Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Telegram says it is not affected by a supposed zero-day in its IM client that can be exploited to run malicious code via a malicious custom sticker

x.com/telegram/status/20380697…

zerodayinitiative.com/advisori…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Israele vieta l'accesso al Santo Sepolcro al card #Pizzaballa

Tajani:"inaccettabile"
Meloni:"offensivo"

A #Gaza abbiamo avuto:
-70 mila morti
-190 mila feriti
-2 milioni sfollati
-negazione delle cure per 20 mila pazienti
-1,8 milioni di persone a rischio carestia
-80% delle strutture sanitarie distrutte
-70% degli edifici civili colpiti
-centinaia di ONG espulse
-oltre 200 giornalisti uccisi

Ma il #governo convoca l'ambasciatore israeliano per il divieto al cardinale.
Game over

Cybersecurity & cyberwarfare ha ricondiviso questo.

NO a Palantir in Europa: ecco l'iniziativa europea per chiedere all'Unione Europea di sospendere ogni rapporto con Palantir

Chiediamo ai governi europei di:

- Bloccare la firma di nuovi contratti con Palantir.
- Rivedere e rescindere gradualmente i contratti in essere con l’azienda.
- Investire in alternative europee trasparenti e pubblicamente responsabili.

@eticadigitale

action.wemove.eu/sign/2026-03-…

(SEGUE)

in reply to informapirata ⁂

Che cosa curiosa!

Dopo avere firmato la petizione l'ho condivisa su Facebook e del tutto casualmente il link è svanito dal mio post, c'è solo il testo che ho scritto io. Chissà come mai!

Aggiungete che Tiel, il fondatore di Palantir, è stato uno dei primi e più importanti finanziatori di Facebook, e fate 1+1.

reshared this

in reply to Carlo Bencini =/\=

Sensitive content

reshared this

in reply to Elena Brescacin

@elettrona @m3nhir @ilsimoneviaggiatore infatti.
Però ho anche smesso di usare Google come motore di ricerca e Chrome come browser, ormai da 2 anni con DuckDuckGo mi trovo benissimo 🤷‍♀️
Lo so, non è molto, ma se cisscuno di noi riduce la propria impronta è tanto di guadagnato

reshared this

in reply to Carlo Bencini =/\=

Sensitive content

reshared this

in reply to Elena Brescacin

@elettrona @cgbencini @m3nhir @ilsimoneviaggiatore ad esempio puoi degoogleare quanto ti pare, ma se devi cercare un pdi su una mappa hai una sola scelta! Maps.

Poi che in autostrada here we go dallo schermo del telefono, quando non canna le interruzioni, sia 100 volte meglio, o in città grandi a piedi organic maps si il migliore è un discorso diverso.

Ma se mi dicono che lo studio di tizio si trova di fianco al bar di caio, la scelta è una.

Etica Digitale (Feddit) reshared this.

Cybersecurity & cyberwarfare ha ricondiviso questo.

La situazione dei bot su Internet è in realtà peggiore di quanto si possa immaginare. Ecco perché:

Come forse saprete, su Glade Art tendiamo a prendere molto sul serio le misure anti-bot; una delle nostre massime priorità è proteggere gli altri utenti dal fatto che la loro arte venga sottoposta ad addestramento automatico. Tendiamo anche a trollare i bot utilizzando infiniti labirinti di dati inutili per intrappolarli. Questi sono comunemente indicati come "honeypot" o "fosse di catrame digitali" E così, dopo 6,8 milioni di richieste negli ultimi 55 giorni al momento in cui scrivo, abbiamo alcuni dati sostanziali, quindi restate in attesa e lasciate che li condividiamo con voi. : )

gladeart.com/blog/the-bot-situ…

@Informatica (Italy e non Italy)

Questa voce è stata modificata (1 giorno fa)

Clean Enclosures, No Printing Necessary


The media in this post is not displayed to visitors. To view it, please log in.

Unless you’re into circuit sculptures, generally speaking, a working circuit isn’t the end-point of a lot of electronics projects. To protect your new creation from grabby hands, curious paws, and the ravages of nature, you’ll probably want some kind of enclosure. These days a lot of us would probably run it off on the 3D printer, but some people would rather stay electronics hobbiests without getting into the 3D printing hobby. For those people, [mircemk] shares how he creates professonal-looking enclosures with handtools.

The name [mircemk] will seem familiar to longtime readers– we’ve featured many of his projects, and they’ve always stood out for the simple but elegant enclosures he uses. The secret, it turns out, is thin PVC sheeting from a sign shop. At thicknesses upto and including 5 mm, the material can be bent by hand and cut with hobby knives. It’s obviously also amenable to drilling and cutting with woodworking tools as well. Drilling is especially useful to make holes for indicator LEDs. [mircemk] recommends cyanoacrylate ‘crazy’ glue to hold pieces together. For holding down the PCB, the suggestion of double-sided tape will work for components that won’t get too hot.

Rather than paint, the bold contrasting colours we’ve become used to are applied using peel-and-stick wallpaper, which is a great idea. It’s quick, zero mess, and the colour is guaranteed to be evenly applied. It might even help hold the PVC enclosure together ever so slightly. You can watch him do it in the video embedded below.

We hate to say it, but for a one-off project, this technique probably does beat a 3D printed box for professional looks, assuming you have [mircemk]’s motorskills. If you don’t have said motor skills, check out this parametric project box generator. If you’d rather avoid PVC while making a square box to hold a PCB, have you considered using PCBs?

Thanks to [mircemk] for the tip! If you have a tip or technique you want to share, please box it up and send it to the tipsline

youtube.com/embed/t9KfsZ-eU5M?…


hackaday.com/2026/03/29/clean-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Bluesky punta sull'intelligenza artificiale con Attie, un'app per la creazione di feed personalizzati

Il team di #Bluesky ha creato un'altra app, e questa volta non si tratta di un social network, bensì di un assistente basato sull'intelligenza artificiale che permette di progettare il proprio algoritmo, creare feed personalizzati e, un giorno, persino "codificare" la propria app.

techcrunch.com/2026/03/28/blue…

@bluesky

reshared this

in reply to Poliverso & Poliversity

Nope. Am I the only one who find this app a bit dangerous? There is no more need (for the company who is social owner) to guess what a person likes or a person wants. Is the person who says clear and loud for what kind of content is a perfect target.
No, thanks. No.

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

I Social sono una parte fondamentale della nostra vita? Cosa ci insegnano tutte le multe alle big tech e le controversie degli ultimi giorni? Io mi sono chiesto tutte queste cose ed ho deciso di fare detox da tutti i social.

Vi racconto la mia esperienza senza filtri:

youtu.be/T2EUHE-X_e4

#mastodon #linux #opensource

@opensource

in reply to Simone Spinedi

credo che siamo arrivati al punto in cui c'è bisogno che l'OMS intervenga, perché ormai queste piattaforme non sono più un tramite per gli esseri umani, ma sono strumenti per manipolare lo stato emotivo e sociale. E non lo dico tanto per dire, l'ho vissuto sulla mia pelle. Ci sarebbe così tanto da far conoscere su molti aspetti di salute mentale che stanno colpendo queste piattaforme... speriamo che qualcuno intervenga il prima possibile.
Cybersecurity & cyberwarfare ha ricondiviso questo.

Più di 1.500 matematici chiedono che il convegno più prestigioso del loro settore venga spostato dagli Stati Uniti

Sta circolando tra i matematici una petizione per spostare l'evento altrove. La petizione cita le recenti azioni militari americane in Venezuela e Iran, la sospensione dei visti per i cittadini di 75 paesi e la continua presenza di agenti federali dell'Immigration and Customs Enforcement (ICE) nelle principali città statunitensi, elementi che contrastano con l'obiettivo dell'ICM di promuovere "un senso di unità internazionale tra i matematici".

scientificamerican.com/article…

@matematica

Cybersecurity & cyberwarfare ha ricondiviso questo.

Security firm Cybereason has open-sourced owLSM, an EDR-like agent for Linux, an eBPF LSM agent to run Sigma rules

github.com/Cybereason-Public/o…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Buongiorno.

Inauguro i #consiglidifollow, suddivisi per argomento.
Non sono elenchi esaustivi. Semplicemente condivido gli account che mi è capitato d'incontrare per caso e che piacciono a me.

Primo elenco: Letteratura.


@WeirdWriter
@WedaleBooks
@internetarchive
@differx
@Umbertogaetani
@jeffjarvis
@Fbrzvnrnd
@lisavag
@viadellabarca
@huss
@m
@TGioiellieri
@libri@feddit.it
@lucianofloridi
@overholt
@gutenberg_new
@giuliocavalli
@cctmwebsite
@libri@poliverso.org
@slowforward.net
@Ricciotto
@antoniovigilante

Self-healing CMOS Imager to Withstand Jupiter’s Radiation Belt


The media in this post is not displayed to visitors. To view it, please log in.

Ionizing radiation damage from electrons, protons and gamma rays will over time damage a CMOS circuit, through e.g. degrading the oxide layer and damaging the lattice structure. For a space-based camera that’s inside a probe orbiting a planet like Jupiter it’s thus a bit of a bummer if this will massively shorted useful observation time before the sensor has been fully degraded. A potential workaround here is by using thermal energy to anneal the damaged part of a CMOS imager.

The first step is to detect damaged pixels by performing a read-out while the sensor is not exposed to light. If a pixel still carries significant current it’s marked as damaged and a high current is passed through it to significantly raise its temperature. For the digital logic part of the circuit a similar approach is used, where the detection of logic errors is cause for a high voltage pulse that should also result in annealing of any damage.

During testing the chip was exposed to the same level of radiation to what it would experience during thirty days in orbit around Jupiter, which rendered the sensor basically unusable with a massive increase in leakage current. After four rounds of annealing the image was almost restored to full health, showing that it is a viable approach.

Naturally, this self-healing method is only intended as another line of defense against ionizing radiation, with radiation shielding and radiation-resistant semiconductor technologies serving as the primary defenses.


hackaday.com/2026/03/29/self-h…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Un nuovo malware Linux si evolve con l’aiuto dell’intelligenza artificiale e diventa quasi impossibile da rilevare...

📌 Link all'articolo : redhotcyber.com/post/voidlink-…

A cura di Bajram Zeqiri

#redhotcyber #hacking #cti #cybercrime #cybersecurity #news #cyberthreatintelligence

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Urgent Alert: #NetScaler bug CVE-2026-3055 probed by attackers could leak sensitive data
securityaffairs.com/190131/hac…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

Nasce Botèp, l'istanza gancio di Bergamo e provincia


botep.org/ è l'istanza gancio di Bergamo e provincia dove tutti possono condividere eventi di qualsiasi tipo. Può essere seguita direttamente dalle piattaforme del fedi verso tramite l'account @relay@botep.org
Cybersecurity & cyberwarfare ha ricondiviso questo.

SECURITY AFFAIRS #MALWARE #NEWSLETTER ROUND 90
securityaffairs.com/190123/mal…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

#Apple issues urgent lock screen warnings for unpatched #iPhones and #iPads
securityaffairs.com/190109/sec…
#securityaffairs #hacking

Multicolor 5-Axis 3D Printing


The media in this post is not displayed to visitors. To view it, please log in.

A 3D printer is shown, with the print bed pitched sharply toward the camera. The hotend is depositing plastic on a model at a sharp angle to the print bed.

Usually, when we see non-planar 3D printers, they’re rather rudimentary prototypes, intended more as development frames than as workhorse machines. [multipoleguy]’s Archer five-axis printer, on the other hand, breaks this trend with automatic four-hotend toolchanging, a CoreXY motion system, and print results as good-looking as any Voron’s.

The print bed rests on three ball joints, two on one side and one in the center of the opposite side. Each joint can be raised and lowered on an independent rail, which allows the bed to be tilted on two axes. The dimensions of the extruders their motion system limit how much the bed can be angled when the extruder is close to the bed, but it can reach sharp angles further out.

The biggest difficulty with non-planar printing is developing a slicer; [multipoleguy] is working on a slicer (MaxiSlicer), but it’s still in development. It looks as though it’s already working rather well, to the point that [multipoleguy] has been optimizing purge settings for tool changes. It seems that when a toolhead is docked, the temperature inside the melt chamber rises above the normal temperature in use, which causes stringing. To compensate for this, the firmware runs a more extensive purge when a hotend’s been sitting for a longer time. The results for themselves: a full three-color double helix, involving 830 tool changes, could be printed with as little as six grams of purge waste.

As three-axis 3D printers become consumer products, hackers have kept looking for further improvements to make, which perhaps explains the number of non-planar printing projects appearing recently, including a few five-axis machines. Alternatively, some have experimented with non-planar print ironing.

youtube.com/embed/Y44QV1gQqq0?…


hackaday.com/2026/03/29/multic…

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Telegram: rilevata vulnerabilità 0-Click

Rilevata una vulnerabilità 0‑click in Telegram, nota applicazione di messaggistica istantanea. Tale vulnerabilità potrebbe consentire a utente malintenzionato di eseguire codice arbitrario su istanze applicative Android e Linux, tramite l’invio di contenuti multimediali opportunamente predisposti

acn.gov.it/portale/w/telegram-…

Grazie a @nemeyes per la segnalazione

in reply to Devil

@devil
x.com/telegram/status/20380700…
Telegram smentisce
Quindi la notizia diventa che l'Agenzia per la Cybersicurezza Nazionale ripete a pappagallo quello che trova scritto online e spara raccomandazioni senza nessuna verifica di accuratezza, wow, bene

La fonte indicata è un blog di sicurezza "AI" (tale TrendAI) che non ha pubblicato neanche un proof of concept

👆 TrendAi è una divisione di Trend Micro, leggo online

reshared this

in reply to GNU/ Paolo Metal

@lichingyun @devil ma non funzione sempre così? Si avvisa il responsabile del software e si rende pubblico se non viene mitigato. La falla è stata trovata da zeroday
zerodayinitiative.com/advisori…

Il fatto che Telegram dica che la falla (gli sticker animati possono essere usati per eseguire codice) non esiste perchè gli sticker passano dai loro server mi sembra strano e non del tutto rassicurante. Anche le app malevole si installano dal play store.

informapirata ⁂ reshared this.

Cybersecurity & cyberwarfare ha ricondiviso questo.

Security Affairs #newsletter Round 569 by #Pierluigi #Paganini – INTERNATIONAL EDITION
securityaffairs.com/190104/unc…
#securityaffairs #hacking

Soviet CDs And CD Players Existed, And They Were Strange


The media in this post is not displayed to visitors. To view it, please log in.

Until the fall of the Soviet Union around 1990 you’d be forgiven as a proud Soviet citizen for thinking that the USSR’s technology was on par with the decadent West. After the Iron Curtain lifted it became however quite clear how outdated especially consumer electronics were in the USSR, with technologies like digital audio CDs and their players being one good point of comparison. In a recent video by a railways/retro tech YouTube channel we get a look at one of the earliest Soviet CD players.

A good overall summary of how CD technology slowly developed in the Soviet Union despite limitations can be found in this 2025 article by [Artur Netsvetaev]. Soviet technology was characterized mostly by glossy announcements and promises of ‘imminent’ serial production prior to a slow fading into obscurity. Soviet engineers had come up with the Luch-001 digital audio player in 1979, using glass discs. More prototypes followed, but with no means for mass-production and Soviet bureaucracy getting in the way, these efforts died during the 1980s.

During the 1980s CD players were produced in Soviet Estonia in small batches, using Philips internals to create the Estonia LP-010. Eventually sanctions on the USSR would strangle these efforts, however. Thus it wouldn’t be until 1991 that the Vega PKD-122 would become the first mass-produced CD player, with one example featured in this video.

The video helpfully includes a teardown of the player after a rundown of its controls and playback demonstration, so that we can ogle its internals. This system uses mostly localized components, with imported components like the VF display and processors gradually getting replaced over time. The DAC and optical-mechanical assembly would still be imported from Japan until 1995 when the factory went bankrupt.
Insides of the Vega 122S CD player. (Credit: Railways | Retro Tech | DIY, YouTube)Insides of the Vega 122S CD player. (Credit: Railways | Retro Tech | DIY, YouTube)
This difference between the imported and localized part is captured succinctly in the video with the comparison to Berlin in 1999, in that you can clearly see the difference between East and West. The CD mechanism is produced by Sanyo, with a Sanyo DAC IC on the mainboard. The power supply, display and logic board (using Soviet TTL ICs) are all Soviet-produced. A sticker inside the case identifies this unit as having been produced in 1994.

Amusingly, the front buttons are directly coupled into the mainboard without ESD protection, which means that in a Siberian winter with practically zero relative humidity inside you’d often fry the mainboard by merely using these buttons.

After this exploration the video goes on to explain how Soviet CD production began in the 1989, using imported technology and know-how. This factory was set up in Moscow, using outdated West-German CD pressing equipment and makes for a whole fascinating topic by itself.

Finally, the video explores the CD player’s manual and how to program the player, as well as how to obtain your own Soviet CD player. Interestingly, a former employee of the old factory has taken over the warehouse and set up a web shop selling new old stock as well as repaired units and replacement parts.

youtube.com/embed/utcfnmQtGxA?…


hackaday.com/2026/03/29/soviet…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

L’Europa è in allarme: Cina e Russia stanno facendo una mossa strategica per l’indipendenza tecnologica…

📌 Link all'articolo : redhotcyber.com/post/chi-contr…

A cura di Carolina Vivianti

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

C’è un nuovo mercato online che sta cambiando le regole del gioco per i criminali informatici...

📌 Link all'articolo : redhotcyber.com/post/arriva-le…

A cura di Bajram Zeqiri

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #news #cyberthreatintelligence

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

268 – Stiamo mettendo like su milioni di foto finte! O la smettiamo o faremo danni irreversibili camisanicalzolari.it/268-stiam…

reshared this

Play a .WAV Instead of Typing Line After Line Into Vintage Microcomputer


The media in this post is not displayed to visitors. To view it, please log in.

[Casey Bralla] got his hands on a Rockwell AIM 65 microcomputer, a fantastic example of vintage computing from the late 70s. It sports a full QWERTY keyboard, and a twenty character wide display complemented by a small thermal printer. The keyboard is remarkably comfortable, but doing software development on a one-line, twenty-character display is just not anyone’s idea of a good time. [Casey] made his own tools to let him write programs on his main PC, and transfer them easily to the AIM 65 instead.
A one-line, twenty-character wide display was a fantastic feature, but certainly lacking for development work.
Moving data wasn’t as straightforward in 1978 as it is today. While the Rockwell AIM 65 is a great machine, it has no disk drive and no filesystem. Programs can be written in assembler or BASIC (which had ROM support) but getting them into running memory where they could execute is not as simple as it is on modern machines. One can type a program in by hand, but no one wants to do that twice.

Fortunately the AIM 65 had a tape interface (two, actually) and could read and store data in an audio-encoded format. Rather than typing a program by hand, one could play an audio tape instead.

This is the angle [Casey]’s tools take, in the form of two Python programs: one for encoding into audio, and one for decoding. He can write a program on his main desktop, and encode it into a .wav file. To load the program, he sets up the AIM 65 then hits play on that same .wav file, sending the audio to the AIM 65 and essentially automating the process of typing it in. We’ve seen people emulate vintage tape drive hardware, but the approach of simply encoding text to and from .wav files is much more fitting in this case.

The audio encoding format Rockwell used for the AIM is very well-documented but no tools existed that [Casey] could find, so he made his own with the help of Anthropic’s Claude AI. The results were great, as Claude was able to read the documentation and, with [Casey]’s direction, generate working encoding and decoding tools that implemented the spec perfectly. It went so swimmingly he even went on to also make a two-pass assembler and source code formatter for the AIM, as well. With them, development is far friendlier.

Watch a demonstration in the video [Casey] made (embedded under the page break) that shows the encoded data being transferred at a screaming 300 baud, before being run on the AIM 65.

youtube.com/embed/C5hO1vE4pxM?…


hackaday.com/2026/03/28/play-a…

Watch Electricity Slosh: Visualizing Impedance Matching


The media in this post is not displayed to visitors. To view it, please log in.

Y-circuit comparison for a water and real electrical circuit

It’s one thing to learn about transmission lines in theory, and quite another to watch a voltage pulse bounce off an open connector. [Alpha Phoenix] bridges the gap between knowledge and understanding in the excellent videos after the break. With a simple circuit, he uses an oscilloscope to visualize the propagation of electricity, showing us exactly how signals travel, reflect, and interfere.

The experiment relies on a twisted-pair Y-harness, where one leg is left open and the other is terminated by a resistor. By stitching together oscilloscope traces captured at regular intervals along the wire, [Alpha Phoenix] constructs a visualization of the voltage pulse propagating. To make this intuitive, [Alpha Phoenix] built a water model of the same circuit with acrylic channels, and the visual result is almost identical to the electrical traces.

For those who dabble in the dark art of RF and radio, the real payoff is the demonstration of impedance matching in the second video. He swaps resistors on the terminated leg to show how energy “sloshes” back when the resistance is too high or too low. However, when the resistor matches the line’s characteristic impedance, the reflection vanishes entirely—the energy is perfectly dissipated. It really makes it click how a well-matched, low SWR antenna is crucial for performance and protecting your radio.

[Alpha Phoenix] is a genius at making physics visible. He even managed “film” a laser beam traveling at light speed.

youtube.com/embed/2AXv49dDQJw?…

youtube.com/embed/RkAF3X6cJa4?…


hackaday.com/2026/03/28/watch-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Hackers inserted malicious code in the desktop client of Chinese webdev service Apifox.

The attacker compromised JavaScript files hosted in the app's CDN and added code to steal user credentials to a remote server

slowmist.medium.com/security-a…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The Balancer DeFi platform has shut down after hackers stole $110 million last November

forum.balancer.fi/t/on-the-fut…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

⚠️Se siete incappati in un post di #Esperia Italia, ci sono un po’ di cose che dovreste sapere⚠️

Dietro l’ascesa della nuova voce della destra su Instagram e TikTok c’è la mano di professionisti della comunicazione e legami che arrivano fino a uno dei più stretti collaboratori di Giorgia Meloni

wired.it/article/esperia-itali…

@politica

in reply to informapirata ⁂

Sensitive content

reshared this

in reply to informapirata ⁂

@informapirata ⁂ da quello che ho capito leggendo l'articolo Zavalani è un uomo buono per tutte le stagionei sale sempre sul carro del vincitore e se alle prossime elezioni dovesse vincere il campo largo tornerà sulle sue posizioni iniziali.

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

New, from our @deepfield ERT: found a new botnet dressing its C2 traffic as camera management.

#Drifter names its domains after Hikvision products, blending with surveillance traffic on the same VLAN as the Android TV boxes it infects. DNS queries go through an Australian resolver, which somewhat undermines the cover if your bot is in São Paulo.

71 KB binary, already linked to attacks exceeding 2 Tbps from 80k sources. At least six operators are now competing for the same devices.

github.com/deepfield/public-re…

#threatintel #ddos

reshared this

Playful ‘Space Dice’ Kit Shows Off Clever Design


The media in this post is not displayed to visitors. To view it, please log in.

[Tommy] at Oskitone has been making hardware synth kits for years, and his designs are always worth checking out. His newest offering Space Dice is an educational kit that is a combination vintage sci-fi space laser sound generator, and six-sided die roller. What’s more, as a kit it represents an effort to be genuinely educational, rather than just using it as a meaningless marketing term.

There are several elements we find pretty interesting in Space Dice. One is the fact that, like most of [Tommy]’s designs, there isn’t a microcontroller in sight. Synthesizers based mostly on CMOS logic chips have been a mainstay of DIY electronics for years, as have “electronic dice” circuits. This device mashes both together in an accessible way that uses a minimum of components.

There are only three chips inside: a CD4093 quad NAND with Schmitt-trigger inputs used as a relaxation oscillator, a CD4040 binary counter used as a prescaler, and a CD4017 decade counter responsible for spinning a signal around six LEDs while sound is generated, to represent an electronic die. Sound emerges from a speaker on the backside of the PCB, which we’re delighted to see is driven not by a separate amplifier chip, but by unused gates on the CD4093 acting as a simple but effective square wave booster.

In addition, [Tommy] puts effort into minimizing part count and complexity, ensuring that physical assembly does not depend on separate fasteners or adhesives. We also like the way he uses a lever assembly to make the big activation button — mounted squarely above the 9 V battery — interface with a button on the PCB that is physically off to the side. The result is an enclosure that is compact and tidy.

We recommend checking out [Tommy]’s concise writeup on the design details of Space Dice for some great design insights, and take a look at the assembly guide to see for yourself the attention paid to making the process an educational one. We love the concept of presenting an evolving schematic diagram, which changes and fills out as each assembly step is performed and tested.

Watch it in action in a demo video, embedded just below. Space Dice is available for purchase but if you prefer to roll your own, all the design files and documentation are available online from the project’s GitHub repository.

player.vimeo.com/video/1172325…


hackaday.com/2026/03/28/playfu…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

If the Trivy, RICS, and LiteLLM incidents have confused you, the team at OpenSourceMalware has published a profile of TeamPCP, the group behind the larger attack (as well on how the attack was carried out)

opensourcemalware.com/blog/tea…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Il Ransomware colposce Netalia: Cloud italiano sotto attacco, ma l’azienda frena sul data breach

📌 Link all'articolo : redhotcyber.com/post/il-ransom…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #attacchinformatici #gruppQilin #netalia #cloudsecurity

reshared this

Apple’s Most Repairable Laptop is Thanks to Right-to-Repair


The media in this post is not displayed to visitors. To view it, please log in.

An upside down laptop with its cover removed on a grey surface. The inside of the laptop is a series of black modules connected to the frame with glorious amounts of screws and not glue!

The common narrative around device design is that you can have repairability or a low price, but that they are inversely proportional to each other. Apple’s new budget MacBook Neo seems to attempt a bit of both.

Brittle snap-fit enclosures or glue can make a device pop together quickly during manufacture, but are a headache when it comes time to repair or hack it. Our friends at iFixit tore down the Neo and found it to be the most repairable MacBook since the 2012 unibody model. A screwed in battery, and modules for many of the individual components including the USB ports and headphone jack make it fairly simple to replace individual components. Most of those components are even accessible as soon as you pop the bottom cover instead of requiring major surgery.

As someone who has done a keyboard replacement on a 2010 MacBook, the 41 screws holding the keyboard in brought back (bad) memories. While this is a great improvement over Apple’s notoriously painful repair processes, we’re still only looking at an overall 6/10 score from iFixit versus a 10/10 from Framework or Lenovo.

The real story here is that these improvements from Apple were spurred by Right-to-Repair developments, particularly in the EU, that were the result of pressure from hackers like you.

If you want to push a Neo even further, how about water cooling it? If you’d rather have user-upgradeable RAM and storage too in a Mac, you’ve got to go a bit older.

youtube.com/embed/PbPCGqoBB4Y?…


hackaday.com/2026/03/28/apples…

Cybersecurity & cyberwarfare ha ricondiviso questo.

«Ho decompilato la nuova app della Casa Bianca.»

L'app ufficiale della Casa Bianca per Android include un sistema per aggirare i cookie e i sistemi di pagamento, traccia la tua posizione GPS ogni 4,5 minuti e carica codice JavaScript dalle pagine GitHub di un tizio non specificato... 🤡

blog.thereallo.dev/blog/decomp…

@informatica

Cybersecurity & cyberwarfare ha ricondiviso questo.

Attacchi cyber a Commissione Ue e Fbi: che sta succedendo?


@Informatica (Italy e non Italy)
Due episodi molto diversi mostrano quanto la minaccia cyber resti alta anche su profili istituzionali altissimi. Il caso della mail del direttore Fbi Patel violata da hacker iraniani sembra legato a dati personali datati mentre la violazione del cloud della Commissione europea

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Hack iraniano al capo dell’FBI: ecco le ricadute


@Informatica (Italy e non Italy)
La violazione dell’account mail personale di Kash Patel mostra quanto un profilo privato possa diventare un obiettivo strategico. Anche senza dati classificati, il materiale sottratto può alimentare intelligence, propaganda e futuri attacchi di spear phishing
L'articolo Hack iraniano al capo dell’FBI: