Salta al contenuto principale


Gaming on an Arduino Uno Q in Linux


After Qualcomm’s purchase of Arduino it has left many wondering what market its new Uno Q board is trying to target. Taking the ongoing RAM-pocalypse as inspiration, [Bringus Studios] made a tongue-in-cheek video about using one of these SoC/MCU hybrid Arduino boards for running Linux and gaming on it. Naturally, with the lack of ARM-native Steam games, this meant using the FEX x86-to-ARM translator in addition to Steam’s Proton translation layer where no native Linux game exists, making for an excellent stress test of the SoC side of this board.
Technically, this is a heatsink. (Credit: Bringus Studios, YouTube)Technically, this is a heatsink. (Credit: Bringus Studios, YouTube)
We covered this new ‘Arduino’ board previously, which features both a quad-core Cortex-A53 SoC and a Cortex-M33 MCU. Since it uses the Uno form factor, all SoC I/O goes via the single USB-C connector, meaning that a USB-C docking station is pretty much required to use the SoC, though there’s at least 16 GB of eMMC to install the OS on. A Debian-based OS image even comes preinstalled, which is convenient.

With a mere 2 GB of LPDDR4 it’s not the ideal board to run desktop Linux on, but if you’re persistent and patient enough it will work, and you can even play 3D video games as though it’s Qualcomm’s take on Raspberry Pi SBCs. After some intense gaming the SoC package gets really quite toasty, so adding a heatsink is probably needed if you want to peg its cores and GPU to 100% for extended periods of time.

As for dodging the RAM-pocalypse with one of these $44 boards, it’s about the same price as the 1 GB Raspberry Pi 5, but the 2 GB RPi 5 – even with the recent second price bump – is probably a better deal for this purpose. Especially since you can skip the whole docking station, but losing the eMMC is a rawer deal, and the dedicated MCU could be arguably nice for more dedicated purposes. Still, desktop performance is a hard ‘meh’ on the Uno Q, even if you’re very generous.

Despite FEX being a pain to set up, it seems to work well, which is promising for Valve’s upcoming Steam Frame VR glasses, which are incidentally Qualcomm Snapdragon-based.

youtube.com/embed/YrrqF2y-dlM?…


hackaday.com/2026/02/10/gaming…


Cybersecurity & cyberwarfare ha ricondiviso questo.


UNC1069 colpisce fintech e startup crypto: ecco cosa sapere

📌 Link all'articolo : redhotcyber.com/post/unc1069-c…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #socialengineering #cryptosicurezza


Cybersecurity & cyberwarfare ha ricondiviso questo.


L'intelligenza artificiale non riduce il lavoro, lo rende più estenuante

Sebbene la sensazione di avere un "partner" favorisca un senso di slancio, la realtà mostra un continuo cambio di attenzione, un controllo frequente degli output dell'IA e un numero crescente di attività aperte. Ciò crea un carico cognitivo e una sensazione di continuo destreggiarsi tra le varie attività, anche se il lavoro sembra produttivo.

simonwillison.net/2026/Feb/9/a…

@aitech


Cybersecurity & cyberwarfare ha ricondiviso questo.


Una giuria ha affermato che Meta e Google hanno "progettato la dipendenza" in un processo storico negli Stati Uniti

Meta e YouTube, di proprietà di Google, sono stati accusati lunedì di aver promosso app altamente coinvolgenti sui bambini, mentre un processo storico sui social media è iniziato sul serio in un tribunale della California.

techxplore.com/news/2026-02-ju…

@eticadigitale



Piantedosi, Urso, il Capo della Polizia e dell’Intelligence tra gli speaker di CyberSEC2026: l’agenda


@Informatica (Italy e non Italy)
È online l’Agenda della 5^ edizione di CyberSEC, la Conferenza internazionale promossa ed organizzata da Cybersecurity Italia, il quotidiano dedicato alla cultura cyber del nostro Gruppo editoriale. L’edizione 2026

reshared this



Cybersecurity & cyberwarfare ha ricondiviso questo.


Bug critico nel Semantic Kernel da 9.9 di score: i file sono a rischio. Aggiorna subito

📌 Link all'articolo : redhotcyber.com/post/bug-criti…

#redhotcyber #news #cybersecurity #hacking #vulnerabilita #microsoft #semanticKernel #sicurezzainformatica


Cybersecurity & cyberwarfare ha ricondiviso questo.


Has anyone looked if the Notepad++ and EmEditor incidents are related in any way?

reshared this

in reply to Catalin Cimpanu

I also wondered about that. Also, if the compromise of eScan's update infrastructure might be related / the work of the same group. But haven't heard anything to support that theory.

Cybersecurity & cyberwarfare ha ricondiviso questo.


🚀 AVVIATE LE ISCRIZIONI ALLA SETTIMA LIVE CLASS DEL CORSO "𝗗𝗔𝗥𝗞 𝗪𝗘𝗕 𝗘 𝗖𝗬𝗕𝗘𝗥 𝗧𝗛𝗥𝗘𝗔𝗧 𝗜𝗡𝗧𝗘𝗟𝗟𝗜𝗚𝗘𝗡𝗖𝗘" DI LIVELLO INTERMEDIO IN PARTENZA A MARZO (POSTI LIMITATI)

✅ Pagina del corso: redhotcyber.com/linksSk2L/acad…
✅ Presentazione del corso del prof. Pietro Melillo : youtube.com/watch?v=9VaQUnTz4J…
✅ Webinar introduttivo di presentazione al corso : youtube.com/watch?v=ExZhKqjuwf…

Per info e iscrizioni: 📱 💬 379 163 8765 ✉️ formazione@redhotcyber.com

#redhotcyber #formazione #formazioneonline #ethicalhacking #cti #cyberthreatintelligence #cybersecurity #cybercrime #cybersecuritytraining #cybersecuritynews #privacy #cti #cyberthreat #intelligence #infosec #corsi #corsiprartici #liveclass


Cybersecurity & cyberwarfare ha ricondiviso questo.


RE: flipboard.com/@wireditalia/sci…

O era un antesignano del Go o la prima campagna di DnD in cui esordivo come Dungeon Master =D


Le regole di un antico gioco da tavolo dell'Impero romano inciso su una pietra sono state svelate grazie all'intelligenza artificiale
https://www.wired.it/article/regole-antico-gioco-da-tavolo-romano-pietra-svelate-intelligenza-artificiale-ludus-coriovalli/?utm_source=flipboard&utm_medium=activitypub

Pubblicato su Scienza @scienza-WiredItalia



Cybersecurity & cyberwarfare ha ricondiviso questo.


An Orange Cyberdefense report concludes that hacktivism has evolved from a form of digital protest into the realm of hybrid warfare

orangecyberdefense.com/global/…

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


#Senegal shuts National ID office after #ransomware attack
securityaffairs.com/187811/dat…
#securityaffairs #hacking #malware

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Google Cloud has published a report looking at all the threat actors targeting companies in the Defense Industrial Base. The report goes over the main groups from all major foreign adversaries and what their main focus has been over the past decade

cloud.google.com/blog/topics/t…

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


A US judge has sentenced a Chinese national to 20 years in prison for laundering funds from Cambodian cyber scam compounds

That's the maximum sentence, btw

justice.gov/opa/pr/man-sentenc…

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


New report claims that after a close Orban ally bought Euronews, the TV network turned into a propaganda machine for autocratic regimes

euractiv.com/news/inside-euron…

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Dutch agencies hit by #Ivanti #EPMM exploit exposing employee contact data
securityaffairs.com/187806/sec…
#securityaffairs #hacking

Cybersecurity & cyberwarfare ha ricondiviso questo.


📣 ISCRIVITI AL WEBINAR GRATUITO DEL CORSO "CYBER OFFENSIVE FUNDAMENTALS" – LIVELLO BASE 🚀

📅 Data Webinar: Martedì 17 Febbraio ore 18

Per ricevere il link al webinar e per iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com

🔗 Programma: redhotcyber.com/linksSk2L/cybe…
🎥 Intro del prof: youtube.com/watch?v=0y4GYsJMoX…

Attraverso laboratori isolati e replicabili, potrai sperimentare:
✅Ricognizione e analisi delle vulnerabilità
✅Exploitation controllata e post-exploitation in sicurezza
✅Uso professionale di strumenti come Nmap, Metasploit, BloodHound e Nessus

Per info e iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com

#redhotcyber #formazione #pentesting #pentest #formazioneonline #ethicalhacking #cybersecurity #penetrationtesting #cti #cybercrime #infosec #corsi #liveclass #hackerhood #pentesting



IBM Made a Sound Card? Who Knew!


Even in a field you think you know intimately, the Internet still has the power to surprise. Sound cards of the 1990s might not be everyone’s specialist subject, but since the CD-ROM business provided formative employment where this is being written, it’s safe to say that a lot of tech from that era is familiar. It’s a surprise then when along comes [DOS Storm] with a new one. The IBM Mwave was the computer giant’s offering back in the days when they were still pushing forward in the PC space, and sadly for them it turned out to be a commercial disaster.

The king of the sound cards in the ’90s was the SoundBlaster 16, which other manufacturers cloned directly. Not IBM of course, who brought their own Mwave DSP chip to the card, using it as both the sound card and the engine behind an on-board dial-up modem. This appears to have been its undoing, because aside from its notoriously flaky drivers, using both sound and modem at the same time just wasn’t a pleasant experience. To compound the problem, Big Blue resorted to trying to bury the problem with NDAs rather than releasing better drivers, so unsurprisingly it faded from view. Perhaps the reason it was unfamiliar here had something to do with it not being sold in Europe, but given that the chipset found its way into ’90s ThinkPads, we’d have expected to have seen something of it.

In the video below the break he introduces the card, and with quite some trouble gets it working. There are several demos of period games which sound a little scratchy, but we can’t judge from this whether they’d have sounded better on the Creative card. If you’d like to immerse yourself in the folly of ’90s multimedia, have a little bit of Hackaday scribe reminiscing.

youtube.com/embed/v1RmAd9iwwA?…


hackaday.com/2026/02/09/ibm-ma…



Cybersecurity & cyberwarfare ha ricondiviso questo.


#China-linked APT #UNC3886 targets #Singapore telcos
securityaffairs.com/187792/apt…
#securityaffairs #hacking

reshared this



Safer Internet Day 2026: il vettore d’attacco nell’era dell’AI non è più il malware, ma la comunicazione


@Informatica (Italy e non Italy)
Oggi il rischio non è più Internet, ma social, messaggistica, AI generativa e Agentic AI. Tuttavia l'appello a condividere dati in modo consapevole significa proteggere noi stessi e gli altri. Ecco cosa

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Buon compleanno a Gary McKinnon che compie 60 anni: l’hacker che sfidò la NASA in cerca degli UFO!

📌 Link all'articolo : redhotcyber.com/post/hacker-fa…

#redhotcyber #news #hacker #security #nasa #ufo #extradizione #statunitensi #scozzese #cybersecurity #hacking

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


La mente dietro le password: quando squilla il telefono. Puntata 8

📌 Link all'articolo : redhotcyber.com/post/la-mente-…

#redhotcyber #news #sicurezzainformatica #sicurezzadigital #cybersecurity #hacking #phishing #spoofing


Cybersecurity & cyberwarfare ha ricondiviso questo.


224 – La pubblicità è impazzita: stessa audience online vale poco, in TV vale oro camisanicalzolari.it/224-la-pu…

Cybersecurity & cyberwarfare ha ricondiviso questo.


⏳ RHC CONFERENCE 2026 – SPONSOR PROGRAM: ULTIME SETTIMANE PER ADERIRE

📍 Pagina evento: redhotcyber.com/red-hot-cyber-…
📩 Per informazioni e sponsorizzazioni: sponsor@redhotcyber.com

#redhotcyber #rhcconference #cybersecurity #informationsecurity #digitalinnovation #sponsorship #infosecurity


Cybersecurity & cyberwarfare ha ricondiviso questo.


Zero-click, zero avvisi: così le estensioni di Claude prendono il controllo del tuo PC

📌 Link all'articolo : redhotcyber.com/post/zero-clic…

#redhotcyber #news #intelligenzaartificiale #sicurezzainformatica #vulnerabilit #cybersecurity #hacking #malware


Cybersecurity & cyberwarfare ha ricondiviso questo.


Campagne zero-day e ransomware su larga scala: più attacchi ma meno riscatti

📌 Link all'articolo : redhotcyber.com/post/campagne-…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #vulnerabilita #zeroDay #estorsione #dati


Cybersecurity & cyberwarfare ha ricondiviso questo.


Humanoid presenta KinetIQ: il sistema di controllo degli sciami robot

📌 Link all'articolo : redhotcyber.com/post/humanoid-…

#redhotcyber #news #robotica #intelligenzaartificiale #sistemidigestiorobot #kinetiq #humanoid #robot #autonomia



Why Haven’t Quantum Computers Factored 21 Yet?


If you are to believe the glossy marketing campaigns about ‘quantum computing’, then we are on the cusp of a computing revolution, yet back in the real world things look a lot less dire. At least if you’re worried about quantum computers (QCs) breaking every single conventional encryption algorithm in use today, because at this point they cannot even factor 21 yet without cheating.

In the article by [Craig Gidney] the basic problem is explained, which comes down to simple exponentials. Specifically the number of quantum gates required to perform factoring increases exponentially, allowing QCs to factor 15 in 2001 with a total of 21 two-qubit entangling gates. Extrapolating from the used circuit, factoring 21 would require 2,405 gates, or 115 times more.

Explained in the article is that this is due to how Shor’s algorithm works, along with the overhead of quantum error correction. Obviously this puts a bit of a damper on the concept of an imminent post-quantum cryptography world, with a recent paper by [Dennish Willsch] et al. laying out the issues that both analog QCs (e.g. D-Wave) and digital QCs will have to solve before they can effectively perform factorization. Issues such as a digital QC needing several millions of physical qubits to factor 2048-bit RSA integers.


hackaday.com/2026/02/09/why-ha…


Cybersecurity & cyberwarfare ha ricondiviso questo.


New academic research has found that Chrome's new MV3 extension API is not that bad after all

"Ad blocker providers appear to have successfully navigated the MV3 update, finding solutions that maintain the core functionality of their extensions"

petsymposium.org/popets/2026/p…

Questa voce è stata modificata (2 giorni fa)

reshared this



A Working Intercom From Antique Telephones


Although it can be hard to imagine in today’s semiconductor-powered, digital world, there was electrical technology around before the widespread adoption of the transistor in the latter half of the 1900s that could do more than provide lighting. People figured out clever ways to send information around analog systems, whether that was a telegraph or a telephone. These systems are almost completely obsolete these days thanks to digital technology, leaving a large number of rotary phones and other communications systems relegated to the dustbin of history. [Attoparsec] brought a few of these old machines back to life anyway, setting up a local intercom system with technology faithful to this pre-digital era.

These phones date well before the rotary phone that some of us may be familiar with, to a time where landline phones had batteries installed in them to provide current to the analog voice circuit. A transformer isolated the DC out of the line and amplified the voice signal. A generator was included in parallel which, when operated by hand, could ring the other phones on the line. The challenge to this build was keeping everything period-appropriate, with a few compromises made for the batteries which are D-cell batteries with a recreation case. [Attoparsec] even found cloth wiring meant for guitars to keep the insides looking like they’re still 100 years old. Beyond that, a few plastic parts needed to be fabricated to make sure the circuit was working properly, but for a relatively simple machine the repairs were relatively straightforward.

The other key to getting an intercom set up in a house is exterior to the phones themselves. There needs to be some sort of wiring connecting the phones, and [Attoparsec] had a number of existing phone wiring options already available in his house. He only needed to run a few extra wires to get the phones located in his preferred spots. After everything is hooked up, the phones work just as they would have when they were new, although their actual utility is limited by the availability of things like smartphones. But, if you have enough of these antiques, you can always build your own analog phone network from the ground up to support them all.

youtube.com/embed/mkJmT9kiu30?…


hackaday.com/2026/02/09/a-work…



Upcycling an iPad into a Touchscreen Display for your PC



Installing an RPi Pico board like it's a modchip. (Credit: Tucker Osman, YouTube)Installing an RPi Pico board like it’s a modchip. (Credit: Tucker Osman, YouTube)
Although generally iPads tend to keep their resale value, there are a few exceptions, such as when you find yourself burdened with iCloud-locked devices. Instead of tossing these out as e-waste, you can still give them a new, arguably better purpose in life: an external display, with touchscreen functionality if you’re persistent enough. Basically someone like [Tucker Osman], who spent the past months on making the touchscreen functionality play nice in Windows and Linux.

While newer iPads are easy enough to upcycle as an external display as they use eDP (embedded Display Port), the touch controller relies on a number of chips that normally are initialized and controlled by the CPU. Most of the time was thus spent on reverse-engineering this whole process, though rather than a full-depth reverse-engineering, instead the initialization data stream was recorded and played back.

This thus requires that the iPad can still boot into iOS, but as demonstrated in the video it’s good enough to turn iCloud-locked e-waste into a multi-touch display. The SPI data stream that would normally go to the iPad’s SoC is instead intercepted by a Raspberry Pi Pico board which pretends to be a USB HID peripheral to the PC.

If you feel like giving it a short yourself, there’s the GitHub repository with details.

Thanks to [come2] for the tip.

youtube.com/embed/3t8xT-2vBE0?…


hackaday.com/2026/02/09/upcycl…



Converting AC Irrigation Valves To DC Operation


Due to historical engineering decisions made many decades ago, a great many irrigation systems rely on solenoid valves that operate on 24 volts AC. This can be inconvenient if you’re trying to integrate those valves with a modern smart home control system. [Johan] had read that there were ways to convert these valves to more convenient DC operation, and dived into the task himself.

As [Johan] found, simply wiring these valves up to DC voltage doesn’t go well. You tend to have to lower the voltage to avoid overheating, since the inductance effect used to limit the AC current doesn’t work at DC. However, even at as low as 12 volts, you might still overheat the solenoids, or you might not have enough current to activate the solenoid properly.

The workaround involves wiring up a current limiting resistor with a large capacitor in parallel. When firing 12 volts down the line to a solenoid valve, the resistor acts as a current limiter, while the parallel cap is initially a short circuit. This allows a high current initially, that slowly tails off to the limited value as the capacitor reaches full charge. This ensures the solenoid valve switches hard as required, but keeps the current level lower over the long term to avoid overheating. According to [Johan], this allows running 24V AC solenoid valves with a 12V DC supply and some simple off-the-shelf relay boards.

We’ve seen similar work before, which was applied to great effect. Sometimes doing a little hack work on your own can net you great hardware to work with. If you’ve found your own way to irrigate your garden as cheaply and effectively as possible, don’t hesitate to notify the tipsline!


hackaday.com/2026/02/09/conver…


Cybersecurity & cyberwarfare ha ricondiviso questo.


Substack breach impacted 663,000 accounts, but appears to be a scrape of public data... so not a big deal at all

haveibeenpwned.com/Breach/Subs…

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Security firm Defused has spotted a coordinated campaign from an initial access broker that is targeting the recent Ivanti EPMM zero-days

defusedcyber.com/ivanti-epmm-s…

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Fallo subito e poi sfuggi alla regolamentazione

Contenuti in riproduzione automatica, pubblicità personalizzata, gamification: ecco gli elementi progettati per influenzare in modo sottile gli utenti di Internet. Il Digital Fairness Act mira a contrastare questo fenomeno. Tuttavia, uno studio del Corporate Europe Observatory rivela che le grandi aziende tecnologiche come Meta e Google stanno facendo pressioni contro i piani della Commissione Europea.

netzpolitik.org/2026/big-tech-…

@eticadigitale

in reply to informapirata ⁂

Maledetti... Certe pubblicità e contenuti in riproduzione automatica violerebbero anche le norme di accessibilità - non parliamo di quelle pubblicità poi che ti alzano il volume a palla

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Un hacktivista ha recuperato più di mezzo milione di registrazioni di pagamento da un produttore di stalkerware e tecnologie di sorveglianza dei consumatori, esponendo gli indirizzi email dei clienti e numeri di carta parziali.

L'hackvisita ha detto di averlo fatto perché ritiene che queste aziende siano "inquietanti" e perché si diverte a "prendere di mira le app che vengono utilizzate per spiare le persone".

Il post di @lorenzofb

techcrunch.com/2026/02/09/hack…

@pirati



Incidente ransomware all'Università Sapienza di Roma: Fatti noti vs ipotesi analitiche

@Informatica (Italy e non Italy)

Qualsiasi collegamento a specifiche famiglie ransomware (BabLock/Rorschach) o ad attori di minaccia rimane un'ipotesi analitica, basata su somiglianze comportamentali e su pattern osservati a livello di settore, non su artefatti tecnici verificati.

Questa valutazione di bassa–moderata confidenza distingue le informazioni confermate dalle assunzioni derivate da analogie osservate e delinea uno scenario alternativo credibile che coinvolge la compromissione di credenziali di terze parti, potenzialmente connessa ad attacchi contemporanei contro istituzioni accademiche e governative.

L'analisi senza speculazioni, clickbait o informazioni non verificate a cura di @Claudia del gruppo di ransomnews.

ransomnews.online/blog/sapienz…

reshared this

in reply to Cybersecurity & cyberwarfare

qualche idea ce l'ho, ma sembra davvero troppo allucinante per essere vera..

Eppure, come diceva il buon Sherlock 😎


Cybersecurity & cyberwarfare ha ricondiviso questo.


Decodificare i compromessi nascosti di E2EE e usabilità - Le proprietà crittografiche dei vari servizi di comunicazione e2e

In un mondo ideale, le app di messaggistica crittografate end-to-end (E2EE) funzionerebbero in modo identico alle loro controparti non E2EE, senza ulteriori inconvenienti per gli utenti.
In realtà, molti problemi "semplici" diventano molto più difficili da risolvere.

element.io/blog/decoding-the-h…

@informatica