Cybersecurity & cyberwarfare ha ricondiviso questo.

#ENISA Technical Advisory on Secure Package Managers: Essential DevSecOps Guidance
securityaffairs.com/189333/sec…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

⚠️ Abbiamo dovuto spegnere il server poliverso.org per operare alcuni interventi urgenti di manutenzione non programmata, al fine di risolvere alcuni problemi verificatisi dopo l'aggiornamento⚠️

Ci dispiace per il disservizio

@fediverso

Cybersecurity & cyberwarfare ha ricondiviso questo.

U.S. CISA adds a flaw in n8n to its Known Exploited Vulnerabilities catalog
securityaffairs.com/189326/sec…
#securityaffairs #hacking

Open Source Radar Has Up To 20 KM Range


The media in this post is not displayed to visitors. To view it, please log in.

Phased-array radars are great for all sorts of things, whether you’re doing advanced radio research or piloting a fifth-generation combat aircraft. They’re also typically very expensive. [Nawfal] hopes to make the technology more affordable with an open-source radar design of their own.

The design is called the AERIS-10, and is available in two versions. Operating at 10.5 GHz, it can be built to operate at ranges between 3 or 20 kilometers depending on the desired spec. The former uses an 8 x 16 patch antenna array, while the latter extends this to a 32 x 16 array. Either way, each design is capable of fully-electronic beam steering in azimuth and can be hacked to enable elevation too—one of the most attractive features of phased array radars. The hardware is based around an STM32 microcontroller, an FPGA, and a bunch of specialist clock generators, frequency synthesizers, phase shifters, and ADCs to do all the heavy lifting involved in radar.

Radar is something you probably don’t spend a lot of time thinking about unless you’re involved in maritime, air defence, or weather fields. All of which seem to be very much in the news lately! Still, we feature a good few projects on the topic around these parts. If you’ve got your own radar hacks brewing up in the lab, don’t hesitate to let us know.


hackaday.com/2026/03/12/open-s…

A Radio Power Amplifier for Not a Lot


The media in this post is not displayed to visitors. To view it, please log in.

When building a radio transmitter, unless it’s a very small one indeed, there’s a need for an amplifier before the antenna. This is usually referred to as the power amplifier, or PA. How big your PA is depends on your idea of power, but at the lower end of the power scale a PA can be quite modest. QRP, as lowe power radio is referred to, has a transmit power in the miliwatts or single figure watts. [Guido] is here with a QRP PA that delivers about a watt from 1 to 30 MHz, is made from readily available parts, and costs very little.

Inspired by a circuit from [Harry Lythall], the prototype is built on a piece of stripboard. It’s getting away with using those cheap transistors without heatsinking because it’s a class C design. In other words, it’s in no way linear; instead it’s efficient, but creates harmonics and can’t be used for all modes of transmission. This PA will need a low-pass filter to avoid spraying the airwaves with spurious emissions, and on the bands it’s designed for, is for CW, or Morse, only.

We like it though, as it’s proof that building radios can still be done without a large bank balance. Meanwhile if the world of QRP interests you, it’s something we have explored in the past.


hackaday.com/2026/03/11/a-radi…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

251 – I robot intelligenti saranno ovunque camisanicalzolari.it/251-i-rob…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Basta un carattere Unicode? La Privilege Escalation in Active Directory da 8.8 di score

📌 Link all'articolo : redhotcyber.com/post/basta-un-…

Microsoft ha pubblicato il 10 marzo 2026 una nuova #vulnerabilità di #sicurezza che interessa Active Directory Domain Services (AD DS). La falla, identificata come CVE-2026-25177, consente a un attaccante autenticato di ottenere un’elevazione dei #privilegi attraverso la #rete, con la possibilità di arrivare fino ai #privilegi SYSTEM, il livello più alto nei #sistemi Windows.

A cura di Redazione RHC

#redhotcyber #news #cybersecurity #hacking #malware #windows #vulnerabilita #sicurezzainformatica #minacceinformatiche #attaccantiinformatici #aziende #protezione #datipersonali #sistemioperativi

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Dieci bug gravi aggiornati in WordPress: Le scansioni stanno iniziando: aggiorna subito!

📌 Link all'articolo : redhotcyber.com/post/dieci-bug…

#redhotcyber #news #wordpress #aggiornamento #vulnerabilita #cybersecurity #hacking #cms #pathtraversal

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Affida la migrazione ad un’AI ma l’agente cancella due anni e mezzo di dati su AWS

📌 Link all'articolo : redhotcyber.com/post/affida-la…

#redhotcyber #news #aws #cloudcomputing #sicurezzainformatica #erroridimigrazione #protezionedatibase

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Una falla in Splunk apre le porte ai comandi remoti: ecco la patch

📌 Link all'articolo : redhotcyber.com/post/vulnerabi…

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Figli criminali: Arrestato per il furto di 46 milioni di dollari il figlio di un CEO USA

📌 Link all'articolo : redhotcyber.com/post/figli-cri…

#redhotcyber #news #furtoDicriptovalute #arrestoperfurto #criptovalute #USMarshalsService #FBI

Hands on with Creality’s new M1 Filament Maker


The media in this post is not displayed to visitors. To view it, please log in.

Ever since 3D printing has become a popular tool, the question of waste has been looming in the background. The sad reality of rapid prototyping is that you’re going to generate a lot of prints that just don’t aren’t fit for purpose, even if your printer runs them off perfectly every time. Creality has some products on the way aimed at solving that problem, and [Embrace Making] on YouTube has got his hands on a pre-production prototype of the Creality M1 Filament Maker to give the community a first look.

The M1 is actually only half of the system; Creality is also working on an R1 shredder to reduce your prints into re-usable shreds. [Embrace Making] hasn’t gotten his hands on that, but shredding prints isn’t the hard part. We’ve featured plenty of DIY shredders in the past. Extruding filament reliably at home has traditionally proven much more difficult, which is why we mostly outsource it to professionals.

Lacking the matching shredder, and wanting to give the M1 the fairest possible shake, [Embrace] tests the machine out first using Creality-supplied PLA pellets. The filament diameter isn’t as stable as we’ve gotten used to, and the spool rolling setup needs a bit more work.

Again, this is an early prototype. Creality says they’re working on it and claims they’ll get to ±0.05 mm precision in the production models. Doubtless they’ll also fix the errors that led to [Embrace]’s messy spool. That’s probably just software given that the winding mechanism did a pretty good job on the Creality-supplied spool.

Most importantly, the M1-produced filament does print. The prints aren’t perfect due to the variation in diameter, but they turn out surprisingly well for home-made filament. [Embrace] also shows off the ability to mix custom colors and gradients, but, again, using raw PLA rather than shredded material. Hopefully Creality lets him test drive the R1 shredder once its design is further along.

This is hardly the first time we’ve seen a filament extruder. The goal of this product is to pair with a shredder and use it for recycling, but if you’re going to stick with raw plastic pellets, you may as well print them directly.

youtube.com/embed/Yh5EAr_pFwc?…


hackaday.com/2026/03/11/hands-…

Printing an Underwater Diving Helmet With Floating Air Supply


The media in this post is not displayed to visitors. To view it, please log in.

Old-school diving helmets are deceivingly simple, even if they are – as [Hyperspace Pirate] puts it in a recent video – essentially the equivalent of an upside-down bucket with an air hose supplying air into it. While working on a 3D-printed diving helmet, he therefore made sure to run through all the requisite calculations prior to testing out said diving helmet in his pool.

The 3D model for the diving helmet can be found over at Thingiverse if you too feel like getting wet, just make sure that you size it to fit your own head. In the video CAD (cardboard-aided design) was used to determine the rough bounding box for the head, but everyone’s head is of course different. The helmet was printed in ABS, with the sections glued together before being covered in fiberglass and epoxy resin. Note that polyester resin dissolves ABS, so don’t use that.

On the helmet is a 1/4″ SAE fitting for the air hose, with the air provided from an oil-less compressor that in the final iteration is strapped to a floatation device along with an inverter and batteries. Of note is that you do not want to use a gas-powered compressor, as it’ll happily use any CO2 and CO it exhausts to send down the air hose to your lungs. This would be bad, much as having vaporized oil ending up in your lungs would be bad.

Although in the video the system is only tested in a backyard pool, it should be able to handle depths of up to ten meters, assuming the compressor can supply at least 41 L/minute. With some compressor-side miniaturization and waterproofing, [Hyperspace Pirate] reckons it would work fine for some actual ocean exploration, which while we’re sure everyone is dying to see. Perhaps don’t try this one at home, kids.

youtube.com/embed/mCLPCMgDScI?…


hackaday.com/2026/03/11/printi…

3D Printing a Harmonic Pin-Ring Gearing Drive


The media in this post is not displayed to visitors. To view it, please log in.

Cycloidal drives are a type of speed reducer that are significantly more compact than gearboxes, but they still come with a fair number of components. In comparison, the harmonic pin-ring drive that [Raph] recently came across as used in some TQ electric bicycles manages to significantly reduce the number of parts to just two discs. Naturally he had to 3D model his own version for printing a physical model to play with.

How exactly this pin-ring cycloidal drive works is explained well in the referenced [Pinkbike] article. Traditional cycloidal drives use load pins that help deal with the rather wobbly rotation from the eccentric input, but this makes for bulkier package that’s harder to shrink down. The change here is that the input force is transferred via two teethed discs that are 180° out of sync, thus not only cancelling out the wobble, but also being much more compact.

It appears to be a kind of strain wave gearing, which was first patented in 1957 by C.W. Musser and became famous under the Harmonic Drive name, seeing use by NASA in the Lunar Rover and beyond. Although not new technology by any means, having it get some more well-deserved attention is always worth it. If you want to play with the 3D model yourself, files are available both on GitHub and on MakerWorld.


hackaday.com/2026/03/11/3d-pri…

Are We Finally At The Point Where Phones Can Replace Computers?


The media in this post is not displayed to visitors. To view it, please log in.

There was an ideal of convergence, a long time ago, when one device would be all you need, digitally speaking. [ETA Prime] on YouTube seems to think we’ve reached that point, and his recent video about the Samsung S26 Ultra makes a good case for it. Part of that is software: Samsung’s DeX is a huge enabler for this use case. Part of that his hardware: the S26 Ultra, as the upcoming latest-and-greatest flagship phone, has absurd stats and a price tag to match.

First, it’s got 12 GB of that unobtanium once called “RAM”. It’s got an 8-core ARM processor in its Snapdragon Elite SOC, with the two performance cores clocked at 4.74 GHz — which isn’t a world record, but it’s pretty snappy. The other six cores aren’t just doddling along at 3.62 GHz. Except for the very youngest of our readers, you probably remember a time when the world’s greatest supercomputers had as much computing power as this phone.

So it should be no suprise that when [ETA Prime] plugs it into a monitor (using USB-C, natch) he’s able to do all the usual computational tasks without trouble. A big part of that is the desktop mode Samsung phones have had for a while now; we’ve seen hackers make use of it in years gone by. It’s still Android, but Android with a desktop-and-windows interface.

What are the hard tasks? Well, there’s photo and video editing, which the hardware can handle. Though [ETA] notes that it’s held back a bit because Adobe doesn’t offer their full suite on Android. But what’s really taxing for most of us is gaming. Android gaming? Well, obviously a flagship phone can handle anything in the play store.

It’s PC gaming that’s pretty impressive, considering the daisy chain of compatibility needed last time we looked at gaming on ARM. Cyberpunk 2077 gets frame rates near 60, but he needs to drop down to “low” graphics and 720p to do it. You may find that ample, or you may find it unplayable; there’s really no accounting for taste.

We might not always like carrying an everything device with us at all times, but there’s something to be said in not duplicating that functionality on your desk. Give it a couple of years when these things hit the used market at decent prices, and unless PC parts drop in price, convergence might start to seem like a great idea to those of us who aren’t big gamers and don’t need floppy drives.

youtube.com/embed/CwgsGpIwhJo?…


hackaday.com/2026/03/11/are-we…

A Rotary Dial The 3D Printed Way


The media in this post is not displayed to visitors. To view it, please log in.

There’s a meme which may have a basis in truth, of a teenager left clueless when presented with a rotary telephone. The dial, in reality a mechanical pulse chain generator, was once ubiquitous enough that having one in your parts bin was anything but unusual. If you’re curious about their inner workings in 2026 though, you may be out of luck. Never fear though, because [Moeya 3D Designs] is here with a fully 3D printed version. It’s not as compact as the original, but it’s all there.

If you’re not put off by the anime-style Japanese voice over on the video below the break and you can enable subtitles for your language, you get the full explanation. There’s a ratchet and spring on the dial, which when released drives a gear train that ends in a cam that would operate a switch for the pulses. Another set of gears drives a very neatly designed centrifugal speed governor, and we see the effect immediately when it is removed. We’re not sure who will go for this project, but we surely like it.

There are two videos below the break, with the dial shown off in the first and the design process in the second. Meanwhile we’ve talked in the past about the networks behind the dials.

youtube.com/embed/uo3RUD5v5Es?…

youtube.com/embed/D2Yu9v2xFFQ?…

Thanks [Jan] for the tip.


hackaday.com/2026/03/11/a-rota…

German Fireball’s 15 Minutes of Fame


The media in this post is not displayed to visitors. To view it, please log in.

Sunday night, around 7:00 PM local time, a bright fireball streaked across the western German sky, exploded, and rained chunks of space rock down on the region around Koblenz. One of the largest known chunks put a soccer-ball-sized hole in someone’s roof, landing in their bedroom. Fortunately, nobody was hurt. But given the apparent size of the explosion, there must be many more pieces out there for the finding, and a wave of hopeful meteorite hunters has descended upon the region.

But if you wanted a piece of the action, where exactly would you start looking? How do scientists find meteorites anyway? And what should you do if you happen to see a similar fireball in the night sky?

Citizen Science

Meteorite video-bombs a boring parking lot in Heerlen, NL.
In the age of always-on dashboard cameras, ubiquitous smartphones, and other video recording devices, it’s hard for a shy meteorite to find a quiet spot out of the public eye. That makes them a lot easier to find than they were in the past. Indeed, the International Meteor Organization, which aggregates amateur meteor observations, received more than 3,200 reports of this one, including several with video documentation. Some are stunning, and others may not even be of the event at all.

By collecting reports from many locations, they can hope to piece together the meteorite’s trajectory. However, if you look at the individual reports, it’s clear that this is a difficult task. Nobody is expecting a bright fireball to streak across the night sky, so many of the reports are reasonably vague on the details and heavy on the awe.

This report from [Sophie Z], for instance, is typical. She records where she was and roughly the location in the night sky where the meteorite passed, along with the comment “I’ve never seen anything so amazing and large before in my life.” Other amateur observers are more precise. [David C] (“I have a Ph.D in physics”) managed to record the start and the end heading of the meteorite to a couple of decimal places. He must have had a camera.

We’d love to know the exact algorithm used for combining the reports. It’s worth noting that reporters get an experience score, and the system presumably takes this into account when producing the average track. However, the system works, though, with 3,200 reports of a once-in-a-lifetime meteorite, it’s bound to come up with a pretty good estimate. But for smaller meteorites, like this one that flew by on Monday night, there are fewer observers, and deducing the actual track is a lot more difficult.

Everyday meteorites are better tracked by taking a more systematic approach. We’ve covered a few of these networks before, because the equipment needed to contribute meaningfully isn’t all that much more complicated than a single-board computer with a network connection, a camera module, and a weatherproof housing to keep it working all year round. We’ve covered the French meteorite-hunting network, Fripon, before, and have featured other amateur sky-camera builds to boot. But we’re not amateur astronomers, so we’re not in the loop on what the current state of the art is. If you know about coordinated citizen-science meteorite tracking efforts, let us know in the comments.

Geologists Get Into The Astronomy Game


This meteorite was big enough and loud enough when it exploded that participation in tracking wasn’t limited to those who are looking up. Geologists at the Karlsruhe Institute for Technology (KIT) found that the explosion registered on their seismometers. (Via Heise Online.) These have the advantage that they are in very well-known locations with extremely precise timestamps. After all, that’s what they’re used for every day, although the medium that the pressure waves travel through is usually the earth rather than the air.

This was also a particularly lucky event for the KIT team because it happened over a particularly dense network of seismological stations in the Eifel mountains, allowing for greater resolution. And as they point out, using the sound of the explosion has the additional advantage of not being hindered by light conditions during the day or clouds at night. This makes us think of how easy it would be to set up a distributed system of microphones to do something similar.

The KIT track estimate lines up fairly well with the aggregated estimate from amateur observers, but it’s not exactly the same. Who is right? We’ll see where more of the meteorites are found on the ground, presumably, in the next few weeks.

Meteorite Hunting


If the meteorite fell through our roof and chunks were scattered all around our bedroom, we’d count ourselves lucky. But would we get to keep it? Of course, it depends on the local laws, and in Germany, you can keep the meteorites in most cases, unless the state decides that it’s of special value for whatever reason, and then they get first dibs.

Apparently, the going rate for meteorites is between 1€ and 5,000€ per gram, so we’re not entirely sure that it will cover the damage. Maybe our homeowners’ insurance would? We’ll have to go dig out our policy to be sure, but however that plays out, we’d just be stoked to have the meteorite chunks and a good story.

While very big fireballs like this are rare, NASA estimates that around 44,000 kg of meteoritic material falls on the Earth every day. (Whoah!) Most of this burns up in the atmosphere, but some falls to the ground. Most of that fraction is in the form of micrometeorites, which are sand-grain-sized bits that are very likely raining down on us every day. Indeed, if you’re interested, you can try to collect them, and all you need is a tarp on the roof or a magnet in your downspout, a good microscope, and a bit of knowledge. So if all you want is some extraterrestrial rock, and you’re not worried so much about the size, maybe micrometeorite hunting is the path to success.

Have you gone looking for meteorites? Know of any up-to-date amateur fireball-hunting networks? Sound off in the comments!


hackaday.com/2026/03/11/german…

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Bell #Ambulance data breach impacted over 238,000 people
securityaffairs.com/189343/dat…
#securityaffairs #hacking

Mini Multi-Arcade Game Cabinets with an ESP32 and Galagino


The media in this post is not displayed to visitors. To view it, please log in.

Most people love arcade games, but putting a full-sized arcade cabinet in the living room can lead to certain unpleasant complications. Ergo the market for fun-sized cabinets has exploded alongside the availability of cheap SBCs and MCUs that can run classical arcade titles. Microcontrollers like the ESP32 with its dual 240 MHz cores can run circles around the CPU grunt of 1980s arcade hardware. Cue [Till Harbaum]’s Galagino ESP32-based arcade emulator project, that recently saw some community versions and cabinet takes.

There was a port to the PlatformIO framework by [speckhoiler] which also added a few more arcade titles and repurposed the enclosure of an off-the-shelf ‘My Arcade’ by stuffing in an ESP32-based ‘Cheap Yellow Display‘ (CYD) board instead. These boards include the ESP32 module, a touch display, micro SD card slot, sound output, and more; making it an interesting all-in-one solution for this purpose.

Most recently [Davide Gatti] and friends ported the Galagino software to the Arduino platform and added a 3D printed enclosure, though you will still need to source a stack of parts which are listed in the bill of materials. What you do get is a top display that displays the current game title in addition to the display of the usual CYD core, along with an enclosure that can be printed both in single- or multi-color.

There’s also a build video that [Davide Gatti] made, but it’s only in Italian, so a bit of a crash course in this language may be required for some finer details.

youtube.com/embed/Nz3LRrY3Ukw?…

Thanks to [ZT] for the tip.


hackaday.com/2026/03/11/mini-m…

reshared this

Manualetto di sicurezza digitale per giornalisti e attivisti


“Manualetto di sicurezza digitale per giornalisti e attivisti”

scritto e pubblicato da Guerre di Rete

lo presenta
Sonia Montegiove

ne discutono

Stefano Chiccarelli, Arturo Di Corinto, Fabio Pietrosanti

coordina

Giulio De Petra

A questo indirizzo si può trovare la descrizione dell’incontro:

centroriformastato.it/iniziati…

‘incontro si svolgerà a Roma, mercoledì 18 marzo, in via della Dogana Vecchia 5, a partire dalle 17,30.

Sarà possibile partecipare anche a distanza, collegandosi tramite il link

us02web.zoom.us/j/86313951005

Il nostro rapporto con le tecnologie è inevitabilmente contraddittorio. Mai come ora siamo circondati da strumenti abilitanti, che ci consentono di allargare le nostre capacità, ridurre sforzi e tempi di vecchie attività, dotarci di una somma di poteri da cui ormai siamo dipendenti. Eppure questi stessi strumenti, in maniera spesso invisibile e inattesa, possono aprire dei varchi sulle nostre vite, il nostro lavoro, le nostre relazioni. E quando succede, proprio la loro potenza, insieme alla capacità di archiviazione, l’ubiquità, la granularità con cui estraggono informazioni che prima non sarebbero mai state raccolte, diventano un’arma a doppio taglio. Questo vale per tutti, ma soprattutto per giornalisti e attivisti, che fanno dello scambio di informazioni (anche delicate, riservate, sensibili) una delle loro ragion d’essere. Il problema è che la macchina, intesa come l’assemblaggio caotico e strabordante di dispositivi, account, servizi digitali che ognuno di noi gestisce alla bell’e meglio mentre è intento a vivere e a lavorare, funziona splendidamente (o dà l’idea di funzionare in tal modo) senza disfunzioni, senza avvertimenti, senza preavvisi, fino al giorno in cui non funziona più. Fino al giorno in cui si riceve una strana notifica di Apple o Meta di essere stati oggetto di un attacco statale; fino a quando ritroviamo i nostri dati più privati online; o non riusciamo a entrare nel nostro account Instagram, che ha iniziato nel frattempo a delirare; o veniamo informati che qualcuno è entrato nella nostra casella di posta; o veniamo respinti alla frontiera senza nemmeno sapere perché; o la nostra fonte passa dei guai, e ci resta il sospetto che sia a causa delle comunicazioni avute con noi.

È con questa consapevolezza che Guerre di Rete ha deciso di scrivere e pubblicare un “Manualetto di sicurezza digitale per giornalisti e attivisti”

Il Manualetto segue un percorso che va dal facile al difficile, da quello che va messo subito in sicurezza, e con poca fatica, a quello che richiede più lavoro. Si inizia inquadrando alcuni aspetti generali – i diversi piani della sicurezza, l’analisi delle minacce – e poi si va nel pratico. Siamo partiti dalla mail perché sappiamo che è ancora l’hub centrale delle nostre vite, e quindi un fortino da difendere. Passiamo poi ai social media che, nel bene e nel male, restano un luogo fondamentale per giornalisti e attivisti, sottovalutato dal punto di vista della sicurezza. Eppure una revisione attenta delle impostazioni di visibilità e di privacy dei nostri account potrebbe far emergere informazioni che non siamo consapevoli di “pubblicizzare”. Poi parliamo di come si comunica con una fonte, o con qualcuno che necessiti di non essere esposto: il problema del primo contatto, quali app (e perché) possono essere utili, quali sistemi adottare per ricevere soffiate. Sistemate la mail, i social, e le comunicazioni, è tempo di pensare ai dispositivi. Sono cifrati? Abbiamo backup? Come li gestiamo? È il caso di compartimentare? Successivamente, ci addentriamo nell’aspetto della cybersicurezza più noto e forse temuto: phishing, malware, spyware.

Senza fare miracoli un lettore consapevole di questo Manualetto può però alzare di molto l’asticella della sua protezione.


dicorinto.it/formazione/manual…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Growing convinced we could and should ship new version cooldown in the Go modules ecosystem.

The subdb and MVP get us far, and supply chain attacks are not much of a thing in Go beyond typosquatting, but we want to stay ahead of them.

github.com/golang/go/issues/76…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Rapporto Clusit 2026: cresce l’impatto degli attacchi cyber, ma anche le difficoltà di analisi


@Informatica (Italy e non Italy)
A fronte di un +49% d’aumento degli attacchi cyber a livello globale, in Italia si registra una crescita record del 42%, a dimostrazione che il Bel Paese continua a essere bersaglio appetibile per i criminali informatici.

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Gli hacktivisti filo-iraniani Handala affermano di aver hackerato il colosso statunitense della tecnologia medica Stryker. Alcuni sistemi aziendali sono stati cancellati, causando interruzioni e disservizi in tutto il mondo.

Gli attivisti hanno affermato che l'attacco è stato "una rappresaglia per il brutale attacco alla scuola Minab", in cui sono morte decine di bambini.

"In questa operazione, oltre 200.000 sistemi, server e dispositivi mobili sono stati cancellati e sono stati estratti 50 terabyte di dati critici. Gli uffici di Stryker in 79 paesi sono stati costretti a chiudere", hanno scritto gli hacker in un messaggio pubblicato online.

Il post di @Lorenzo Franceschi-Bicchierai su #Techcrunch

techcrunch.com/2026/03/11/stry…


Se vuoi conoscere le notizie sul mondo dell'informatica, segui il gruppo @Informatica (Italy e non Italy)



NEW: The pro-Iran hacktivists Handala claim to have hacked U.S. medical tech giant Stryker. Some company systems have been wiped, causing disruptions and outages worldwide.

The hakctivists said the attack was "in retaliation for the brutal attack on the Minab school," which killed dozens of kids.

“In this operation, over 200,000 systems, servers, and mobile devices have been wiped and 50 terabytes of critical data have been extracted. Stryker’s offices in 79 countries have been forced to shut down,” the hackers wrote in a message posted online.

techcrunch.com/2026/03/11/stry…


reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Dal porta a porta alla sanzione: Acea Energia paga 2 milioni di euro per violazioni GDPR


@Informatica (Italy e non Italy)
Il Garante privacy rende noto di avere inflitto una sanzione da 2milioni di euro ad Acea Energia per gravi violazioni privacy, emerse dal trattamento dei dati personali di oltre 1.200 clienti nell’ambito della fornitura di energia

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Gli aggressori hanno trasformato la compromissione della supply chain nx npm in un accesso completo all'amministrazione AWS in meno di 72 ore.

Google afferma che UNC6426 ha rubato il token GitHub di uno sviluppatore tramite QUIETVAULT, ha abusato di OIDC Trust da GitHub ad AWS, ha creato un nuovo ruolo di amministratore, quindi ha avuto accesso ai dati S3 e ha distrutto i sistemi di produzione.

thehackernews.com/2026/03/unc6…

@Informatica (Italy e non Italy)

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Tutte le minacce del 2025 e le priorità di difesa nel nuovo anno


@Informatica (Italy e non Italy)
La valutazione critica dei fatti di sicurezza avvenuti e delle tendenze future deve essere rapportata alle capacità di difesa della propria organizzazione. E questo per far emergere un eventuale divario di sicurezza e per poi pianificare interventi adeguati. Ecco come

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Aggiornamenti Microsoft: corrette due zero-day e la prima vulnerabilità scoperta dall’IA


@Informatica (Italy e non Italy)
Microsoft rilascia gli aggiornamenti mensili con otto vulnerabilità critiche, una valanga di escalation di privilegi e una falla in Excel che potrebbe trasformare Microsoft Copilot in strumento di esfiltrazione dati. E, per

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

From the story:

"Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices."

"Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently."

krebsonsecurity.com/2026/03/ir…

#stryker #handala #intune #wiper #cybersecurity

in reply to BrianKrebs

Wait. What does this company have to do with Epstein? I wonder if it relates to the FBI breach, where some of the Epstein files were compromised. If that's the case, then the attackers probably have a list of targets.

techcrunch.com/2026/03/11/hack…

A couple of hours ago: mlive.com/news/kalamazoo/2026/…

Stryker financial contributions: opensecrets.org/orgs/stryker-c…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Fastweb+Vodafone, il cybercrime in Italia: attacchi più mirati, phishing più sofisticato e crescita attacchi “zero day”


@Informatica (Italy e non Italy)
Anche per l’anno 2025 Fastweb + Vodafone ha contribuito a fotografare la situazione del cyber crime in Italia sulla base dei dati del proprio Security Operations Center (SOC), attivo

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

L’Iran ha cominciato la contro-guerra cyber: dai Ddos ai sabotaggi, ecco cosa bisogna sapere


@Informatica (Italy e non Italy)
L’Iran sta usando il dominio cyber come strumento elastico di rappresaglia, con una prima fascia visibile a bassa soglia e una seconda fascia meno rumorosa ma pericolosa che riguarda accessi, persistenza, raccolta

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

In Italia si sta così bene che 85 mila cervelli vogliono fuggire a Bruxelles, e sono la metà di tutti quelli europei.

euractiv.com/news/national-bre…

Cybersecurity & cyberwarfare ha ricondiviso questo.

“D’istruzione pubblica”, il nuovo film-documentario che racconta lo smantellamento della scuola pubblica: mercoledì 18 Marzo incontro con il pubblico dopo la proiezione delle 18.40 al Cinema Aquila


[em][strong][url=https://cinemaaquila.it/evento/incontro-per-distruzione-pubblica/]“D’istruzione pubblica”, il nuovo film-documentario di Mirko Melchiorre e Federico Greco che racconta lo smantellamento della scuola pubblica, torna a grande richiesta nella sala cara al quartiere Pigneto. Mercoledì 18 alla proiezione delle 18.40 saranno infatti presenti Marina Boscaino (docente e giornalista), Renata Puleo (dirigente scolastico in quiescenza) e Luca Malgioglio (docente). [...][/url][/strong][/em]

BeatBanker: A dual‑mode Android Trojan


The media in this post is not displayed to visitors. To view it, please log in.

Recently, we uncovered BeatBanker, an Android‑based malware campaign targeting Brazil. It spreads primarily through phishing attacks via a website disguised as the Google Play Store. To achieve their goals, the malicious APKs carry multiple components, including a cryptocurrency miner and a banking Trojan capable of completely hijacking the device and spoofing screens, among other things. In a more recent campaign, the attackers switched from the banker to a known RAT.

This blog post outlines each phase of the malware’s activity on the victim’s handset, explains how it ensures long‑term persistence, and describes its communication with mining pools.

Key findings:


  • To maintain persistence, the Trojan employs a creative mechanism: it plays an almost inaudible audio file on a loop so it cannot be terminated. This inspired us to name it BeatBanker.
  • It monitors battery temperature and percentage, and checks whether the user is using the device.
  • At various stages of the attack, BeatBanker disguises itself as a legitimate application on the Google Play Store and as the Play Store itself.
  • It deploys a banker in addition to a cryptocurrency miner.
  • When the user tries to make a USDT transaction, BeatBanker creates overlay pages for Binance and Trust Wallet, covertly replacing the destination address with the threat actor’s transfer address.
  • New samples now drop BTMOB RAT instead of the banking module.


Initial infection vector


The campaign begins with a counterfeit website, cupomgratisfood[.]shop, that looks exactly like the Google Play Store. This fake app store contains the “INSS Reembolso” app, which is in fact a Trojan. There are also other apps that are most likely Trojans too, but we haven’t obtained them.

The INSS Reembolso app poses as the official mobile portal of Brazil’s Instituto Nacional do Seguro Social (INSS), a government service that citizens can use to perform more than 90 social security tasks, from retirement applications and medical exam scheduling to viewing CNIS (National Registry of Social Information), tax, and payment statements, as well as tracking request statuses. By masquerading as this trusted platform, the fake page tricks users into downloading the malicious APK.

Packing


The initial APK file is packed and makes use of a native shared library (ELF) named libludwwiuh.so that is included in the application. Its main task is to decrypt another ELF file that will ultimately load the original DEX file.

First, libludwwiuh.so decrypts an embedded encrypted ELF file and drops it to a temporary location on the device under the name l.so. The same code that loaded the libludwwiuh.so library then loads this file, which uses the Java Native Interface (JNI) to continue execution.


l.so – the DEX loader


The library does not have calls to its functions; instead, it directly calls the Java methods whose names are encrypted in the stack using XOR (stack strings technique) and restored at runtime:

Initially, the loader makes a request to collect some network information using ipapi.is to determine whether the infected device is a mobile device, if a VPN is being used, and to obtain the IP address and other details.

This loader is engineered to bypass mobile antivirus products by utilizing dalvik.system.InMemoryDexClassLoader. It loads malicious DEX code directly into memory, avoiding the creation of any files on the device’s file system. The necessary DEX files can be extracted using dynamic analysis tools like Frida.

Furthermore, the sample incorporates anti-analysis techniques, including runtime checks for emulated or analysis environments. When such an environment is detected (or when specific checks fail, such as verification of the supported CPU_ABI), the malware can immediately terminate its own process by invoking android.os.Process.killProcess(android.os.Process.myPid()), effectively self-destructing to hinder dynamic analysis.

After execution, the malware displays a user interface that mimics the Google Play Store page, showing an update available for the INSS Reembolso app. This is intended to trick victims into granting installation permissions by tapping the “Update” button, which allows the download of additional hidden malicious payloads.

The payload delivery process mimics the application update. The malware uses the REQUEST_INSTALL_PACKAGES permission to install APK files directly into its memory, bypassing Google Play. To ensure persistence, the malware keeps a notification about a system update pinned to the foreground and activates a foreground service with silent media playback, a tactic designed to prevent the operating system from terminating the malicious process.


Crypto mining


When UPDATE is clicked on a fake Play Store screen, the malicious application downloads and executes an ELF file containing a cryptomining payload. It starts by issuing a GET request to the C2 server at either hxxps://accessor.fud2026.com/libmine-<arch>.so or hxxps://fud2026.com/libmine-<arch>.so. The downloaded file is then decrypted using CipherInputStream(), with the decryption key being derived from the SHA-1 hash of the downloaded file’s name, ensuring that each version of the file is encrypted with a unique key. The resulting file is renamed d-miner.

The decrypted payload is an ARM-compiled XMRig 6.17.0 binary. At runtime, it attempts to create a direct TCP connection to pool.fud2026[.]com:9000. If successful, it uses this endpoint; otherwise, it automatically switches to the proxy endpoint pool-proxy.fud2026[.]com:9000. The final command-line arguments passed to XMRig are as follows:

  • -o pool.fud2026[.]com:9000 or pool-proxy.fud2026[.]com:9000 (selected dynamically)
  • -k (keepalive)
  • --tls (encrypted connection)
  • --no-color (disable colored output)
  • --nicehash (NiceHash protocol support)


C2 telemetry


The malware uses Google’s legitimate Firebase Cloud Messaging (FCM) as its primary command‑and‑control (C2) channel. In the analyzed sample, each FCM message received triggers a check of the battery status, temperature, installation date, and user presence. A hidden cryptocurrency miner is then started or stopped as needed. These mechanisms ensure that infected devices remain permanently accessible and responsive to the attacker’s instructions, which are sent through the FCM infrastructure. The attacker monitors the following information:

  • isCharging: indicates whether the phone is charging;
  • batteryLevel: the exact battery percentage;
  • isRecentInstallation: indicates whether the application was recently installed (if so, the implant delays malicious actions);
  • isUserAway: indicates whether the user is away from the device (screen off and inactive);
  • overheat: indicates whether the device is overheating;
  • temp: the current battery temperature.


Persistence


The KeepAliveServiceMediaPlayback component ensures continuous operation by initiating uninterrupted playback via MediaPlayer. It keeps the service active in the foreground using a notification and loads a small, continuous audio file. This constant activity prevents the system from suspending or terminating the process due to inactivity.

The identified audio output8.mp3 is five seconds long and plays on a loop. It contains some Chinese words.

Banking module


BeatBanker compromises the machine with a cryptocurrency miner and introduces another malicious APK that acts as a banking Trojan. This Trojan uses previously obtained permission to install an additional APK called INSS Reebolso, which is associated with the package com.destination.cosmetics.

Similar to the initial malicious APK, it establishes persistence by creating and displaying a fixed notification in the foreground to hinder removal. Furthermore, BeatBanker attempts to trick the user into granting accessibility permissions to the package.

Leveraging the acquired accessibility permissions, the malware establishes comprehensive control over the device’s user interface.

The Trojan constantly monitors the foreground application. It targets the official Binance application (com.binance.dev) and the Trust Wallet application (com.wallet.crypto.trustapp), focusing on USDT transactions. When a user tries to withdraw USDT, the Trojan instantly overlays the target app’s transaction confirmation screen with a highly realistic page sourced from Base64-encoded HTML stored in the banking module.

The module captures the original withdrawal address and amount, then surreptitiously substitutes the destination address with an attacker-controlled one using AccessibilityNodeInfo.ACTION_SET_TEXT. The overlay page shows the victim the address they copied (for Binance) or just shows a loading icon (for Trust Wallet), leading them to believe they are remitting funds to the intended wallet when, in fact, the cryptocurrency is transferred to the attacker’s designated address.

Fake overlay pages: Binance (left) and Trust Wallet (right)
Fake overlay pages: Binance (left) and Trust Wallet (right)

Target browsers


BeatBanker’s banking module monitors the following browsers installed on the victim’s device:

  • Chrome
  • Firefox
  • sBrowser
  • Brave
  • Opera
  • DuckDuckGo
  • Dolphin Browser
  • Edge

Its aim is to collect the URLs accessed by the victim using the regular expression ^(?:https?://)?(?:[^:/\\\\]+\\\\.)?([^:/\\\\]+\\\\.[^:/\\\\]+). It also offers management functionalities (add, edit, delete, list) for links saved in the device’s default browser, as well as the ability to open links provided by the attacker.

C2 communication


BeatBanker is also designed to receive commands from the C2. These commands aim to collect the victim’s personal information and gain complete control of the device.

CommandDescription
0Starts dynamic loading of the DEX class
UpdateSimulates software update and locks the screen
msg:Displays a Toast message with the provided text
goauth<*>Opens Google Authenticator (if installed) and enables the AccessService.SendGoogleAuth flag used to monitor and retrieve authentication codes
kill<*>Sets the protection bypass flag AccessService.bypass to “True”
and sets the initializeService.uninstall flag to “Off”
srec<*>Starts or stops audio recording (microphone), storing the recorded data in a file with an automatically generated filename. The following path format is used to store the recording: /Config/sys/apps/rc/<timestamp>_0REC<last5digits>.wav
pst<*>Pastes text from the clipboard (via Accessibility Services)
GRC<*>Lists all existing audio recording files
gtrc<*>Sends a specific audio recording file to the C2
lcm<*>Lists supported front camera resolutions
usdtress<*>Sets a USDT cryptocurrency address when a transaction is detected
lnk<*>Opens a link in the browser
EHP<*>Updates login credentials (host, port, name) and restarts the application
ssms<*>Sends an SMS message (individually or to all contacts)
CRD<*>Adds (E>) or removes (D>) packages from the list of blocked/disabled applications
SFD<*>Deletes files (logs, recordings, tones) or uninstalls itself
adm<>lck<>Immediately locks the screen using Device Administrator permissions
adm<>wip<>Performs a complete device data wipe (factory reset)
Aclk<*>Executes a sequence of automatic taps (auto-clicker) or lists existing macros
KBO<*>lodChecks the status of the keylogger and virtual keyboard
KBO<*>AKP/AKARequests permission to activate a custom virtual keyboard or activates one
KBO<*>ENB:Enables (1) or disables (0) the keylogger
RPM<*>lodChecks the status of all critical permissions
RPM<*>ACCRequests Accessibility Services permission
RPM<*>DOZRequests Doze/App Standby permission (battery optimization)
RPM<*>DRWRequests Draw Over Other Apps permission (overlay)
RPM<*>INSTRequests permission to install apps from unknown sources (Android 8+)
ussd<*>Executes a USSD code (e.g., *#06# for IMEI)
Blkt<*>Sets the text for the lock overlay
BLKV<*>Enables or disables full-screen lock using WindowManager.LayoutParams.TYPE_APPLICATION_OVERLAY to display a black FrameLayout element over the entire screen
SCRD<> / SCRD2<>Enables/disables real-time screen text submission to the C2 (screen reading)
rdall<*>Clears or sends all keylogger logs
rdd<*>Deletes a specific log file
rd<*>Sends the content of a specific keylogger file
MO<*>Manages application monitoring (add, remove, list, screenshot, etc.)
FW<*>Controls VPN and firewall (status, block/allow apps, enable/disable)
noti<*>Creates persistent and custom notifications
sp<*>Executes a sequence of swipes/taps (gesture macro)
lodp<*>Manages saved links in the internal browser (add, edit, delete, list)
scc:Starts screen capture/streaming

New BeatBanker samples dropping BTMOB


Our recent detection efforts uncovered a campaign leveraging a fraudulent StarLink application that we assess as being a new BeatBanker variant. The infection chain mirrored previous instances, employing identical persistence methods – specifically, looped audio and fixed notifications. Furthermore, this variant included a crypto miner similar to those seen previously. However, rather than deploying the banking module, it was observed distributing the BTMOB remote administration tool.

The BTMOB APK is highly obfuscated and contains a class responsible for configuration. Despite this, it’s possible to identify a parser used to define the application’s behavior on the device, as well as persistence features, such as protection against restart, deletion, lock reset, and the ability to perform real-time screen recording.


String decryption


The simple decryption routine uses repetitive XOR between the encrypted data and a short key. It iterates through the encrypted text byte by byte, repeating the key from the beginning whenever it reaches the end. At each position, the sample XORs the encrypted byte with the corresponding byte of the key, overwriting the original. Ultimately, the modified byte array contains the original text, which is then converted to UTF-8 and returned as a string.


Malware-as-a-Service


BTMOB is an Android remote administration tool that evolved from the CraxsRAT, CypherRAT, and SpySolr families. It provides full remote control of the victim’s device and is sold in a Malware-as-a-Service (MaaS) model. On July 26, 2025, a threat actor posted a screenshot of the BTMOB RAT in action on GitHub under the username “brmobrats”, along with a link to the website btmob[.]xyz. The website contains information about the BTMOB RAT, including its version history, features, and other relevant details. It also redirects to a Telegram contact. Cyfirma has already linked this account to CraxsRAT and CypherRAT.

Recently, a YouTube channel was created by a different threat actor that features videos demonstrating how to use the malware and facilitate its sale via Telegram.

We also saw the distribution and sale of leaked BTMOB source code on some dark web forums. This may suggest that the creator of BeatBanker acquired BTMOB from its original author or the source of the leak and is utilizing it as the final payload, replacing the banking module observed in the INSS Reebolso incident.

In terms of functionality, BTMOB maintains a set of intrusive capabilities, including: automatic granting of permissions, especially on Android 13–15 devices; use of a black FrameLayout overlay to hide system notifications similar to the one observed in the banking module; silent installation; persistent background execution; and mechanisms designed to capture screen lock credentials, including PINs, patterns, and passwords. The malware also provides access to front and rear cameras, captures keystrokes in real time, monitors GPS location, and constantly collects sensitive data. Together, these functionalities provide the operator with comprehensive remote control, persistent access, and extensive surveillance capabilities over compromised devices.


Victims


All variants of BeatBanker – those with the banking module and those with the BTMOB RAT – were detected on victims in Brazil. Some of the samples that deliver BTMOB appear to use WhatsApp to spread, as well as phishing pages.

Conclusion


BeatBanker is an excellent example of how mobile threats are becoming more sophisticated and multi-layered. Initially focused in Brazil, this Trojan operates a dual campaign, acting as a Monero cryptocurrency miner, discreetly draining your device’s battery life while also stealing banking credentials and tampering with cryptocurrency transactions. Moreover, the most recent version goes even further, substituting the banking module with a full-fledged BTMOB RAT.

The attackers have devised inventive tricks to maintain persistence. They keep the process alive by looping an almost inaudible audio track, which prevents the operating system from terminating it and allows BeatBanker to remain active for extended periods.

Furthermore, the threat demonstrates an obsession with staying hidden. It monitors device usage, battery level and temperature. It even uses Google’s legitimate system (FCM) to receive commands. The threat’s banking module is capable of overlaying Binance and Trust Wallet screens and diverting USDT funds to the criminals’ wallets before the victim even notices.

The lesson here is clear: distrust is your best defense. BeatBanker spreads through fake websites that mimic Google Play, disguising itself as trustworthy government applications. To protect yourself against threats like this, it is essential to:

  1. Download apps only from official sources. Always use the Google Play Store or the device vendor’s official app store. Make sure you use the correct app store app, and verify the developer.
  2. Check permissions. Pay attention to the permissions that applications request, especially those related to accessibility and installation of third-party packages.
  3. Keep the system updated. Security updates for Android and your mobile antivirus are essential.

Our solutions detect this threat as HEUR:Trojan-Dropper.AndroidOS.BeatBanker and HEUR:Trojan-Dropper.AndroidOS.Banker.*

Indicators of compromise


Additional IoCs, TTPs and detection rules are available to customers of our Threat Intelligence Reporting service. For more details, contact us at crimewareintel@kaspersky.com.

Host-based (MD5 hashes)
F6C979198809E13859196B135D21E79B – INSS Reebolso
D3005BF1D52B40B0B72B3C3B1773336B – StarLink

Domains
cupomgratisfood[.]shop
fud2026[.]com
accessor.fud2026[.]com
pool.fud2026[.]com
pool-proxy.fud2026[.]com
aptabase.fud2026[.]com
aptabase.khwdji319[.]xyz
btmob[.]xyz
bt-mob[.]net


securelist.com/beatbanker-mine…

Cybersecurity & cyberwarfare ha ricondiviso questo.

We Were Right About Havana Syndrome
L: warontherocks.com/2026/03/we-w…
C: news.ycombinator.com/item?id=4…
posted on 2026.03.11 at 16:01:48 (c=2, p=8)

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Gli strumenti di verifica dell’età online si diffondono negli Stati Uniti per la sicurezza dei bambini, ma il vero obiettivo sono gli adulti

- Le nuove leggi statunitensi ideate per la sicurezza dei minori online stanno costringendo milioni di americani adulti a sottoporsi a controlli obbligatori per la verifica dell’età, che spesso utilizzano la tecnologia dell’intelligenza artificiale, e stanno creando notevoli grattacapi alle aziende di social media che cercano di trovare un equilibrio tra conformità legale e privacy per gli utenti.
- Circa la metà degli stati degli Stati Uniti ha promulgato o sta promuovendo leggi che impongono alle piattaforme, tra cui siti di contenuti per adulti, servizi di gioco online e app di social media, di bloccare gli utenti minorenni.
- Grandi volumi di dati sensibili sull’identità possono diventare bersagli per le richieste del governo e degli hacker. Ma a un livello più profondo, la sorveglianza colpisce le fondamenta di un Internet libero e aperto, affermano i sostenitori delle libertà civili, e la scorsa settimana una sentenza del tribunale della Virginia, citando il Primo Emendamento, ha confermato la decisione.

cnbc.com/2026/03/08/social-med…

@Privacy Pride

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Votazione storica su #chatcontrol al Parlamento europeo: gli eurodeputati votano per porre fine alla scansione di massa non mirata delle chat private

In una svolta sensazionale nella lotta contro il Chat Control, la maggioranza del Parlamento europeo ha votato oggi per porre fine alla scansione di massa non mirata delle comunicazioni private. Così facendo, il Parlamento ha fermamente respinto le pratiche di sorveglianza incostituzionali e soggette a errori degli ultimi anni. Ora aumenta la pressione sui governi dell’UE affinché rispettino il voto dei deputati e pongano fine una volta per tutte alla sorveglianza di massa non mirata in Europa.
informapirata.it/2026/03/11/vo…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Votazione storica su chatcontrol al Parlamento europeo: gli eurodeputati votano per porre fine alla scansione di massa non mirata delle chat private

In una svolta sensazionale nella lotta contro il Chat Control, la maggioranza del Parlamento europeo ha votato oggi per porre fine alla scansione di massa non mirata delle comunicazioni private.

informapirata.it/2026/03/11/vo…

Grazie a @echo_pbreyer per tutta l'energia spesa per questa battaglia

@pirati


Votazione storica su #chatcontrol al Parlamento europeo: gli eurodeputati votano per porre fine alla scansione di massa non mirata delle chat private

In una svolta sensazionale nella lotta contro il Chat Control, la maggioranza del Parlamento europeo ha votato oggi per porre fine alla scansione di massa non mirata delle comunicazioni private. Così facendo, il Parlamento ha fermamente respinto le pratiche di sorveglianza incostituzionali e soggette a errori degli ultimi anni. Ora aumenta la pressione sui governi dell’UE affinché rispettino il voto dei deputati e pongano fine una volta per tutte alla sorveglianza di massa non mirata in Europa.
informapirata.it/2026/03/11/vo…


Cybersecurity & cyberwarfare ha ricondiviso questo.

Pro-Palestinian hacktivist group #Handala targets #Stryker in global disruption
securityaffairs.com/189304/hac…
#securityaffairs #hacking #Iran