Telegram says it is not affected by a supposed zero-day in its IM client that can be exploited to run malicious code via a malicious custom sticker
reshared this
Telegram says it is not affected by a supposed zero-day in its IM client that can be exploited to run malicious code via a malicious custom sticker
reshared this
#Israele vieta l'accesso al Santo Sepolcro al card #Pizzaballa
Tajani:"inaccettabile"
Meloni:"offensivo"
A #Gaza abbiamo avuto:
-70 mila morti
-190 mila feriti
-2 milioni sfollati
-negazione delle cure per 20 mila pazienti
-1,8 milioni di persone a rischio carestia
-80% delle strutture sanitarie distrutte
-70% degli edifici civili colpiti
-centinaia di ONG espulse
-oltre 200 giornalisti uccisi
Ma il #governo convoca l'ambasciatore israeliano per il divieto al cardinale.
Game over
reshared this
NO a Palantir in Europa: ecco l'iniziativa europea per chiedere all'Unione Europea di sospendere ogni rapporto con Palantir
Chiediamo ai governi europei di:
- Bloccare la firma di nuovi contratti con Palantir.
- Rivedere e rescindere gradualmente i contratti in essere con l’azienda.
- Investire in alternative europee trasparenti e pubblicamente responsabili.
action.wemove.eu/sign/2026-03-…
(SEGUE)
Una potente azienda statunitense di spyware tecnologico è collegata al genocidio a Gaza, alle separazioni delle famiglie dell’ICE e alla guerra di Trump in Iran.WeMove Europe
like this
reshared this
Che cosa curiosa!
Dopo avere firmato la petizione l'ho condivisa su Facebook e del tutto casualmente il link è svanito dal mio post, c'è solo il testo che ho scritto io. Chissà come mai!
Aggiungete che Tiel, il fondatore di Palantir, è stato uno dei primi e più importanti finanziatori di Facebook, e fate 1+1.
reshared this
Etica Digitale (Feddit) reshared this.
reshared this
@elettrona @cgbencini @m3nhir @ilsimoneviaggiatore ad esempio puoi degoogleare quanto ti pare, ma se devi cercare un pdi su una mappa hai una sola scelta! Maps.
Poi che in autostrada here we go dallo schermo del telefono, quando non canna le interruzioni, sia 100 volte meglio, o in città grandi a piedi organic maps si il migliore è un discorso diverso.
Ma se mi dicono che lo studio di tizio si trova di fianco al bar di caio, la scelta è una.
Etica Digitale (Feddit) reshared this.
Qwuant chiede le ricerche a Bing; se lo scopo è liberarsi di tecnologia americana non ci sono molte soluzioni, tranne MoJeek che è del Regno unito e che da risultati abbastanza osceni.
Se invece basta non usare Google o Microsoft, si può usare brave (sempre americano, ma con risultati indipendenti).
Ecosia and Qwant today reveal a new joint venture, European Search Perspective (EUSP), to develop and build search engine infrastructure in Europe.Team Qwant (Better Web)
Come forse saprete, su Glade Art tendiamo a prendere molto sul serio le misure anti-bot; una delle nostre massime priorità è proteggere gli altri utenti dal fatto che la loro arte venga sottoposta ad addestramento automatico. Tendiamo anche a trollare i bot utilizzando infiniti labirinti di dati inutili per intrappolarli. Questi sono comunemente indicati come "honeypot" o "fosse di catrame digitali" E così, dopo 6,8 milioni di richieste negli ultimi 55 giorni al momento in cui scrivo, abbiamo alcuni dati sostanziali, quindi restate in attesa e lasciate che li condividiamo con voi. : )
reshared this
@Katy B. 📚 🥛 scusa ma è un errore della traduzione automatica:
"la loro arte venga addestrata" va inteso come "la loro arte venga sottoposta ad addestramento automatico"
Informatica (Italy e non Italy) reshared this.
riproviamoci, dato che non è l'arte che subisce un addestramento:
...la loro arte venga utilizzata per addestrare le IA.
Ecco.
hackerspaces.org è una Wiki dedicata a chiunque desideri condividere le proprie esperienze e domande relative agli hackerspace con la comunità globale degli hackerspace.
reshared this
Unless you’re into circuit sculptures, generally speaking, a working circuit isn’t the end-point of a lot of electronics projects. To protect your new creation from grabby hands, curious paws, and the ravages of nature, you’ll probably want some kind of enclosure. These days a lot of us would probably run it off on the 3D printer, but some people would rather stay electronics hobbiests without getting into the 3D printing hobby. For those people, [mircemk] shares how he creates professonal-looking enclosures with handtools.
The name [mircemk] will seem familiar to longtime readers– we’ve featured many of his projects, and they’ve always stood out for the simple but elegant enclosures he uses. The secret, it turns out, is thin PVC sheeting from a sign shop. At thicknesses upto and including 5 mm, the material can be bent by hand and cut with hobby knives. It’s obviously also amenable to drilling and cutting with woodworking tools as well. Drilling is especially useful to make holes for indicator LEDs. [mircemk] recommends cyanoacrylate ‘crazy’ glue to hold pieces together. For holding down the PCB, the suggestion of double-sided tape will work for components that won’t get too hot.
Rather than paint, the bold contrasting colours we’ve become used to are applied using peel-and-stick wallpaper, which is a great idea. It’s quick, zero mess, and the colour is guaranteed to be evenly applied. It might even help hold the PVC enclosure together ever so slightly. You can watch him do it in the video embedded below.
We hate to say it, but for a one-off project, this technique probably does beat a 3D printed box for professional looks, assuming you have [mircemk]’s motorskills. If you don’t have said motor skills, check out this parametric project box generator. If you’d rather avoid PVC while making a square box to hold a PCB, have you considered using PCBs?
Thanks to [mircemk] for the tip! If you have a tip or technique you want to share, please box it up and send it to the tipsline
youtube.com/embed/t9KfsZ-eU5M?…
Bluesky punta sull'intelligenza artificiale con Attie, un'app per la creazione di feed personalizzati
Il team di #Bluesky ha creato un'altra app, e questa volta non si tratta di un social network, bensì di un assistente basato sull'intelligenza artificiale che permette di progettare il proprio algoritmo, creare feed personalizzati e, un giorno, persino "codificare" la propria app.
techcrunch.com/2026/03/28/blue…
Bluesky’s new app Attie uses AI to help people build custom feeds the open social networking protocol atproto.Sarah Perez (TechCrunch)
reshared this
reshared this
I Social sono una parte fondamentale della nostra vita? Cosa ci insegnano tutte le multe alle big tech e le controversie degli ultimi giorni? Io mi sono chiesto tutte queste cose ed ho deciso di fare detox da tutti i social.
Vi racconto la mia esperienza senza filtri:
Profitez des vidéos et de la musique que vous aimez, mettez en ligne des contenus originaux, et partagez-les avec vos amis, vos proches et le monde entier.Lorenzo DM (YouTube)
like this
reshared this
Sta circolando tra i matematici una petizione per spostare l'evento altrove. La petizione cita le recenti azioni militari americane in Venezuela e Iran, la sospensione dei visti per i cittadini di 75 paesi e la continua presenza di agenti federali dell'Immigration and Customs Enforcement (ICE) nelle principali città statunitensi, elementi che contrastano con l'obiettivo dell'ICM di promuovere "un senso di unità internazionale tra i matematici".
scientificamerican.com/article…
More than 1,500 mathematicians are demanding that their field’s most prestigious meeting be moved from the U.S.Joseph Howlett (Scientific American)
Giuseppe likes this.
reshared this
Security firm Cybereason has open-sourced owLSM, an EDR-like agent for Linux, an eBPF LSM agent to run Sigma rules
github.com/Cybereason-Public/o…
Sigma Rules Engine inside the Linux Kernel using eBPF. Focusing on prevention capabilities - Cybereason-Public/owLSMGitHub
reshared this
Buongiorno.
Inauguro i #consiglidifollow, suddivisi per argomento.
Non sono elenchi esaustivi. Semplicemente condivido gli account che mi è capitato d'incontrare per caso e che piacciono a me.
@WeirdWriter
@WedaleBooks
@internetarchive
@differx
@Umbertogaetani
@jeffjarvis
@Fbrzvnrnd
@lisavag
@viadellabarca
@huss
@m
@TGioiellieri
@libri@feddit.it
@lucianofloridi
@overholt
@gutenberg_new
@giuliocavalli
@cctmwebsite
@libri@poliverso.org
@slowforward.net
@Ricciotto
@antoniovigilante
like this
reshared this
Ionizing radiation damage from electrons, protons and gamma rays will over time damage a CMOS circuit, through e.g. degrading the oxide layer and damaging the lattice structure. For a space-based camera that’s inside a probe orbiting a planet like Jupiter it’s thus a bit of a bummer if this will massively shorted useful observation time before the sensor has been fully degraded. A potential workaround here is by using thermal energy to anneal the damaged part of a CMOS imager.
The first step is to detect damaged pixels by performing a read-out while the sensor is not exposed to light. If a pixel still carries significant current it’s marked as damaged and a high current is passed through it to significantly raise its temperature. For the digital logic part of the circuit a similar approach is used, where the detection of logic errors is cause for a high voltage pulse that should also result in annealing of any damage.
During testing the chip was exposed to the same level of radiation to what it would experience during thirty days in orbit around Jupiter, which rendered the sensor basically unusable with a massive increase in leakage current. After four rounds of annealing the image was almost restored to full health, showing that it is a viable approach.
Naturally, this self-healing method is only intended as another line of defense against ionizing radiation, with radiation shielding and radiation-resistant semiconductor technologies serving as the primary defenses.
Un nuovo malware Linux si evolve con l’aiuto dell’intelligenza artificiale e diventa quasi impossibile da rilevare...
📌 Link all'articolo : redhotcyber.com/post/voidlink-…
A cura di Bajram Zeqiri
#redhotcyber #hacking #cti #cybercrime #cybersecurity #news #cyberthreatintelligence
Scopri VoidLink, un rootkit Linux avanzato che utilizza tecniche di evasione e AI per infiltrarsi nei sistemi e restare invisibile.Bajram Zeqiri (Red Hot Cyber)
reshared this
Attackers are actively probing a critical Citrix NetScaler flaw (CVE-2026-3055) that can leak sensitive data via a memory overread issue.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Eventi Italiani Gancio e Mobilizon likes this.
reshared this
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscapePierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Apple is alerting users of outdated iPhones and iPads via lock screen warnings about active web-based exploits, urging immediate sw updates.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Usually, when we see non-planar 3D printers, they’re rather rudimentary prototypes, intended more as development frames than as workhorse machines. [multipoleguy]’s Archer five-axis printer, on the other hand, breaks this trend with automatic four-hotend toolchanging, a CoreXY motion system, and print results as good-looking as any Voron’s.
The print bed rests on three ball joints, two on one side and one in the center of the opposite side. Each joint can be raised and lowered on an independent rail, which allows the bed to be tilted on two axes. The dimensions of the extruders their motion system limit how much the bed can be angled when the extruder is close to the bed, but it can reach sharp angles further out.
The biggest difficulty with non-planar printing is developing a slicer; [multipoleguy] is working on a slicer (MaxiSlicer), but it’s still in development. It looks as though it’s already working rather well, to the point that [multipoleguy] has been optimizing purge settings for tool changes. It seems that when a toolhead is docked, the temperature inside the melt chamber rises above the normal temperature in use, which causes stringing. To compensate for this, the firmware runs a more extensive purge when a hotend’s been sitting for a longer time. The results for themselves: a full three-color double helix, involving 830 tool changes, could be printed with as little as six grams of purge waste.
As three-axis 3D printers become consumer products, hackers have kept looking for further improvements to make, which perhaps explains the number of non-planar printing projects appearing recently, including a few five-axis machines. Alternatively, some have experimented with non-planar print ironing.
youtube.com/embed/Y44QV1gQqq0?…
#Telegram: rilevata vulnerabilità 0-Click
Rilevata una vulnerabilità 0‑click in Telegram, nota applicazione di messaggistica istantanea. Tale vulnerabilità potrebbe consentire a utente malintenzionato di eseguire codice arbitrario su istanze applicative Android e Linux, tramite l’invio di contenuti multimediali opportunamente predisposti
acn.gov.it/portale/w/telegram-…
Grazie a @nemeyes per la segnalazione
Rilevata una vulnerabilità 0‑click in Telegram, nota applicazione di messaggistica istantanea. Tale vulnerabilità potrebbe consentire a utente malintenzionato di eseguire codice arbitrario su istanze applicative Android e Linux, tramite l’invio di co…ACN
reshared this
razzospaziale reshared this.
@devil
x.com/telegram/status/20380700…
Telegram smentisce
Quindi la notizia diventa che l'Agenzia per la Cybersicurezza Nazionale ripete a pappagallo quello che trova scritto online e spara raccomandazioni senza nessuna verifica di accuratezza, wow, bene
La fonte indicata è un blog di sicurezza "AI" (tale TrendAI) che non ha pubblicato neanche un proof of concept
👆 TrendAi è una divisione di Trend Micro, leggo online
This flaw does not exist. This researcher falsely claims that a corrupted Telegram sticker could be used as an attack vector — which completely disregards that all stickers uploaded to Telegram are validated by its servers before they can be played b…Telegram Messenger (X (formerly Twitter))
reshared this
@lichingyun sì, la questione si fa interessante.
Premesso che non credo a nulla di quello che dice Telegram, questa volta mi sembra che la versione di Telegram sia più credibile
@lichingyun @devil ma non funzione sempre così? Si avvisa il responsabile del software e si rende pubblico se non viene mitigato. La falla è stata trovata da zeroday
zerodayinitiative.com/advisori…
Il fatto che Telegram dica che la falla (gli sticker animati possono essere usati per eseguire codice) non esiste perchè gli sticker passano dai loro server mi sembra strano e non del tutto rassicurante. Anche le app malevole si installano dal play store.
informapirata ⁂ reshared this.
@lichingyun @devil @informapirata
Infatti va seguita perché potrebbe essere anche una dichiarazione formale per "rassicurare" gli utenti. Mancano dettagli. I server "dell'oste" significa poco o nulla.
informapirata ⁂ reshared this.
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Until the fall of the Soviet Union around 1990 you’d be forgiven as a proud Soviet citizen for thinking that the USSR’s technology was on par with the decadent West. After the Iron Curtain lifted it became however quite clear how outdated especially consumer electronics were in the USSR, with technologies like digital audio CDs and their players being one good point of comparison. In a recent video by a railways/retro tech YouTube channel we get a look at one of the earliest Soviet CD players.
A good overall summary of how CD technology slowly developed in the Soviet Union despite limitations can be found in this 2025 article by [Artur Netsvetaev]. Soviet technology was characterized mostly by glossy announcements and promises of ‘imminent’ serial production prior to a slow fading into obscurity. Soviet engineers had come up with the Luch-001 digital audio player in 1979, using glass discs. More prototypes followed, but with no means for mass-production and Soviet bureaucracy getting in the way, these efforts died during the 1980s.
During the 1980s CD players were produced in Soviet Estonia in small batches, using Philips internals to create the Estonia LP-010. Eventually sanctions on the USSR would strangle these efforts, however. Thus it wouldn’t be until 1991 that the Vega PKD-122 would become the first mass-produced CD player, with one example featured in this video.
The video helpfully includes a teardown of the player after a rundown of its controls and playback demonstration, so that we can ogle its internals. This system uses mostly localized components, with imported components like the VF display and processors gradually getting replaced over time. The DAC and optical-mechanical assembly would still be imported from Japan until 1995 when the factory went bankrupt.Insides of the Vega 122S CD player. (Credit: Railways | Retro Tech | DIY, YouTube)
This difference between the imported and localized part is captured succinctly in the video with the comparison to Berlin in 1999, in that you can clearly see the difference between East and West. The CD mechanism is produced by Sanyo, with a Sanyo DAC IC on the mainboard. The power supply, display and logic board (using Soviet TTL ICs) are all Soviet-produced. A sticker inside the case identifies this unit as having been produced in 1994.
Amusingly, the front buttons are directly coupled into the mainboard without ESD protection, which means that in a Siberian winter with practically zero relative humidity inside you’d often fry the mainboard by merely using these buttons.
After this exploration the video goes on to explain how Soviet CD production began in the 1989, using imported technology and know-how. This factory was set up in Moscow, using outdated West-German CD pressing equipment and makes for a whole fascinating topic by itself.
Finally, the video explores the CD player’s manual and how to program the player, as well as how to obtain your own Soviet CD player. Interestingly, a former employee of the old factory has taken over the warehouse and set up a web shop selling new old stock as well as repaired units and replacement parts.
youtube.com/embed/utcfnmQtGxA?…
L’Europa è in allarme: Cina e Russia stanno facendo una mossa strategica per l’indipendenza tecnologica…
📌 Link all'articolo : redhotcyber.com/post/chi-contr…
A cura di Carolina Vivianti
#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news
L'Europa deve costruire una propria infrastruttura tecnologica per ridurre la dipendenza da ecosistemi stranieri e garantire la sovranità.Carolina Vivianti (Red Hot Cyber)
reshared this
C’è un nuovo mercato online che sta cambiando le regole del gioco per i criminali informatici...
📌 Link all'articolo : redhotcyber.com/post/arriva-le…
A cura di Bajram Zeqiri
#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #news #cyberthreatintelligence
Leak Bazaar introduce un nuovo modello nel cybercrime: analizza, ripulisce e rivende dati rubati trasformandoli in asset commerciali anche dopo il fallimento del ransomware.Bajram Zeqiri (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Stiamo mettendo like su milioni di foto finte! O la smettiamo o faremo danni irreversibili Le foto del matrimonio di Zendaya e Tom Holland hanno superato undici milioni di like su Instagram. Le ha pubblicate il 4 marzo un creator a caso.Marco Camisani Calzolari
reshared this
[Casey Bralla] got his hands on a Rockwell AIM 65 microcomputer, a fantastic example of vintage computing from the late 70s. It sports a full QWERTY keyboard, and a twenty character wide display complemented by a small thermal printer. The keyboard is remarkably comfortable, but doing software development on a one-line, twenty-character display is just not anyone’s idea of a good time. [Casey] made his own tools to let him write programs on his main PC, and transfer them easily to the AIM 65 instead.A one-line, twenty-character wide display was a fantastic feature, but certainly lacking for development work.
Moving data wasn’t as straightforward in 1978 as it is today. While the Rockwell AIM 65 is a great machine, it has no disk drive and no filesystem. Programs can be written in assembler or BASIC (which had ROM support) but getting them into running memory where they could execute is not as simple as it is on modern machines. One can type a program in by hand, but no one wants to do that twice.
Fortunately the AIM 65 had a tape interface (two, actually) and could read and store data in an audio-encoded format. Rather than typing a program by hand, one could play an audio tape instead.
This is the angle [Casey]’s tools take, in the form of two Python programs: one for encoding into audio, and one for decoding. He can write a program on his main desktop, and encode it into a .wav file. To load the program, he sets up the AIM 65 then hits play on that same .wav file, sending the audio to the AIM 65 and essentially automating the process of typing it in. We’ve seen people emulate vintage tape drive hardware, but the approach of simply encoding text to and from .wav files is much more fitting in this case.
The audio encoding format Rockwell used for the AIM is very well-documented but no tools existed that [Casey] could find, so he made his own with the help of Anthropic’s Claude AI. The results were great, as Claude was able to read the documentation and, with [Casey]’s direction, generate working encoding and decoding tools that implemented the spec perfectly. It went so swimmingly he even went on to also make a two-pass assembler and source code formatter for the AIM, as well. With them, development is far friendlier.
Watch a demonstration in the video [Casey] made (embedded under the page break) that shows the encoded data being transferred at a screaming 300 baud, before being run on the AIM 65.
youtube.com/embed/C5hO1vE4pxM?…
It’s one thing to learn about transmission lines in theory, and quite another to watch a voltage pulse bounce off an open connector. [Alpha Phoenix] bridges the gap between knowledge and understanding in the excellent videos after the break. With a simple circuit, he uses an oscilloscope to visualize the propagation of electricity, showing us exactly how signals travel, reflect, and interfere.
The experiment relies on a twisted-pair Y-harness, where one leg is left open and the other is terminated by a resistor. By stitching together oscilloscope traces captured at regular intervals along the wire, [Alpha Phoenix] constructs a visualization of the voltage pulse propagating. To make this intuitive, [Alpha Phoenix] built a water model of the same circuit with acrylic channels, and the visual result is almost identical to the electrical traces.
For those who dabble in the dark art of RF and radio, the real payoff is the demonstration of impedance matching in the second video. He swaps resistors on the terminated leg to show how energy “sloshes” back when the resistance is too high or too low. However, when the resistor matches the line’s characteristic impedance, the reflection vanishes entirely—the energy is perfectly dissipated. It really makes it click how a well-matched, low SWR antenna is crucial for performance and protecting your radio.
[Alpha Phoenix] is a genius at making physics visible. He even managed “film” a laser beam traveling at light speed.
youtube.com/embed/2AXv49dDQJw?…
youtube.com/embed/RkAF3X6cJa4?…
Hackers inserted malicious code in the desktop client of Chinese webdev service Apifox.
The attacker compromised JavaScript files hosted in the app's CDN and added code to steal user credentials to a remote server
reshared this
La potete ascoltare sulla sua istanza Castopod, scaricarla, copiarla e farci quello che volete.
like this
reshared this
The Balancer DeFi platform has shut down after hackers stole $110 million last November
forum.balancer.fi/t/on-the-fut…
Nerite supports balancer! Balancer will come back from this in some form or another. Abandoning veBAL is fine as long as there is another alternative. Tokenomics update is very welcome.Balancer
reshared this
⚠️Se siete incappati in un post di #Esperia Italia, ci sono un po’ di cose che dovreste sapere⚠️
Dietro l’ascesa della nuova voce della destra su Instagram e TikTok c’è la mano di professionisti della comunicazione e legami che arrivano fino a uno dei più stretti collaboratori di Giorgia Meloni
reshared this
informapirata ⁂ likes this.
reshared this
New, from our @deepfield ERT: found a new botnet dressing its C2 traffic as camera management.
#Drifter names its domains after Hikvision products, blending with surveillance traffic on the same VLAN as the Android TV boxes it infects. DNS queries go through an Australian resolver, which somewhat undermines the cover if your bot is in São Paulo.
71 KB binary, already linked to attacks exceeding 2 Tbps from 80k sources. At least six operators are now competing for the same devices.
github.com/deepfield/public-re…
DDoS botnet research and indicators of compromise from Nokia Deepfield ERT - deepfield/public-researchGitHub
reshared this
[Tommy] at Oskitone has been making hardware synth kits for years, and his designs are always worth checking out. His newest offering Space Dice is an educational kit that is a combination vintage sci-fi space laser sound generator, and six-sided die roller. What’s more, as a kit it represents an effort to be genuinely educational, rather than just using it as a meaningless marketing term.
There are several elements we find pretty interesting in Space Dice. One is the fact that, like most of [Tommy]’s designs, there isn’t a microcontroller in sight. Synthesizers based mostly on CMOS logic chips have been a mainstay of DIY electronics for years, as have “electronic dice” circuits. This device mashes both together in an accessible way that uses a minimum of components.
There are only three chips inside: a CD4093 quad NAND with Schmitt-trigger inputs used as a relaxation oscillator, a CD4040 binary counter used as a prescaler, and a CD4017 decade counter responsible for spinning a signal around six LEDs while sound is generated, to represent an electronic die. Sound emerges from a speaker on the backside of the PCB, which we’re delighted to see is driven not by a separate amplifier chip, but by unused gates on the CD4093 acting as a simple but effective square wave booster.
In addition, [Tommy] puts effort into minimizing part count and complexity, ensuring that physical assembly does not depend on separate fasteners or adhesives. We also like the way he uses a lever assembly to make the big activation button — mounted squarely above the 9 V battery — interface with a button on the PCB that is physically off to the side. The result is an enclosure that is compact and tidy.
We recommend checking out [Tommy]’s concise writeup on the design details of Space Dice for some great design insights, and take a look at the assembly guide to see for yourself the attention paid to making the process an educational one. We love the concept of presenting an evolving schematic diagram, which changes and fills out as each assembly step is performed and tested.
Watch it in action in a demo video, embedded just below. Space Dice is available for purchase but if you prefer to roll your own, all the design files and documentation are available online from the project’s GitHub repository.
player.vimeo.com/video/1172325…
If the Trivy, RICS, and LiteLLM incidents have confused you, the team at OpenSourceMalware has published a profile of TeamPCP, the group behind the larger attack (as well on how the attack was carried out)
opensourcemalware.com/blog/tea…
Security professionals sharing intelligence on malicious packages, repositories, and CDNs to protect the open source ecosystem.opensourcemalware.com
reshared this
Il Ransomware colposce Netalia: Cloud italiano sotto attacco, ma l’azienda frena sul data breach
📌 Link all'articolo : redhotcyber.com/post/il-ransom…
#redhotcyber #news #cybersecurity #hacking #malware #ransomware #attacchinformatici #gruppQilin #netalia #cloudsecurity
Un attacco ransomware colpisce Netalia, player importante nel mercato cloud italiano, e mette in dubbio la sicurezza dei datiRedazione RHC (Red Hot Cyber)
reshared this
reshared this
The common narrative around device design is that you can have repairability or a low price, but that they are inversely proportional to each other. Apple’s new budget MacBook Neo seems to attempt a bit of both.
Brittle snap-fit enclosures or glue can make a device pop together quickly during manufacture, but are a headache when it comes time to repair or hack it. Our friends at iFixit tore down the Neo and found it to be the most repairable MacBook since the 2012 unibody model. A screwed in battery, and modules for many of the individual components including the USB ports and headphone jack make it fairly simple to replace individual components. Most of those components are even accessible as soon as you pop the bottom cover instead of requiring major surgery.
As someone who has done a keyboard replacement on a 2010 MacBook, the 41 screws holding the keyboard in brought back (bad) memories. While this is a great improvement over Apple’s notoriously painful repair processes, we’re still only looking at an overall 6/10 score from iFixit versus a 10/10 from Framework or Lenovo.
The real story here is that these improvements from Apple were spurred by Right-to-Repair developments, particularly in the EU, that were the result of pressure from hackers like you.
If you want to push a Neo even further, how about water cooling it? If you’d rather have user-upgradeable RAM and storage too in a Mac, you’ve got to go a bit older.
youtube.com/embed/PbPCGqoBB4Y?…
«Ho decompilato la nuova app della Casa Bianca.»
L'app ufficiale della Casa Bianca per Android include un sistema per aggirare i cookie e i sistemi di pagamento, traccia la tua posizione GPS ogni 4,5 minuti e carica codice JavaScript dalle pagine GitHub di un tizio non specificato... 🤡
like this
reshared this
@Informatica (Italy e non Italy)
Due episodi molto diversi mostrano quanto la minaccia cyber resti alta anche su profili istituzionali altissimi. Il caso della mail del direttore Fbi Patel violata da hacker iraniani sembra legato a dati personali datati mentre la violazione del cloud della Commissione europea
reshared this
@Informatica (Italy e non Italy)
La violazione dell’account mail personale di Kash Patel mostra quanto un profilo privato possa diventare un obiettivo strategico. Anche senza dati classificati, il materiale sottratto può alimentare intelligence, propaganda e futuri attacchi di spear phishing
L'articolo Hack iraniano al capo dell’FBI:
reshared this
Sam Izby
in reply to Catalin Cimpanu • • •