Cybersecurity & cyberwarfare ha ricondiviso questo.

AI error jails innocent grandmother for months in North Dakota fraud case
L: grandforksherald.com/news/nort…
C: news.ycombinator.com/item?id=4…
posted on 2026.03.12 at 16:55:51 (c=5, p=9)

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

AI-assisted #Slopoly #malware powers #Hive0163’s #ransomware campaigns
securityaffairs.com/189378/mal…
#securityaffairs #hacking #AI

OS/2 Never Went Away. Its Successor Has Received An Update


The media in this post is not displayed to visitors. To view it, please log in.

ArcaOS is an operating system you might not have heard of, but you will recognize it when we tell you that it’s the direct descendant of IBM’s OS/2. It’s just received a major update, and delivers this persuasive argument for its uptake:

“How about a commercial operating system which doesn’t spy on you, does not report your online activity to anyone, and gives you complete freedom to choose the applications you want to use, however you want to use them?”


We’re guessing that a higher-than-average number of Hackaday readers use open-source operating systems, but in a world in which the commercial OS everyone loves to hate is ever more turning the Play button into the Pay button, we have to admit that’s attractive if you pay for your software.

This update, version 5.1.2, brings support for the very latest UEFI systems to the table, keeping the platform alive in a manner we’d never have guessed would happen back in the 1990s. It’s true it’s a 32-bit system rather than 64-bit, and you’d be unlikely to buy it for your high-end gaming machine, but we remember OS/2 Warp back in the day as being very nice indeed and particularly stable. We’re interested enough to have put in a cheeky request for a review ISO, so should that come off we’d love to give it the Jenny’s Daily Drivers treatment.

ArcaOS has been mentioned here before. Do any of our readers encounter it in your daily lives? We’d love to hear in the comments.


hackaday.com/2026/03/13/os-2-n…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Sventato un cyber attacco iraniano alla centrale nucleare di ricerca Polacca

📌 Link all'articolo : redhotcyber.com/post/attacco-d…

#redhotcyber #news #sicurezzainformatica #hacking #iran #attacchinformatici #cybersecurity #polonia

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Google fixed two new actively exploited flaws in the #Chrome browser
securityaffairs.com/189373/hac…
#securityaffairs #hacking #AI
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Cyber war: i gruppi statali Iraniani utilizzano malware già pronti per velocizzare gli attacchi

📌 Link all'articolo : redhotcyber.com/post/cyber-war…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #attacchiinformatici #intelligenzaartificiale

Cybersecurity & cyberwarfare ha ricondiviso questo.

Beyond File Servers: Securing Unstructured Data in the Era of AI
securityaffairs.com/189368/sec…
#securityaffairs #hacking #AI
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚀 TRA POCHI GIORNI AL VIA IL CORSO "𝗖𝗬𝗕𝗘𝗥 𝗢𝗙𝗙𝗘𝗡𝗦𝗜𝗩𝗘 𝗙𝗨𝗡𝗗𝗔𝗠𝗘𝗡𝗧𝗔𝗟𝗦" 🚀

🔗 Programma e dettagli: redhotcyber.com/linksSk2L/cybe…
🔗 Introduzione al corso del prof. Alessio Lauro: youtube.com/watch?v=0y4GYsJMoX…
🔗 Webinar introduttivo al corso: youtube.com/watch?v=z92gaV2zgN…

✅Lezioni in diretta e supervisionate (niente video preregistrati abbandonati a metà).
✅Laboratori pratici su ambienti reali.
✅Un percorso strutturato per chi parte da zero.

💎 Essendo la prima "Live Class" su questo argomento, i prezzi sono imbattibili.
Ma affrettatevi perché il corso è a numero chiuso

Info 📞 379 163 8765 ✉️ formazione@redhotcyber.com

#redhotcyber #formazione #pentesting #pentest #formazionelive #ethicalhacking #hacking #cybersecurity #penetrationtesting #cti #cybercrime #infosec #corsi #liveclass #hackerhood #pentesting

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Zombie ZIP: la nuova tecnica di attacco che aggira antivirus e EDR

📌 Link all'articolo : redhotcyber.com/post/zombie-zi…

Chris Aziz, ricercatore di #sicurezza presso Bombadil Systems, ha sviluppato e dimostrato una tecnica di #attacco chiamata Zombie ZIP, la quale consente di nascondere payload dannosi all’interno di archivi ZIP in modo che non vengano rilevati dai #sistemi antivirus e EDR. Lo specialista spiega che l’attacco consiste nella manipolazione delle intestazioni del file ZIP.

A cura di Bajram Zeqiri

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #antivirus #edr #sicurezzainformatica #zombiezip #archivizip #payloaddannosi #tecnichidiattacco #minacceinformatiche

Perfecting the Shape-Changing Fruit Bowl


The media in this post is not displayed to visitors. To view it, please log in.

Fruit bowls have an unavoidable annoyance– not flies and rotten fruit, those would be avoidable if your diet was better. No, it’s that the bowl is never the right size. Either your fruit is sad and lonely in a too-large bowl, or it’s falling out. It’s the kind of existential nightmare that can only be properly illustrated by a late-night infomercial. [Simone Giertz] has a solution to the problem: a shape-changing fruit bowl.

See, it was one thing to make a bowl that could change shape. That was easy, [Simone] had multiple working prototypes. There are probably many ways to do it, but we like [Simone]’s use of an iris mechanism in a flat base to allow radial expansion of the walls. The problem was that [Simone] has that whole designer thing going on, and needs the bowl to be not only functional, but aesthetically pleasing. Oh, and it would be nice if expanding the bowl didn’t create escape routes for smaller fruits, but that got solved many prototypes before it got pretty.

It’s neat to see her design process. Using 3D printing and CNC machining for prototyping is very familiar to Hackaday, but lets be honest — for our own projects, it’s pretty common to stop at “functional”. Watching [Simone] struggle to balance aesthetics with design-for-manufacturing makes for an interesting 15 minutes, if nothing else. Plus she gives us our inspirational quote of the day: “As much as I feel like I’m walking in circles, I know that product development is a spiral”. Something to keep in mind next time it seems like you’re going around the drain in your own projects. Just be warned, she does have a bit of a potty mouth.

We’ve featured [Simone]’s design decisions here, if you’re interested in seeing how she goes the rest of the way from project to product. We’re pretty sure her face-slapping-alarm clock never made it into the SkyMall catalog, though.

youtube.com/embed/9jPVsWPs4p8?…


hackaday.com/2026/03/13/perfec…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🔴 Benvenuta Erminia in Red Hot Cyber Cyber Angels 🔴

👉 Ultimo contributo qui: redhotcyber.com/post/ti-sei-ma…
📩 Per chi fosse interessata a partecipare : redazione@redhotcyber.com

#redhotcyber #rhccyberangels #hacking #benesseredigitale #cti #ai #online #it #cybercrime #cybersecurity

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

252 – Le aziende di AI decidono chi muore camisanicalzolari.it/252-le-az…
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Microsoft slitta ancora il passaggio al nuovo Outlook: addio al classico… forse nel 2029

📌 Link all'articolo : redhotcyber.com/post/microsoft…

#redhotcyber #news #nuovoutlook #outlookperwindows #transizioneoutlook #clientunificato #supportooutlook

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Veeam nel mirino: una Remote Code Execution espone i server di Backup

📌 Link all'articolo : redhotcyber.com/post/veeam-nel…

#redhotcyber #news #cybersecurity #hacking #veam #backup #replication #vulnerabilita #rce #sicurezzainformatica

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Corea del Sud: 3% del fatturato per le aziende che hanno incidenti informatici ricorrenti

📌 Link all'articolo : redhotcyber.com/post/corea-del…

#redhotcyber #news #cybersecurity #sanzionipersevere #aziendeirresponsabili #spamillegale #sicurezzainformatica

Nintendo’s Family BASIC Keyboard Gets USB Upgrade


The media in this post is not displayed to visitors. To view it, please log in.

America knew it as the Nintendo Entertainment System, but in Japan, it was the Family Computer (Famicom). It was more than just a home console—it was intended to actually do a whole lot more. All you had to do was plug in the keyboard and chuck in the right Family BASIC cartridge, and you had a computer hooked up to your TV! [Lucas Leadbetter] came across an old Family BASIC keyboard recently, and set about making it more useful in our modern age with a simple USB upgrade.

[Lucas] started with research, and soon found plenty of schematics and details on the keyboard on the NESdev wiki page. Hunting further turned up a video from [Circuit Rewind], who demonstrated how to hook up the keyboard to a Raspberry Pi Pico, including how to interface with the onboard chips to scan the keys. These resources told [Lucas] enough to get going—and that it should be as simple as wiring some custom hardware up to the internal keyboard matrix connector to get it speaking to USB.

[Lucas] went a slightly different path to [Circuit Rewind], implementing the popular QMK firmware to suit the Family Basic keyboard on an Adafruit KB2040. The Adafruit part is basically an RP2040 microcontroller slapped onto a tiny PCB in a form factor that’s ideal for making custom keyboards. [Lucas] was able to reimplement the scanning logic that [Circuit Rewind] had reverse engineered previously, and had the keyboard up and running in short order with all the usability benefits of the QMK firmware. Files are on Github for those eager to recreate the work.

As far as usability goes, [Lucas] notes that the Family BASIC keyboard is more of a conversation piece than a daily driver, thanks to its rather poor feel. Duly noted. We’ve explored how software development is done in Family BASIC before, too. Video after the break.

youtube.com/embed/t6OEFQlg0Nc?…


hackaday.com/2026/03/12/ninten…

Replicating a Nuclear Event Detector For Fun and Probably Not Profit


The media in this post is not displayed to visitors. To view it, please log in.

Last year, we brought you a story about the BhangmeterV2, an internet-of-things nuclear war monitor. With a cold-war-era HSN-1000 nuclear event detector at its heart, it had one job: announce to everything else on the network than an EMP was inbound, hopefully with enough time to shut down electronics. We were shocked to find out that the HSN-1000 detector was still available at the time, but that time has now passed. Fortunately [Bigcrimping] has stepped up to replicate the now-unobtainable component at the heart of his build with his BHG-2000 Nuclear Event Detector — but he needs your help to finish the job.

The HSN-1000, as reported previously, worked by listening for the characteristic prompt gamma ray pulse that is the first sign of a nuclear blast. The Vela Satellites that discovered Gamma Ray Bursts were watching for the same thing, though almost certainly not with that specific component. With the HSN-1000 unavailable, [Bigcrimping] decided he might as well make his own gamma ray detector, using four BPW34S PIN diodes coated with black paint. The paint blocks all visible light that might trigger photocurrent inside diode, but not Gamma Rays, while using four acts increases the area and may inadvertently act as a sort of coincident detector. You wouldn’t want your homemade Dead Hand to be triggered by a cosmic ray, would you?

That tiny photocurrent is then amplified by a transimpedance amplifier based on the LTC6244 op-amp, which then goes into a second-stage based on a LT1797 op amp that drives a LOW pulse to indicate an event has occurred. [Bigcrimping] fit all of this onto a four-layer PCB that is a pin-compatible replacement for the HSN-1000L event detector called for in his BhangmeterV2.
Paired with a Pico 2 W, the BHG-2000 is ready to defend your devices. At least until the EMP and blast wave hits.
There’s only one problem: without exposing this thing to gamma rays, we really don’t know if it will work. [Bigcrimping] is looking for anyone in Europe with a Cs-137 or Co-60 source willing to help out with that. His contact info is on the GitHub page where the entire project is open sourced. Presumably a nuclear detonation would work for calibration, too, but we at Hackaday are taking the bold and perhaps controversial editorial stance that nuclear explosions are best avoided. If the Bhangmeter– which we wrote up here, if you missed it–or some equivalent does warn you of a blast, do you know where to duck and cover?


hackaday.com/2026/03/12/replic…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Yay test vectors!

I will write properly about this, but we are going pretty far to test ML-DSA *and make it easy to test,* so I am hopeful ML-DSA bugs will be rare compared to classical [EC|Ed]DSA bugs.

These test gaps were identified by writing multiple alternative ML-DSA implementations and mutation testing *those* to find missing vectors to then bring back to the Go implementation, and share on Wycheproof.

Building a Robot Partner to Play Air Hockey With


The media in this post is not displayed to visitors. To view it, please log in.

Air hockey is one of those sports that’s both incredibly fun, but also incredibly frustrating as playing it by yourself is a rather lonely and unfulfilling experience. This is where an air hockey playing robot like the one by [Basement Builds] could come in handy. After all, after you finished building an air hockey table from scratch, how hard could it be to make a robot that merely moves the paddle around to hit the puck with?

An air hockey table is indeed not extremely complicated, being mostly just a chamber that has lots of small holes on the top through which the air is pushed. This creates the air layer on which the puck appears to float, and allows for super-fast movement. For this part countless chamfered holes were drilled to get smooth airflow, with an inline 12VDC duct fan providing up to 270 CFM (~7.6 m3/minute).

Initially the robot used a CoreXY gantry configuration, which proved to be unreliable and rather cumbersome, so instead two motors were used, each connected to its own gearbox. These manipulate the paddle position by changing the geometry of the arms. Interestingly, the gearbox uses TPU for its gears to absorb any impacts and increase endurance as pure PLA ended up falling apart.

The position of the puck is recorded by an overhead camera, from where a Python script – using the OpenCV library running on a PC – determines how to adjust the arms, which is executed by Arduino C++ code running on a board attached to the robot. All of this is available on GitHub, which as the video makes clear is basically cheating as you don’t get to enjoy doing all the trigonometry and physics-related calculating and debugging fun.

youtube.com/embed/GLsDLgj8Q5E?…


hackaday.com/2026/03/12/buildi…

Cybersecurity & cyberwarfare ha ricondiviso questo.

If you're reading up on #Stryker and the wipe that was done on their systems, you can get a pretty good idea of your threat landscape by navigating to the Intune admin center > Tenant Administration > Roles >Roles by Permission > Category: "Remote Tasks" Permission "Wipe"

This should show Help Desk Operator and School Administrator. You can click through to see who's in those roles.

#CTI #InfoSec #Microsoft #Intune #Iran #Cybersecurity

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

In a major win for digital privacy, the European Parliament just (again) limited all scanning of communications for child abuse material to specific suspects. No mass surveillance, no #chatcontrol. Now the negotiations with Member States will be interesting. They are already supposed to start tomorrow morning.

Mapping The Sound Field Of An Acoustic Levitator


The media in this post is not displayed to visitors. To view it, please log in.

Sound! It’s a thing you hear, moreso than something you see with your eyes. And yet, it is possible to visualize sound with various techniques. [PlasmatronX] demonstrates this well, using a special scanning technique to visually capture the sound field inside an acoustic levitation device.

If you’re unfamiliar, acoustic levitation devices like this use ultrasound to create standing waves that can hold small, lightweight particles in mid-air. The various nodes of the standing wave are where particles will end up hovering. [PlasmatronX] was trying to calibrate such a device, but it proved difficult without being able to see what was going on with the sound field. Hence, the desire to image it!

Imaging the sound field was achieved with a Schlieren optical setup, which can capture variations in air density as changes in brightness in an image. Normally, Schlieren imaging only works in a two-dimensional slice. However, [PlasmatronX] was able to lean on computed tomography techniques to create a volumetric representation of the sound field in 3D. He refers to this as “computerized acoustical tomography.” Images were captured of the acoustic levitation rig from different angles using the Schlieren optics rig, and then the images were processed in Python to recreate a 3D image of the sound field.

We’ve seen some other entertaining applications of computed tomography techniques before, like inspecting packets of Pokemon cards. Video after the break.

youtube.com/embed/Ky7AWh8nd-A?…


hackaday.com/2026/03/12/mappin…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Una donna Bisessuale spesso viene esclusa sia dalle comunità etero che omosessuali. Può sviluppare una bifobia specifica. E come al solito i problemi medici peculiari sono pressoché ignorati dai medici di medicina generale. Trova un medic* che ti ascolti e non ti giudichi per poter confidare senza stigma la tua vita sessuale ed i problemi legati al minority stress.
Cybersecurity & cyberwarfare ha ricondiviso questo.

👉🏻 we moved our dashboard to the GitHub RedACT repo while we're working hard under the hoods. 🇮🇹 Italian claims only (for now): ransomnews.github.io/RedACT/ #ransomNews

ransomNews · Rivendicazioni It...

reshared this

How Would a Field Sequential Home Computer Have Worked?


The media in this post is not displayed to visitors. To view it, please log in.

The early history of colour TV had several false starts, of which perhaps one of the most interesting might-have-beens was the CBS field-sequential system. This was a rival to the nascent system which would become NTSC, which instead of encoding red, green, and blue all at once for each pixel, made sequential frames carry them.

The Korean war stopped colour TV development for its duration in the early 1950s, and by the end of hostilities NTSC had matured into what we know today, so field-sequential colour became a historical footnote. But what if it had survived? [Nicole Express] takes into this alternative history, with a look at how a field-sequential 8-bit home computer might have worked.

The CBS system had a much higher line frequency in order to squeeze in those extra frames without lowering the overall frame rate, so given the clock speeds of the 8-bit era it rapidly becomes obvious that a field-sequential computer would be restricted to a lower pixel resolution than its NTSC cousin. The fantasy computer discussed leans heavily on the Apple II, and we explore in depth the clock scheme of that machine.

While it would have been possible with the faster memory chips of the day to achieve a higher resolution, the conclusion is that the processor itself wasn’t up to matching the required speed. So the field-sequential computer would end up with wide pixels. After a look at a Breakout clone and how a field-sequential Atari 2600 might have worked, there’s a conclusion that field-sequential 8-bit machines would not be as practical as their NTSC cousins. From where we’re sitting we’d expect them to have used dedicated field-sequential CRT controller chips to take away some of the heartache, but such fantasy silicon really is pushing the boundaries.

Meanwhile, while field-sequential broadcast TV never made it, we do have field-sequential TV here in 2026, in the form of DLP projectors. We’ve seen their spinning filter disks in a project or two.


1950 CBS color logo: Archive.org, CC0.


hackaday.com/2026/03/12/how-wo…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Ogni promessa è debito!

Si può sparire totalmente dall'Internet?
No. Almeno non esattamente come pensiamo.

Ma limitare le tracce è cosa buona e giusta.

#SocialDebug ogni giovedì 🦄

open.substack.com/pub/signorin…

Cybersecurity & cyberwarfare ha ricondiviso questo.

NEW: A global law enforcement operation took down a botnet allegedly used to facilitate ransomware, DDoS attacks, the distribution of child sexual abuse material (CSAM), and other cybercrimes.

The botnet was made of more than 369,000 hacked routers and IoT devices, according to Europol.

techcrunch.com/2026/03/12/law-…

Controlling Vintage Mac OS With AI


The media in this post is not displayed to visitors. To view it, please log in.

Classic Mac OS was prized for its clean, accessible GUI when it first hit the scene in the 1980s. Back then, developers hadn’t even conceived of all the weird gewgaws that would eventually be shoehorned into modern operating systems, least of all AI agents that seem to be permeating everything these days. And yet! [SeanFDZ] found a way to cram Claude or other AI agents into the vintage Mac world.

The result of [Sean]’s work is AgentBridge, a tool for interfacing modern AI agents with vintage Mac OS (7-9). AgentBridge itself runs as an application within Mac OS. It works by reading and writing text files in a shared folder which can also be accessed by Claude or whichever AI agent is in use. AgentBridge takes commands from its “inbox”, executes them via the Mac Toolbox, and then writes outputs to its “outbox” where they can be picked up and processed by the AI agent. The specifics of how the shared folder work are up to you—you can use a network share, a shared folder in an emulation environment, or just about any other setup that lets the AI agent and AgentBridge access the same folder.

It’s hard to imagine any mainstream use cases for having a fleet of AI-controlled Macintosh SE/30s. Still, that doesn’t mean we don’t find the concept hilarious. Meanwhile, have you considered the prospect of artificial intelligence running on the Commodore 64?


hackaday.com/2026/03/12/contro…

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Apple issues emergency fixes for #Coruna flaws in older #iOS versions
securityaffairs.com/189362/sec…
#securityaffairs #hacking #iPhone

Pokemon Go Had Players Capturing More Than They Realized


The media in this post is not displayed to visitors. To view it, please log in.

Released in 2016, Pokemon Go quickly became a worldwide phenomenon. Even folks who weren’t traditionally interested in the monster-taming franchise were wandering around with their smartphones out, on the hunt for virtual creatures that would appear via augmented reality. Although the number of active users has dropped over the years, it’s estimated that more than 50 million users currently log in and play every month.

From a gameplay standpoint, Go is brilliant. Although the Pokemon that players seek out obviously aren’t real, searching for them closely approximates the in-game experience that the franchise has been known for since its introduction on the Game Boy back in 1996.

But now, instead of moving a character through a virtual landscape in search of the elusive “pocket monsters”, players find them dotted throughout the real world. To be successful, players need to leave their homes and travel to where the Pokemon are physically located — which often happens to be a high-traffic area or other point of interest.

As a game, it’s hard to imagine Pokemon Go being a bigger success. At the peak of its popularity, throngs of players were literally causing traffic jams as they roamed the streets in search of invisible creatures. But what players may not have realized as they scanned the world around them through the game was that they were helping developer Niantic build something even more valuable.

The Imaginary Gig Economy


The game has used augmented reality (AR) to bring the world of Pokemon to life since day one, but it wasn’t until the fall of 2020 that Niantic introduced AR Mapping. With this new feature, players could scan real-world locations and objects by walking around them while the software captured images from their smartphone’s camera. This was presented to the player as “Field Research”, and once completed, it would unlock various rewards in the game.

youtube.com/embed/naFeJxszLOs?…

For those with a technical mindset, the implications of this are immediately obvious. Through the Research system, Niantic could direct Pokemon Go players anywhere they wished. Once the imagery from these Research scans were uploaded, they could be used to create detailed 3D models through the use of photogrammetry. The more players that perform Field Research on a particular location, the more accurate the results.

If Niantic wanted to create a 3D model of a statue in a park or the front of a building, they simply needed to assign it a Field Research task and the players would rush out to collect the data. Forget Google’s Street View — rather than sending a camera-laden car out once every year or so to grab new images, Niantic could sit back while millions of players uploaded high resolution pictures of the world around them in exchange for in-game trinkets that have no physical value.

No Such Thing as a Free Pokemon


In the tech world there’s a common saying: “If something is free, you’re the product.”

The idea being that if you’re using some service without paying for it, there’s an excellent chance that the company providing said service is somehow making money off of the situation. So for example when a user looks up a particular topic with a search engine, they can be presented with contextually appropriate advertisements. By selling this ad space to companies, the search engine provider generates a profit for each “free” search performed by its users. The personal relevancy offered by such bespoke advertisements can be more effective than traditional TV or print ads, which in turn means the search engine provider can charge a premium for them.

Just as in our hypothetical search engine example, Pokemon Go is offered up to players on Android and iOS free of charge. To date, it’s been downloaded by over a billion total users. To make the game financially viable, Niantic eventually needed to find a way to turn all those free downloads into a revenue stream.

The answer is Niantic Spatial. This spin-off company was announced in March of 2025, and offers a Visual Positioning System (VPS) created in part using the photogrammetry data collected by Pokemon Go. Through this service Niantic Spatial offers centimeter-scale positioning for millions of high-traffic locations all over the globe, even in areas where GPS may be inaccurate.

Earlier this week, Niantic Spatial announced they had entered into an agreement with Coco Robotics to provide VPS for their fleet of delivery robots. Images captured by the robot’s onboard cameras can be fed into the VPS to provide a more accurate position than is possible with GPS, even in the best of conditions. This is particularly important for a robot that not only needs to navigate an ever-changing urban landscape, but must arrive at a precise location to successfully complete its delivery.

Always Read the Fine Print


At this point, you may be thinking to yourself that this all seems a bit shady. Can Niantic really take the data that was provided to them by Pokemon Go players and spin that off into a commercial venture that monetizes it? Of course they can, because that’s precisely what players agreed to when they installed the game.

Section 5.2 of the Niantic Terms of Service, titled “Rights Granted by You – AR Content”, states that the company retains wide-ranging rights over anything that users upload through the AR functions of their products:

In short, not only can Niantic do anything they want with player submitted data, but they can pass that freedom on to other entities as they see fit. So while Coco Robotics didn’t even exist when the AR Mapping feature was added to Pokemon Go, all of the imagery that players captured since that time — plus any images that they continue to capture — is fair game.

In the end, it’s unlikely that many players will lose any sleep over the fact that they have unwittingly been collecting training data to help robots more effectively deliver pizzas. But it’s also not hard to imagine a scenario in which that data ends up getting licensed out for some purpose they aren’t comfortable with.

If that happens, their options may be limited. A reading of Niantic’s Privacy Policy would seem to indicate that uploaded AR imagery is anonymized during processing, and as such doesn’t need to be treated in the same way that personally identifiable information would be. As such, players have the right to opt-out of uploading additional data going forward, but can’t remove what’s already been pushed into the system.

Regardless of whether or not this situation impacts you directly, it’s an important cautionary tale in an interconnected world where more and more of what users do online is tracked, filtered, processed, and sold off to the highest bidder. Perhaps something to keep in mind before clicking “I Agree.”


hackaday.com/2026/03/12/pokemo…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Cyber war: gli hacktivisti iraniani di Handala usano i wiper per cancellare le aziende

📌 Link all'articolo : redhotcyber.com/post/gli-hackt…

#redhotcyber #news #cyberattack #hacking #malware #ransomware #sicurezzainformatica #attacchinformatici

Cybersecurity & cyberwarfare ha ricondiviso questo.

Critical SQL Injection bug in #Ally plugin threatens 400,000+ #WordPress sites
securityaffairs.com/189354/hac…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Guerra 2.0: come le AI del Pentagono decidono chi colpire

📌 Link all'articolo : redhotcyber.com/post/come-lai-…

#redhotcyber #news #intelligenzaartificiale #datacenter #pentagono #analisiintelligence #obiettivimilitari #velocita

Selective Ironing Adds Designs To 3D Prints


The media in this post is not displayed to visitors. To view it, please log in.

While working on a project that involved super-thin prints, [Julius Curt] came up with selective ironing, a way to put designs on the top surface of a print without adding any height.

For those unfamiliar, ironing is a technique in filament-based 3D printing that uses the extruder to smooth out top surfaces after printing them. The hot nozzle makes additional passes across a top surface, extruding a tiny amount in the process, which smooths out imperfections and leaves a much cleaner surface. Selective ironing is nearly the same process, but applied only in a certain pattern instead of across an entire surface.
Selective Ironing can create patterns by defining the design in CAD, and using a post-processing script.
While conceptually simple, actually making it work was harder than expected. [Julius] settled on using a mixture of computer-aided design (CAD) work to define the pattern, combined with a post-processing script. More specifically, one models the desired pattern into the object in CAD as a one-layer-tall feature. The script then removes that layer from the model while applying the modified ironing pattern in its place. In this way, one can define the pattern in CAD without actually adding any height to the printed object. You can see it in action in the video, embedded below.

We’ve seen some interesting experiments in ironing 3D prints, including non-planar ironing and doing away with the ironing setting altogether by carefully tuning slicer settings so it is not needed. Selective Ironing is another creative angle, and we can imagine it being used to embed a logo or part number as easily as a pattern.

Selective Ironing is still experimental, but if you find yourself intrigued and would like to give it a try head over to the GitHub repository where you’ll find the script as well as examples to try out.

youtube.com/embed/DYhGsloosWY?…


hackaday.com/2026/03/12/select…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Gli Hacker entrano nei server FBI e accedono ai dati esclusivi sull’indagine di Jeffrey Epstein

📌 Link all'articolo : redhotcyber.com/post/gli-hacke…

#redhotcyber #news #cybersecurity #hacking #fbi #jeffreyepstein #indaginifbi #violaioneserver #sicurezzainformatica

Cybersecurity & cyberwarfare ha ricondiviso questo.

L’analisi ASviS. Quando le app diventano armi di guerra


@Informatica (Italy e non Italy)
BadeSaba Calendar è un’app molto diffusa in Iran. Serve a mostrare gli orari di preghiera per i credenti, il calendario religioso e le notifiche dell’Adhan, la chiamata islamica fatta di norma dal muezzin. Solo su Android ha avuto cinque milioni di download. Quando il 28 febbraio sono iniziati i

reshared this