Cybersecurity & cyberwarfare ha ricondiviso questo.

Dal porta a porta alla sanzione: Acea Energia paga 2 milioni di euro per violazioni GDPR


@Informatica (Italy e non Italy)
Il Garante privacy rende noto di avere inflitto una sanzione da 2milioni di euro ad Acea Energia per gravi violazioni privacy, emerse dal trattamento dei dati personali di oltre 1.200 clienti nell’ambito della fornitura di energia

reshared this

Rapporto Clusit 2026: cresce l’impatto degli attacchi cyber, ma anche le difficoltà di analisi


@Informatica (Italy e non Italy)
A fronte di un +49% d’aumento degli attacchi cyber a livello globale, in Italia si registra una crescita record del 42%, a dimostrazione che il Bel Paese continua a essere bersaglio appetibile per i criminali informatici.

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Gli aggressori hanno trasformato la compromissione della supply chain nx npm in un accesso completo all'amministrazione AWS in meno di 72 ore.

Google afferma che UNC6426 ha rubato il token GitHub di uno sviluppatore tramite QUIETVAULT, ha abusato di OIDC Trust da GitHub ad AWS, ha creato un nuovo ruolo di amministratore, quindi ha avuto accesso ai dati S3 e ha distrutto i sistemi di produzione.

thehackernews.com/2026/03/unc6…

@Informatica (Italy e non Italy)

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Tutte le minacce del 2025 e le priorità di difesa nel nuovo anno


@Informatica (Italy e non Italy)
La valutazione critica dei fatti di sicurezza avvenuti e delle tendenze future deve essere rapportata alle capacità di difesa della propria organizzazione. E questo per far emergere un eventuale divario di sicurezza e per poi pianificare interventi adeguati. Ecco come

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Aggiornamenti Microsoft: corrette due zero-day e la prima vulnerabilità scoperta dall’IA


@Informatica (Italy e non Italy)
Microsoft rilascia gli aggiornamenti mensili con otto vulnerabilità critiche, una valanga di escalation di privilegi e una falla in Excel che potrebbe trasformare Microsoft Copilot in strumento di esfiltrazione dati. E, per

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

From the story:

"Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices."

"Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently."

krebsonsecurity.com/2026/03/ir…

#stryker #handala #intune #wiper #cybersecurity

in reply to BrianKrebs

Wait. What does this company have to do with Epstein? I wonder if it relates to the FBI breach, where some of the Epstein files were compromised. If that's the case, then the attackers probably have a list of targets.

techcrunch.com/2026/03/11/hack…

A couple of hours ago: mlive.com/news/kalamazoo/2026/…

Stryker financial contributions: opensecrets.org/orgs/stryker-c…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Fastweb+Vodafone, il cybercrime in Italia: attacchi più mirati, phishing più sofisticato e crescita attacchi “zero day”


@Informatica (Italy e non Italy)
Anche per l’anno 2025 Fastweb + Vodafone ha contribuito a fotografare la situazione del cyber crime in Italia sulla base dei dati del proprio Security Operations Center (SOC), attivo

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

L’Iran ha cominciato la contro-guerra cyber: dai Ddos ai sabotaggi, ecco cosa bisogna sapere


@Informatica (Italy e non Italy)
L’Iran sta usando il dominio cyber come strumento elastico di rappresaglia, con una prima fascia visibile a bassa soglia e una seconda fascia meno rumorosa ma pericolosa che riguarda accessi, persistenza, raccolta

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

In Italia si sta così bene che 85 mila cervelli vogliono fuggire a Bruxelles, e sono la metà di tutti quelli europei.

euractiv.com/news/national-bre…

Cybersecurity & cyberwarfare ha ricondiviso questo.

“D’istruzione pubblica”, il nuovo film-documentario che racconta lo smantellamento della scuola pubblica: mercoledì 18 Marzo incontro con il pubblico dopo la proiezione delle 18.40 al Cinema Aquila


[em][strong][url=https://cinemaaquila.it/evento/incontro-per-distruzione-pubblica/]“D’istruzione pubblica”, il nuovo film-documentario di Mirko Melchiorre e Federico Greco che racconta lo smantellamento della scuola pubblica, torna a grande richiesta nella sala cara al quartiere Pigneto. Mercoledì 18 alla proiezione delle 18.40 saranno infatti presenti Marina Boscaino (docente e giornalista), Renata Puleo (dirigente scolastico in quiescenza) e Luca Malgioglio (docente). [...][/url][/strong][/em]

BeatBanker: A dual‑mode Android Trojan


The media in this post is not displayed to visitors. To view it, please log in.

Recently, we uncovered BeatBanker, an Android‑based malware campaign targeting Brazil. It spreads primarily through phishing attacks via a website disguised as the Google Play Store. To achieve their goals, the malicious APKs carry multiple components, including a cryptocurrency miner and a banking Trojan capable of completely hijacking the device and spoofing screens, among other things. In a more recent campaign, the attackers switched from the banker to a known RAT.

This blog post outlines each phase of the malware’s activity on the victim’s handset, explains how it ensures long‑term persistence, and describes its communication with mining pools.

Key findings:


  • To maintain persistence, the Trojan employs a creative mechanism: it plays an almost inaudible audio file on a loop so it cannot be terminated. This inspired us to name it BeatBanker.
  • It monitors battery temperature and percentage, and checks whether the user is using the device.
  • At various stages of the attack, BeatBanker disguises itself as a legitimate application on the Google Play Store and as the Play Store itself.
  • It deploys a banker in addition to a cryptocurrency miner.
  • When the user tries to make a USDT transaction, BeatBanker creates overlay pages for Binance and Trust Wallet, covertly replacing the destination address with the threat actor’s transfer address.
  • New samples now drop BTMOB RAT instead of the banking module.


Initial infection vector


The campaign begins with a counterfeit website, cupomgratisfood[.]shop, that looks exactly like the Google Play Store. This fake app store contains the “INSS Reembolso” app, which is in fact a Trojan. There are also other apps that are most likely Trojans too, but we haven’t obtained them.

The INSS Reembolso app poses as the official mobile portal of Brazil’s Instituto Nacional do Seguro Social (INSS), a government service that citizens can use to perform more than 90 social security tasks, from retirement applications and medical exam scheduling to viewing CNIS (National Registry of Social Information), tax, and payment statements, as well as tracking request statuses. By masquerading as this trusted platform, the fake page tricks users into downloading the malicious APK.

Packing


The initial APK file is packed and makes use of a native shared library (ELF) named libludwwiuh.so that is included in the application. Its main task is to decrypt another ELF file that will ultimately load the original DEX file.

First, libludwwiuh.so decrypts an embedded encrypted ELF file and drops it to a temporary location on the device under the name l.so. The same code that loaded the libludwwiuh.so library then loads this file, which uses the Java Native Interface (JNI) to continue execution.


l.so – the DEX loader


The library does not have calls to its functions; instead, it directly calls the Java methods whose names are encrypted in the stack using XOR (stack strings technique) and restored at runtime:

Initially, the loader makes a request to collect some network information using ipapi.is to determine whether the infected device is a mobile device, if a VPN is being used, and to obtain the IP address and other details.

This loader is engineered to bypass mobile antivirus products by utilizing dalvik.system.InMemoryDexClassLoader. It loads malicious DEX code directly into memory, avoiding the creation of any files on the device’s file system. The necessary DEX files can be extracted using dynamic analysis tools like Frida.

Furthermore, the sample incorporates anti-analysis techniques, including runtime checks for emulated or analysis environments. When such an environment is detected (or when specific checks fail, such as verification of the supported CPU_ABI), the malware can immediately terminate its own process by invoking android.os.Process.killProcess(android.os.Process.myPid()), effectively self-destructing to hinder dynamic analysis.

After execution, the malware displays a user interface that mimics the Google Play Store page, showing an update available for the INSS Reembolso app. This is intended to trick victims into granting installation permissions by tapping the “Update” button, which allows the download of additional hidden malicious payloads.

The payload delivery process mimics the application update. The malware uses the REQUEST_INSTALL_PACKAGES permission to install APK files directly into its memory, bypassing Google Play. To ensure persistence, the malware keeps a notification about a system update pinned to the foreground and activates a foreground service with silent media playback, a tactic designed to prevent the operating system from terminating the malicious process.


Crypto mining


When UPDATE is clicked on a fake Play Store screen, the malicious application downloads and executes an ELF file containing a cryptomining payload. It starts by issuing a GET request to the C2 server at either hxxps://accessor.fud2026.com/libmine-<arch>.so or hxxps://fud2026.com/libmine-<arch>.so. The downloaded file is then decrypted using CipherInputStream(), with the decryption key being derived from the SHA-1 hash of the downloaded file’s name, ensuring that each version of the file is encrypted with a unique key. The resulting file is renamed d-miner.

The decrypted payload is an ARM-compiled XMRig 6.17.0 binary. At runtime, it attempts to create a direct TCP connection to pool.fud2026[.]com:9000. If successful, it uses this endpoint; otherwise, it automatically switches to the proxy endpoint pool-proxy.fud2026[.]com:9000. The final command-line arguments passed to XMRig are as follows:

  • -o pool.fud2026[.]com:9000 or pool-proxy.fud2026[.]com:9000 (selected dynamically)
  • -k (keepalive)
  • --tls (encrypted connection)
  • --no-color (disable colored output)
  • --nicehash (NiceHash protocol support)


C2 telemetry


The malware uses Google’s legitimate Firebase Cloud Messaging (FCM) as its primary command‑and‑control (C2) channel. In the analyzed sample, each FCM message received triggers a check of the battery status, temperature, installation date, and user presence. A hidden cryptocurrency miner is then started or stopped as needed. These mechanisms ensure that infected devices remain permanently accessible and responsive to the attacker’s instructions, which are sent through the FCM infrastructure. The attacker monitors the following information:

  • isCharging: indicates whether the phone is charging;
  • batteryLevel: the exact battery percentage;
  • isRecentInstallation: indicates whether the application was recently installed (if so, the implant delays malicious actions);
  • isUserAway: indicates whether the user is away from the device (screen off and inactive);
  • overheat: indicates whether the device is overheating;
  • temp: the current battery temperature.


Persistence


The KeepAliveServiceMediaPlayback component ensures continuous operation by initiating uninterrupted playback via MediaPlayer. It keeps the service active in the foreground using a notification and loads a small, continuous audio file. This constant activity prevents the system from suspending or terminating the process due to inactivity.

The identified audio output8.mp3 is five seconds long and plays on a loop. It contains some Chinese words.

Banking module


BeatBanker compromises the machine with a cryptocurrency miner and introduces another malicious APK that acts as a banking Trojan. This Trojan uses previously obtained permission to install an additional APK called INSS Reebolso, which is associated with the package com.destination.cosmetics.

Similar to the initial malicious APK, it establishes persistence by creating and displaying a fixed notification in the foreground to hinder removal. Furthermore, BeatBanker attempts to trick the user into granting accessibility permissions to the package.

Leveraging the acquired accessibility permissions, the malware establishes comprehensive control over the device’s user interface.

The Trojan constantly monitors the foreground application. It targets the official Binance application (com.binance.dev) and the Trust Wallet application (com.wallet.crypto.trustapp), focusing on USDT transactions. When a user tries to withdraw USDT, the Trojan instantly overlays the target app’s transaction confirmation screen with a highly realistic page sourced from Base64-encoded HTML stored in the banking module.

The module captures the original withdrawal address and amount, then surreptitiously substitutes the destination address with an attacker-controlled one using AccessibilityNodeInfo.ACTION_SET_TEXT. The overlay page shows the victim the address they copied (for Binance) or just shows a loading icon (for Trust Wallet), leading them to believe they are remitting funds to the intended wallet when, in fact, the cryptocurrency is transferred to the attacker’s designated address.

Fake overlay pages: Binance (left) and Trust Wallet (right)
Fake overlay pages: Binance (left) and Trust Wallet (right)

Target browsers


BeatBanker’s banking module monitors the following browsers installed on the victim’s device:

  • Chrome
  • Firefox
  • sBrowser
  • Brave
  • Opera
  • DuckDuckGo
  • Dolphin Browser
  • Edge

Its aim is to collect the URLs accessed by the victim using the regular expression ^(?:https?://)?(?:[^:/\\\\]+\\\\.)?([^:/\\\\]+\\\\.[^:/\\\\]+). It also offers management functionalities (add, edit, delete, list) for links saved in the device’s default browser, as well as the ability to open links provided by the attacker.

C2 communication


BeatBanker is also designed to receive commands from the C2. These commands aim to collect the victim’s personal information and gain complete control of the device.

CommandDescription
0Starts dynamic loading of the DEX class
UpdateSimulates software update and locks the screen
msg:Displays a Toast message with the provided text
goauth<*>Opens Google Authenticator (if installed) and enables the AccessService.SendGoogleAuth flag used to monitor and retrieve authentication codes
kill<*>Sets the protection bypass flag AccessService.bypass to “True”
and sets the initializeService.uninstall flag to “Off”
srec<*>Starts or stops audio recording (microphone), storing the recorded data in a file with an automatically generated filename. The following path format is used to store the recording: /Config/sys/apps/rc/<timestamp>_0REC<last5digits>.wav
pst<*>Pastes text from the clipboard (via Accessibility Services)
GRC<*>Lists all existing audio recording files
gtrc<*>Sends a specific audio recording file to the C2
lcm<*>Lists supported front camera resolutions
usdtress<*>Sets a USDT cryptocurrency address when a transaction is detected
lnk<*>Opens a link in the browser
EHP<*>Updates login credentials (host, port, name) and restarts the application
ssms<*>Sends an SMS message (individually or to all contacts)
CRD<*>Adds (E>) or removes (D>) packages from the list of blocked/disabled applications
SFD<*>Deletes files (logs, recordings, tones) or uninstalls itself
adm<>lck<>Immediately locks the screen using Device Administrator permissions
adm<>wip<>Performs a complete device data wipe (factory reset)
Aclk<*>Executes a sequence of automatic taps (auto-clicker) or lists existing macros
KBO<*>lodChecks the status of the keylogger and virtual keyboard
KBO<*>AKP/AKARequests permission to activate a custom virtual keyboard or activates one
KBO<*>ENB:Enables (1) or disables (0) the keylogger
RPM<*>lodChecks the status of all critical permissions
RPM<*>ACCRequests Accessibility Services permission
RPM<*>DOZRequests Doze/App Standby permission (battery optimization)
RPM<*>DRWRequests Draw Over Other Apps permission (overlay)
RPM<*>INSTRequests permission to install apps from unknown sources (Android 8+)
ussd<*>Executes a USSD code (e.g., *#06# for IMEI)
Blkt<*>Sets the text for the lock overlay
BLKV<*>Enables or disables full-screen lock using WindowManager.LayoutParams.TYPE_APPLICATION_OVERLAY to display a black FrameLayout element over the entire screen
SCRD<> / SCRD2<>Enables/disables real-time screen text submission to the C2 (screen reading)
rdall<*>Clears or sends all keylogger logs
rdd<*>Deletes a specific log file
rd<*>Sends the content of a specific keylogger file
MO<*>Manages application monitoring (add, remove, list, screenshot, etc.)
FW<*>Controls VPN and firewall (status, block/allow apps, enable/disable)
noti<*>Creates persistent and custom notifications
sp<*>Executes a sequence of swipes/taps (gesture macro)
lodp<*>Manages saved links in the internal browser (add, edit, delete, list)
scc:Starts screen capture/streaming

New BeatBanker samples dropping BTMOB


Our recent detection efforts uncovered a campaign leveraging a fraudulent StarLink application that we assess as being a new BeatBanker variant. The infection chain mirrored previous instances, employing identical persistence methods – specifically, looped audio and fixed notifications. Furthermore, this variant included a crypto miner similar to those seen previously. However, rather than deploying the banking module, it was observed distributing the BTMOB remote administration tool.

The BTMOB APK is highly obfuscated and contains a class responsible for configuration. Despite this, it’s possible to identify a parser used to define the application’s behavior on the device, as well as persistence features, such as protection against restart, deletion, lock reset, and the ability to perform real-time screen recording.


String decryption


The simple decryption routine uses repetitive XOR between the encrypted data and a short key. It iterates through the encrypted text byte by byte, repeating the key from the beginning whenever it reaches the end. At each position, the sample XORs the encrypted byte with the corresponding byte of the key, overwriting the original. Ultimately, the modified byte array contains the original text, which is then converted to UTF-8 and returned as a string.


Malware-as-a-Service


BTMOB is an Android remote administration tool that evolved from the CraxsRAT, CypherRAT, and SpySolr families. It provides full remote control of the victim’s device and is sold in a Malware-as-a-Service (MaaS) model. On July 26, 2025, a threat actor posted a screenshot of the BTMOB RAT in action on GitHub under the username “brmobrats”, along with a link to the website btmob[.]xyz. The website contains information about the BTMOB RAT, including its version history, features, and other relevant details. It also redirects to a Telegram contact. Cyfirma has already linked this account to CraxsRAT and CypherRAT.

Recently, a YouTube channel was created by a different threat actor that features videos demonstrating how to use the malware and facilitate its sale via Telegram.

We also saw the distribution and sale of leaked BTMOB source code on some dark web forums. This may suggest that the creator of BeatBanker acquired BTMOB from its original author or the source of the leak and is utilizing it as the final payload, replacing the banking module observed in the INSS Reebolso incident.

In terms of functionality, BTMOB maintains a set of intrusive capabilities, including: automatic granting of permissions, especially on Android 13–15 devices; use of a black FrameLayout overlay to hide system notifications similar to the one observed in the banking module; silent installation; persistent background execution; and mechanisms designed to capture screen lock credentials, including PINs, patterns, and passwords. The malware also provides access to front and rear cameras, captures keystrokes in real time, monitors GPS location, and constantly collects sensitive data. Together, these functionalities provide the operator with comprehensive remote control, persistent access, and extensive surveillance capabilities over compromised devices.


Victims


All variants of BeatBanker – those with the banking module and those with the BTMOB RAT – were detected on victims in Brazil. Some of the samples that deliver BTMOB appear to use WhatsApp to spread, as well as phishing pages.

Conclusion


BeatBanker is an excellent example of how mobile threats are becoming more sophisticated and multi-layered. Initially focused in Brazil, this Trojan operates a dual campaign, acting as a Monero cryptocurrency miner, discreetly draining your device’s battery life while also stealing banking credentials and tampering with cryptocurrency transactions. Moreover, the most recent version goes even further, substituting the banking module with a full-fledged BTMOB RAT.

The attackers have devised inventive tricks to maintain persistence. They keep the process alive by looping an almost inaudible audio track, which prevents the operating system from terminating it and allows BeatBanker to remain active for extended periods.

Furthermore, the threat demonstrates an obsession with staying hidden. It monitors device usage, battery level and temperature. It even uses Google’s legitimate system (FCM) to receive commands. The threat’s banking module is capable of overlaying Binance and Trust Wallet screens and diverting USDT funds to the criminals’ wallets before the victim even notices.

The lesson here is clear: distrust is your best defense. BeatBanker spreads through fake websites that mimic Google Play, disguising itself as trustworthy government applications. To protect yourself against threats like this, it is essential to:

  1. Download apps only from official sources. Always use the Google Play Store or the device vendor’s official app store. Make sure you use the correct app store app, and verify the developer.
  2. Check permissions. Pay attention to the permissions that applications request, especially those related to accessibility and installation of third-party packages.
  3. Keep the system updated. Security updates for Android and your mobile antivirus are essential.

Our solutions detect this threat as HEUR:Trojan-Dropper.AndroidOS.BeatBanker and HEUR:Trojan-Dropper.AndroidOS.Banker.*

Indicators of compromise


Additional IoCs, TTPs and detection rules are available to customers of our Threat Intelligence Reporting service. For more details, contact us at crimewareintel@kaspersky.com.

Host-based (MD5 hashes)
F6C979198809E13859196B135D21E79B – INSS Reebolso
D3005BF1D52B40B0B72B3C3B1773336B – StarLink

Domains
cupomgratisfood[.]shop
fud2026[.]com
accessor.fud2026[.]com
pool.fud2026[.]com
pool-proxy.fud2026[.]com
aptabase.fud2026[.]com
aptabase.khwdji319[.]xyz
btmob[.]xyz
bt-mob[.]net


securelist.com/beatbanker-mine…

Cybersecurity & cyberwarfare ha ricondiviso questo.

We Were Right About Havana Syndrome
L: warontherocks.com/2026/03/we-w…
C: news.ycombinator.com/item?id=4…
posted on 2026.03.11 at 16:01:48 (c=2, p=8)

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Gli strumenti di verifica dell’età online si diffondono negli Stati Uniti per la sicurezza dei bambini, ma il vero obiettivo sono gli adulti

- Le nuove leggi statunitensi ideate per la sicurezza dei minori online stanno costringendo milioni di americani adulti a sottoporsi a controlli obbligatori per la verifica dell’età, che spesso utilizzano la tecnologia dell’intelligenza artificiale, e stanno creando notevoli grattacapi alle aziende di social media che cercano di trovare un equilibrio tra conformità legale e privacy per gli utenti.
- Circa la metà degli stati degli Stati Uniti ha promulgato o sta promuovendo leggi che impongono alle piattaforme, tra cui siti di contenuti per adulti, servizi di gioco online e app di social media, di bloccare gli utenti minorenni.
- Grandi volumi di dati sensibili sull’identità possono diventare bersagli per le richieste del governo e degli hacker. Ma a un livello più profondo, la sorveglianza colpisce le fondamenta di un Internet libero e aperto, affermano i sostenitori delle libertà civili, e la scorsa settimana una sentenza del tribunale della Virginia, citando il Primo Emendamento, ha confermato la decisione.

cnbc.com/2026/03/08/social-med…

@Privacy Pride

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Votazione storica su #chatcontrol al Parlamento europeo: gli eurodeputati votano per porre fine alla scansione di massa non mirata delle chat private

In una svolta sensazionale nella lotta contro il Chat Control, la maggioranza del Parlamento europeo ha votato oggi per porre fine alla scansione di massa non mirata delle comunicazioni private. Così facendo, il Parlamento ha fermamente respinto le pratiche di sorveglianza incostituzionali e soggette a errori degli ultimi anni. Ora aumenta la pressione sui governi dell’UE affinché rispettino il voto dei deputati e pongano fine una volta per tutte alla sorveglianza di massa non mirata in Europa.
informapirata.it/2026/03/11/vo…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Votazione storica su chatcontrol al Parlamento europeo: gli eurodeputati votano per porre fine alla scansione di massa non mirata delle chat private

In una svolta sensazionale nella lotta contro il Chat Control, la maggioranza del Parlamento europeo ha votato oggi per porre fine alla scansione di massa non mirata delle comunicazioni private.

informapirata.it/2026/03/11/vo…

Grazie a @echo_pbreyer per tutta l'energia spesa per questa battaglia

@pirati


Votazione storica su #chatcontrol al Parlamento europeo: gli eurodeputati votano per porre fine alla scansione di massa non mirata delle chat private

In una svolta sensazionale nella lotta contro il Chat Control, la maggioranza del Parlamento europeo ha votato oggi per porre fine alla scansione di massa non mirata delle comunicazioni private. Così facendo, il Parlamento ha fermamente respinto le pratiche di sorveglianza incostituzionali e soggette a errori degli ultimi anni. Ora aumenta la pressione sui governi dell’UE affinché rispettino il voto dei deputati e pongano fine una volta per tutte alla sorveglianza di massa non mirata in Europa.
informapirata.it/2026/03/11/vo…


Cybersecurity & cyberwarfare ha ricondiviso questo.

Pro-Palestinian hacktivist group #Handala targets #Stryker in global disruption
securityaffairs.com/189304/hac…
#securityaffairs #hacking #Iran

Gli hacktivisti filo-iraniani Handala affermano di aver hackerato il colosso statunitense della tecnologia medica Stryker. Alcuni sistemi aziendali sono stati cancellati, causando interruzioni e disservizi in tutto il mondo.

Gli attivisti hanno affermato che l'attacco è stato "una rappresaglia per il brutale attacco alla scuola Minab", in cui sono morte decine di bambini.

"In questa operazione, oltre 200.000 sistemi, server e dispositivi mobili sono stati cancellati e sono stati estratti 50 terabyte di dati critici. Gli uffici di Stryker in 79 paesi sono stati costretti a chiudere", hanno scritto gli hacker in un messaggio pubblicato online.

Il post di @Lorenzo Franceschi-Bicchierai su #Techcrunch

techcrunch.com/2026/03/11/stry…


Se vuoi conoscere le notizie sul mondo dell'informatica, segui il gruppo @Informatica (Italy e non Italy)



NEW: The pro-Iran hacktivists Handala claim to have hacked U.S. medical tech giant Stryker. Some company systems have been wiped, causing disruptions and outages worldwide.

The hakctivists said the attack was "in retaliation for the brutal attack on the Minab school," which killed dozens of kids.

“In this operation, over 200,000 systems, servers, and mobile devices have been wiped and 50 terabytes of critical data have been extracted. Stryker’s offices in 79 countries have been forced to shut down,” the hackers wrote in a message posted online.

techcrunch.com/2026/03/11/stry…


reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please log in.

Formazione obbligatoria sulla sicurezza (scuola), unica possibilità gratuita iscrivendosi a servizio esterno con cessione dei dati personali: aiuto!

EDIT: correggo le diciture delle prime frasi perché ho appurato che il corso posso farlo liberamente anche da privato (perciò la scuola non mi impone né obbliga a usare la piattaforma che propone), anche se ovviamente in questo caso sarà a spese mie e dovrò pensare io a cercare il corso ecc.
Segnalo i cambiamenti con il grassetto corsivo.
Resta comunque valido il punto centrale del topic: credo che la scuola abbia fatto una pessima proposta, tra quelle disponibili sul mercato, perché invia i dati raccolti a troppe piattaforme internazionali con sedi fuori dall'Italia e dalla UE (Stati Uniti, Malta).

@Etica Digitale (Feddit)

La mia scuola mi propone di registrarmi alla piattaforma Docendo Academy per conseguire l'attestazione obbligatoria per la sicurezza sul lavoro, ma questo comporta l'acquisizione di dati sensibili da parte di Amazon, Google, Microsoft e altri.

Ho deciso di rifiutare la proposta della scuola e provvederò in proprio e a mie spese all'adempimento dell'obbligo di legge.

Sto preparando un'email per spiegare al mio DS come, pur desiderando partecipare al corso, non sia stato messo nelle condizioni di farlo utilizzando la possibilità gratuita offerta dalla scuola senza rinunciare a parte dei miei diritti in fatto di privacy e protezione dell'identità digitale.

Ho infatti ricevuto (come tutti i miei colleghi) l'email che trovate nella prima immagine, direttamente dalla Docendo Academy a cui la scuola ha passato il mio indirizzo istituzionale (MS365). Pare che questo possano farlo senza il mio consenso perché si tratta dell'adempimento di un obbligo di legge, perciò non voglio contestare questo punto.

La registrazione sulla piattaforma prevede però l'inserimento di dati sensibili, di cui alle successive immagini (le successive alle prime 4 sono nei commenti per permettere agli utenti mastodon di visualizzarle tutte).

Poiché un collega mi aveva segnalato il problema, sono arrivato all'ultimo passaggio dopo aver inserito dati falsi per prova (compreso un codice fiscale non valido e un indirizzo/CAP inesistenti, dati che il sistema non ha minimamente verificato in questa fase) e ho trovato la pagina relativa al consenso, che obbliga al trattamento dei dati da parte di AWS/Amazon.

Ho aperto il link relativo alla privacy policy (gestito da Iubenda) e ho trovato i dettagli, tra i quali spiccano le raccolte di dati per profilazione (senza possibilità di opt-out) da parte di: Google (cloud, pubblicità, statistica e altro), Meta (pubblicità, statistica), Amazon (hosting), HubSpot (database utenti), X (pubblicità), LinkedIn (pubblicità) ecc...

Per molti di questi servizi di terze parti non è neanche ben chiaro quali dati siano trattati, perché si rimanda alle privacy policy dei singoli enti (lunghissime, in inglese) e perché a volte comprendono l'utilizzo di script di tracciamento non meglio specificati.

Chiedo l'aiuto del Fediverso perché a me la cosa sembra grave (non alla maggioranza dei miei colleghi naturalmente, che si è registrata immediatamente con grande naturalezza).

Vorrei se possibile che mi aiutaste a definire bene perché la cosa è grave: "lesione della privacy" è troppo generico e debole (socialmente) in questo periodo storico. Vorrei trovare qualche definizione ben fatta di etica digitale, buone pratiche, cattive pratiche, identità digitale ecc... Possibilmente vorrei citare qualche articolo specifico sulle implicazioni delle società qui citate in gravi "nefandezze" a livello mondiale, dalla sorveglianza di massa al coinvolgimento nelle guerre in corso. Insomma, materiale e idee, ad integrare le ricerche che ovviamente sto facendo io...

Grazie a tutti, vi prego di boostare e diffondere il più possibile e vi terrò aggiornati!
🙏

#privacy #pubblicaamministrazione #Scuola #Sicurezza #formazione #eticadigitale #identitadigitali

@Scuola - Gruppo Forum

in reply to PiadaMakkine

@PiadaMakkine Beh il corso sulla sicurezza è obbligatorio. Un collega ha provato a protestare per lo stesso motivo e gli è stato risposto che l'unica alternativa è farselo per conto proprio e a spese proprie, e io sono disposto a farlo. Però voglio cercare di sensibilizzare sia la dirigenza, sia i colleghi sul fatto che la scelta dell'erogatore di servizi andrebbe fatta con maggiore attenzione anche a questo aspetto, e non solo selezionando la proposta più economica...

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Nuovo post: Didacta 2026 - giorno 1

dropseaofulaula.blogspot.com/2…

Cybersecurity & cyberwarfare ha ricondiviso questo.

NEW: The pro-Iran hacktivists Handala claim to have hacked U.S. medical tech giant Stryker. Some company systems have been wiped, causing disruptions and outages worldwide.

The hakctivists said the attack was "in retaliation for the brutal attack on the Minab school," which killed dozens of kids.

“In this operation, over 200,000 systems, servers, and mobile devices have been wiped and 50 terabytes of critical data have been extracted. Stryker’s offices in 79 countries have been forced to shut down,” the hackers wrote in a message posted online.

techcrunch.com/2026/03/11/stry…

in reply to Lorenzo Franceschi-Bicchierai

In a statement, CISA's acting director Nick Andersen said the agency is investigating the attack. "We are working shoulder-to-shoulder with our public and private sector partners as we continue to uncover relevant information and provide technical assistance."

techcrunch.com/2026/03/11/stry…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

La Forza è forte in te... ma lo stress pure

#redhotcyber #cybersecurity #hacking #hacker #infosec #infosecurity #quotes #meme #comica #vignette #citazioni

Cybersecurity & cyberwarfare ha ricondiviso questo.

Cos’è vibeware, l’industrializzazione dei malware potenziata dalle AI


@Informatica (Italy e non Italy)
Individuata da Bitdefender, vibeware è una nuova strategia d'attacco APT basata sull’industrializzazione dei malware potenziata dalle AI al fine di diffondere codice dannoso monouso che si adatta agli ambienti target
L'articolo Cos’è vibeware, l’industrializzazione dei malware potenziata dalle AI proviene da Cyber

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Score 10 su 10 per i BMS Honeywell che espongono gli edifici al controllo remoto

📌 Link all'articolo : redhotcyber.com/post/score-10-…

#redhotcyber #news #cybersecurity #hacking #vulnerabilità #sicurezzainformatica #honeywell #iq4xbms #cvss

Cybersecurity & cyberwarfare ha ricondiviso questo.

NEW: A hacker broke into a server at the Child Exploitation Forensic Lab in the FBI’s New York Field Office and compromised files related to the Epstein investigation, as first reported by Reuters.

“Following the 2023 cyber incident, the FBI contained the affected network and determined the incident to be an isolated one. The FBI restricted access to the malicious actor and rectified the network,” an FBI spokesperson said.

techcrunch.com/2026/03/11/hack…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Da Flock a ICE, ecco un'analisi di come vieni osservato

Per comprendere meglio cosa stiamo osservando esattamente in questo inferno di sorveglianza distopica, Jason Koebler e Joseph Cox di 404 Media si sono uniti a r/technology di Reddit per una sessione di Ask Me Anything.

404media.co/flock-ice-surveill…

@privacypride


From Flock to ICE, Here’s a Breakdown of How You’re Being Watched


It’s nearly impossible not to be watched these days. It can start right at home with your neighbors and their Ring cameras—a company that sold fear to the American public and is now integrating AI to turn entire neighborhoods into networked, automated surveillance systems.

Head out a bit further and you’ll likely be confronted by Flock’s network of cameras that not only track license plates, but also track people’s movements with detailed precision. And as the Trump administration raids cities across the U.S. for undocumented immigrants, tech giants like Palantir are powering tools for ICE, including one called ELITE that helps the agency pick which neighborhoods to raid.

To better understand what exactly we’re looking at in this dystopian hellscape, 404 Media’s Jason Koebler and Joseph Cox joined r/technology for an AMA.

Understandably, people are worried about violations of their privacy by companies and the government. And many wonder, is there any way to go back once we’ve released all this AI-powered, surveillance tech?

Questions and answers have been edited for clarity.

Q: How do you think we can as a society deescalate tools designed to spy on citizens? I feel like once the police state bottle is open it’s near impossible to put it back in?

JASON:This is something I grapple with a lot. For whatever reason, my reporting has gravitated to state and local surveillance tools owned by police. This is not uniformly true, but what I've seen based on watching zillions of city council meetings and reading thousands of pages of emails and public records is that police, in general, love new toys and love new gadgets. The strategy is very often ‘get the surveillance tech first and ask questions later.’ A lot of city councils are not very sophisticated about the risks of surveillance technology and a lot of them feel a lot of pressure to keep their city safe or whatever, and so they defer to the police and give them money for whatever they ask for. There are also tons of grants and pilot programs in which police can obtain technology for cheap or free, and so the posture cities take is often ‘why not try it?’ Police love telling each other about the new capabilities and tools that they've acquired, so this tech can spread from city to city very quickly.

All of this can be pretty demoralizing but something that we've seen is that when you shine even a tiny bit of light on the ways these systems work, how they can and are often abused, people learn a lot about the intricacies of them very quickly. At this point, I am getting emails and messages multiple times a week from people in a new city or town that has either decided not to buy Flock or has decided to stop working with Flock, and usually our reporting is cited in some way. The issue is that it's not just Flock, there's all sorts of surveillance tools and new companies are popping up all the time. So it does feel like it's hard to put the genie back in the bottle, but I do think that, overall, the public discussion on surveillance and privacy is getting a lot more sophisticated, and that gives me optimism.

Q: Given the breadth of these surveillance technologies, is there any hope or possibility of opting out or avoiding being “seen”? Do we accept surveillance and aggregated data about ourselves and our behavior as an inevitability?

JOSEPH: I don't think privacy is dead. I don't think people need to give up and say fine, take my data. There are concrete things people can do. But they do introduce friction. The trade off with security is efficiency. The more efficient, the less secure you might be. The more secure, the less efficient. An extreme example would be not owning a mobile phone. Well, you're immune to producing any mobile phone telecom data because you don't own one. But that's gonna be a massive pain.

Concrete things people can do:

  • Explore legislation that will let you demand a company deletes your data. Google a template of the language to send, it's pretty easy
  • Maybe delete your AdID in your phone, or change it. Here's how on Android. This is the digital glue advertisers, and parties that buy that data, use to stick together your device and its usage.
  • Use a different email for each service. This is too much work to make constant new addresses (unless you just use one junk one). I like Apple's iCloud Hide My Email feature which gives you (they say) an unlimited number of emails to generate. Then if a website is hacked or your data sold, it is not necessarily clear that the data belongs to you. Obviously it depends on the service but I use that every day.


playlist.megaphone.fm?p=TBIEA2…
Q: Are new phones being built with spyware technology and how will we know? Will Independent Media be able to continue reporting if all of our technology blocks the truth from ever reaching the masses?

JOSEPH: Supply chain attacks are what really scare me. You have a device you trust, or a piece of software you download from a legitimate source, and even then someone has snuck in some malware. The biggest one right now which was reported just recently is the Notepad++ case.

That said, we haven't seen much widespread reporting about it happening to new phones (beyond there being annoying sketchy apps, that does happen). I'd flag that the Bloomberg piece claiming the Apple supply chain was somehow compromised was widely debunked by the infosec community.

Q: What can you infer from the info you learned to explain why some ICE agents just pull cars on the street to arrest people instead of going after them from their home?

JOSEPH: I think there are a few things going on. Some parts of DHS want there to be targeted raids, against specific people, specific addresses. Others (Bovino) want a more blanket, indiscriminate approach. I'd point to this really good reporting in The Atlantic about that tension inside the agency.

But other than that, data can only go so far. Data by itself can't make these agents fulfill their arbitrary and extreme quotas of how many people to detain. At some point, the mass deportation effort becomes distinctly low tech. It's almostttt like the XKCD comic about password security and wrench attacks. It basically boils down to grabbing who they can or feel they can.

Q: Do you ever hear from workers at Palantir (or other similar companies) about what things are like there?

JOSEPH: I won't talk about sources specifically, but a couple of things: some people inside Palantir are clearly motivated enough by what the company is doing with ICE to then leak details of that work to journalists. That started with this piece, Leaked: Palantir’s Plan to Help ICE Deport People. That was a pretty unusual leak in that it contained both Slack messages and an internal Palantir wiki in which company leadership explained and justified its work with ICE.

Leaked: Palantir’s Plan to Help ICE Deport People
Internal Palantir Slack chats and message boards obtained by 404 Media show the contracting giant is helping find the location of people flagged for deportation, that Palantir is now a “more mature partner to ICE,” and how Palantir is addressing employee concerns with discussion groups on ethics.
404 MediaJoseph Cox


Broadly, I think a lot of people inside tech companies (both social media giants and surveillance companies) are often conflicted about their work. Some leave. Some put it out of mind and stay. Some leak.

Q: Do we know what information was handed over to Palantir from DOGE? I don’t think the majority of Americans understand just how dangerous this company is right now.

JOSEPH: I think we are still learning the specifics of that. When we reported on the ELITE the Palantir-made tool ICE is using, the user guide said the tool included data from the Department of Health and Human Services. Now, I don't think the list in the user guide is exhaustive by any stretch. It says ELITE integrates new data sources.

What new data sources has ICE gotten recently? IRS. CMS. Medical insurance databases. I'm not saying that data is being fed into ELITE. I don't know that and can't report it. But I absolutely think it's possible and would make sense.

Q: Are public record requests Flock's Achilles heel?

JASON: I think you've hit on something here—the business model of not just Flock but of a lot of surveillance companies is to go city by city pitching and selling their tech to local police officers. Because of the hollowing out of local news over the last 20 years, there have been fewer journalists paying attention to city council meetings, and a lot of this tech is acquired directly by police through discretionary budgets. So for years, surveillance companies have been able to essentially go to a couple small police departments, demo their tech, get a contract. Then, through police listservs and conferences and email chains, the police start to talk about their new toys with other districts, and companies can quickly go from having just a few contracts to having dozens, hundreds, or thousands of contracts. That is more or less what's happened with Flock—a lot of officers within the police departments that were early adopters of the tech have actually been hired by the company to be lobbyists and salespeople. I've focused a lot of my reporting over the years on this dynamic and how this usually goes.

But what has happened, as you've noted, is that because these surveillance companies are working with so many police departments and cities, they are subject to public records from all of them. When a company sells only to the federal government, they may be able to be very careful about what they say, what they put in writing, how they pitch their product etc. But when a company is hyperfocused on growth at the local level, they have to explain how their tech works over and over again, and highlight different features and capabilities. They create a lot of public records doing this, and journalists and concerned citizens have noticed this and have been vigilant about requesting documents that their tax dollars are paying for. So yes, this is how we're learning a lot about Flock, and it's also how governments that may not have known about abuses or how pervasive this tech is are learning about Flock too.

So my very long answer to your question is not that public records requests are Flock's achilles heel—I think Flock's design, business model, and approach to surveillance are its achilles heel, but that the way it operates its company across tons of cities leaves it more vulnerable than it would have expected to the transparency we all deserve, and it cannot plausibly fight against the release of public documents in thousands and thousands of cities at once.

Police Unmask Millions of Surveillance Targets Because of Flock Redaction Error
Flock is going after a website called HaveIBeenFlocked.com that has collated public records files released by police.
404 MediaJason Koebler


Q: Our local PD has stated that they have control over their Flock data. To me this implies that other Flock users can’t search the ALPR data from our city. Can you talk about what in particular Flock users can search for?

JOSEPH: Yeah, the ownership of Flock data is interesting. Flock says the police own it. Police say and believe that too. I think that is correct... mostly. Until our reporting (and maybe still now) many police forces seem to fundamentally misunderstand the Flock product, especially the nationwide network. When we contacted police departments when we were verifying that local cops were doing lookups for ICE, some of them had no idea what we were talking about. We had to explain how the system worked. Then many police departments realized what was happening and changed their access policies. So, police departments do own the footage (unless it's in Washington where a court has said actually it's a public record). But they might not realize who they are accidentally giving access to their cameras to.

Q: What is the state of the Fourth Amendment in the courts (and Supreme Court clarification) regarding Flock type surveillance currently?

JASON: There are a few lawsuits. One in San Jose. There was one in Norfolk, Virginia which just got decided in the city's favor (Flock's favor). It's being appealed.

The general argument is that you don't have an expectation of privacy in public and that you can take pictures of anything from public roads (basically). Another argument is that license plates are government data, roads are funded by taxpayers and are therefore public, so no problem here. What our law hasn't grappled with is the fact that all of these are networked together and automated, so it's a little different, in my opinion, from having one discrete camera that takes one discrete picture and then has to be accessed by a human. Instead you have thousands of networked cameras building a comprehensive database over time. I feel like that's functionally something different but our laws have not evolved to deal with this yet.

Q: Have we seen any of this technology spread (or attempt to spread) beyond the US, perhaps to other governments?

JOSEPH: Yep, absolutely. The UK has a robust facial recognition program, scanning people in public constantly, for example.

I would say it is often the other way around: technology is made or used overseas then it comes to the U.S. Cobwebs, which makes the Webloc location data tool ICE has bought access to, is from Israel (they're now part of an American company called Penlink). Paragon, the spyware that ICE bought, is also from Israel.

Q: Regarding the story posted on 404 Media about Apple’s Lockdown mode, is this the first time (publicly perhaps) the government has had issues accessing a phone with that mode enabled?

JOSEPH: I believe this is the first time we've seen the government admit it cannot access an iPhone running Lockdown Mode. Maybe it is in other court documents, but I don't think it's been reported.

FBI Couldn’t Get into WaPo Reporter’s iPhone Because It Had Lockdown Mode Enabled
Lockdown Mode is a sometimes overlooked feature of Apple devices that broadly make them harder to hack. A court record indicates the feature might be effective at stopping third parties unlocking someone’s device. At least for now.
404 MediaJoseph Cox


I don't think Apple will make changes based on this. That's for a few reasons:

  • Apple has continued to make changes that thwart mobile forensics tools, like the silent reboot we revealed
  • Frankly I don't think this case is high profile enough to cause that kind of response. San Bernardino was a freak, horrible event. An actual terrorist attack. That is part of why the DOJ came down so hard
  • It went against their long standing ideas of just making their product more secure

Now, Cook has obviously gotten more close to President Trump. It is embarrassing. Giving him a gold statue, or whatever. But that's different from undermining their users' security (pushing the product into China and making concessions there, that's another story).

Q: What surveillance tools do you anticipate seeing develop and integrate further into American society in the next three years without legislative oversight?

JASON: I hate that this is my answer but I think that there's going to be a lot, and I am pretty concerned at what I've seen. Here we go:

  • Police departments are obsessed with Drone as First Responder programs (called DFR), which are basically little autonomous drones that fly out to the location of a 911 call as the call is happening. Some reporting has shown that this ends up with lots of people getting drones sent at them when they're mowing the lawn too loudly or something. This is being integrated with ALPR cameras and other AI tools. Not into it.
  • I think real time facial recognition and AI cameras that are networked together is the next big thing. New Orleans is already doing this through a quasi public “charity,” which I'm writing about for next week. We've also written about a company called Fusus which is quite concerning.
  • We've seen some early AI persona bots being used by police to infiltrate social media groups. I think these are very goofy but also cops seem generally obsessed with cramming AI and facial recognition into everything they can and I think we're about to see an explosion in this space.

Q: Outside of 404 Media, what books or resources do you recommend to folks looking to learn more about surveillance in America or globally?

JOSEPH: I definitely recommend Means of Control, Byron Tau's book. He was the first journalist to report that government agencies (including ICE and CBP) were buying smartphone location data from data brokers. It's a great book to give you a true idea of the scale of the interaction between private industry and the government. This is much more important than, say, any links between, for example, Facebook and the government. Here they just literally buy the data.

For families, I think Flock is a good one. Everyone understands what it is like to drive around and how they sometimes go places they might not want others to know for personal privacy reasons. Well, are you okay with authorities being able to query that without a warrant? And are you okay with law enforcement in, say, a town in Texas being able to then look up the movements of people across the country? I think it's a pretty good tangible example that doesn't require a lot of tech stuff.

JASON: I'll add to this briefly. This is not an exhaustive list, but off the top of my head:

Zack Whitaker's This Week in Security newsletter is really good.

Our old colleague and friend Lorenzo Franceschi-Bicchierai at TechCrunch does really great work. Groups like the EFF, ACLU, Electronic Privacy Information Center, and Center for Democracy and Technology all focus on different things but are often surfacing interesting surveillance-related cases and can be helpful in terms of understanding some of the legal issues around surveillance. Lucy Parsons Lab does amazing work. The Institute of Justice is a libertarian group that always finds very interesting privacy and surveillance cases.

With Ring, American Consumers Built a Surveillance Dragnet
Ring’s ‘Search Party’ is dystopian surveillance accelerationism.
404 MediaJason Koebler


Another one I feel people understand immediately is Ring cameras. So many people have them, and I think a lot of people like them. But I have found Ring cameras as a useful intro point just because they are so popular. Should we be filming our neighbors at all times? Putting it on Nextdoor and social media sites? Connecting it to local police? What about the entire neighborhood's cameras? Should it go to ICE, etc? I think that unfortunately a lot of people will say ‘I want to protect my house and my family,’ but I do find it's usually possible to have a nuanced talk about Ring cameras, at least in my personal life, and that often opens people's eyes to other, similar systems.


reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Crimini notturni e illuminazione artificiale

@astronomia

Fra i temi proposti e affrontati al primo convegno nazionale sull’inquinamento luminoso, che si è tenuto a Roma a fine febbraio, c’è anche la relazione fra sicurezza e illuminazione notturna di strade e città. Ne parliamo in questa intervista a uno dei relatori del convegno, Luca Invernizzi, autore di una monografia sul rapporto fra criminalità e

Cybersecurity & cyberwarfare ha ricondiviso questo.

Senigallia piange Luca Conti: blogger e consigliere comunale, aveva 50 anni
vivere.me/gBdb-m

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Piano d'azione per l'intelligenza artificiale nel Regno Unito: vaporware, crypto bros e niente intelligenza artificiale


Se vuoi conoscere le ultime notizie rilevanti del mondo della #IntelligenzaArtificiale puoi seguir il gruppo @aitech


Il Regno Unito ha annunciato il suo Piano d'azione per le opportunità dell'IA a gennaio 2025. Questo trasformerà il Regno Unito in un Paese orientato all'IA! Un salto nel futuro!

Il piano si basava su due rapporti del Tony Blair Institute del 2024, contenenti molti dettagli apparentemente concreti sul panorama industriale del Regno Unito, ma che in realtà i ricercatori avevano scritto chiedendo a ChatGPT. Se ne vantavano nei rapporti. Chiedere a veri esperti avrebbe richiesto troppo tempo.

Il Regno Unito ha preso questi numeri inventati e li ha utilizzati!

Il Guardian ha analizzato attentamente come questo stupido piano di intelligenza artificiale del Regno Unito sia basato su quelli che il titolo definisce cortesemente “investimenti fantasma”: [ Guardian ]

il denaro non è necessariamente reale, i data center potrebbero non essere nuovi, i posti di lavoro non sono stati ancora contabilizzati e il sito del supercomputer a 12 miglia a nord di Londra è ancora un cantiere di impalcature.


Il Dipartimento per la scienza, l'innovazione e la tecnologia ha ammesso al Guardian che:

Non esisteva alcun contratto per un investimento da 1,9 miliardi di sterline (2,5 miliardi di dollari), nonostante un comunicato stampa dichiarasse che ne era stato firmato uno. In un altro, si affermava che "non stava svolgendo un ruolo attivo nella verifica di tali impegni".


La parte del piano di intelligenza artificiale relativa ai data center dipende da due aziende: Nscale (Regno Unito) e CoreWeave (Stati Uniti). Entrambe erano ex miner di criptovalute, che hanno fatto una... svolta verso l'intelligenza artificiale!

continua qui:
pivot-to-ai.com/2026/03/10/uk-…

Grazie a @davidgerard per la segnalazione


UK AI Action Plan: vaporware, crypto bros, no AI

♫ we told you so ♫

youtube.com/watch?v=nB415dkRsY… - video
pivottoai.libsyn.com/20260310-… - podcast

time: 5 min 51 sec

pivot-to-ai.com/2026/03/10/uk-… - blog post


Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Privilege Escalation in SQL Server: installa ora la patch che evita guai

📌 Link all'articolo : redhotcyber.com/post/privilege…

#redhotcyber #news #cybersecurity #hacking #sqlserver #vulnerabilita #privilegeescalation #cve202621262

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚨 Corso 𝗖𝗬𝗕𝗘𝗥 𝗢𝗙𝗙𝗘𝗡𝗦𝗜𝗩𝗘 𝗙𝗨𝗡𝗗𝗔𝗠𝗘𝗡𝗧𝗔𝗟𝗦: ultimi posti rimasti. Afrettati!

📞 Per info 379 163 8765 ✉️ formazione@redhotcyber.com
🔗 Per dettagli: redhotcyber.com/linksSk2L/cybe…

#redhotcyber #formazione #pentesting #pentest #formazionelive #ethicalhacking #hacking #cybersecurity

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Exploit Zero-Day per Windows RDP a 220.000 dollari. Ecco il mercato dei cyber-weapons

📌 Link all'articolo : redhotcyber.com/post/exploit-z…

#redhotcyber #news #cybersecurity #hacking #vulnerabilita #windows #remotdesktop #elevazioneprivilegi

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

📢 Cerchi un generatore di QRcode open source, non tracciante e completamente libero?

Boost Media APS ha creato Frog:
💚 condividi i tuoi link con qrcode
💚 inserisci loghi all'interno dei qrcode
💚 l'applicazione non richiede alcuna registrazione
💚 l'applicazione non ha alcun tracciante
💚 è integrata in tutte le release di Ufficio Zero.

Insieme continuiamo ad offrire servizi a costo zero, etici e liberi.

frog.boostmedia.it/

@lealternative@feddit.it

#frog #qrcode #ufficiozero #ufficiozerolinuxos #opensource #freesoftware

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

One of the things I like about The Onion, to which I pay cash money for the print version, is the "ads"
Cybersecurity & cyberwarfare ha ricondiviso questo.

Phrack has a new “main page” on their website. With a CfP as a cracktro. Love it!
phrack.org/ #phrack #zine #ezine #cracktro #demoscene #hacking
Questa voce è stata modificata (1 mese fa)

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Meta, the Royal Thai Police, the FBI, and the US DOJ disrupt criminal scam centers in Southeast Asia, disabling 150K+ accounts and arresting 21 individuals (Sam Sabin/Axios)

axios.com/2026/03/11/meta-thai…
techmeme.com/260311/p18#a26031…

reshared this