di tortura" che paralizza ogni dimensione della vita quotidiana. Quando la Relatrice parla di "sumud" (fermezza), identifica il vero obiettivo politico dell'occupazione che va oltre la soppressione fisica e si conforma come uno sfinimento psicologico. Inoltre, sempre Albanese, osserva che l'inazione degli Stati terzi non può essere configurata come neutralità, bensì come complicità biopolitica. Permettere che un intero popolo sia sottoposto a un regime di "insecurity" permanente significa avallare la distruzione del legame sociale palestinese. La libertà di movimento è una concessione revocabile all'interno di una gabbia a cielo aperto.

Segue
#nuovoRapportoAlbanese #FrancescaAlbanese #gazagenocide

@politica

in reply to emama

INEDIA E FEROCIA TECNOLOGICA COME ARMI DI MASSA

Il rapporto documenta l'uso deliberato della fame e di armi avanzate (AI, droni, armi termobariche) per indurre un collasso psicologico totale nella popolazione di Gaza. Lo sterminio fisico non basta.
Un passaggio da Pagina 22:
"L'inedia usata come tortura societaria è una tecnica coloniale riesumata che causa miseria di massa e danni cumulativi e irreversibili, devastando il presente e il futuro di un popolo. Armamenti avanzati sono dispiegati non solo per uccidere ma anche per generare paura, impotenza e collasso psicologico. Sorveglianza costante tramite droni, sciami di quadricotteri, attacchi aerei con bombe a caduta gravitazionale o armi esplosive avanzate con impatti massicci — riferite persino armi termobariche che polverizzano la carne umana, fosforo bianco e sistemi di targeting basati sull'intelligenza artificiale — sono impiegati per 'causare lesioni superflue o sofferenze non necessarie', integrando tecnologie di genocidio all'avanguardia in pratiche di tortura collettiva."
Nel report viene citata la dichiarazione di Israel Katz: "Senza carburante, l'elettricità locale si spegnerà in pochi giorni e i pozzi d'acqua smetteranno di funzionare entro una settimana". Questa politica ha causato la morte per malnutrizione di centinaia di persone, tra cui 157 bambini (il dato è fermo a ottobre 2025). Il dolore è usato come arma, chirurgie eseguite senza anestesia a causa del blocco dei medicinali. Albanese denuncia l'integrazione di sistemi di targeting basati sull'IA e armi termobariche che "polverizzano la carne umana", trasformando Gaza in una "vetrina di ferocia tecnologica" per l'industria bellica globale, Gaza è la sua vetrina e luogo di sperimentazione per queste armi “testate sul campo”. L'integrazione dell'Intelligenza Artificiale nel processo genocidario trasforma lo sterminio in un'operazione tecnica, priva di empatia e di responsabilità umana. La fame, definita "tortura societaria", è il ritorno alle tecniche coloniali più oscure, ma aggiornate con i mezzi della modernità. Politicamente, questo configura un "medicide" e un "domicide" dove non si va a colpire il nemico combattente. In gioco c’è molto di più, si colpisce la possibilità stessa della vita biologica e culturale del gruppo. L'orrore è solo statistica amministrativa, ricorda molto da vicino l’acme del nazismo (questo lo dico io, non Francesca Albanese)

IL NESSO CON LA "NUOVA NAKBA"

Il rapporto conclude che la tortura ininterrotta è la prova del dolus specialis genocidiario, volto alla rimozione forzata dei palestinesi per consentire l'annessione dei territori. Albanese tira le somme dell'intenzionalità politica, inquadrando la tortura come lo strumento necessario per il compimento della "Nuova Nakba".
Dalla sezione conclusiva, Paragrafi 82-86:
"L'intento genocida è 'apparente' quando la tortura è perpetrata in un intero territorio, attraverso una vasta gamma di forme individualizzate e collettive, e sostenuta attraverso politiche che distruggono sistematicamente le condizioni di vita... In questo senso, il genocidio è diventato l'ultima forma di tortura, caratterizzandosi come continuo, generazionale e collettivo. Se la giustizia deve mai essere servita, bisogna riconoscere che nel contesto di un genocidio, la tortura, sia essa detentiva o meno, è intrinsecamente intenzionale e finalizzata; il suo uso sostenuto nel tempo e nello spazio contro la stessa popolazione è probante di politiche mirate alla distruzione fisica e psicologica di quel gruppo"
Possiamo tranquillamente parlare di "Nuova Nakba” come programma di governo. Il legame tra tortura e genocidio risiede nell'intenzionalità del trasferimento forzato e la sofferenza è il catalizzatore dell'esodo. Quando un ministro parla apertamente di annessione e conquista, la tortura non può che diventare l'unico linguaggio possibile per uno Stato che ha deciso di non “convivere” più con l'indigeno. Il progetto coloniale non è mai stato così evidente.

Fine
#laviniaMarchetti
#nuovoRapportoAlbanese #FrancescaAlbanese #gazagenocide

Questa voce è stata modificata (5 giorni fa)
Cybersecurity & cyberwarfare ha ricondiviso questo.

Russian national convicted for running #botnet used in attacks on U.S. firms
securityaffairs.com/189987/cyb…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

Tre attivisti del Convoy Nuestra América arrestati di ritorno da Cuba
pressenza.com/it/2026/03/tre-a…
Riprendiamo dalla pagina Facebook dell’attivista brasiliano Thiago Avila questo allarmante appello lanciato dal suo team di comunicazione. Thiago Avila è stato arrestato questa mattina alle 8:17 (ora locale) all’aeroporto di Panama e portato via per essere interrogato. L’ultimo contatto risale…
Redazione Italia

The Most Intricate Of Freeform Digital Clocks


The media in this post is not displayed to visitors. To view it, please log in.

Digital clock projects have been with us since the 1970s, when affordable LEDs and integrated circuits became available. In 2026 most of them use a microcontroller, but for the AliExpress fans there’s one that goes straight back to the ’70s with a pile of logic chips. You can make it on the supplied PCBs, but that wasn’t for [ALTco]. Instead, he made the circuit in free form, using six metres of brass wire.

The construction is anchored together by a set of busbars that carry sockets for a set of seven-segment and driver modules. The circuit is typical for the day, with a crystal oscillator and divider chain feeding the counters for the displays. There are a few clever tricks that older engineers might recognize in order to reduce the chip count. In this case that’s negated by an extra set of circuitry allowing the time to be set from a rotary encoder.

We’re impressed by the intricacy of the device, made bit by bit without a plan, it as some wires what thread their way between others. It’s a truly beautiful piece, and it reminds us of our circuit sculpture contest back in 2020.

youtube.com/embed/w20A85zaaos?…


hackaday.com/2026/03/25/the-mo…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

PornHub e la Guerra dei Clic: è sfida tra norme, sorveglianza di stato e VPN

📌 Link all'articolo : redhotcyber.com/post/pornhub-e…

#redhotcyber #news #pornhub #sicurezzainternet #libertadiparola #protezioneminori #dirittoprivacy #navigazioneonline #sicurezzadigital

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

La Slovenia come laboratorio dell’hybrid warfare israeliana? Il caso Black Cube

Una campagna elettorale trasformata in un’operazione sotto copertura tra identità fittizie, incontri riservati e video registrati di nascosto per avvantaggiare l'opposizione di destra alle elezioni del 22 marzo. Il caso sloveno mostra come le interferenze non passino più solo dalla disinformazione online ma anche da sofisticate operazioni ibride.

formiche.net/2026/03/slovenia-…

@politica

Cybersecurity & cyberwarfare ha ricondiviso questo.

Meta e Google sono insieme la droga e il suo spacciatore: finalmente ritenuti responsabili in uno storico processo per dipendenza dai social media

Una giuria di Los Angeles ha assegnato una vittoria senza precedenti a una giovane donna che ha fatto causa a Meta e Google per la sua dipendenza infantile dai social media.

bbc.com/news/articles/c747x7gz…

@eticadigitale

in reply to informapirata ⁂

I giurati hanno scoperto che Meta, proprietaria di Instagram, Facebook e WhatsApp, e Google, proprietaria di YouTube, hanno intenzionalmente creato piattaforme di social media avvincenti che hanno danneggiato la salute mentale del ventenne.

Alla donna, nota come Kaley, sono stati assegnati 3 milioni di dollari (£2,2 milioni), un risultato che probabilmente avrà implicazioni per centinaia di casi simili che ora si stanno facendo strada nei tribunali statunitensi.

@eticadigitale

reshared this