Prove me wrong
reshared this
reshared this
A hacker is selling data from France's ANTS, the agency that deals with vehicle registration, driving licence, and identity documents
clubic.com/actualite-580066-le…
Confirmed by authorities yesterday: interieur.gouv.fr/actualites/c…
Ces derniers jours, un hacker a mis en vente de supposées bases de données de France Titres, ex-ANTS, et de France Travail, entre autres, pour des sommes dérisoires. En plus d'avoir menti, il a été écarté par ses pairs.Alexandre Boero (clubic.com)
reshared this
reshared this
A cluster of 26 malicious iOS apps have been uploaded on the Chinese version of the Apple App Store
The apps redirected users to phishing pages posing as legitimate cryptocurrency services
securelist.com/fakewallet-cryp…
In March 2026, we uncovered more than twenty phishing apps in the Apple App Store masquerading as popular crypto wallets.antonkarpin (Securelist)
reshared this
APRs is an amateur radio protocol allowing the exchange of short packets of data. It’s commonly used to transmit a GPS position, though it can find other applications. The Flipper Zero RF hacker’s multi tool normally needs to be hooked up to an external transmitter to do APRS, but [Richard YO3GND] has made his Flipper do the job without any external parts at all.
One of the the Flipper’s radios sits in the 435 MHz ISM band, meaning that the rest of the 70 cm amateur band is well within its reach. There only remains the subject of modulation, in which the Flipper’s FSK and APRS’s FM are similar on paper if not on a waterfall display. Some software hackery ensues, and the Flipper is an APRS station. Because of the FSK-as-FM modulation it won’t be decoded by everything, but you can’t argue with the bill of materials if you happen to own a Flipper. Check out the demo video below.
Meanwhile, should any readers with an amateur radio licence be interested, this certainly isn’t the first time we’ve brought you a minimalist APRS transceiver. Assuming that possession of a Flipper hasn’t got you into hot water, that is.
youtube.com/embed/OhWlq-4IK9E?…
@Informatica (Italy e non Italy)
Check Point Research ha documentato come il gruppo ransomware-as-a-service The Gentlemen impieghi la botnet SystemBC per orchestrare attacchi devastanti: 320 vittime rivendicate, 1.570 host aziendali compromessi e
Axios reports the NSA uses Anthropic Claude Mythos model despite Department of Defense concerns, blurring AI risk vs defense lines.Pierluigi Paganini (Security Affairs)
reshared this
The Gentlemen e SystemBC: anatomia di un’operazione ransomware con botnet da 1.570 vittime aziendali
#CyberSecurity
insicurezzadigitale.com/the-ge…
reshared this
gite scolastiche
Come tenere i bambini in fila quando vanno in gita? Usando una corda
reshared this
@Informatica (Italy e non Italy)
L’Autorità garante per la protezione dei dati personali ha irrogato due sanzioni per un totale di 12,5 milioni di euro a Poste Italiane e PostePay per aver trattato illecitamente i dati personali di milioni di utenti con le app BancoPosta e
reshared this
"La trappola dei licenziamenti da IA" ovvero come l'automazione porta le aziende a distruggere il mercato da cui dipendono
L'adozione della IA porta a tendere a una massiccia esternalità negativa. Se l'IA sostituisce i lavoratori umani più velocemente di quanto l'economia possa riassorbirli, si verificherà un'erosione della domanda aggregata.
Non è più una questione di "capacità tecnologica" ma di semplice "teoria dei giochi"
reshared this
The third security firm employee who worked with the BlackCat ransomware has also pleaded guilty now
justice.gov/opa/pr/florida-man…
A Florida man, formerly employed as a ransomware negotiator, pleaded guilty to conspiring to commit ransomware attacks against U.S. companies in 2023.www.justice.gov
reshared this
US CISA adds Cisco, Kentico Xperience, PaperCut NG/MF, Synacor, Quest, and TeamCity flaws to its Known Exploited Vulnerabilities catalogPierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
AI in Italia: adozione da record ma la governance resta pericolosamente indietro
📌 Link all'articolo : redhotcyber.com/post/ai-in-ita…
A cura di Silvia Felici
#redhotcyber #news #sovranitadigitale #intelligenzaartificiale #ai #redhat #ricerca #italiaeuropa
La sovranità dell'AI è una priorità per le organizzazioni italiane. Scopri di più sulla ricerca di Red Hat e su come l'open source può aiutareSilvia Felici (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
CVE-2026-33032 (MCPwn) is a CVSS 9.8 authentication bypass in nginx-ui being actively exploited in the wild. Attackers can seize full control of Nginx web servers in two HTTP requests with zero credentials. Patch to version 2.3.4 immediately.dark6 (Secure Bulletin)
reshared this
RAG in .NET con Semantic Kernel: le insidie che i tutorial non ti dicono
#tech
spcnet.it/rag-in-net-con-seman…
@informatica
reshared this
ShinyHunters claims to have breached Canada Life Assurance Company, stealing over 5.6 million Salesforce records containing PII. The group set a ransom deadline of April 21, 2026, threatening to leak the data publicly if demands are not met.dark6 (Secure Bulletin)
reshared this
L'Europa e il paradosso dei diritti, quando meno burocrazia (in campo AI) fa rima con meno tutele
Il Digital Omnibus punta ad aggiornare l’AI Act con una serie di semplificazioni che rischia di indebolire le tutele dei cittadini (a vantaggio delle big tech). A che punto siamo nel tira e molla tra politica e associazioni
wired.it/article/europa-parado…
Grazie a Marco per la segnalazione
thisisbutaname likes this.
reshared this
reshared this
Once a pioneer in videocards, S3’s legacy is today mostly found in details like texture compression as well as the strong presence of S3-branded videocards in the retro-computing world. There’s however a bit of a funny issue with some of these S3 cards in what is often called a ‘brightness bug’, but which as [Bits und Bolts] covers in a recent video was actually a hardware feature that we can once again blame composite video for.
This issue appears with AGP cards like the Trio 3D, Trio64 and ViRGE, where the brightness on the output signal is set too high, easily seen with the washed out look on boot, where especially on CRTs you’d expect to see the nice deep black background. Using an S3 Trio 3D 2X card that was saved from the e-waste pile this so-called Pedestal Bit responsible is investigated and tweaked to show what difference it makes.
At the core is adjusting the black level to make scanline changes easier to detect for TVs, which is no longer relevant for CRTs, LCDs, etc., while adjusting the brightness for one videocard in a system can cause issues elsewhere, such as when using said card alongside a 3dfx Voodoo II card or with inconsistent brightness levels inside 3D games.
Fortunately S3 provided in-depth datasheets on their chips, including how to address the responsible bit. After demonstrating the principle, the BIOS is then patched to set this Pedestal Bit to the value of 0 on boot, solving the issue once and for all.
youtube.com/embed/w_KSfngbmqo?…
Come sempre, quando gli AI bros annunciano, non è vero niente
Bluesky suffered a 24-hour DDoS attack that caused outages. A pro-Iran hacker group claimed responsibility for the disruption.Pierluigi Paganini (Security Affairs)
reshared this
Mozilla cambia il bug bounty per Firefox: solo bug critici e ben documentati
📌 Link all'articolo : redhotcyber.com/post/mozilla-c…
A cura di Bajram Zeqiri
#redhotcyber #news #cybersecurity #hacking #bugbounty #firefox #sicurezzainformatica
Mozilla ha rivisto le regole del bug bounty per Firefox, concentrandosi su vulnerabilità critiche e originali, con l'obiettivo di accelerare l'eliminazione delle minacce più pericolose. Scopri di piùBajram Zeqiri (Red Hot Cyber)
reshared this
Il tuo chatbot sa più cose di te di quanto pensi Provate a chiedere al vostro chatbot: "Cosa sai di me?" Fatelo. Adesso. Vi risponderà con una lista di cose che vi faranno impressione.Marco Camisani Calzolari
Cybersecurity & cyberwarfare reshared this.
NIS 2 e cybersecurity: perché il CdA non può più ignorare il CISO
📌 Link all'articolo : redhotcyber.com/post/nis-2-e-c…
A cura di Paolo Galdieri
#redhotcyber #news #cybersecurity #governancedellasicurezza #ciso #cda #sicurezzainformatica
NIS2 e DL 138/2024 rivoluzionano la cybersecurity: dialogo CdA-CISO, documenti strategici e scadenze inderogabili. Proteggi la tua azienda e il tuo futuro.Paolo Galdieri (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
🚀 Gli speaker della RHC Conference 2026
📍𝗤𝘂𝗮𝗻𝗱𝗼: Martedì 19 Maggio con ingresso dalle ore 8:45
📍𝗗𝗼𝘃𝗲: Teatro Italia, Via Bari 18, Roma (Metro Piazza Bologna)
📍𝗣𝗿𝗼𝗴𝗿𝗮𝗺𝗺𝗮: redhotcyber.com/linksSk2L/prog…
📍𝗜𝘀𝗰𝗿𝗶𝘇𝗶𝗼𝗻𝗲 conferenza di Martedì 19 Maggio: rhc-conference-2026.eventbrite…
#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity
Registrazione per l'evento Red Hot Cyber Conference 2026 del 19 Maggio 2026 presso il Teatro Italia di Roma, in Via Bari 18.Eventbrite
Cybersecurity & cyberwarfare reshared this.
Zero EDR. Zero Firewall. Zero… Trust. L’unico punto debole sei tu!
📌 Link all'articolo : redhotcyber.com/post/lanello-d…
A cura di Massimo Dionisi
#redhotcyber #news #cybersecurity #hacking #malware #ransomware #inganniinformatici
Le violazioni dati sfruttano la psicologia umana: paura, urgenza, autorità. L'AI rende gli attacchi iper-personalizzati e credibili. Serve una cultura di sicurezza.Massimo Dionisi (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Il Caso Claude Mythos di Anthropic. Ha trovato davvero migliaia di vulnerabilità?
📌 Link all'articolo : redhotcyber.com/post/il-caso-c…
A cura di Carolina Vivianti
#redhotcyber #news #cybersecurity #hacking #vulnerabilita #zeroday #intelligenzaartificiale
Un esperto di VulnCheck indaga sulle audaci affermazioni di Anthropic riguardo Claude Mythos e il Progetto Glasswing. Quante vulnerabilità ha scoperto l'IA?Carolina Vivianti (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Cyberdecks are typically reminiscent of weird computers in futuristic sci-fi films, moreso than the computers of today. The cool thing about cyberdecks, though, is you get to build them however you like. [WillTechBuilds] has put together a deck of his own that diverges from cyberdeck norms and ends up closer to something you might have bought off the shelf at Best Buy.
For a start, the build eschews the typical Raspberry Pi or other single-board computer that normally lives at the heart of a cyberdeck. In its place is a motherboard harvested from a GMKTec NucBox G5. It runs the Intel N97 CPU. It’s an x86 processor that’s roughly equivalent in power to an i5 from 10 years ago, but it only sips 12 watts. The compact motherboard is installed in a compact 3D-printed case along with a porbable USB-C battery pack, a small widescreen LCD, and a Lenovo ThinkPad trackpoint keyboard. This latter design choice, along with the x86 chip, is what gives this build so much of a laptop feel. There’s no weird Linux desktop, green-glowing terminal, or chunky mechanical keyboard here, let alone any GPIO pins. Definitely an oddball entry to the cyberdeck world, but valid nonetheless.
We’ve featured cyberdecks built out of everything from CRT TVs to event badges. As always, we’d love to see your latest innovative creation on the tipsline. Video after the break.
youtube.com/embed/iEVtBDjWPRQ?…
[Thanks to Heath Kit for the tip!]
Having molten aluminium interact with atmospheric water forms a source of hydrogen which can be rather problematic if you’re trying to cast aluminium parts. As the molten metal cools down, the dissolved hydrogen is forced out, creating bubbles and other flaws that make aluminium foundries rather upset. While you can inject inert gases to solve the problem, you can also lean into this issue to make some rather fascinating aluminium crystals and geodes, as [Electron Impressions] recently did.
The key here is to use a eutectic Al-Cu alloy at around 45% Cu by weight, as this alloy readily forms large crystals as it cools down. With hydrogen injected into the molten metal, this hydrogen forms large bubbles inside the cooling metal with crystals clearly visible.
A way to create proper geodes involves very slow cooling and pouring off the still molten metal before the eutectic point is reached. As can be seen in this video, this creates a rather impressive looking geode after it’s been smashed open. This also gives a good clue as to how these geological features form in nature, although one does not typically observe Al-Cu alloy geodes in the wild.
youtube.com/embed/3OuaOHT37QA?…
ᙖᗩᖇᕊᘎᕍᙓᔕ ᕊᗢᓮᔕ likes this.
The Onion have finally completed their takeover of InfoWars, and it's everything I wanted and more.
Let me tell you a story. When I was a child, I suffered from night terrors. It was always the same dream: I could hear my family and neighbors wailing…yurivictor (InfoWars)
reshared this
Andreas Kilgus likes this.
reshared this
Vercel says its recent breach originated at Context[.]ai, a third-party AI tool used by a Vercel employee.
Attackers used the compromised Context[.]ai account to pivot to the employees Google Workspace account, then to some work systems from where they stole env files
vercel.com/kb/bulletin/vercel-…
We’ve identified a security incident that involved unauthorized access to certain internal Vercel systems.vercel.com
reshared this
3D cutaway of the lock with the handle engaging the cog that rotates the mechanism. (Credit: Works By Design, YouTube)
Throughout the centuries the art of lock-making and lock-picking have been trapped in a constant struggle, with basic lock designs being replaced by ever more complex ones that seek to thwart any lockpicking attempts, as well as less gentle approaches. When it comes to the very common pin-and-tumbler lock design, the main issue here is that the keyway also provides direct access to the lock’s mechanism. This led [Works By Design] to brainstorm a lock design in which the keyway is hidden.
The ingenious part here is that because the actual key is rotated away after insertion, there is no clear path to the pins. This did require some creative thinking to have a somewhat traditional style key as well as a way to turn the internal mechanism so that the key would be pressed against the pins. Here inspiration was drawn from the switchable magnet mechanism as seen with e.g. magnetic bases. This ensures the key and key handle can be detached and attached quite firmly.
After many 3D printed prototypes, a metal version was CNCed and subjected to some early testing by a locksmith, who even with having seen the CAD model of the lock was stumped. With this initial result and some user feedback in the bag, it was time for large-scale testing with more lockpick enthusiasts, as there are many more ways to open a lock beyond pushing pins. That said, a mechanism was also added to the lock to prevent bumping attacks.
The next testers were found in the Lock Pickers United community, one of whom raised the issue of an impressioning attack. With a couple of test locks on their way to said lockpicking enthusiasts it’ll be exciting to see whether this new lock design will set the standard for future locks or not.
youtube.com/embed/-qUu8kIliy8?…
reshared this
reshared this
End of an Apple era: Tim Cook to step back, John Ternus named CEO
https://mashable.com/article/apple-tim-cook-john-ternus-ceo?utm_source=flipboard&utm_medium=activitypub
Posted into All the Biggest Apple News in One Place @all-the-biggest-apple-news-in-one-place-Mashable
Apple makes it official: the Ternus era begins this fall.Chris Taylor (Mashable)
reshared this
AI token subsidies seem to be ending across the industry.
GitHub Copilot has paused new signups on a number of plans, removed Opus from $10-a-month subscriptions, and plans to move users to token/API-based billing later this year.
Usage quotas are also being reduced and users will hit limits sooner.
github.blog/changelog/2026-04-…
As shared in our recent blog post, we’re making the following changes to Copilot plans for individuals as part of our ongoing efforts to ensure service reliability and a sustainable…Allison (The GitHub Blog)
reshared this
A cyberattack hit France’s ANTS website, possibly exposing personal data from users applying for IDs, passports, and driver’s licenses.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
I post possono essere di diversi tipi:
1) post pubblicati manualmente
2) post pubblicati da feed di alcune testate selezionate
3) ricondivisioni manuali di altri account
4) ricondivisioni automatiche di altri account gestiti da esperti di cybersecurity
NB: purtroppo i post pubblicati da feed di alcune testate includono i cosiddetti "redazionali"; i redazionali sono di fatto delle pubblicità che gli inserzionisti pubblicano per elogiare i propri servizi: di solito li eliminiamo manualmente, ma a volte può capitare che non ce ne accorgiamo (e no: non siamo sempre on line!) e quindi possono rimanere on line alcuni giorni. Fermo restando che le testate che ricondividiamo sono gratuite e che i redazionali sono uno dei metodi più etici per sostenersi economicamente, deve essere chiaro che questo account non riceve alcun contributo da queste pubblicazioni.
like this
reshared this
informapirata ⁂
in reply to .mau. • • •.mau.
in reply to informapirata ⁂ • • •informapirata ⁂
in reply to .mau. • • •> i bimbetti mi sembravano tutti felici
sì, ma il fatto che fossero felici non è né sociologicamente sorprendente, né eticamente meno inquietante... 🤣
Gazzetta del Cadavere
in reply to .mau. • • •