Allarme CISA: exploit in corso contro VMware vCenter. Rischio RCE senza autenticazione
📌 Link all'articolo : redhotcyber.com/post/allarme-c…
#redhotcyber #news #cybersecurity #hacking #vulnerabilita #vmware #broadcom #cisa #sicurezzainformatica
Allarme CISA: exploit in corso contro VMware vCenter. Rischio RCE senza autenticazione
Scopri la vulnerabilità critica CVE-2024-37079 in VMware vCenter Server e come proteggere la tua rete aziendale da questo attacco.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
SSH over USB on a Raspberry Pi
Setting up access to a headless Raspberry Pi is one of those tasks that should take a few minutes, but for some reason always seems to take much longer. The most common method is to configure Wi-Fi access and an SSH service on the Pi before starting it, which can go wrong in many different ways. This author, for example, recently spent a few hours failing to set up a headless Pi on a network secured with Protected EAP, and was eventually driven to using SSH over Bluetooth. This could thankfully soon be a thing of the past, as [Paul Oberosler] developed a package for SSH over USB, which is included in the latest versions of Raspberry Pi OS.
The idea behind rpi-usb-gadget is that a Raspberry Pi in gadget mode can be plugged into a host machine, which recognizes it as a network adapter. The Pi itself is presented as a host on that network, and the host machine can then SSH into it. Additionally, using Internet Connection Sharing (ICS), the Pi can use the host machine’s internet access. Gadget mode can be enabled and configured from the Raspberry Pi Imager. Setting up ICS is less plug-and-play, since an extra driver needs to be installed on Windows machines. Enabling gadget mode only lets the selected USB port work as a power input and USB network port, not as a host port for other peripherals.
An older way to get USB terminal access is using OTG mode, which we’ve seen used to simplify the configuration of a Pi as a simultaneous AP and client. If you want to set up headless access to Raspberry Pi desktop, we have a guide for that.
Thanks to [Gregg Levine] for the tip!
This Unlikely Microsoft Prediction Might Just Hit The Mark
It’s fair to say that there are many people in our community who just love to dunk on Microsoft Windows. It’s an easy win, after all, the dominant player in the PC operating system market has a long history of dunking on free software, and let’s face it, today’s Windows doesn’t offer a good experience. But what might the future hold? [Mason] has an unexpected prediction: that Microsoft will eventually move towards offering a Windows-themed Linux distro instead of a descendant of today’s Windows.
The very idea is sure to cause mirth, but on a little sober reflection, it’s not such a crazy one. Windows 11 is slow and unfriendly, and increasingly it’s losing the position once enjoyed by its ancestors. The desktop (or laptop) PC is no longer the default computing experience, and what to do about that must be a big headache for the Redmond company. Even gaming, once a stronghold for Windows, is being lost to competitors such as Valve’s Steam OS, so it wouldn’t be outlandish for them to wonder whether the old embrace-and-extend strategy could be tried on the Linux desktop.
We do not possess a working crystal ball here at Hackaday, so we’ll hold off hailing a Microsoft desktop Linux. But we have to admit it’s not an impossible future, having seen Apple reinvent their OS in the past using BSD, and even Microsoft bring out a cloud Linux distro. If you can’t wait, you’ll have to make do with a Windows skin, WINE, and the .NET runtime on your current Linux box.
Inside a Sketchy Mains Voltage Touch Control Dimmer
In [Big Clive]’s recent grab bag of tat ordered from Chinese commerce platforms, there were two touch light control boxes that can turn any ungrounded conductive surface into a mains load dimmer control. Of course, the primary reason for the purchase was a teardown, and a teardown we got.
These unassuming little boxes are built around the Tontek TT6061A, listed as a ‘touch dimmer’, which uses a triac to control the output current. There are four levels, ranging from off to full brightness, before the next touch event turns the output off again.
With the output off, [Clive] measured 0.7 W power usage. After popping open the plastic enclosure, the circuitry turned out to largely follow the recommended application circuit from the datasheet — as can be seen in the above screenshot — with apparently a few cost optimizations, in the form of omitted diodes and a capacitor.
The problem with these devices is that they are only really suitable for dimming low-power resistive loads like incandescent lights, with LED lights likely requiring the unpopulated capacitor spot on the PCB to be populated to tweak the chip’s triac timing, among other changes. There are also the slight issues with no real concern with them radiating EMI, and the exciting possibility of getting shocked at mains voltage without at least a class-Y capacitor installed.
Perhaps using a capacitive touch controller instead that works through plastic, for example, isn’t such a crazy alternative here, especially since they’re not really much more expensive and less likely to shock you. Want to create your own triac designs? We have just the post to get you started.
youtube.com/embed/J6cFAqZdzFw?…
Commodore 64 Helps Revive the BBS Days
Before the modern Internet existed, there were still plenty of ways of connecting with other computer users “online”, although many of them might seem completely foreign to those of us in the modern era. One of those systems was the Bulletin Board System, or BBS, which would have been a single computer, often in someone’s home, connected to a single phone line. People accessing the BBS would log in if the line wasn’t busy, leave messages, and quickly log out since the system could only support one user at a time. While perhaps a rose-tinted view, this was a more wholesome and less angsty time than the modern algorithm-driven Internet, and it turns out these systems are making a bit of a comeback as a result.
The video by [The Retro Shack] sets up a lot of this history for context, then, towards the end, uses a modern FPGA-based recreation called the Commodore 64 Ultimate to access a BBS called The Old Net, a modern recreation of what these 80s-era BBS systems were like. This involves using a modern networking card that allows the C64 to connect to Wi-Fi access points to get online instead of an old phone modem, and then using a terminal program called CCGMS to connect to the BBS itself. Once there, users can access mail, share files, and even play a few games.
While the video is a very basic illustration of how these BBS systems worked and how to access one, it is notable in that it’s part of a trend of rejecting more modern technology and systems in favor of older ones, where the users had more control. A retro machine like a C64 or Atari is not required either; modern operating systems can access these with the right terminal program, too. A more in-depth guide to the BBS can be found here for those looking to explore, and we’ve also seen other modern BBS systems recently.
Thanks to [Charlie] for the tip!
youtube.com/embed/A2x3TKRB5X4?…
reshared this
Linux 7.0 dice addio alla reliquia HIPPI: eliminato un pezzo di storia del supercomputing
📌 Link all'articolo : redhotcyber.com/post/linux-7-0…
#redhotcyber #news #linux #kernel #linux7 #hippi #rete #interfaccia
Linux 7.0 dice addio alla reliquia HIPPI: eliminato un pezzo di storia del supercomputing
Linux 7.0 rimuoverà il supporto per HIPPI, un protocollo datato per il trasferimento dati. Scopri cosa significa questa scelta per gli utenti e gli sviluppatori.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
RE: infosec.exchange/@securityaffa…
Mica tanto "possiile", cara Nike =)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187303/dat…
#securityaffairs #hacking
Nike is investigating a possible data breach, after WorldLeaks claims
Nike is investigating a possible cyber incident after the WorldLeaks group claimed it stole data from the company’s systems.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Meloni chiede una squadra congiunta ITA-CH per investigare sulle cause e sulle negligenze al Le Constellation.
La motivazione?
In CH non abbiamo ingerenze politiche nelle indagini di polizia e questa cosa non piace alla Gioggia nazionale.
Le responsabilità ci sono, le vittime ci sono e nessuna giustizia su carta le renderà alle loro famiglie.
Ma smettetela, italioti politicanti, di usare la leva della "giustizia per le vittime" quando non sapete ancora dare risposta alle vittime di Garlasco, via Poma, Erba, Mazara, Brembate, Cogne e tutte le altre vittime che non erano così mainstream da finire per anni nelle cronache.
reshared this
This Script Removes the AI Features From Chrome, Edge, and Firefox
This script disables AI and other annoyances in all major browsers.Justin Pot (Lifehacker)
reshared this
17 porta male, così come queste estensioni.
lifehacker.com/tech/delete-mal…
If You've Installed Any of These 17 Browser Extensions, Delete Them Now
These popular add-ons have been found across Chrome, Firefox, and Edge.Emily Long (Lifehacker)
reshared this
Interessante analisi che mostra come l’algoritmo di #X, sotto il dominio di Musk, amplifichi la polarizzazione, premiando i contenuti estremi e alterando il comportamento degli utenti.
Le dinamiche di visibilità spingono gli utenti ad adattarsi a quello che viene mostrato (scelto o meno, schifo o meno), con la scelta finale: disimpegnarsi (vabbé, resto fino a un certo punto) o lasciare la piattaforma - evidenziando il potere algoritmico influisca molto sul discorso pubblico.
L'articolo di partenza è di @valigiablu qui: valigiablu.it/identikit-algori…
Per la parte tecnica, il post di Andrea qui: x.com/Pinperepette/status/2015…
Identikit dell'algoritmo di Musk: restare o lasciare X? - Valigia Blu
L'algoritmo di X non premia la verità, ma l'attenzione sostenuta. Tu pensi di resistere postando contenuti "di qualità", ma stai già imparando a scrivere come vuole lui.Bruno Saetta (Valigia Blu)
SnowSnac likes this.
reshared this
securityaffairs.com/187299/mal…
#securityaffairs #hacking #malware
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 81
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscapePierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
La bellezza dei response copia-incollati e spacciati come contenuti originali è pari solo alla credibilità di chi li pubblica.
Si riconoscono, e anche quelli meno evidenti hanno pattern che venogno ricoosciuti tramite tool appositi.
Di questo passo, già il giornalismo è morto (quello vero, fatto di giornalisti veri, fortuna sopravvive), ogni notizia spacciata in rete sarà falsa e/o dubitabile.
E nessuno sarà più in grado di scrivere due righe senza consultare l'AI.
#stikazzi preferisco spellarmi le mani sulla tastiera e scrivere contenuti originali, che non si perdono nella valle di lacrime artificiale.
/rant
Cybersecurity & cyberwarfare reshared this.
LA GUERRA: ALCUNE SUE DEFINIZIONI E CARATTERISTICHE (QUINTA PARTE)
@Informatica (Italy e non Italy 😁)
La guerra e le componenti “esterne”
Tra le varie “componenti esterne” della guerra vi sono l’ambiente naturale che può influire sull’economia, le tecnologie e le capacità militari di una popolazione.
L'articolo LA GUERRA: ALCUNE SUE DEFINIZIONI E CARATTERISTICHE (QUINTA PARTE)
Informatica (Italy e non Italy) reshared this.
Silenzio.
HR deglutisce.
Il CISO alza lo sguardo. 👀
Perché la vera cybersecurity non premia chi attacca,
ma chi pensa come un attaccante per difendere meglio.
🔐 Non è glorificazione dell’hacking
🔍 è consapevolezza del rischio
🛡️ è prevenzione prima dell’incidente
💭 Riflessione finale
non serve aspettare il crimine per parlare di sicurezza.
Serve ascoltare chi sa dove guardare prima che sia troppo tardi.
#redhotcyber #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity #memetime #meme
Ricardo Antonio Piana likes this.
Cybersecurity & cyberwarfare reshared this.
Lo scandalo Grok: 3 milioni di immagini a sfondo sessuale generate in 11 giorni
📌 Link all'articolo : redhotcyber.com/post/lo-scanda…
#redhotcyber #news #intelligenzaartificiale #elonmusk #grok #contenutosessuale #minori #ccdh #indagine
Lo scandalo Grok: 3 milioni di immagini a sfondo sessuale generate in 11 giorni
Grok, lo strumento di intelligenza artificiale di Elon Musk, ha generato milioni di immagini a sfondo sessuale, comprese 23.000 con minori, in soli 11 giorni.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
208 - Come deve cambiare la scuola ai tempi dell’AI - Marco Camisani Calzolari
Come deve cambiare la scuola ai tempi dell’Intelligenza Artificiale I compiti non li fanno più gli studenti. Li fa l’Intelligenza Artificiale. E la scuola deve urgentemente cambiare, profondamente.Web Staff MCC (Marco Camisani Calzolari)
Cybersecurity & cyberwarfare reshared this.
“Ho rubato 120.000 Bitcoin”: la confessione dell’hacker di Bitfinex che ora vuole difendere il cyberspazio
📌 Link all'articolo : redhotcyber.com/post/ho-rubato…
#redhotcyber #news #hacker #cybersecurity #criptovalute #sicurezzainformatica #pentimento #secondaschance
“Ho rubato 120.000 Bitcoin”: la confessione dell’hacker di Bitfinex che ora vuole difendere il cyberspazio
L'ex hacker Ilya Lichtenstein, che ha rubato 120.000 bitcoin, vuole cambiare vita e lavorare nella sicurezza informatica dopo aver trascorso quasi 4 anni in carcere.Redazione RHC (Red Hot Cyber)
Ricardo Antonio Piana likes this.
Cybersecurity & cyberwarfare reshared this.
Building A Little Quadruped Robot
Robots don’t have to be large and imposing to be impressive. As this tiny quadruped from [Dorian Todd] demonstrates, some simple electronics and a few servos can create something altogether charming on their own.
This little fellow is named Sesame. A quadruped robot, it’s built out of 3D-printed components. Each leg features a pair of MG90S hobby servos, one of which rotates the leg around the vertical axis, while the other moves the foot. The ESP32 microcontroller controls all eight servos, enabling remote control of Sesame via its built-in wireless connectivity. Sesame also gets a 128×64 OLED display, which it uses to display a range of emotions.
Mechanically, the Sesame design isn’t particularly sophisticated. Where it shines is that even with such a limited range of motion, between its four legs and its little screen, this robot can display a great deal of emotion. [Dorian] shows this off in the project video, in which Sesame scampers around a desktop with all the joy and verve of a new puppy. It’s also very cheap; [Dorian] estimates you can build your own Sesame for about $60. Files are on GitHub for the curious.
If you prefer your quadrupeds built for performance over charm, you might consider an alternative build. Video after the break.
youtube.com/embed/1UDsWkcQZhc?…
Tamper Detection with Time-Domain Reflectometry
For certain high-security devices, such as card readers, ATMs, and hardware security modules, normal physical security isn’t enough – they need to wipe out their sensitive data if someone starts drilling through the case. Such devices, therefore, often integrate circuit meshes into their cases and regularly monitor them for changes that could indicate damage. To improve the sensitivity and accuracy of such countermeasures, [Jan Sebastian Götte] and [Björn Scheuermann] recently designed a time-domain reflectometer to monitor meshes (pre-print paper).
Many meshes are made from flexible circuit boards with winding traces built into the case, so cutting or drilling into the case breaks a trace. The problem is that most common ways to detect broken traces, such as by resistance or capacitance measurements, aren’t easy to implement with both high sensitivity and low error rates. Instead, this system uses time-domain reflectometry: it sends a sharp pulse into the mesh, then times the returning echoes to create a mesh fingerprint. When the circuit is damaged, it creates an additional echo, which is detected by classifier software. If enough subsequent measurements find a significant fingerprint change, it triggers a data wipe.
The most novel aspect of this design is its affordability. An STM32G4-series microcontroller manages the timing, pulse generation, and measurement, thanks to its two fast ADCs and a high-resolution timer with sub-200 picosecond resolution. For a pulse-shaping amplifier, [Jan] and [Björn] used the high-speed amplifiers in an HDMI redriver chip, which would normally compensate for cable and connector losses. Despite its inexpensive design, the circuit was sensitive enough to detect when oscilloscope probes contacted the trace, pick up temperature changes, and even discern the tiny variations between different copies of the same mesh.
It’s not absolutely impossible for an attacker to bypass this system, nor was it intended to be, but overcoming it would take a great deal of skill and some custom equipment, such as a non-conductive drill bit. If you’re interested in seeing such a system in the real world, check out this teardown of a payment terminal. One of the same authors also previously wrote a KiCad plugin to generate anti-tamper meshes.
Thanks to [mark999] for the tip!
Wireless MIDI Controller Has Lots Of Knobs
We live in a golden age for MIDI controllers. [rheslip]’s contribution to the milieu is a twisty take on the format, in that it’s covered in an array of knobs. Thus the name—Twisty 2.
The controller can be built using the Raspberry Pi Pico or Pico 2. It’s set up to read a 4×4 array of clickable encoders, plus two bonus control knobs to make 18 in total, which are read via a 74HC4067 analog mux chip. There’s also an SK6812 RGB LED for each encoder, and an OLED display for showing status information. MIDI output is via USB, or, if you purchased the W variant of the Pi Pico/Pico 2, it can operate wirelessly over Bluetooth MIDI instead. The controller is set up to send MIDI CC messages, program changes, or note on/off messages depending on its configuration. Flipping through different modes is handled with the bottom set of encoders and the OLED display.
Few musicians we’ve ever met have told us they learned how to play the encoders, and yet. The cool thing about building your own MIDI controller is you can tune it to suit whatever method of performance strikes your fancy. If the name of this build alone has you inspired, you could always whip up a MIDI controller out of a Twister mat.
youtube.com/embed/-W1Gd_hKzS8?…
Ancient Egyptian Flatness
Making a truly flat surface is a modern engineering feat, and not a small one. Even making something straight without reference tools that are already straight is a challenge. However, the ancient Egyptians apparently made very straight, very flat stone work. How did they do it? Probably not alien-supplied CNC machines. [IntoTheMap] explains why it is important and how they may have done it in a recent video you can see below.
The first step is to define flatness, and modern mechanical engineers have taken care of that. If you use 3D printers, you know how hard it is to even get your bed and nozzle “flat” with respect to each other. You’ll almost always have at least a 100 micron variation in the bed distances. The video shows how different levels of flatness require different measurement techniques.
The Great Pyramid’s casing stones have joints measuring 0.5 mm, which is incredible to achieve on such large stones with no modern tools. A stone box in the Pyramid of Seostris II is especially well done and extremely flat, although we can make things flatter today.
The main problem with creating a flat surface is that to do a good job, you need some flat things to start with. However, there is a method from the 19th century that uses three plates and multiple lapping steps to create three very flat plates. In modern times, we use a blue material to indicate raised areas, much as a dentist makes you chomp on a piece of paper to place a crown. There are traces of red ochre on Egyptian stonework that probably served the same purpose.
Lapping large pieces is still a challenge, but moving giant stones at scale appears to have been a solved problem for the Egyptians. Was this the method they used? We don’t know, of course. But it certainly makes sense.
It would be a long time before modern people could make things as flat. While we can do even better now, we also have better measuring tools.
youtube.com/embed/vhv8fAqN1cw?…
Reviewing Tweezers for Microsoldering and SMD Work
Attributed to Picasso was the notion that when art critics get together they talk about content, style, trend, and meaning; but that when painters get together they talk about where to get the best turpentine. We can extend that sentiment into the digital age by saying that when philosophers get together they talk about ideas, theory, and meaning; but when hackers get together they talk about where to get the best tweezers.
In this video [nanofix] runs us through his collection of tweezers talking about what he likes and doesn’t like for each. If you’re just getting into microsoldering this video will have some tips about where you should start, and if you’ve been soldering tiny stuff for a while you might find some ideas for a helpful new bit of kit, or two.
If you’re interested in tweezers and novel applications you might want to check out “smart” tweezers, which can read capacitance and resistance values on the fly. Or read about a suction based SMD tool, which can securely hold SMD components with less risk of them flying across the bench and disappearing forever into the carpet on the floor.
youtube.com/embed/gt9MdfWkz1k?…
securityaffairs.com/187290/bre…
#securityaffairs #hacking #malware
Security Affairs newsletter Round 560 by Pierluigi Paganini – INTERNATIONAL EDITION
A new round of weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs in your email boxPierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
BitLocker: chiavi fuori dal cloud. Guida alla crittografia di Windows, passo per passo
#tech
spcnet.it/bitlocker-chiavi-fuo…
@informatica
reshared this
Crazy Old Machines
Al and I were talking about the IBM 9020 FAA Air Traffic Control computer system on the podcast. It’s a strange machine, made up of a bunch of IBM System 360 mainframes connected together to a common memory unit, with all sorts of custom peripherals to support keeping track of airplanes in the sky. Absolutely go read the in-depth article on that machine if it sparks your curiosity.
It got me thinking about how strange computers were in the early days, and how boringly similar they’ve all become. Just looking at the word sizes of old machines is a great example. Over the last, say, 40 years, things that do computing have had 4, 8, 16, 32, or even 64-bit words. You noticed the powers-of-two trend going on here, right? Basically starting with the lowly Intel 4004, it’s been round numbers ever since.
Harvard Mark I, by [Topory]On the other side of the timeline, though, you get strange beasts. The classic PDP-8 had 12-bit words, while its predecessors the PDP-6 and PDP-1 had 36 bits and 18 bits respectively. (Factors of six?) There’s a string of military guidance computers that had 27-bit words, while the Apollo Guidance computer ran 15-bit words. UNIVAC III had 25-bit words, putting the 23-bit Harvard Mark I to shame.
I wasn’t there, but it gives you the feeling that each computer is a unique, almost hand-crafted machine. Some must have made their odd architectural choices to suit particular functions, others because some designer had a cleaver idea. I’m not a computer historian, but I’m sure that the word lengths must tell a number of interesting stories.
On the whole, though, it gives the impression of a time when each computer was it’s own unique machine, before the convergence of everything to roughly the same architectural ideas. A much more hackery time, for lack of a better word. We still see echoes of this in the people who make their own “retro” computers these days, either virtually, on a breadboard, or emulated in the fabric of an FPGA. It’s not just nostalgia, though, but a return to a time when there was more creative freedom: a time before 64 bits took over.
This article is part of the Hackaday.com newsletter, delivered every seven days for each of the last 200+ weeks. It also includes our favorite articles from the last seven days that you can see on the web version of the newsletter. Want this type of article to hit your inbox every Friday morning? You should sign up!
Isolated AC/DC Power Supply and Testing Station for 230 V Devices
When you’re testing or debugging some mains-powered gear, plugging it directly into the outlet can often be an exciting proposition. If such excitement is not really your thing, you can opt for an isolation transformer and other types of safeties. In the case of [Michał Słomkowski], he opted to take a few steps further by modding a vintage East-German isolating variac with a broken amp meter into an isolated AC/DC power supply and testing station.
The core is formed by the isolated variable transformer, to which a configurable DC output section, a current limiter and digital voltage and current read-outs were added. This enables a variable AC output of 0 – 330 VAC and 0 – 450 VDC on their respective terminals, with the incandescent light bulb providing an optional current limiter.
In its final configuration [Michał] has been using the device for the past four years now for a range of tasks, including the simulating of various undesirable mains power conditions, varying the speed of an old Soviet-era drill, powering vacuum tube devices, capacitor reforming and of course running 100-120 VAC devices from e.g. the US.
As far as feature set goes, we have to admit that it is an impressive device, indeed. Although some parts of it are clearly playing it fast and loose with best practices, with [Michał] admitting to not being an electrician, it was clearly engineered well enough to survive a few years of use, something which cannot be said for even professional laboratory equipment these days.
securityaffairs.com/187279/sec…
#securityaffairs #hacking
Osiris ransomware emerges, leveraging BYOVD technique to kill security tools
Researchers identified a new Osiris ransomware used in a November 2025 attack, abusing the POORTRY driver via BYOVD to disable security toolsPierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Scuola, Sicurezza e Capacità Nazionale: perché il 2026 è prigioniero dei problemi del 1960
📌 Link all'articolo : redhotcyber.com/post/scuola-si…
#redhotcyber #news #educazione #scuola #capacitanazionale #crisedemografica #minaccecyber #rigoreeducativo
Scuola, Sicurezza e Capacità Nazionale: perché il 2026 è prigioniero dei problemi del 1960
La scuola italiana nel 2026: come la demografia e la formazione influenzano la capacità nazionale e la sicurezza. Scopri i dati e le strategie per un futuro resiliente.Roberto Villani (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
AGI: i CEO di Google e Anthropic lanciano l’allarme a Davos – il mondo non sarà pronto!
📌 Link all'articolo : redhotcyber.com/post/agi-i-ceo…
#redhotcyber #news #intelligenzaartificiale #deepseek #gemini #claude #ia #worldEconomicForum #forumEconomicoMondiale #DemisHassabis
AGI: i CEO di Google e Anthropic lanciano l’allarme a Davos – il mondo non sarà pronto!
I CEO di Google DeepMind e Anthropic esprimono opinioni diverse sul futuro dell'IA, sui rischi e sull'impatto sulla società.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187267/sec…
#securityaffairs #hacking
U.S. CISA adds a flaw in Broadcom VMware vCenter Server to its Known Exploited Vulnerabilities catalog
The U.S. CISA adds a flaw impacting Broadcom VMware vCenter to its Known Exploited Vulnerabilities catalog.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Boycott #MilanoCortina! L'ICE in Italia per la "sicurezza" delle Olimpiadi: “Aiutiamo il servizio di sicurezza Usa affiancando la vostra polizia”
Invece che bandirla come organizzazione terroristica, l'abbiamo invitata a casa nostra per gestire la sicurezza in tutto il periodo delle #Olimpiadi e #Paralimpiadi invernali di Milano-Cortina, dal 6 febbraio al 15 marzo. Ed è già presente nella sede di Roma!
Il post di @smaurizi sul #FattoQuotidiano
ilfattoquotidiano.it/in-edicol… (PAYWALL)
Milano-Cortina, la famigerata Ice arriva in Italia per la sicurezza delle Olimpiadi
Altro che spirito olimpicoDall’omicidio di Renee Good in Minnesota fino ai Giochi di Milano-Cortina: “Aiutiamo il servizio di sicurezza Usa affiancando la vostra polizia”Stefania Maurizi (Il Fatto Quotidiano)
like this
reshared this
Politica interna, europea e internazionale reshared this.
Piantedosi non smentisce: «“Non risulta”, ha detto, precisando che ogni delegazione protegge i propri partecipanti come ritiene opportuno. Ha sottolineato che, in caso di arrivo, gli agenti americani si coordinerebbero con le forze italiane, una prassi definita normale e non un’ingerenza. Piantedosi ha inoltre ricordato che simili misure di sicurezza sono comuni durante visite di alti rappresentanti stranieri.»
tv.alanews.it/2026/01/24/milan…
Milano-Cortina, Piantedosi: “Presenza Ice non confermata, prassi normale per la sicurezza” - alanews TV | Ultime notizie in tempo reale dall'Italia e dal mondo
Il ministro dell’Interno rassicura sulla gestione della sicurezza per le Olimpiadi invernali 2026: collaborazione internazionale e coordinamento con le autorità italiane restano centrali Milano, 24 gennaio 2026 – Il ministro dell’Interno, Matteo Pian…Redazione (alanews TV | Ultime notizie in tempo reale dall'Italia e dal mondo)
reshared this
reshared this
Credo dipenda dal diverso potere che il Presidente americano ha su i corpi di polizia. Le Agenzie federali dipendono dal Presidente. Altri corpi di polizia invece sono dipendenti dai rispettivi Stati. Non dobbiamo dimenticare che gli USA sono una federazione di Stati che mantengono una considerevole indipendenza.
Politica interna, europea e internazionale reshared this.
Politica interna, europea e internazionale reshared this.
Un browser funzionante creato con l’AI con 3 milioni di righe di codice: svolta o illusione?
📌 Link all'articolo : redhotcyber.com/post/un-browse…
#redhotcyber #news #svilupposoftware #browser #gpt5 #intelligenzaartificiale #rust #javascript #webdevelopment #programmazione
Un browser funzionante creato con l'AI con 3 milioni di righe di codice: svolta o illusione?
Un team di sviluppatori crea un browser con GPT-5.2, ma gli esperti sono scettici sui risultati. Scopri di più su questo progetto ambizioso.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Environmental Monitoring on the Cheap
If there is one thing we took from [azwankhairul345’s] environmental monitor project, it is this: sensors and computing power for such a project are a solved problem. What’s left is how to package it. The solution, in this case, was using recycled plastic containers, and it looks surprisingly effective.
A Raspberry Pi Pico W has the processing capability and connectivity for a project like this. A large power bank battery provides the power. Off-the-shelf sensors for magnetic field (to measure anemometer spins), air quality, temperature, and humidity are easy to acquire. The plastic tub that protects everything also has PVC pipe and plastic covers for the sensors. Those covers look suspiciously like the tops of drink bottles.
We noted that the battery bank inside the instrument doesn’t have a provision for recharging. That means the device will go about two days before needing some sort of maintenance. Depending on your needs, this could be workable, or you might have to come up with an alternative power supply.
This probably won’t perform as well as a Hoffman box-style container, and we’ve seen those crop up, too. There are a number of ways of sealing things against the elements.
Kimwolf: la botnet IoT che si muove silenziosa tra reti aziendali e governative
📌 Link all'articolo : redhotcyber.com/post/kimwolf-l…
#redhotcyber #news #cybersecurity #hacking #iot #malware #botnet #sicurezzainformatica #minacceinformatica #proxyresidenziali
Kimwolf: la botnet IoT che si muove silenziosa tra reti aziendali e governative
Scopri Kimwolf, la botnet IoT che ha compromesso milioni di dispositivi e rappresenta una minaccia silenziosa per le reti aziendali e governative.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
NoName057(16) colpisce l’Italia 487 volte negli ultimi 3 mesi: l’ondata DDoS non si ferma
📌 Link all'articolo : redhotcyber.com/post/noname057…
#redhotcyber #news #cybersecurity #hacking #ddos #attacchidDos #gruppihacktivisti #sicherzainformatica #italiahacktivisti #nome057
NoName057(16) colpisce l’Italia 487 volte negli ultimi 3 mesi: l’ondata DDoS non si ferma
L'Italia è stata colpita da 487 attacchi DDoS tra ottobre 2024 e gennaio 2026, secondo il gruppo hacktivista NoName057(16).Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Cavi Sottomarini: allarmi ignorati e processi incerti. La verità sugli incidenti sotto il mare
📌 Link all'articolo : redhotcyber.com/post/cavi-sott…
#redhotcyber #news #taiwan #cavisottomarini #sicurezzamarittima #sorveglianzamarina #leggisottomarine #controlyuan #normativasicurezza
Cavi Sottomarini: allarmi ignorati e processi incerti. La verità sugli incidenti sotto il mare
Taiwan affronta la sfida della protezione dei cavi sottomarini danneggiati, tra tensioni politiche e limiti nella sorveglianza e nella giurisdizione.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
informapirata ⁂
in reply to Claudia • • •> La motivazione?
> In CH non abbiamo ingerenze politiche nelle indagini di polizia e questa cosa non piace alla Gioggia nazionale
Magari fosse quella la motivazione; almeno avrebbe senso.
Invece è solo un modo per mantenere una postura da ducetta di fronte agli Italiani...
Alla fine invece sarà solo un modo per far vergognare del patrio governo i tanti italiani in Svizzera
Claudia
in reply to informapirata ⁂ • • •@informapirata lo sai che non mi piace la polemica sterile e sai anche è Claudio che parte lancia in resta in questi argomenti.
Stavolta però mi sento davvero delusa da un governo che pensa che la facciata giustifichi le vittime; ho sempre mantenuto la cittadinanza italiana, mi credi se ti dico che sto pensando seriamente a rinunciarvi?
Riporto anche il commento che riassume tutto il mio pensiero. Poi vorrei davvero lasciare che parlino i risultati della magistratura e non i politici (e qui la gif "ah, pure perito forense, stikazzi").
informapirata ⁂ reshared this.
informapirata ⁂
in reply to Claudia • • •quando parlo di governo, aggiungo spesso l'espressione "pro tempore": il governo è transitorio (anche se poi, i peggiori governi non pssano mai rapidamente) e non vale la pena rinunciare alla cittadinanza del proprio paese a causa di un governo di persone indegne.
Comprendo benissimo però il tuo disagio, anche perché non si vedono ancora all'orizzione segni di inversione di tendenza...
Claudia
in reply to informapirata ⁂ • • •@informapirata Ti posso parafrasare AG&G, nei "Corti", la scena della montagna?
Ecco: "un momento? È 50 anni che è un momento!"
Non credo più al transitorio, manca qualcosa di fondo. Cultura del rispetto. Si fanno governare dalle mafie, dai milionari, dai presidenti di altri paesi, dal flow di economia, dai soldi.
I soldi governano ogni aspetto.
Basta capire che prezzo abbiamo, perché tutti lo abbiamo. E, parafrasando J-Ax, "quando arrivi al top, resi intrappolato al pop come un topo". Questi sentono l'odore dei soldi, della bella vita, di un palco dal quale nessuno li tira giù, vogliono essere ascoltati, vogliono essere adorati, perché secondo loro ce l'hanno fatta. Vogliono essere democratici perché il popolo è sovrano ma decidono loro.
E democraticamente devono andare affanculo =)
informapirata ⁂ reshared this.