Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Votazione storica su chatcontrol al Parlamento europeo: gli eurodeputati votano per porre fine alla scansione di massa non mirata delle chat private

In una svolta sensazionale nella lotta contro il Chat Control, la maggioranza del Parlamento europeo ha votato oggi per porre fine alla scansione di massa non mirata delle comunicazioni private.

informapirata.it/2026/03/11/vo…

Grazie a @echo_pbreyer per tutta l'energia spesa per questa battaglia

@pirati


Votazione storica su #chatcontrol al Parlamento europeo: gli eurodeputati votano per porre fine alla scansione di massa non mirata delle chat private

In una svolta sensazionale nella lotta contro il Chat Control, la maggioranza del Parlamento europeo ha votato oggi per porre fine alla scansione di massa non mirata delle comunicazioni private. Così facendo, il Parlamento ha fermamente respinto le pratiche di sorveglianza incostituzionali e soggette a errori degli ultimi anni. Ora aumenta la pressione sui governi dell’UE affinché rispettino il voto dei deputati e pongano fine una volta per tutte alla sorveglianza di massa non mirata in Europa.
informapirata.it/2026/03/11/vo…


Cybersecurity & cyberwarfare ha ricondiviso questo.

Pro-Palestinian hacktivist group #Handala targets #Stryker in global disruption
securityaffairs.com/189304/hac…
#securityaffairs #hacking #Iran

Gli hacktivisti filo-iraniani Handala affermano di aver hackerato il colosso statunitense della tecnologia medica Stryker. Alcuni sistemi aziendali sono stati cancellati, causando interruzioni e disservizi in tutto il mondo.

Gli attivisti hanno affermato che l'attacco è stato "una rappresaglia per il brutale attacco alla scuola Minab", in cui sono morte decine di bambini.

"In questa operazione, oltre 200.000 sistemi, server e dispositivi mobili sono stati cancellati e sono stati estratti 50 terabyte di dati critici. Gli uffici di Stryker in 79 paesi sono stati costretti a chiudere", hanno scritto gli hacker in un messaggio pubblicato online.

Il post di @Lorenzo Franceschi-Bicchierai su #Techcrunch

techcrunch.com/2026/03/11/stry…


Se vuoi conoscere le notizie sul mondo dell'informatica, segui il gruppo @Informatica (Italy e non Italy)



NEW: The pro-Iran hacktivists Handala claim to have hacked U.S. medical tech giant Stryker. Some company systems have been wiped, causing disruptions and outages worldwide.

The hakctivists said the attack was "in retaliation for the brutal attack on the Minab school," which killed dozens of kids.

“In this operation, over 200,000 systems, servers, and mobile devices have been wiped and 50 terabytes of critical data have been extracted. Stryker’s offices in 79 countries have been forced to shut down,” the hackers wrote in a message posted online.

techcrunch.com/2026/03/11/stry…


reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Formazione obbligatoria sulla sicurezza (scuola), unica possibilità gratuita iscrivendosi a servizio esterno con cessione dei dati personali: aiuto!

EDIT: correggo le diciture delle prime frasi perché ho appurato che il corso posso farlo liberamente anche da privato (perciò la scuola non mi impone né obbliga a usare la piattaforma che propone), anche se ovviamente in questo caso sarà a spese mie e dovrò pensare io a cercare il corso ecc.
Segnalo i cambiamenti con il grassetto corsivo.
Resta comunque valido il punto centrale del topic: credo che la scuola abbia fatto una pessima proposta, tra quelle disponibili sul mercato, perché invia i dati raccolti a troppe piattaforme internazionali con sedi fuori dall'Italia e dalla UE (Stati Uniti, Malta).

@Etica Digitale (Feddit)

La mia scuola mi propone di registrarmi alla piattaforma Docendo Academy per conseguire l'attestazione obbligatoria per la sicurezza sul lavoro, ma questo comporta l'acquisizione di dati sensibili da parte di Amazon, Google, Microsoft e altri.

Ho deciso di rifiutare la proposta della scuola e provvederò in proprio e a mie spese all'adempimento dell'obbligo di legge.

Sto preparando un'email per spiegare al mio DS come, pur desiderando partecipare al corso, non sia stato messo nelle condizioni di farlo utilizzando la possibilità gratuita offerta dalla scuola senza rinunciare a parte dei miei diritti in fatto di privacy e protezione dell'identità digitale.

Ho infatti ricevuto (come tutti i miei colleghi) l'email che trovate nella prima immagine, direttamente dalla Docendo Academy a cui la scuola ha passato il mio indirizzo istituzionale (MS365). Pare che questo possano farlo senza il mio consenso perché si tratta dell'adempimento di un obbligo di legge, perciò non voglio contestare questo punto.

La registrazione sulla piattaforma prevede però l'inserimento di dati sensibili, di cui alle successive immagini (le successive alle prime 4 sono nei commenti per permettere agli utenti mastodon di visualizzarle tutte).

Poiché un collega mi aveva segnalato il problema, sono arrivato all'ultimo passaggio dopo aver inserito dati falsi per prova (compreso un codice fiscale non valido e un indirizzo/CAP inesistenti, dati che il sistema non ha minimamente verificato in questa fase) e ho trovato la pagina relativa al consenso, che obbliga al trattamento dei dati da parte di AWS/Amazon.

Ho aperto il link relativo alla privacy policy (gestito da Iubenda) e ho trovato i dettagli, tra i quali spiccano le raccolte di dati per profilazione (senza possibilità di opt-out) da parte di: Google (cloud, pubblicità, statistica e altro), Meta (pubblicità, statistica), Amazon (hosting), HubSpot (database utenti), X (pubblicità), LinkedIn (pubblicità) ecc...

Per molti di questi servizi di terze parti non è neanche ben chiaro quali dati siano trattati, perché si rimanda alle privacy policy dei singoli enti (lunghissime, in inglese) e perché a volte comprendono l'utilizzo di script di tracciamento non meglio specificati.

Chiedo l'aiuto del Fediverso perché a me la cosa sembra grave (non alla maggioranza dei miei colleghi naturalmente, che si è registrata immediatamente con grande naturalezza).

Vorrei se possibile che mi aiutaste a definire bene perché la cosa è grave: "lesione della privacy" è troppo generico e debole (socialmente) in questo periodo storico. Vorrei trovare qualche definizione ben fatta di etica digitale, buone pratiche, cattive pratiche, identità digitale ecc... Possibilmente vorrei citare qualche articolo specifico sulle implicazioni delle società qui citate in gravi "nefandezze" a livello mondiale, dalla sorveglianza di massa al coinvolgimento nelle guerre in corso. Insomma, materiale e idee, ad integrare le ricerche che ovviamente sto facendo io...

Grazie a tutti, vi prego di boostare e diffondere il più possibile e vi terrò aggiornati!
🙏

#privacy #pubblicaamministrazione #Scuola #Sicurezza #formazione #eticadigitale #identitadigitali

@Scuola - Gruppo Forum

in reply to PiadaMakkine

@PiadaMakkine Beh il corso sulla sicurezza è obbligatorio. Un collega ha provato a protestare per lo stesso motivo e gli è stato risposto che l'unica alternativa è farselo per conto proprio e a spese proprie, e io sono disposto a farlo. Però voglio cercare di sensibilizzare sia la dirigenza, sia i colleghi sul fatto che la scelta dell'erogatore di servizi andrebbe fatta con maggiore attenzione anche a questo aspetto, e non solo selezionando la proposta più economica...

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Nuovo post: Didacta 2026 - giorno 1

dropseaofulaula.blogspot.com/2…

Cybersecurity & cyberwarfare ha ricondiviso questo.

NEW: The pro-Iran hacktivists Handala claim to have hacked U.S. medical tech giant Stryker. Some company systems have been wiped, causing disruptions and outages worldwide.

The hakctivists said the attack was "in retaliation for the brutal attack on the Minab school," which killed dozens of kids.

“In this operation, over 200,000 systems, servers, and mobile devices have been wiped and 50 terabytes of critical data have been extracted. Stryker’s offices in 79 countries have been forced to shut down,” the hackers wrote in a message posted online.

techcrunch.com/2026/03/11/stry…

in reply to Lorenzo Franceschi-Bicchierai

In a statement, CISA's acting director Nick Andersen said the agency is investigating the attack. "We are working shoulder-to-shoulder with our public and private sector partners as we continue to uncover relevant information and provide technical assistance."

techcrunch.com/2026/03/11/stry…

Dal porta a porta alla sanzione: Acea Energia paga 2 milioni di euro per violazioni GDPR


@Informatica (Italy e non Italy)
Il Garante privacy rende noto di avere inflitto una sanzione da 2milioni di euro ad Acea Energia per gravi violazioni privacy, emerse dal trattamento dei dati personali di oltre 1.200 clienti nell’ambito della fornitura di energia

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

La Forza è forte in te... ma lo stress pure

#redhotcyber #cybersecurity #hacking #hacker #infosec #infosecurity #quotes #meme #comica #vignette #citazioni

Cybersecurity & cyberwarfare ha ricondiviso questo.

Cos’è vibeware, l’industrializzazione dei malware potenziata dalle AI


@Informatica (Italy e non Italy)
Individuata da Bitdefender, vibeware è una nuova strategia d'attacco APT basata sull’industrializzazione dei malware potenziata dalle AI al fine di diffondere codice dannoso monouso che si adatta agli ambienti target
L'articolo Cos’è vibeware, l’industrializzazione dei malware potenziata dalle AI proviene da Cyber

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Score 10 su 10 per i BMS Honeywell che espongono gli edifici al controllo remoto

📌 Link all'articolo : redhotcyber.com/post/score-10-…

#redhotcyber #news #cybersecurity #hacking #vulnerabilità #sicurezzainformatica #honeywell #iq4xbms #cvss

Cybersecurity & cyberwarfare ha ricondiviso questo.

NEW: A hacker broke into a server at the Child Exploitation Forensic Lab in the FBI’s New York Field Office and compromised files related to the Epstein investigation, as first reported by Reuters.

“Following the 2023 cyber incident, the FBI contained the affected network and determined the incident to be an isolated one. The FBI restricted access to the malicious actor and rectified the network,” an FBI spokesperson said.

techcrunch.com/2026/03/11/hack…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Da Flock a ICE, ecco un'analisi di come vieni osservato

Per comprendere meglio cosa stiamo osservando esattamente in questo inferno di sorveglianza distopica, Jason Koebler e Joseph Cox di 404 Media si sono uniti a r/technology di Reddit per una sessione di Ask Me Anything.

404media.co/flock-ice-surveill…

@privacypride


From Flock to ICE, Here’s a Breakdown of How You’re Being Watched


It’s nearly impossible not to be watched these days. It can start right at home with your neighbors and their Ring cameras—a company that sold fear to the American public and is now integrating AI to turn entire neighborhoods into networked, automated surveillance systems.

Head out a bit further and you’ll likely be confronted by Flock’s network of cameras that not only track license plates, but also track people’s movements with detailed precision. And as the Trump administration raids cities across the U.S. for undocumented immigrants, tech giants like Palantir are powering tools for ICE, including one called ELITE that helps the agency pick which neighborhoods to raid.

To better understand what exactly we’re looking at in this dystopian hellscape, 404 Media’s Jason Koebler and Joseph Cox joined r/technology for an AMA.

Understandably, people are worried about violations of their privacy by companies and the government. And many wonder, is there any way to go back once we’ve released all this AI-powered, surveillance tech?

Questions and answers have been edited for clarity.

Q: How do you think we can as a society deescalate tools designed to spy on citizens? I feel like once the police state bottle is open it’s near impossible to put it back in?

JASON:This is something I grapple with a lot. For whatever reason, my reporting has gravitated to state and local surveillance tools owned by police. This is not uniformly true, but what I've seen based on watching zillions of city council meetings and reading thousands of pages of emails and public records is that police, in general, love new toys and love new gadgets. The strategy is very often ‘get the surveillance tech first and ask questions later.’ A lot of city councils are not very sophisticated about the risks of surveillance technology and a lot of them feel a lot of pressure to keep their city safe or whatever, and so they defer to the police and give them money for whatever they ask for. There are also tons of grants and pilot programs in which police can obtain technology for cheap or free, and so the posture cities take is often ‘why not try it?’ Police love telling each other about the new capabilities and tools that they've acquired, so this tech can spread from city to city very quickly.

All of this can be pretty demoralizing but something that we've seen is that when you shine even a tiny bit of light on the ways these systems work, how they can and are often abused, people learn a lot about the intricacies of them very quickly. At this point, I am getting emails and messages multiple times a week from people in a new city or town that has either decided not to buy Flock or has decided to stop working with Flock, and usually our reporting is cited in some way. The issue is that it's not just Flock, there's all sorts of surveillance tools and new companies are popping up all the time. So it does feel like it's hard to put the genie back in the bottle, but I do think that, overall, the public discussion on surveillance and privacy is getting a lot more sophisticated, and that gives me optimism.

Q: Given the breadth of these surveillance technologies, is there any hope or possibility of opting out or avoiding being “seen”? Do we accept surveillance and aggregated data about ourselves and our behavior as an inevitability?

JOSEPH: I don't think privacy is dead. I don't think people need to give up and say fine, take my data. There are concrete things people can do. But they do introduce friction. The trade off with security is efficiency. The more efficient, the less secure you might be. The more secure, the less efficient. An extreme example would be not owning a mobile phone. Well, you're immune to producing any mobile phone telecom data because you don't own one. But that's gonna be a massive pain.

Concrete things people can do:

  • Explore legislation that will let you demand a company deletes your data. Google a template of the language to send, it's pretty easy
  • Maybe delete your AdID in your phone, or change it. Here's how on Android. This is the digital glue advertisers, and parties that buy that data, use to stick together your device and its usage.
  • Use a different email for each service. This is too much work to make constant new addresses (unless you just use one junk one). I like Apple's iCloud Hide My Email feature which gives you (they say) an unlimited number of emails to generate. Then if a website is hacked or your data sold, it is not necessarily clear that the data belongs to you. Obviously it depends on the service but I use that every day.


playlist.megaphone.fm?p=TBIEA2…
Q: Are new phones being built with spyware technology and how will we know? Will Independent Media be able to continue reporting if all of our technology blocks the truth from ever reaching the masses?

JOSEPH: Supply chain attacks are what really scare me. You have a device you trust, or a piece of software you download from a legitimate source, and even then someone has snuck in some malware. The biggest one right now which was reported just recently is the Notepad++ case.

That said, we haven't seen much widespread reporting about it happening to new phones (beyond there being annoying sketchy apps, that does happen). I'd flag that the Bloomberg piece claiming the Apple supply chain was somehow compromised was widely debunked by the infosec community.

Q: What can you infer from the info you learned to explain why some ICE agents just pull cars on the street to arrest people instead of going after them from their home?

JOSEPH: I think there are a few things going on. Some parts of DHS want there to be targeted raids, against specific people, specific addresses. Others (Bovino) want a more blanket, indiscriminate approach. I'd point to this really good reporting in The Atlantic about that tension inside the agency.

But other than that, data can only go so far. Data by itself can't make these agents fulfill their arbitrary and extreme quotas of how many people to detain. At some point, the mass deportation effort becomes distinctly low tech. It's almostttt like the XKCD comic about password security and wrench attacks. It basically boils down to grabbing who they can or feel they can.

Q: Do you ever hear from workers at Palantir (or other similar companies) about what things are like there?

JOSEPH: I won't talk about sources specifically, but a couple of things: some people inside Palantir are clearly motivated enough by what the company is doing with ICE to then leak details of that work to journalists. That started with this piece, Leaked: Palantir’s Plan to Help ICE Deport People. That was a pretty unusual leak in that it contained both Slack messages and an internal Palantir wiki in which company leadership explained and justified its work with ICE.

Leaked: Palantir’s Plan to Help ICE Deport People
Internal Palantir Slack chats and message boards obtained by 404 Media show the contracting giant is helping find the location of people flagged for deportation, that Palantir is now a “more mature partner to ICE,” and how Palantir is addressing employee concerns with discussion groups on ethics.
404 MediaJoseph Cox


Broadly, I think a lot of people inside tech companies (both social media giants and surveillance companies) are often conflicted about their work. Some leave. Some put it out of mind and stay. Some leak.

Q: Do we know what information was handed over to Palantir from DOGE? I don’t think the majority of Americans understand just how dangerous this company is right now.

JOSEPH: I think we are still learning the specifics of that. When we reported on the ELITE the Palantir-made tool ICE is using, the user guide said the tool included data from the Department of Health and Human Services. Now, I don't think the list in the user guide is exhaustive by any stretch. It says ELITE integrates new data sources.

What new data sources has ICE gotten recently? IRS. CMS. Medical insurance databases. I'm not saying that data is being fed into ELITE. I don't know that and can't report it. But I absolutely think it's possible and would make sense.

Q: Are public record requests Flock's Achilles heel?

JASON: I think you've hit on something here—the business model of not just Flock but of a lot of surveillance companies is to go city by city pitching and selling their tech to local police officers. Because of the hollowing out of local news over the last 20 years, there have been fewer journalists paying attention to city council meetings, and a lot of this tech is acquired directly by police through discretionary budgets. So for years, surveillance companies have been able to essentially go to a couple small police departments, demo their tech, get a contract. Then, through police listservs and conferences and email chains, the police start to talk about their new toys with other districts, and companies can quickly go from having just a few contracts to having dozens, hundreds, or thousands of contracts. That is more or less what's happened with Flock—a lot of officers within the police departments that were early adopters of the tech have actually been hired by the company to be lobbyists and salespeople. I've focused a lot of my reporting over the years on this dynamic and how this usually goes.

But what has happened, as you've noted, is that because these surveillance companies are working with so many police departments and cities, they are subject to public records from all of them. When a company sells only to the federal government, they may be able to be very careful about what they say, what they put in writing, how they pitch their product etc. But when a company is hyperfocused on growth at the local level, they have to explain how their tech works over and over again, and highlight different features and capabilities. They create a lot of public records doing this, and journalists and concerned citizens have noticed this and have been vigilant about requesting documents that their tax dollars are paying for. So yes, this is how we're learning a lot about Flock, and it's also how governments that may not have known about abuses or how pervasive this tech is are learning about Flock too.

So my very long answer to your question is not that public records requests are Flock's achilles heel—I think Flock's design, business model, and approach to surveillance are its achilles heel, but that the way it operates its company across tons of cities leaves it more vulnerable than it would have expected to the transparency we all deserve, and it cannot plausibly fight against the release of public documents in thousands and thousands of cities at once.

Police Unmask Millions of Surveillance Targets Because of Flock Redaction Error
Flock is going after a website called HaveIBeenFlocked.com that has collated public records files released by police.
404 MediaJason Koebler


Q: Our local PD has stated that they have control over their Flock data. To me this implies that other Flock users can’t search the ALPR data from our city. Can you talk about what in particular Flock users can search for?

JOSEPH: Yeah, the ownership of Flock data is interesting. Flock says the police own it. Police say and believe that too. I think that is correct... mostly. Until our reporting (and maybe still now) many police forces seem to fundamentally misunderstand the Flock product, especially the nationwide network. When we contacted police departments when we were verifying that local cops were doing lookups for ICE, some of them had no idea what we were talking about. We had to explain how the system worked. Then many police departments realized what was happening and changed their access policies. So, police departments do own the footage (unless it's in Washington where a court has said actually it's a public record). But they might not realize who they are accidentally giving access to their cameras to.

Q: What is the state of the Fourth Amendment in the courts (and Supreme Court clarification) regarding Flock type surveillance currently?

JASON: There are a few lawsuits. One in San Jose. There was one in Norfolk, Virginia which just got decided in the city's favor (Flock's favor). It's being appealed.

The general argument is that you don't have an expectation of privacy in public and that you can take pictures of anything from public roads (basically). Another argument is that license plates are government data, roads are funded by taxpayers and are therefore public, so no problem here. What our law hasn't grappled with is the fact that all of these are networked together and automated, so it's a little different, in my opinion, from having one discrete camera that takes one discrete picture and then has to be accessed by a human. Instead you have thousands of networked cameras building a comprehensive database over time. I feel like that's functionally something different but our laws have not evolved to deal with this yet.

Q: Have we seen any of this technology spread (or attempt to spread) beyond the US, perhaps to other governments?

JOSEPH: Yep, absolutely. The UK has a robust facial recognition program, scanning people in public constantly, for example.

I would say it is often the other way around: technology is made or used overseas then it comes to the U.S. Cobwebs, which makes the Webloc location data tool ICE has bought access to, is from Israel (they're now part of an American company called Penlink). Paragon, the spyware that ICE bought, is also from Israel.

Q: Regarding the story posted on 404 Media about Apple’s Lockdown mode, is this the first time (publicly perhaps) the government has had issues accessing a phone with that mode enabled?

JOSEPH: I believe this is the first time we've seen the government admit it cannot access an iPhone running Lockdown Mode. Maybe it is in other court documents, but I don't think it's been reported.

FBI Couldn’t Get into WaPo Reporter’s iPhone Because It Had Lockdown Mode Enabled
Lockdown Mode is a sometimes overlooked feature of Apple devices that broadly make them harder to hack. A court record indicates the feature might be effective at stopping third parties unlocking someone’s device. At least for now.
404 MediaJoseph Cox


I don't think Apple will make changes based on this. That's for a few reasons:

  • Apple has continued to make changes that thwart mobile forensics tools, like the silent reboot we revealed
  • Frankly I don't think this case is high profile enough to cause that kind of response. San Bernardino was a freak, horrible event. An actual terrorist attack. That is part of why the DOJ came down so hard
  • It went against their long standing ideas of just making their product more secure

Now, Cook has obviously gotten more close to President Trump. It is embarrassing. Giving him a gold statue, or whatever. But that's different from undermining their users' security (pushing the product into China and making concessions there, that's another story).

Q: What surveillance tools do you anticipate seeing develop and integrate further into American society in the next three years without legislative oversight?

JASON: I hate that this is my answer but I think that there's going to be a lot, and I am pretty concerned at what I've seen. Here we go:

  • Police departments are obsessed with Drone as First Responder programs (called DFR), which are basically little autonomous drones that fly out to the location of a 911 call as the call is happening. Some reporting has shown that this ends up with lots of people getting drones sent at them when they're mowing the lawn too loudly or something. This is being integrated with ALPR cameras and other AI tools. Not into it.
  • I think real time facial recognition and AI cameras that are networked together is the next big thing. New Orleans is already doing this through a quasi public “charity,” which I'm writing about for next week. We've also written about a company called Fusus which is quite concerning.
  • We've seen some early AI persona bots being used by police to infiltrate social media groups. I think these are very goofy but also cops seem generally obsessed with cramming AI and facial recognition into everything they can and I think we're about to see an explosion in this space.

Q: Outside of 404 Media, what books or resources do you recommend to folks looking to learn more about surveillance in America or globally?

JOSEPH: I definitely recommend Means of Control, Byron Tau's book. He was the first journalist to report that government agencies (including ICE and CBP) were buying smartphone location data from data brokers. It's a great book to give you a true idea of the scale of the interaction between private industry and the government. This is much more important than, say, any links between, for example, Facebook and the government. Here they just literally buy the data.

For families, I think Flock is a good one. Everyone understands what it is like to drive around and how they sometimes go places they might not want others to know for personal privacy reasons. Well, are you okay with authorities being able to query that without a warrant? And are you okay with law enforcement in, say, a town in Texas being able to then look up the movements of people across the country? I think it's a pretty good tangible example that doesn't require a lot of tech stuff.

JASON: I'll add to this briefly. This is not an exhaustive list, but off the top of my head:

Zack Whitaker's This Week in Security newsletter is really good.

Our old colleague and friend Lorenzo Franceschi-Bicchierai at TechCrunch does really great work. Groups like the EFF, ACLU, Electronic Privacy Information Center, and Center for Democracy and Technology all focus on different things but are often surfacing interesting surveillance-related cases and can be helpful in terms of understanding some of the legal issues around surveillance. Lucy Parsons Lab does amazing work. The Institute of Justice is a libertarian group that always finds very interesting privacy and surveillance cases.

With Ring, American Consumers Built a Surveillance Dragnet
Ring’s ‘Search Party’ is dystopian surveillance accelerationism.
404 MediaJason Koebler


Another one I feel people understand immediately is Ring cameras. So many people have them, and I think a lot of people like them. But I have found Ring cameras as a useful intro point just because they are so popular. Should we be filming our neighbors at all times? Putting it on Nextdoor and social media sites? Connecting it to local police? What about the entire neighborhood's cameras? Should it go to ICE, etc? I think that unfortunately a lot of people will say ‘I want to protect my house and my family,’ but I do find it's usually possible to have a nuanced talk about Ring cameras, at least in my personal life, and that often opens people's eyes to other, similar systems.


reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Crimini notturni e illuminazione artificiale

@astronomia

Fra i temi proposti e affrontati al primo convegno nazionale sull’inquinamento luminoso, che si è tenuto a Roma a fine febbraio, c’è anche la relazione fra sicurezza e illuminazione notturna di strade e città. Ne parliamo in questa intervista a uno dei relatori del convegno, Luca Invernizzi, autore di una monografia sul rapporto fra criminalità e

Cybersecurity & cyberwarfare ha ricondiviso questo.

Senigallia piange Luca Conti: blogger e consigliere comunale, aveva 50 anni
vivere.me/gBdb-m

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Piano d'azione per l'intelligenza artificiale nel Regno Unito: vaporware, crypto bros e niente intelligenza artificiale


Se vuoi conoscere le ultime notizie rilevanti del mondo della #IntelligenzaArtificiale puoi seguir il gruppo @aitech


Il Regno Unito ha annunciato il suo Piano d'azione per le opportunità dell'IA a gennaio 2025. Questo trasformerà il Regno Unito in un Paese orientato all'IA! Un salto nel futuro!

Il piano si basava su due rapporti del Tony Blair Institute del 2024, contenenti molti dettagli apparentemente concreti sul panorama industriale del Regno Unito, ma che in realtà i ricercatori avevano scritto chiedendo a ChatGPT. Se ne vantavano nei rapporti. Chiedere a veri esperti avrebbe richiesto troppo tempo.

Il Regno Unito ha preso questi numeri inventati e li ha utilizzati!

Il Guardian ha analizzato attentamente come questo stupido piano di intelligenza artificiale del Regno Unito sia basato su quelli che il titolo definisce cortesemente “investimenti fantasma”: [ Guardian ]

il denaro non è necessariamente reale, i data center potrebbero non essere nuovi, i posti di lavoro non sono stati ancora contabilizzati e il sito del supercomputer a 12 miglia a nord di Londra è ancora un cantiere di impalcature.


Il Dipartimento per la scienza, l'innovazione e la tecnologia ha ammesso al Guardian che:

Non esisteva alcun contratto per un investimento da 1,9 miliardi di sterline (2,5 miliardi di dollari), nonostante un comunicato stampa dichiarasse che ne era stato firmato uno. In un altro, si affermava che "non stava svolgendo un ruolo attivo nella verifica di tali impegni".


La parte del piano di intelligenza artificiale relativa ai data center dipende da due aziende: Nscale (Regno Unito) e CoreWeave (Stati Uniti). Entrambe erano ex miner di criptovalute, che hanno fatto una... svolta verso l'intelligenza artificiale!

continua qui:
pivot-to-ai.com/2026/03/10/uk-…

Grazie a @davidgerard per la segnalazione


UK AI Action Plan: vaporware, crypto bros, no AI

♫ we told you so ♫

youtube.com/watch?v=nB415dkRsY… - video
pivottoai.libsyn.com/20260310-… - podcast

time: 5 min 51 sec

pivot-to-ai.com/2026/03/10/uk-… - blog post


Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Privilege Escalation in SQL Server: installa ora la patch che evita guai

📌 Link all'articolo : redhotcyber.com/post/privilege…

#redhotcyber #news #cybersecurity #hacking #sqlserver #vulnerabilita #privilegeescalation #cve202621262

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚨 Corso 𝗖𝗬𝗕𝗘𝗥 𝗢𝗙𝗙𝗘𝗡𝗦𝗜𝗩𝗘 𝗙𝗨𝗡𝗗𝗔𝗠𝗘𝗡𝗧𝗔𝗟𝗦: ultimi posti rimasti. Afrettati!

📞 Per info 379 163 8765 ✉️ formazione@redhotcyber.com
🔗 Per dettagli: redhotcyber.com/linksSk2L/cybe…

#redhotcyber #formazione #pentesting #pentest #formazionelive #ethicalhacking #hacking #cybersecurity

Tutte le minacce del 2025 e le priorità di difesa nel nuovo anno


@Informatica (Italy e non Italy)
La valutazione critica dei fatti di sicurezza avvenuti e delle tendenze future deve essere rapportata alle capacità di difesa della propria organizzazione. E questo per far emergere un eventuale divario di sicurezza e per poi pianificare interventi adeguati. Ecco come

reshared this

Aggiornamenti Microsoft: corrette due zero-day e la prima vulnerabilità scoperta dall’IA


@Informatica (Italy e non Italy)
Microsoft rilascia gli aggiornamenti mensili con otto vulnerabilità critiche, una valanga di escalation di privilegi e una falla in Excel che potrebbe trasformare Microsoft Copilot in strumento di esfiltrazione dati. E, per

reshared this

Fastweb+Vodafone, il cybercrime in Italia: attacchi più mirati, phishing più sofisticato e crescita attacchi “zero day”


@Informatica (Italy e non Italy)
Anche per l’anno 2025 Fastweb + Vodafone ha contribuito a fotografare la situazione del cyber crime in Italia sulla base dei dati del proprio Security Operations Center (SOC), attivo

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Exploit Zero-Day per Windows RDP a 220.000 dollari. Ecco il mercato dei cyber-weapons

📌 Link all'articolo : redhotcyber.com/post/exploit-z…

#redhotcyber #news #cybersecurity #hacking #vulnerabilita #windows #remotdesktop #elevazioneprivilegi

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

📢 Cerchi un generatore di QRcode open source, non tracciante e completamente libero?

Boost Media APS ha creato Frog:
💚 condividi i tuoi link con qrcode
💚 inserisci loghi all'interno dei qrcode
💚 l'applicazione non richiede alcuna registrazione
💚 l'applicazione non ha alcun tracciante
💚 è integrata in tutte le release di Ufficio Zero.

Insieme continuiamo ad offrire servizi a costo zero, etici e liberi.

frog.boostmedia.it/

@lealternative@feddit.it

#frog #qrcode #ufficiozero #ufficiozerolinuxos #opensource #freesoftware

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

One of the things I like about The Onion, to which I pay cash money for the print version, is the "ads"
Cybersecurity & cyberwarfare ha ricondiviso questo.

Phrack has a new “main page” on their website. With a CfP as a cracktro. Love it!
phrack.org/ #phrack #zine #ezine #cracktro #demoscene #hacking
Questa voce è stata modificata (1 mese fa)

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Meta, the Royal Thai Police, the FBI, and the US DOJ disrupt criminal scam centers in Southeast Asia, disabling 150K+ accounts and arresting 21 individuals (Sam Sabin/Axios)

axios.com/2026/03/11/meta-thai…
techmeme.com/260311/p18#a26031…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Muppet, Trump, AI

Sensitive content

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Hewlett #Packard #Enterprise fixes critical authentication bypass in #Aruba AOS-CX
securityaffairs.com/189278/sec…
#securityaffairs #hacking #HPE
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

L'eID Wallet non merita ancora la tua piena fiducia

Nonostante la sua imminente implementazione, il nuovo portafoglio elettronico dell'UE non è ancora idoneo a tutelare i diritti dei suoi utenti. @edri e 9 ONG sollecitano la @EUCommission a modificare le bozze per garantire che gli utenti non possano essere tracciati, né costretti a condividere dati sensibili né a fornire la propria identità legale laddove ciò non sia richiesto dalla legge.

edri.org/our-work/the-eid-wall…

@privacypride

in reply to informapirata ⁂

Direi piuttosto che "l'eID Wallet non merita la tua fiducia", tout court. Per due motivi:
1) diventa un singolo punto di rottura. Il furto del telefono diventa (potenzialmente?) una tragedia.
2) ti obbligano ad usare dispositivi che non puoi controllare veramente. Con Android ed iPhone siamo alla mercé di aziende non europee; schiacciano un bottone e l'intera Europa rimane fregata. Niente documenti, niente autenticazioni. Niente.
@edri @EUCommission @privacypride

Privacy Pride reshared this.

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Hewlett #Packard #Enterprise fixes critical authentication bypass in #Aruba AOS-CX
securityaffairs.com/189278/sec…
#securityaffairs #hacking #HPE
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Under the Trump administration, two of the three major credit bureaus have sharply reduced the share of complaints they resolved in customers’ favor.

In 2024, Experian’s relief rate was 20%. Last year, that figure fell to less than 1%.

Read our full investigation: propublica.org/article/credit-…

#Data #Finance #PersonalFinance #Credit #Trump #DataViz #Research #Journalism

in reply to ProPublica

🤖 Tracking strings detected and removed!

🔗 Clean URL(s):
propublica.org/article/credit-…

❌ Removed parts:
?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

UK announces it put billions of pounds into generative AI today to inject it into a growth economy it says - after being told by entirely unbiased tech companies it is that good. We’re building an “AI supercomputer”.

In other news, what is actually happening on the ground:

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Il reclutamento degli hacker di Stato e l’evoluzione normativa della difesa cibernetica in italia

📌 Link all'articolo : redhotcyber.com/post/il-reclut…

#redhotcyber #news #cybersicurezza #ransomware #hackerEtici #sicurezzainformatica #normecyber #incidenticyber

L’Iran ha cominciato la contro-guerra cyber: dai Ddos ai sabotaggi, ecco cosa bisogna sapere


@Informatica (Italy e non Italy)
L’Iran sta usando il dominio cyber come strumento elastico di rappresaglia, con una prima fascia visibile a bassa soglia e una seconda fascia meno rumorosa ma pericolosa che riguarda accessi, persistenza, raccolta

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

#KadNap bot compromises 14,000+ devices to route malicious traffic
securityaffairs.com/189251/mal…
#securityaffairs #hacking #malware
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Ti sei mai innamorato di un algoritmo?

📌 Link all'articolo : redhotcyber.com/post/ti-sei-ma…

#redhotcyber #news #intelligenzaartificiale #profilazioneonline #fantascienzaromantica #algoritmi #amore #netflix

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

250 – La guerra più dei fake che dei missili camisanicalzolari.it/250-la-gu…
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Big Tech contro il Pentagono: la guerra dell’AI è appena iniziata

📌 Link all'articolo : redhotcyber.com/post/big-tech-…

#redhotcyber #news #intelligenzaartificiale #openai #google #anthropic #pentagono #tecnologia #cybersecurity

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Vulnerabilità negli IDE con assistenti AI: un altro problema di sicurezza

📌 Link all'articolo : redhotcyber.com/post/vulnerabi…

#redhotcyber #news #cybersecurity #hacking #malware #vulnerabilita #vscode #opensvsx #extension #google #cursor