Salta al contenuto principale

Cybersecurity & cyberwarfare ha ricondiviso questo.


Cyberattacks Disrupt Communications at Wind, Solar, and Heat Facilities in Poland
securityaffairs.com/187503/apt…
#securityaffairs #hacking #Poland #Rusia

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


🚨 WalutaTu car valuation platform hit by data breach

Italian car valuation platform WalutaTu suffered a data breach with customer data allegedly exposed on dark web forums.

#ransomNews #databreach #automotive


Cybersecurity & cyberwarfare ha ricondiviso questo.


Azienda italiana all’asta nel Dark Web: bastano 1.500 dollari per il controllo totale

📌 Link all'articolo : redhotcyber.com/post/azienda-i…

#redhotcyber #news #cybercrime #mercatonero #trasformazionedigitale #cybersecurity #hacking #ransomware


Cybersecurity & cyberwarfare ha ricondiviso questo.


🔎 The AI social network risk nobody is watching

AI-driven social networks amplify manipulation, data harvesting and behavioral profiling. Algorithmic feedback loops, opaque models and weak governance could turn AI platforms into large-scale influence and surveillance systems.

We’ve dissected a bit, over the rising #ClawBot phenomenon: ransomnews.online/blog/theaiso…

#ransomNews #ai #socialmedia


Cybersecurity & cyberwarfare ha ricondiviso questo.


Sistemi SCADA a rischio: perché la sicurezza del file system conta più che mai

📌 Link all'articolo : redhotcyber.com/post/sistemi-s…

#redhotcyber #news #sicurezzainformatica #cybersecurity #vulnerabilita #scadasicurezza #iconicsvulnerabilità


Cybersecurity & cyberwarfare ha ricondiviso questo.


Vulnerabilità critica in Apache bRPC: esecuzione di comandi arbitrari sul server

📌 Link all'articolo : redhotcyber.com/post/vulnerabi…

Un team di ricerca di #CyberArk Labs ha individuato una falla critica nel diffuso #framework Apache bRPC, che permette l’esecuzione remota di comandi su un #server. Il problema di #sicurezza è stato classificato con l’identificatore CVE-2025-60021 e un livello di gravità pari a 9,8 secondo la scala #CVSS.

A cura di Bajram Zeqiri

#redhotcyber #news #cyberattack #cybersecurity #hacking #vulnerabilita #apache #brpc #sicurezzainformatica #ciberattacchi #vulnerabilitaapertura #protezioneinformatica #safetyinformatica #malware



Cybersecurity & cyberwarfare ha ricondiviso questo.


Questa è piuttosto grossa, ancora nel settore marittimo.


Crouching Typewriter, Hidden PC


The finished product

Go back a couple of generations, and rather than a laptop or a luggable, the office accessory of choice was a portable typewriter. As the 20th century wore on, the typewriter became electric before eventually being eclipsed by luggable and laptop computers. On YouTube, [Prototype] is turning back the clock, by turning an old Smith-Corona electric typewriter into a luggable computer– with a stretch goal of still being able to type.

Yeah, just gutting the typewriter and shoving an SBC inside wasn’t ambitious enough for [Prototype]: his goal is a working typewriter and an x86 gaming PC. To facilitate this, he guts the Smith-Corona keyboard, and 3D-prints a new top plate to add a little more vertical space in the old typewriter. The new top does recreate the original layout and the Corona switches get printed adapters to fit them to mechanical switches [Prototype] is using with a vibe-coded Arduino. Why one would bother with ChatGPT when QMK is right there, we could not say, but feel free to skip 6:20 to 15:00 if you’re watching the video but want to avoid that side quest.

Unfortunately, the “get the keyboard working” side-quest is either faked or deferred to video part II, which has not been posted yet. In this video he demonstrates that he can actuate a single hammer with a servo, but that’s a far cry from a working typewriter so, we’re really hoping he comes through on that promise in Part Two. Even if the build stops with just one hammer, that would give the tactile sound-and-feel that other builds turn to solenoids for. Squeezing a small-form-factor motherboard and graphics card into the old Smith-Corona is also going to be an interesting challenge. It’s certainly going to be a step up from using the keyboard as a terminal.

If you like this project but balk at the idea of destroying a working piece of vintage office equipment, it is possible to turn a typewriter into a USB keyboard non-invasively.

If you like this project at all, join us in thanking [Katie] for the tip. Not your cup of tea? Tell us what is, with a tip of your own.

youtube.com/embed/Bgk944awGcQ?…


hackaday.com/2026/01/30/crouch…



Writing an Optimizing Tensor Compiler from Scratch


Not everyone will write their own optimizing compiler from scratch, but those who do sometimes roll into it during the course of ever-growing project scope creep. People like [Michael Moroz], who wrote up a long and detailed article on the why and how. Specifically, a ‘small library’ involving a few matrix operations for a Unity-based project turned into a static optimizing tensor compiler, called TensorFrost, with a Python front-end and a shader-like syntax, all of which is available on GitHub.

The Python-based front-end implements low-level NumPy-like operations, with development still ongoing. As for why Yet Another Tensor Library had be developed, the reasons were that most of existing libraries are heavily focused on machine learning tasks and scale poorly otherwise, dynamic flow control is hard to implement, and the requirement of writing custom kernels in e.g. CUDA.

Above all [Michael] wanted to use a high-level language instead of pure shader code, and have something that can output graphical data in real-time. Taking the gamble, and leaning on LLVM for some parts, there is now a functional implementation, albeit with still a lot of work ahead.


hackaday.com/2026/01/30/writin…



Need a Curved Plastic Mesh? Print Flat, Curve Later


Need a plastic mesh in a custom pattern? 3D print it, no problem. But what if one needs a curved plastic mesh? That’s considerably harder to 3D print, but [Uncle Jessy]’s figured out a simple approach: 3D print the mesh flat, then break out a mold and a heat gun.

Of course, there are a few gotchas, but [Uncle Jessy] shares his tips for getting the most reliable results. The important part is to design and 3D print a mold that represents the final desired shape. Then print the mesh, and fit it into a frame. Heat things up with a heat gun, and press into the mold to deform the mesh while it’s still soft. It’s much easier seen than explained, so take a few moments to check out the video, embedded below the page break.
Custom eye inserts become a breeze.
Because the plastic in a mesh is so thin, [Uncle Jessy] says to keep the heat low and slow. The goal is to have the mesh stretch and deform, not melt.

Speaking of heat, when thermoforming, one usually needs to make the mold out of heat-resistant material. But the thermal mass of a mesh is so small that it really doesn’t matter much — there just isn’t enough heat trapped in the mesh to really damage a mold. As long as the mold is reasonably dense, there’s no need to go overboard with making it heat resistant.

The whole process takes a little practice, but since the meshes are so fast to print and use so little plastic it’s easy to experiment a little.

As for the meshes themselves, a simple way to print a mesh is just to print a disc with no top or bottom layers, only infill. Set the infill pattern to honeycomb, for example, for an easy hexagon mesh. We’ve seen a variant of this “exposed infill” idea used to create a desiccant container, and using it to print a mesh pattern easily is a neat trick, too.

Why might one need to reshape a mesh into a curve? Perhaps to custom-fit a costume piece, or make custom eye inserts for masks, as shown here. In any case, it’s a good technique to keep in the back of one’s mind, and if you put it to good use, drop us a tip!

youtube.com/embed/TsG89NgZJO8?…


hackaday.com/2026/01/30/need-a…



Ordering Pizza On Your Sega Dreamcast Is Very Clunky Indeed


If you’re ordering pizza these days, you’re probably using a smartphone app or perhaps still making a regular old phone call. If you’re creative and a little bit tricky, though, you can order pizza right from your Sega Dreamcast. You just need to jump through a few hoops, as demonstrated by [Delux] and [The Dreamcast Junkyard] in the recent past.

You used to be able to order pizza on the Dreamcast natively, all the way back in 1999. However, the modern Domino’s website doesn’t really work on the ancient Dreamcast browser anymore. The simple fact is that web technology has advanced a long way in the last couple of decades, and Sega didn’t exactly spend a lot of time maintaining a browser on a console that died mere months after its rivals hit the market.

Thus, to place a pizza order on the Dreamcast these days, you need to work within its limitations. [Delux] uses the Dreamcast with the Broadband Adapter to access a PC on the local network via the XDP web browser. That PC is hosting Web Rendering Proxy, a tool which converts complicated modern websites into something a simpler machine can parse. From there, it’s a matter of connecting to the Domino’s website, and slowly clicking through the online ordering pages. Between the proxy delay, the Dreamcast’s glacial processing speed, and the clunky Domino’s ordering interface, it takes ages. Never before has adding coupons felt like such a hassle. Still, after 15 minutes of fuss, the order is completed… and a short time later, a hot fresh pizza arrives.

It’s a fun hack, but really it’s the PC running the proxy that’s doing the heavy lifting. In 2026, it’s far more elegant to order a pizza from your Nintendo Wii.

youtube.com/embed/dEMqq7-8K5s?…


hackaday.com/2026/01/30/orderi…



Do Expensive Filaments Make 3D Printed Wrenches Better?


What filament is strongest? The real answer is “it depends”, but sometimes you have a simple question and you just want a simple answer. Like, which material makes the best 3D printed wrench? [My Tech Fun] printed a bunch of options to find out — including some expensive filaments — and got some interesting insights in the process.

His setup is simple: he printed a bunch of 13 mm open-end wrenches, and tested each one to failure by cranking on a clamped digital torque meter until the wrench failed by breaking, or skipping.

[My Tech Fun] tested a total of eighteen filaments, from regular basic PLA, PETG, ABS and ASA, and a variety of carbon fiber-infused filaments including PPA-CF. TPU is included for fun, and there’s also a wrench printed with continuous carbon fiber, which requires a special printer. More on that in a moment. First, let’s get to the results!
PETG wrench reinforced with continuous carbon fiber. The result is extremely stiff compared to without.
Unsurprisingly, TPU fared the worst at 0.8 nM which is roughly “unscrewing the cap of a water bottle” territory. Top performers included the wrench printed with continuous carbon fiber reinforcement (failing at 3.7 nM) and a couple printed in expensive PPA-CF (high-temperature nylon filament with carbon fiber) topped the list at 4.3 nM. Everything else landed somewhere in between, with plain PLA surprisingly outperforming some CF blends.

The continuous carbon fiber wrench was printed on a FibreSeeker printer, which reinforces a print with solid fibers embedded into the plastic instead of chopped particles, and such prints are noticeably more resistant to bending. Check out our earlier coverage for a closer look at what the FibreSeeker does.

This is a good time to mention that the wrench 3D model used is not at all optimized for best results with 3D printing. But that’s okay; this is really about the filaments, not the wrench.

The wrench model is just a way to test things in a familiar and highly visual, relatable way. You can see each one in action in the video below, and seeing [My Tech Fun] turn the wrenches gives a very good idea of just how much force is involved, with a relatable display of just how strong the different filaments are.

youtube.com/embed/b2a1h-bc2Zw?…


hackaday.com/2026/01/30/do-exp…


Cybersecurity & cyberwarfare ha ricondiviso questo.


Ex alleato avverte che il declino di Trump è "significativo" dopo il discorso disastroso

L'ex avvocato della Casa Bianca Ty Cobb ha affermato che il declino cognitivo di Donald Trump è "palpabile".

newrepublic.com/post/205474/do…

@politica

in reply to informapirata ⁂

No, ma dai!

Non sembrava assolutamente prima del discorso!

Questa voce è stata modificata (1 settimana fa)

Cybersecurity & cyberwarfare ha ricondiviso questo.


Secondo un rapporto, gli hacker russi hanno violato la rete elettrica polacca a causa della scarsa sicurezza.

Venerdì, il Computer Emergency Response Team (CERT) polacco, che fa parte del Ministero degli Affari Digitali, ha pubblicato un rapporto tecnico su un incidente avvenuto alla fine dello scorso anno, in cui presunti hacker del governo russo hanno hackerato parchi eolici e solari e una centrale termoelettrica.

techcrunch.com/2026/01/30/russ…

@informatica


Cybersecurity & cyberwarfare ha ricondiviso questo.


Sei senatori accusano il vice procuratore generale di un conflitto “evidente” sulle criptovalute, citando l’indagine di ProPublica

I senatori hanno presentato una lettera chiedendo al funzionario di alto livello del Dipartimento di Giustizia, Todd Blanche, di chiarire la legalità delle sue azioni, facendo riferimento al rapporto di ProPublica secondo cui possedeva almeno 159.000 dollari in asset correlati quando ha chiuso le indagini sulle criptovalute.

propublica.org/article/todd-bl…

@politica


Cybersecurity & cyberwarfare ha ricondiviso questo.


Le aziende dell'euro devono abbandonare il cloud dello Zio Sam e diventare native dell'UE

Nell'era di Trump-redux del 2026, le aziende europee stanno finalmente prendendo sul serio i dati, e questo significa fare i bagagli da Redmond a Seattle e trasferire i carichi di lavoro più sensibili a casa. Non si tratta solo di una messa in scena di conformità; è una vera e propria messa in scena di sicurezza economica nazionale.

theregister.com/2026/01/30/eur…

@politica

Questa voce è stata modificata (1 settimana fa)

Cybersecurity & cyberwarfare ha ricondiviso questo.


L'EFF chiuderà venerdì in solidarietà con la chiusura nazionale

@eff rimarrà chiusa venerdì 30 gennaio nell'ambito della chiusura nazionale in segno di protesta contro ICE e CBP e contro la brutalità e il terrore che loro e altre agenzie federali continuano a infliggere alle comunità di immigrati e a chiunque si schieri con loro.

«Non prendiamo questa decisione alla leggera, ma non resteremo in silenzio.»

eff.org/deeplinks/2026/01/eff-…

@politica

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


NEW: An informant told the FBI in 2017 that Jeffrey Epstein had a "personal hacker," according to a document released today.

The document does not name the hacker, but says he is Italian, developed and sold zero-days (iOS and Blackberry) to governments such as the U.K. and the United States, and even Hezbollah, which paid him with “a trunk of cash.”

techcrunch.com/2026/01/30/info…

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


I just bought a whole new server for the Geomys transparency services (CT log, tlog witness with SLA, more soon) using “PayPal Check out” and for some reason it was extremely funny to me.


Hackaday Podcast Episode 355: Person Detectors, Walkie Talkies, Open Smartphones, and a WiFi Traffic Light


Another chilly evening in Western Europe, as Elliot Williams is joined this week by Jenny List to chew the fat over the week’s hacks.

It’s been an auspicious week for anniversaries, with the hundredth since the first demonstration of a working television system in a room above a London coffee shop. John Logie Baird’s mechanically-scanned TV may have ultimately been a dead-end superseded by the all-electronic systems we all know, but the importance of television for the later half of the 20th century and further is beyond question.

The standout hacks of the week include a very clever use of the ESP32’s WiFi API to detect people moving through a WiFi field, a promising open-source smartphone, another ESP32 project in a comms system for cyclists, more cycling on tensegrity spokes, a clever way to smooth plaster casts, and a light sculpture reflecting Wi-Fi traffic. Then there are a slew of hacks including 3D printed PCBs and gem-cut dichroic prisms, before we move to the can’t-miss articles. There we’re looking at document preservation, and a wallow in internet history with a look at the Netscape brand.

As usual all the links you need can be found below, so listen, and enjoy!

html5-player.libsyn.com/embed/…

Or download the podcast old-school, with a direct link to the MP3 file in question.

Where to Follow Hackaday Podcast

Places to follow Hackaday podcasts:



Episode 354 Show Notes:

What’s that Sound?



News



Interesting Hacks of the Week:



Quick Hacks:



Can’t-Miss Articles:



hackaday.com/2026/01/30/hackad…



Whipping Up A Quick Adapter To Hack The Xbox 360


[Androxilogin] had a problem. An Xbox 360 Slim had shown up in the post, but failed to give much more than a beep when turned on. Disassembly revealed some missing components, but replacing them failed to breathe life into the beleaguered console. Deeper repair was needed, and that would require a special adapter which [Androxilogin] was able to whip up from scratch.

When it comes to the Corona models of the Xbox 360, it’s often necessary to use something called a “post-fix adapter” to do certain diagnostic and repair tasks. These adapters consist of a bracket which wraps around the CPU, and probes the solder ball for the POST_OUT signal which is otherwise difficult to access on the motherboard itself. Adapters are readily available online, and are usually manufactured as a PCB with a protruding contact to make a connection.

For [Androxilogin], though, time was short. Rather than wait for adapters to ship, it was quicker to whip up a custom piece to do the same job. This was achieved with a 3D print which was able to clamp around the CPU, while snugly holding a piece of tinned 30 AWG wire to poke the critical point beneath the chip. After a couple of attempts to get the sizing just right, [Androxilogin] was able to make the necessary connection which enabled installing Xell Loader on to the machine to bring it back to life.

If you’re eager to make your own post-fix adapter, files are available on Printables, with more details over on Reddit to boot. While the Xbox 360 is starting to suffer some awkward symptoms of age. we nevertheless still see a steady stream of hacks come in for this vintage machine. If you’re tackling your own retro console mods, be sure to notify the tipsline.


hackaday.com/2026/01/30/whippi…



Building Natural Seawalls To Fight Off The Rising Tide


These days, the conversation around climate change so often focuses on matters of soaring temperatures and extreme weather events. While they no longer dominate the discourse, rising sea levels will nonetheless still be a major issue to face as global average temperatures continue to rise.

This poses unique challenges in coastal areas. Municipalities must figure out how to defend their shorelines, or decide which areas they’re willing to lose. The City of Palo Alto is facing just this challenge, and is building a natural kind of seawall to keep the rising tides at bay.

Seawalls That Breathe


The traditional way to fight back against the sea is with seawalls. These typically consist of steep slopes constructed on the shoreline, which are designed to reflect wave energy back to the sea and stop it from eating away at the land. They are normally built using rocks, steel, or concrete walls to dissipate the energy of incoming waves. They are typically simple to design and construct, and prove relatively effective at staving off erosion. However, they can also be quite imposing and unsightly, and often do very little to support native fauna and flora.
The horizontal levee design (left) compared to a traditional rock-based seawall (right). The latter is simpler and quicker to construct, but is far less visually appealing and does little to support the local ecosystem. Credit: City of Palo Alto
The City of Palo Alto is taking an altogether different approach by building a horizontal levee to protect the shore of Harbor Marsh. It eschews the usual steeply sloped seawall concept entirely. Instead, the coast is to be given a gentle gradient constructed of earth, creating a so-called “ecotone slope”—a long, sloping habitat down to the water line. Where the tide meets the shore, native plantings will support a tidal marsh, transitioning to a freshwater marsh with different plants farther up the slope, with volunteers planting 35 species in all. It’s hoped that restoring these habitats in the area will provide support to species like the Ridgway’s rail and the salt marsh harvest mouse.
Wastewater is used to support the growth of native plant species, helping to create the transition between the freshwater marsh and the tidal marsh along the “ecotone slope.” Credit: City of Palo Alto
Furthermore, from the top of the horizontal levee, wastewater will be fed in to support the growth of native plants, which will work with the soil to filter out pollutants as it makes its way to the sea in a process referred to as “polishing treatment”. It’s not intended to remove heavy pollutants from the water; this work is handled at existing municipal water treatment facilities. What the levee can handle is soaking up some of the nitrogen and phosphorous content to support plants on the slope. This reduces the amount of these nutrients that gets released out into the bay, which can cause fish die-offs, algal blooms, and other undesirable consequences.
Volunteers came together to plant native species on the horizontal levee. Construction is expected to be completed by summer this year. Credit: City of Palo Alto
Due to its limited size, the horizontal levee will only handle 100,000 gallons of wastewater per day, which isn’t much against the 20 million gallons that currently flows out into the bay. Ultimately, that’s because the work at Harbor Marsh is a pilot project for the City of Palo Alto. Ideally, it will prove effective in both limiting coastal erosion as well as supporting native plants and animals. If it proves successful, it could become a strategy used elsewhere along the San Francisco coastline and beyond. The Bay Area as a whole needs to be protected against rising sea levels, as the name implies, so projects like this are a key focus as authorities plan for the future.

As it stands, large artificial seawalls probably aren’t going anywhere. It’s very straightforward to build massive concrete and steel structures to defend a piece of coastline. The engineering involved is well understood, and the construction process does not require particular finesse in the selection of plants or the maintenance of native habitats. However, in areas where it’s desirable to slow erosion in a greener fashion, horizontal levees could become popular. After all, it’s a lot nicer to stroll on a path alongside a burgeoning native marshland than it is to feel the sun bouncing off acres of harsh concrete. If the Harbor Marsh experiment works, expect to see similar projects take off in coastal areas around the world.


hackaday.com/2026/01/30/buildi…


Cybersecurity & cyberwarfare ha ricondiviso questo.


Aperti i battenti del primo negozio di robot umanoidi al mondo in Cina. Saremo pronti?

📌 Link all'articolo : redhotcyber.com/post/aperti-i-…

#redhotcyber #news #robotumanoidi #negozidelfuturo #assistenzarobot #intrattenimentorobot #wuhan


Cybersecurity & cyberwarfare ha ricondiviso questo.


NEW: Russian government hackers were able to break into parts of Poland's energy infrastructure thanks to default usernames and passwords and no multi-factor authentication, the Polish government said in a report.

facepalm.gif

techcrunch.com/2026/01/30/russ…

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Gli Stati Uniti hanno indagato sulle affermazioni secondo cui le chat di WhatsApp non sono private

Secondo alcune interviste e il rapporto di un agente visionati da Bloomberg News, le forze dell'ordine statunitensi stanno indagando sulle accuse mosse da ex collaboratori di Meta Platforms Inc. secondo cui il personale di Meta potrebbe accedere ai messaggi di WhatsApp, nonostante l'azienda abbia dichiarato che il servizio di chat è privato e crittografato.

finance.yahoo.com/news/us-inve…

@informatica

in reply to informapirata ⁂

chat private quelle di whatsapp? Per fortuna non sono più su meta (facebook) e uso WA solo per comunicazioni spicce con persone poco tecnologiche. Ma guarda caso anni fa ogni volta che partecipavo a una podistica, arrivavano sempre su meta pubblicità di attrezzature per la corsa. Secondo te da dove le pigliavano visto che su facebook non ho praticamente mai condiviso cosa come dove quando di sport? Mi sono risposta da sola pensando a whatsapp.
in reply to Elena Brescacin

Whatsapp è parte di Meta e suppongo che abbia gli stessi effetti collaterali di FB e IG, ossia privacy zero.

Cybersecurity & cyberwarfare ha ricondiviso questo.


Azienda automotive italiana nel mirino degli hacker: in vendita l’accesso per 5.000 dollari

📌 Link all'articolo : redhotcyber.com/post/azienda-a…

#redhotcyber #news #cybersecurity #hacking #automotive #sicurezzainformatica #venditaaccesso



Comprehensive Power Management for the Raspberry Pi


The Raspberry Pi has been a revolutionary computer in the maker space, providing a full Linux environment, GUI, and tons of GPIO and other interfacing protocols at a considerably low price. This wasn’t its original intended goal, though. Back in the early 2010s it was supposed to be an educational tool for students first, not necessarily a go-to for every electronics project imaginable. As such there are a few issues with the platform when being used this way, and [Vin] addresses his problems with its power management in his latest project.

[Vin]’s main issue is that, unlike a microcontroller, the Raspberry Pi doesn’t have a deep sleep function. That means that even when the operating system is shut down the computer is still drawing an appreciable amount of current, which will quickly drain some batteries. We’ve covered [Vin]’s farm and his use case for the Raspberry Pi in the past, but a quick summary is that these boards are being used in a very rugged environment where utility power isn’t as reliable as he would like.

In [Vin]’s post he not only outlines his design for the board but goes through his design process, starting by using discrete logic components and then trying out various microcontrollers until settling on an ATmega88. The microcontroller communicates with the Raspberry Pi over I2C where the Pi can request a power-down as well as a time for future power-on. A latching relay controlled by the microcontroller ensures the Pi doesn’t drain any battery while the ATmega can put itself into actual sleep in the meantime.

The build for this project goes into an impressive amount of detail, and not only are the designs and code available on the project’s GitHub page but [Vin] also wrote another blog post which uses this project to go over his design philosophy more broadly.


hackaday.com/2026/01/30/compre…



Malware diffusi su LinkedIn. Cosa sapere e a cosa fare attenzione


@Informatica (Italy e non Italy 😁)
I cyber criminali sfruttano i messaggi privati di LinkedIn per diffondere malware contenuti in finti documenti aziendali dai nomi pertinenti con le aziende e le attività professionali delle vittime designate. Cosa sapere, cosa fare e cosa non fare
L'articolo Malware diffusi su LinkedIn. Cosa sapere e a cosa fare

Sabrina Web 📎 reshared this.


Cybersecurity & cyberwarfare ha ricondiviso questo.


I replaced eight different 5V, 12V, and 20V power supplies (for network gear, ext. hard drive, Milk-V board, air monitor) with two large USB-C ones (and various USB-C PD trigger cables).

It might be the most satisfying thing I've done all year.

in reply to Filippo Valsorda

I ordered a batch of those with the same goal in mind. Unfortunately they didn't work at all. Tried various USB-PD supplies, cables, etc, no dice. They'd just power cycle at 5Hz.

Today I returned them and ordered some more from a different aliexpress seller. I hope the next batch work.

in reply to Filippo Valsorda

now we just need more multi-port USB-C PD power supplies which won't briefly cut power to all ports, if you plug something in…

Cybersecurity & cyberwarfare ha ricondiviso questo.


Ivanti corre ai ripari: falle zero-day colpiscono l’Endpoint Manager Mobile

📌 Link all'articolo : redhotcyber.com/post/ivanti-co…

#redhotcyber #news #cybersecurity #hacking #vulnerabilita #patch #ivanti #endpointmanager #mobile


Cybersecurity & cyberwarfare ha ricondiviso questo.


SmarterTools patches critical #SmarterMail flaw allowing code execution
securityaffairs.com/187496/sec…
#securityaffairs #hacking

Cybersecurity & cyberwarfare ha ricondiviso questo.


U.S. #CISA adds a flaw in #Ivanti #EPMM to its Known Exploited Vulnerabilities catalog
securityaffairs.com/187488/sec…
#securityaffairs #hacking



Companion MIDI Pedal Helps Roland Groovebox Along


The Roland SP-404 Mk2 is a popular groovebox that can deliver a great beat if you know how to use it. If you’re seeking greater control than is available out of the box, though, you might like to try a custom pedal built by [Romain Dereu].

The concept is simple enough—[Romain] whipped up a bespoke MIDI device to specifically control various features of the SP-404. It’s based on an Arduino Nano, though it could also be built with an Arduino Uno if so desired. The microcontroller sends the requisite MIDI messages out via its serial UART. The microcontroller is built into a pedal-style enclosure with a big toggle switch and a foot switch. This enables the triggering of various pads on the SP-404, with modes selected via the toggle.

It’s a simple build that opens up new possibilities when playing with the SP-404. If you’ve ever wanted a custom device to spit out some specific MIDI commands to control the synths or drum machines in your performance rig, this project is a great example of how easy this is to achieve. Meanwhile, if you’re whipping your own custom MIDI gear at home, we always love to see it land on our tipsline!


hackaday.com/2026/01/30/compan…


Cybersecurity & cyberwarfare ha ricondiviso questo.


#Empire #Market co-founder faces 10 years to life after guilty plea
securityaffairs.com/187478/cyb…
#securityaffairs #hacking

Cybersecurity & cyberwarfare ha ricondiviso questo.


🚀 AVVIATE LE ISCRIZIONI ALLA SETTIMA LIVE CLASS DEL CORSO "𝗗𝗔𝗥𝗞 𝗪𝗘𝗕 𝗘 𝗖𝗬𝗕𝗘𝗥 𝗧𝗛𝗥𝗘𝗔𝗧 𝗜𝗡𝗧𝗘𝗟𝗟𝗜𝗚𝗘𝗡𝗖𝗘" DI LIVELLO INTERMEDIO IN PARTENZA A MARZO (POSTI LIMITATI)

✅ Pagina del corso: redhotcyber.com/linksSk2L/acad…
✅ Presentazione del corso del prof. Pietro Melillo : youtube.com/watch?v=9VaQUnTz4J…
✅ Webinar introduttivo di presentazione al corso : youtube.com/watch?v=ExZhKqjuwf…

Per info e iscrizioni: 📱 💬 379 163 8765 ✉️ formazione@redhotcyber.com

#redhotcyber #formazione #formazioneonline #ethicalhacking #cti #cyberthreatintelligence #cybersecurity #cybercrime #cybersecuritytraining #cybersecuritynews #privacy #cti #cyberthreat #intelligence #infosec #corsi #corsiprartici #liveclass


Cybersecurity & cyberwarfare ha ricondiviso questo.


Il codice non mente: i legami segreti tra i gruppi hacker HoneyMyte e Mustang Panda

📌 Link all'articolo : redhotcyber.com/post/il-codice…

#redhotcyber #news #cyberspionaggio #hacking #malware #cybersecurity #minacceinformatica #honeymyte


Cybersecurity & cyberwarfare ha ricondiviso questo.


Elk Cloner: Il primo virus informatico della storia nacque come uno scherzo

📌 Link all'articolo : redhotcyber.com/post/nascita-v…

#redhotcyber #news #elkcloner #malware #virusinformatico #cybersecurity #storiadelinformatica #scherzoinformatico


Cybersecurity & cyberwarfare ha ricondiviso questo.


Vulnerabilità da score 10 in Johnson Controls Metasys: gli edifici intelligenti sono a rischio

📌 Link all'articolo : redhotcyber.com/post/vulnerabi…

#redhotcyber #news #cybersecurity #hacking #vulnerabilita #sicurezzainformatica #edificiintelligenti