Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

n8n nel mirino! Un bug con CVSS 10 permette la compromissione totale delle istanze

📌 Link all'articolo : redhotcyber.com/post/n8n-nel-m…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #vulnerabilitacritica #rcvulnerability #n8n

Cybersecurity & cyberwarfare ha ricondiviso questo.

Fake #Booking.com lures and #BSoD scams spread DCRat in European #hospitality sector
securityaffairs.com/186606/cyb…
#securityaffairs #hacking #malware
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚀 RHC CONFERENCE 2026 (V EDIZIONE) - LOADING …

📍 Pagina dell'evento: redhotcyber.com/red-hot-cyber-…

#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection #hacking

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Ledger nella tempesta: i dati dei clienti esposti e il rischio del “phishing perfetto”

📌 Link all'articolo : redhotcyber.com/post/ledger-ne…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #sicurezzainformatica #phishing

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

I lampioni iniziano a “parlare”: dal Giappone una nuova rete dati basata sui LED prende vita

📌 Link all'articolo : redhotcyber.com/post/i-lampion…

#redhotcyber #news #tecnologia #wireless #trasmissionedati #led #innovazione #ricerca #politechnicoditokyo

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Microsoft punta a eliminare C e C++: entro il 2030. La migrazione verso Rust è iniziata?

📌 Link all'articolo : redhotcyber.com/post/microsoft…

#redhotcyber #news #microsoft #rust #c #cpp #windows #azure #programmazione #innovazione

Cybersecurity & cyberwarfare ha ricondiviso questo.

Lego lancia gli Smart Bricks: la fantasia diventa digitale
#tech
spcnet.it/lego-lancia-gli-smar…
@informatica
Cybersecurity & cyberwarfare ha ricondiviso questo.

Product Liability Directive 2024/2853Non sono ammesse esclusioni di responsabilità tramite licenze o disclaimer.

In un certo senso si tratta di una dichiarazione di indipendenza perché di fatto cambia la liability a seconda che il prodotto venga venduto in Europa o prodotto negli USA, dove i disclaimer sono un'arte.
Il software open source puro (non profit) resta escluso dalla responsabilità.

keinpfusch.net/il-disclaimer-m…

@informatica

Il post di @uriel

Cybersecurity & cyberwarfare ha ricondiviso questo.

CERT/CC warns of critical, unfixed vulnerability in #TOTOLINK #EX200
securityaffairs.com/186597/sec…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

#Google fixes critical #Dolby Decoder bug in #Android January update
securityaffairs.com/186591/sec…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

Resecurity Went on the Cyber Offensive - When 'Shiny Objects' trick 'Shiny Hunters'
securityaffairs.com/186586/cyb…
#securityaffairs #hacking #ShinyHuinters
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🧙 Buona Befana a tutti! Ma attenti al "carbone"

Ai buoni, quelli che:
🔐 usano la 2FA
📧 non cliccano link sospetti
💾 fanno i backup

➡️ porta dolcetti cyber, SSL Candy e Antivirus Gummies 🍭🍫

Ai cattivi, quelli che:
❌ usano password123
❌ aprono allegati a caso
❌ ignorano gli alert

➡️ porta il RANSOMWARE e dati pubblicati nel darkweb.

Altro che carbone 😈💀

Da RHC tanti auguri di Buona Epifania
e ricordate: la sicurezza informatica non è una favola.

Grazie ad Inva Malaj per l'idea 😉

#redhotcyber #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity #BuonaEpifania #RedHotCyber #CyberSecurity #BefanaNerd #StaySecure #RHC

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

L'Italia dei nativi digitali. E' un meme che fa ridere? Si ma dovrebbe farci riflettere!

#redhotcyber #cybersecurity #hacking #hacker #infosec #infosecurity #AI #IntelligenzaArtificiale #Educazione

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Le “Biciclette per la mente”! Satya Nadella prevede un futuro di supporto e non di sostituzione

📌 Link all'articolo : redhotcyber.com/post/le-bicicl…

#redhotcyber #news #intelligenzaartificiale #microsoft #satyanadella #iavanzata #evoluzionedellia #cambiodiapproccio

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

189 – Odiare le istituzioni è diventato normale. Le fake news ringraziano camisanicalzolari.it/189-odiar…
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Data center, droni e difesa: il nodo delle terre rare preoccupa molto gli Stati Uniti

📌 Link all'articolo : redhotcyber.com/post/data-cent…

#redhotcyber #news #statiuniti #cina #terreRare #economia #tecnologia #militaria #risorseStrategiche #fornitura

Belgio, per il responsabile della Cybersecurity “L’Europa ha perso Internet perché dipende dagli Usa”


@Informatica (Italy e non Italy 😁)
La superiorità degli Usa in materia di infrastrutture digitali è chiara, ma per l’Europa può diventare un rischio. Lo ha detto in una intervista al Financial Times il direttore del Cybersecurity Center del Belgio

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Una falla su WhatsApp viene corretta silenziosamente, ma la community non ci sta

📌 Link all'articolo : redhotcyber.com/post/una-falla…

#redhotcyber #news #whatsapp #privacysuweb #crittografia #sicurezzainformatica #protezionedatipersonali

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Microsoft elimina l’attivazione di Windows e Office via telefono

📌 Link all'articolo : redhotcyber.com/post/microsoft…

#redhotcyber #news #microsoft #windows #office #attivazioneonline #erroreattivazione #windows7 #office2010

Reviving ReBoot With a Tape Deck Repair


[Mark] shows off footage from a D1 master on the repaired deck

Do you remember ReBoot? If you were into early CGI, the name probably rings a bell, since when it premiered in 1994 it was the first fully computer-animated show on TV. Some time ago, a group found a pile of tapes from Mainframe Studios in Canada, the people behind ReBoot, and the computer historians amongst us were very excited… until they turned out to be digital broadcast master tapes. Exciting for fans of lost media, sure, but not quite the LTO backups of Mainframe’s SGI workstations some of us had hoped would turn up. Still, [Mark Westhaver], [Bryan Baker] and others at the “ReBoot Rewind” project have made great strides, to the point that in their latest update video they declare “We Saved ReBoot

What does it take to revive a 30-year-old television project? Well, as stated, they started with the tapes. These aren’t ordinary VHS tapes: the Sony D-1 tapes, which were also known by the moniker “4:2:2”, are a format that most people who didn’t work in the TV or film industry will have never seen, and the tape decks are rare as hen’s teeth these days. Just getting a working one, and keeping it working, was one of the biggest challenges [Mark] and Reboot Rewind faced. In the end it took three somewhat-dodgy machines long past their service lives and a miraculously located spare read/write head to get a stable scanning rate.

The uncompressed digital output of these tapes isn’t something you can just burn to a DVD, either. The 720 × 576 resolution video stream is captured raw, but there are minor editing tweaks that need to be made in addition to tape errors that have cropped up over the years, and those need to be dealt with before the video and audio data gets encoded into a modern format. The video briefly glosses [Bryan Baker]’s workflow to do just that. At least they aren’t stuck with terrible USB video capture dongles VHS lovers have to deal with. Even if you don’t care about ReBoot, this isn’t the only show that was archived on D1 tapes so that workflow might be of interest to media fans.

We covered ReBoot Rewind when they were first searching for tape decks, so it’s great to have an update. Alas, the rights holders haven’t yet decided how exactly they’re going to release this fine footage, so if like this author you have fond memories of ReBoot, you may have to wait a bit longer for a reWatch.

youtube.com/embed/L00jx-GH2w8?…


hackaday.com/2026/01/04/revivi…

Coupang, una violazione dati con terremoto al seguito: quale lezione dalla Corea del Sud


@Informatica (Italy e non Italy 😁)
Coupang, la più grande piattaforma e-commerce della Corea del Sud, è stata vittima di una violazione che ha esposto i dati di 33 milioni di clienti. Le critiche, sollevate anche dal legislatore, hanno causato un terremoto. Cosa è successo e quale rischio c’è che possa succedere anche in

Cybersecurity & cyberwarfare ha ricondiviso questo.

Russia-linked #APT UAC-0184 uses Viber to spy on Ukrainian military in 2025
securityaffairs.com/186571/apt…
#securityaffairs #hacking #malware #Russia #Ukraine
Cybersecurity & cyberwarfare ha ricondiviso questo.

Kimwolf botnet leverages residential proxies to hijack 2M+ Android devices
securityaffairs.com/186559/mal…
#securityaffairs #hacking #malware
in reply to Filippo Valsorda

yep, it's fairly understandable why dirhash was chosen; unfortunately, Go (among application ecosystems) is quite unique in having solved this problem. Someday, Nix will support extensible fixed-output primitives so that dirhash can be explained to Nix and then Go modules can be natively downloaded by Nix and fed to the rest of the Go packaging machinery.
Cybersecurity & cyberwarfare ha ricondiviso questo.

NEW: A hacktivist (@back2theRoot) dressed as Pink Ranger from the Power Rangers wiped three white supremacist websites on stage at the end of a talk at Chaos Communication Congress (39C3).

The hacker also published users’ data, including full profiles with pictures and geolocation, on the website okstupid.lol.

The three racist websites are still down, a week after the live hack.

techcrunch.com/2026/01/05/hack…

Questa voce è stata modificata (3 mesi fa)
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Smishing INPS 2026: rubano IBAN, documenti e selfie. Il CERT-AGID lancia l’allerta

📌 Link all'articolo : redhotcyber.com/post/smishing-…

#redhotcyber #news #smishing #inps #certagid #sicurezzainformatica #phishing #truffeinps #furtoinformazioni

Cybersecurity & cyberwarfare ha ricondiviso questo.

Password manager self-hosting: sostituiamo i grandi classici come Bitwarden?
#tech
spcnet.it/password-manager-sel…
@informatica
in reply to N_{Dario Fadda}

Certo, questo approccio ha un limite: se non puoi installare Tailscale su un dispositivo, quel dispositivo rimane fuori dalla rete. È il caso, tipicamente, dei computer aziendali bloccati.


Questa affermazione è falsa. Esistono soluzioni, incluse offerte nativamente da tailscale, che permettono a dispositivi non in rete di connettersi a servizi hostati via vpn, a patto che ci sia almeno un server che faccia da gateway connesso in rete.

Magari non è intuitivo e richiede un po' di tempo, ma è fattibile.

Questa voce è stata modificata (3 mesi fa)

Print Pixel Art to a Floppy Disk


The media in this post is not displayed to visitors. To view it, please log in.

Here at Hackaday we love floppy disks. While they are by no means a practical or useful means of storing data in the age of solid state storage, there is something special about the little floppy disc of magnetic film inside that iconic plastic case. That’s why we were so excited to see the tool [dbalsom] developed for printing pixel art in a floppy’s track timing diagrams!

Floppy timing diagrams are usually used to analyze the quality of an individual disk. It represents flux transitions within the a single floppy tack as a 2D graph. But it’s also perfectly possible to “paint” images on a floppy this way. Granted, you can’t see these images without printing out a timing diagram, but if your painting images onto a floppy, that’s probably the point.

This is where pbm2track tool comes in handy! It takes bitmap images and encodes them onto floppy emulators, or actual floppies. The results are quite excellent, with near-perfect recreation in floppy graphical views. The results on real floppies are also recognizable as the original image. The concept is similar to a previous tool [dbalsom] created, PNG2disk

If you too love the nearly forgotten physical likeness of the save button, make sure to check out this modern Linux on a floppy hack next!

Thanks [gloriouscow] for the tip!


hackaday.com/2026/01/04/print-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Kimwolf botnet leverages residential proxies to hijack 2M+ Android devices
securityaffairs.com/186559/mal…
#securityaffairs #hacking #malware
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Calcolo quantistico: la Cina supera la soglia di tolleranza ai guasti

📌 Link all'articolo : redhotcyber.com/post/calcolo-q…

#redhotcyber #news #informatica #computerquantistici #ricercascientifiche #tolleranzaaiguasti #zuchongzhi #tecnologia

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Sei generazioni di Windows a confronto: il vincitore è quello che tutti odiavano

📌 Link all'articolo : redhotcyber.com/post/sei-gener…

#redhotcyber #news #windows #microsoft #velocita #laptop #lenovothinkpad #test #confronto #windows10

Cybersecurity & cyberwarfare ha ricondiviso questo.

The cybercriminal behind the 2016 #Bitfinex hack has been released from prison early thanks to Trump’s 2018 First Step Act
securityaffairs.com/186551/cyb…
#securityaffairs #hacking #Bitcoin
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Siamo i copiaincollatori dell’AI camisanicalzolari.it/siamo-i-c…
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

PlayStation 5 violata alla radice: trapela la chiave segreta che protegge l’intera console

📌 Link all'articolo : redhotcyber.com/post/playstati…

#redhotcyber #news #cybersecurity #hacking #playstation5 #sony #bootrom #sicurezzainformatica #console

Cybersecurity & cyberwarfare ha ricondiviso questo.

VVS Stealer, a new python malware steals Discord credentials
securityaffairs.com/186542/mal…
#securityaffairs #hacking #malware
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

GH05TCREW realizza PentestAgent: il tool open source basato su AI per il pentest

📌 Link all'articolo : redhotcyber.com/post/gh05tcrew…

#redhotcyber #news #pentesting #opensource #python #linguaggimodelli #openai #windows #linux #macos

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Spyware: gli USA rimuovono le sanzioni agli sviluppatori dello spyware Predator

📌 Link all'articolo : redhotcyber.com/post/spyware-g…

#redhotcyber #news #intellexa #predator #spyware #sanzioni #dipartimentoDelTesoro #statiUniti #cybersecurity

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Arriva Rue: il nuovo linguaggio di programmazione dal creatore di Rust Steve Klabnik

📌 Link all'articolo : redhotcyber.com/post/arriva-ru…

#redhotcyber #news #linguaggiodiprogrammazione #sicurezzadellamemoria #garbagecollection #linguaggio

reshared this

Bicycle Tows 15,000 Pounds


The media in this post is not displayed to visitors. To view it, please log in.

An old joke in physics is that of the “spherical cow”, poking fun at some of the assumptions physicists make when tackling a new problem. Making the problem simple like this can help make its fundamentals easier to understand, but when applying these assumptions to real-world problems these assumptions are quickly challenged. Which is what happened when [Seth] from Berm Peak attempted to tow a huge trailer with a bicycle — while in theory the bike just needs a big enough gear ratio he quickly found other problems with this setup that had to be solved.

[Seth] decided on a tandem bike for this build. Not only does the second rider add power, but the longer wheelbase makes it less likely that the tongue weight of the trailer will lift the front wheel off the ground. It was modified with a Class 3 trailer hitch, as well as a battery to activate the electric trailer brakes in case of an emergency. But after hooking the trailer up the first time the problems started cropping up. At such a high gear ratio the bike is very slow and hard to keep on a straight line. Some large, custom training wheels were added between the riders to keep it stable, but even then the huge weight still caused problems with the chain and even damaged the bike’s freehub at one point.

Eventually, though, [Berm Peak] was able to flat tow a Ford F-150 Lightning pulling a trailer a few yards up a hill, at least demonstrating this proof of concept. It might be the absolute most a bicycle can tow without help from an electric motor, although real-world applications for something like this are likely a bit limited. He’s been doing some other bicycle-based projects with more utility lately, including a few where he brings abandoned rental e-bikes back to life by removing proprietary components.

youtube.com/embed/8hDQXP3xSj4?…


hackaday.com/2026/01/04/bicycl…

Modifying a QingPing Air Quality Monitor for Local MQTT Access


The media in this post is not displayed to visitors. To view it, please log in.

The QingPing Air Quality Monitor 2 is an Android-based device that not only features a touch screen with the current air quality statistics of the room, but also includes an MQTT interface that normally is used in combination with the QingPing mobile app and the Xiaomi IoT ecosystem. Changing it to report to a local MQTT server instead for integration with e.g. Home Assistant can be done in an official way that still requires creating a cloud account, or you can just do it yourself via an ADB shell and some file modifications as [ea] has done.

By default these devices do not enumerate when you connect a computer to their USB-C port, but that’s easily resolved by enabling Android’s developer mode. This involves seven taps on the Device Name line in the About section of settings. After this you can enter Developer Options to toggle on Debug Mode and Adbd Debugging, which creates the option to connect to the device via USB with ADB and open up a shell with adb shell.

From there you can shoot off the QingSnow2 app and the watchdog.sh that’s running in the background, disable IPv6 and edit /etc/host to redirect all the standard cloud server calls to a local server. Apparently there is even SSH access at this point, with root access and password rockchip. The MQTT configuration is found under /data/etc/ in settings.ini, which is used by the QingPing app, so editing redirects all that.

Of course, the device also queries a remote server for weather data for your location, so if you modify this you have to provide a proxy, which [ea] did with a simple MQTT server that’s found along with other files on the GitHub project page.


hackaday.com/2026/01/04/modify…