Cybersecurity & cyberwarfare ha ricondiviso questo.

NEW: Google said that last year, and for the first time, it found more zero-days used by spyware makers (15) rather than government-backed espionage groups (12) in the wild.

The shift demonstrated “a slow but sure movement in the landscape” of how governments hack targets, according to the company.

techcrunch.com/2026/03/05/goog…

reshared this

Neutralizzata Tycoon 2FA, il kit phishing che aggirava l’MFA e ha compromesso migliaia di account


@Informatica (Italy e non Italy)
Questi attacchi informatici, che consentono il takeover completo degli account, possono avere conseguenze devastanti, tra cui attacchi ransomware o la perdita di dati sensibili. Ecco come è stata neutralizzata Tycoon

Cybersecurity & cyberwarfare ha ricondiviso questo.

È di nuovo giovedì, e su #SocialDebug cerco di capire come uomo e donna riescano a funzionare anche quando sembrano parlare lingue differenti.

Sul giradischi un Pezzali coi capelli e tutte le emozioni della cassetta nell'autoradio ♥️

open.substack.com/pub/signorin…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Vietato criticare il sionismo? Non più, ma quasi: il nuovo testo del DDL Romeo commentato continua a essere un problema

Il testo del DDL Romeo approvato al Senato differisce significativamente da quello originario, ma mantiene tratti ambigui ed eccezionalisti.

kritica.it/politica/ddl-romeo-…

@politica

Cybersecurity & cyberwarfare ha ricondiviso questo.

GDPR Omnibus: La "semplificazione" dell'UE lontana dalle reali esigenze delle imprese

«...la maggior parte dei professionisti non vuole che le protezioni vengano ridotte, ma che si riducano i compiti di documentazione e le pratiche burocratiche. In molti casi, chiedono addirittura leggi più chiare invece di una maggiore "flessibilità", che è difficile da gestire per la maggior parte delle aziende.»

noyb.eu/it/gdpr-omnibus-eu-sim…

@privacypride

Cybersecurity & cyberwarfare ha ricondiviso questo.

Russin APT targets Ukraine with BadPaw and MeowMeow #malware
securityaffairs.com/188974/apt…
#securityaffairs #hacking #Russia #Ukraine

Guerra cognitiva. Rizzi (DIS): “Il libero arbitrio è l’infrastruttura critica più importante”


@Informatica (Italy e non Italy)
La centralità delle minacce multidominio e multidimensionali nella tutela della sovranità nazionale “Governare il cambiamento” è il titolo della relazione annuale del DIS presentata alla Camera. La tecnologia e l’innovazione tecnologica

Cybersecurity & cyberwarfare ha ricondiviso questo.

Sostenibilità e sovranità digitale nella scuola del 21° secolo. Convegno in occasione dei 20 anni del Progetto FUSS

Il Progetto #FUSS (Free Upgrade for a Digitally Sustainable School) celebra quest’anno il suo ventesimo anniversario (2005-2025) e per l'occasione organizzerà un convegno lunedì 20 aprile 2026 dalle 15:00 alle 18:00 presso l’Aula Magna della Facoltà di Ingegneria della Libera Università di #Bolzano in via Bruno Buozzi 1 a Bolzano.

fuss.bz.it/post/2026-04-20_fus…

@gnulinuxitalia

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Scoperto “Coruna”: il kit di exploit che ha hackerato iPhone per anni senza farsi notare

📌 Link all'articolo : redhotcyber.com/post/scoperto-…

#redhotcyber #news #cybersecurity #hacking #malware #ios #vulnerabilità #google #coruna #iphone #truffacinese

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Decisioni Artificiali: La rubrica che spiega l’AI prima che lei cambi la tua vita

📌 Link all'articolo : redhotcyber.com/post/divulgazi…

#redhotcyber #news #intelligenzaartificiale #decisioniartificiali #marcoCamisaniCalzolari #aibusiness #divulgazione #ai

Using a Solid-State Elastocaloric Cooler to Freeze Water


The media in this post is not displayed to visitors. To view it, please log in.

Elastocaloric materials are a class of materials that exhibit a big change in temperature when exposed to mechanical stress. This could potentially make them useful as solid-state replacement for both vapor-compression refrigeration systems and Peltier coolers.
The entire assembled elastocaloric device. (Credit: Guoan Zhou, Nature, 2026)The entire assembled elastocaloric device. (Credit: Guoan Zhou, Nature, 2026)
So far one issue has been that reaching freezing temperatures was impossible, but a recently demonstrated solution (online PDF via IEEE Spectrum) using NiTi-based shape-memory alloys addressed that issue with a final temperature of -12°C achieved within 15 minutes from room temperature.

In the paper by [Guoan Zhou] et al. the cascade cooler is described, with eight stages of each three tubular, thin-walled NiTi structures. Each of these stages is mechanically loaded by a ceramic head that provides the 900 MPa mechanical stress required to transfer thermal energy via the stages from one side to the other of the device, alternately absorbing or releasing the energy with CaCl2 as the heat-exchange fluid.

NiTi alloys are known as about the ideal type of SMA for this elastocaloric purpose, so how much further this technology can be pushed remains to be seen. For stationary refrigeration applications it might just be the ticket, but we’ll have to see as the technology is developed further.


hackaday.com/2026/03/05/using-…

Running Video Through A Guitar Effects Pedal


The media in this post is not displayed to visitors. To view it, please log in.

Guitar pedals are designed to take in a sound signal, do fun stuff to it, and then spit it out to your amplifier where it hopefully impresses other people. However, [Liam Taylor] decided to see what would happen if you fed video through a guitar pedal instead.

The device under test is a Boss ME-50 multi-effects unit. It’s capable of serving up a wide range of effects, from delay to chorus to reverb, along with compression and distortion and a smattering of others. [Liam] hooked up the composite video output from an old Sony camcorder from the 2000s to a 3.5 mm audio jack, and plugged it straight into the auxiliary input of the ME-50 (notably, not the main guitar input of the device).

The multi-effects pedal isn’t meant to work with an analog video signal, but it can pass it through and do weird things to it regardless. Using the volume pedal on the ME-50 puts weird lines on the signal, while using a wah effect makes everything a little wobbly. [Liam] then steps through a whole range of others, like ring modulation, octave effects, and reverb, all of which do different weird things to the visuals. Particularly fun are some of the periodic effects which create predictable variation to the signal. True to its name, the distortion effect did a particularly good job of messing things up overall.

It’s a fun experiment, and recalls us of some of the fantastic analog video synths of years past. Video after the break.

youtube.com/embed/WG0KVxWWH18?…


hackaday.com/2026/03/04/runnin…

AI Act, un anno dopo i primi divieti: il bilancio della conformità e le nuove scadenze della governance


@Informatica (Italy e non Italy)
A un anno dall'interdizione dei sistemi a rischio inaccettabile, il mercato UE si interroga sull'equilibrio tra innovazione e oneri di conformità. Mentre le sanzioni per i trasgressori possono erodere fino al 7% del fatturato

reshared this

Ciardi (ACN): “AI, servono anticorpi per affrontare le minacce cyber”


@Informatica (Italy e non Italy)
“La cybersicurezza è una responsabilità istituzionale, grandissima. Noi parliamo sempre dei dati come la nuova moneta, ma più dati insieme hanno un valore diverso dato dalla loro relazione e non dalla loro quantità”. Lo ha detto Nunzia Ciardi, Vice Direttrice Generale ACN, nel suo

Iran, Russia e non solo: l’architettura della repressione digitale


@Informatica (Italy e non Italy)
I regimi autoritari fanno sempre più spesso affidamento agli spegnimenti di internet per reprimere il dissenso e bloccare le informazioni: ecco come funzionano i blackout della rete
L'articolo Iran, Russia e non solo: l’architettura della repressione digitale proviene da Guerre di Rete.

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚀 Scopri il Corso "Dark Web & Cyber Threat Intelligence" in modalità E-Learning sulla nostra Academy!🚀

📖 Argomenti del corso academy.redhotcyber.com/course…

📌 𝗔𝗰𝗰𝗲𝘀𝘀𝗼 𝗳𝗹𝗲𝘀𝘀𝗶𝗯𝗶𝗹𝗲: Corso in e-learning con contenuti sempre disponibili
📌 𝗦𝘂𝗽𝗽𝗼𝗿𝘁𝗼 𝗱𝗮𝗹 𝗽𝗿𝗼𝗳𝗲𝘀𝘀𝗼𝗿𝗲: docente disponibile via email
📌 𝗔𝗰𝗰𝗲𝘀𝘀𝗼 𝗮 𝗗𝗮𝗿𝗸𝗟𝗮𝗯: Completata la formazione è possibile fare richiesta per accedere a DarkLab, il gruppo di Red Hot Cyber sulla Cyber Threat Intelligence: redhotcyber.com/post/nasce-dar…

Scrivi a formazione@redhotcyber.com o Whatsapp al 3791638765

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence
#OnlineCourses #Elearning #DigitalLearning #RemoteCourses #VirtualClasses #CourseOfTheDay #LearnOnline #OnlineTraining #Webinars #academy

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Operation #Leak: #FBI and #Europol dismantle #LeakBase #Cybercrime forum
securityaffairs.com/188958/cyb…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Il SOC è morto? l’AI sta riscrivendo la cybersecurity con il SOC Cognitivo

📌 Link all'articolo : redhotcyber.com/post/il-soc-e-…

#redhotcyber #news #cybersecurity #intelligenzaartificiale #securityoperationscenter #soc #cognitivo

Cybersecurity & cyberwarfare ha ricondiviso questo.

Ciruzzo 'o Scialatiello preso per il culo dai due comici di regime russi Vovan e Lexus

Vovan Vladimir Kuznetsov e Lexus Alexey Stolyarov si sono presentati in call a Reza Pahlavi come funzionari tedeschi in contatto con il cancelliere Merz.
All'inizio del video uno dei due attori si è presentato come "Adolf" e sfoggiava baffetti finti che ricordavano quelli di Hitler. "Mio nonno conosceva suo padre", ha esordito

tg.la7.it/cronaca/reza-pahlavi…

@politica

Questa voce è stata modificata (1 mese fa)
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🎉 È arrivato il campione mondiale di OSINT su Google Immagini! 🎉

#redhotcyber #cybersecurity #hacking #hacker #infosec #infosecurity #quotes #meme #comica #vignette #citazioni

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Una falla in Google Chrome può accendere microfono e webcam: la soluzione c’era

📌 Link all'articolo : redhotcyber.com/post/una-falla…

#redhotcyber #news #cybersecurity #vulnerabilita #chromesicurezza #hackinginformatico #malware #browser #gemini

Cybersecurity & cyberwarfare ha ricondiviso questo.

The big illusion is over: Artificial Intelligence is not replacing software developers

Dal blog Link&Think di @enriconardelli
link-and-think.blogspot.com/20…
@informatica
by Enrico Nardelli

(versione italiana qua)

Let me say upfront — to pre-empt the usual hasty comments from those who won't read to the end — that I do believe tools based on generative Artificial

in reply to informapirata ⁂

I’m sure they’d love to try, though. It reminds me of the trend of offshore outsourcing, where executives were so excited that they might be able to replace their costly employees with something cheaper, so they could keep more money for shareholders and themselves. And you know, fuck their former employees. After a ton of investment and disruption while they experimented with offshore outsourcing, for the most part, as far as for programming anyway, they figured out that hiring a bunch of 19 year-old kids in India was not the same as having someone more lexperienced in the same country to it. There were all sorts of problems with interpreting specs, security, coordination across time zones, and so on. They backed away, but not before they’d fired tens of thousands of people and disrupted their lives. I can picture AI going the same way.

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

La grande illusione infranta: l'Intelligenza Artificiale non sostituisce gli sviluppatori di software

Dal blog Link&Think di @enriconardelli
link-and-think.blogspot.com/20…
@informatica
di Enrico Nardelli

(english version here)

Anticipo subito - per evitare i soliti commenti frettolosi di chi non legge fino in fondo - che ritengo che gli strumenti

in reply to informapirata ⁂

le aziende guardano sempre al guadagno immediato mai al lungo termine. Lo si vede quando per pochi spicci lasciano andare via delle persone e poi spendono fior di quattrini per assumere e formare persone nuove che cambieranno dopo 6 mesi.

Cmq quando si usa un'IA per scrivere codice devi avere almeno idea di quello che fai altrimenti è la fine. Ammetto di usarla per scrivere alcune cose in Javascript, ancora non riesco ad imparare bene le promesse...

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

244 – Attenzione! Oggi online possono farci credere che una certa idea sia condivisa da “tutti” camisanicalzolari.it/244-atten…
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Operation Leak: le forze dell’ordine chiudono LeakBase! Forum hacker o mercato di repost?

📌 Link all'articolo : redhotcyber.com/post/operation…

#redhotcyber #news #cybersecurity #hacking #leakbase #operationleak #frodeinformatica #sicurezzainformatica

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Google uncovers #Coruna #iOS Exploit Kit targeting iOS 13–17.2.1
securityaffairs.com/188928/sec…
#securityaffairs #hacking #Apple
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Crisi USA-Iran, hacktivismo e ChatGPT-Pentagono: quando la fiducia diventa infrastruttura

📌 Link all'articolo : redhotcyber.com/post/crisi-usa…

#redhotcyber #news #cyberwar #guerrainformatica #sicurezzainformatica #hacking #malware #ransomware #fiducia

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Quando l’AI diventa il “corriere” per i malware

📌 Link all'articolo : redhotcyber.com/post/traffico-…

#redhotcyber #news #intelligenzaartificiale #cybersecurity #malware #hacking #sicurezzainformatica

Trying a Vibe-Coded Operating System


The media in this post is not displayed to visitors. To view it, please log in.

If you were to read the README of the Vib-OS project on GitHub, you’d see it advertised as a Unix-like OS that was written from scratch, runs on ARM64 and x86_64, and comes with a full GUI, networking and even full Doom game support. Unfortunately, what you are seeing there isn’t the beginnings of a new promising OS that might go toe to toe with the likes of Linux or Haiku, but rather a vibe-coded confabulation. Trying to actually use the OS as [tirimid] recently did sends you down a vibe-coded rabbit hole of broken code, more bugs than you can shake a bug zapper at, and most of the promised features being completely absent.

[tirimid] is one of those people who have a bit of a problem, in that they like to try out new OSes, just to see what they’re like. The fun starts with simply making the thing run at all in any virtual machine environment, as apparently the author uses MacOS and there it probably ‘runs fine’.

After this the graphical desktop does in fact load, some applications also open, but it’s not possible to create new folders in the ‘file explorer’, the function keys simply switch between wallpapers, there’s no networking or Doom support despite the promises made, there’s no Python or Nano support at all, and so on.

Clearly it’s still got the hallmarks of a functioning OS, and it’s sort of nice that you don’t need to know what you’re doing to create a sort-of-OS, but it will not appease those who feel that vibe-coding is killing Open Source software.

youtube.com/embed/JxknDQaDrao?…


hackaday.com/2026/03/04/trying…

Embossing Precision Ball Joints for a Micromanipulator


The media in this post is not displayed to visitors. To view it, please log in.

A 3D-printed mechanism is clamped between the jaws of a pair of calipers, which are surrounded by 3D-printed covers. A hammer is resting against one of the jaws, and a man's gloved hand is holding the calipers.

[Diffraction Limited] has been working on a largely 3D-printed micropositioner for some time now, and previously reached a resolution of about 50 nanometers. There was still room for improvement, though, and his latest iteration improves the linkage arms by embossing tiny ball joints into them.

The micro-manipulator, which we’ve covered before, uses three sets of parallel rod linkages to move a platform. Each end of each rod rotates on a ball joint. In the previous iteration, the parallel rods were made out of hollow brass tubing with internal chamfers on the ends. The small area of contact between the ball and socket created unnecessary friction, and being hollow made the rods less stiff. [Diffraction Limited] wanted to create spherical ball joints, which could retain more lubricant and distribute force more evenly.

The first step was to cut six lengths of solid two-millimeter brass rod and sand them to equal lengths, then chamfer them with a 3D-printed jig and a utility knife blade. Next, they made two centering sleeves to hold small ball bearings at the ends of the rod being worked on, while an anti-buckling sleeve surrounded the rest of the rod. The whole assembly went between the jaws of a pair of digital calipers, which were zeroed. When one of the jaws was tapped with a hammer, the ball bearings pressed into the ends of the brass rod, creating divots. Since the calipers measured the amount of indentation created, they was able to emboss all six rods equally. The mechanism is designed not to transfer force into the calipers, but he still recommends using a dedicated pair.

In testing, the new ball joints had about a tenth the friction of the old joints. They also switched out the original 3D-printed ball mount for one made out of a circuit board, which was more rigid and precisely manufactured. In the final part of the video, he created an admittedly unnecessary, but useful and fun machine to automatically emboss ball joints with a linear rail, stepper motor, and position sensor.

On such a small scale, a physical ball joint is clearly simpler, but on larger scales it’s also possible to make flexures that mimic a ball joint’s behavior.

youtube.com/embed/NM2KXvRGmpg?…


hackaday.com/2026/03/04/emboss…

Vape-powered Car Isn’t Just Blowing Smoke


The media in this post is not displayed to visitors. To view it, please log in.

Gwiz car and vapes

Disposable vapes aren’t quite the problem/resource stream they once were, with many jurisdictions moving to ban the absurdly wasteful little devices, but there are still a lot of slightly-smelly lithium batteries in the wild. You might be forgiven for thinking that most of them seem to be in [Chris Doel]’s UK workshop, given that he’s now cruising around what has to be the world’s only vape-powered car.

Technically, anyway; some motorheads might object to calling donor vehicle [Chris] starts with a car, but the venerable G-Wiz has four wheels, four seats, lights and a windscreen, so what more do you want? Horsepower in excess of 17 ponies (12.6 kW)? Top speeds in excess of 50 Mph (80 km/h)? Something other than the dead weight of 20-year-old lead-acid batteries? Well, [Chris] at least fixes that last part.

The conversion is amazingly simple: he just straps his 500 disposable vape battery pack into the back seat– the same one that was powering his shop–into the GWiz, and it’s off to the races. Not quickly, mind you, but with 500 lightly-used lithium cells in the back seat, how fast would you want to go? Hopefully the power bank goes back on the wall after the test drive, or he finds a better mounting solution. To [Chris]’s credit, he did renovate his pack with extra support and insulation, and put all the cells in an insulated aluminum box. Still, the low speed has to count as a safety feature at this point.

Charging isn’t fast either, as [Chris] has made the probably-controversial decision to use USB-C. We usually approve of USB-Cing all the things, but a car might be taking things too far, even one with such a comparatively tiny battery. Perhaps his earlier (equally nicotine-soaked) e-bike project would have been a better fit for USB charging.

Thanks to [Vaughna] for the tip!

youtube.com/embed/HwoZg3BCigU?…


hackaday.com/2026/03/04/vape-p…

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Cisco fixes maximum-severity Secure FMC bugs threatening firewall security
securityaffairs.com/188921/sec…
#securityaffairs #hacking

FLOSS Weekly Episode 865: Multiplayer Firewall


The media in this post is not displayed to visitors. To view it, please log in.

This week Jonathan chats with Philippe Humeau about Crowdsec! That company created a Web Application Firewall as on Open Source project, and now runs it as a Multiplayer Firewall. What does that mean, and how has it worked out as a business concept? Watch to find out!


youtube.com/embed/cFlhtWiCHNw?…

Did you know you can watch the live recording of the show right on our YouTube Channel? Have someone you’d like us to interview? Let us know, or have the guest contact us! Take a look at the schedule here.

play.libsyn.com/embed/episode/…

Direct Download in DRM-free MP3.

If you’d rather read along, here’s the transcript for this week’s episode.

Places to follow the FLOSS Weekly Podcast:


Theme music: “Newer Wave” Kevin MacLeod (incompetech.com)

Licensed under Creative Commons: By Attribution 4.0 License


hackaday.com/2026/03/04/floss-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Automate or orchestrate? Implementing a streamlined remediation program to shorten MTTR
securityaffairs.com/188917/sec…
#securityaffairs #hacking

Linux Fu: The USB WiFi Dongle Exercise


The media in this post is not displayed to visitors. To view it, please log in.


The TX50U isn’t very Linux-friendly
If you’ve used Linux for a long time, you know that we are spoiled these days. Getting a new piece of hardware back in the day was often a horrible affair, requiring custom kernels and lots of work. Today, it should be easier. The default drivers on most distros cover a lot of ground, kernel modules make adding drivers easier, and dkms can automate the building of modules for specific kernels, even if it isn’t perfect.

So ordering a cheap WiFi dongle to improve your old laptop’s network connection should be easy, right? Obviously, the answer is no or this would be a very short post.

Plug and Pray


The USB dongle in question is a newish TP-Link Archer TX50U. It is probably perfectly serviceable for a Windows computer, and I got a “deal” on it. Plugging it in caused it to show up in the list of USB devices, but no driver attached to it, nor were any lights on the device blinking. Bad sign. Pro tip: lsusb -t will show you what drivers are attached to which devices. If you see a device with no driver, you know you have a problem. Use -tv if you want a little more detail.

The lsusb output shows the devices as a Realtek, so that tells you a little about the chipset inside. Unfortunately, it doesn’t tell you exactly which chip is in use.

Internet to the Rescue?

Note that most devices (including the network card) have drivers since this was taken after the driver install. The fingerprint scanner (port 5 device 3) does not have a driver, however.
My first attempt to install a Realtek driver from GitHub failed because it was for what turned out to be the wrong chipset. But I did find info that the adapter had an RTL8832CU chip inside. Armed with that nugget, I found [morrownr] had several versions, and I picked up the latest one.

Problem solved? Turns out, no. I should have read the documentation, but, of course, I didn’t. So after going through the build, I still had a dead dongle with no driver or blinking lights.

Then I decided to read the file in the repository that tells you what USB IDs the driver supports. According to that file, the code matches several Realtek IDs, an MSI device, one from Sihai Lianzong, and three from TP-Link. All of the TP-Link devices use the 35B2 vendor ID, and the last two of those use device IDs of 0101 and 0102.

Suspiciously, my dongle uses 0103 but with a vendor ID of 37AD. Still, it seemed like it would be worth a shot. I did a recursive grep for 0x0102 and found a table that sets the USB IDs in os_dep/linux/usb_intf.c.

Of course, since I had already installed the driver, I had to change the dkms source, not the download from GitHub. That was, on my system, in /usr/src/rtl8852cu-v1.19.22-103/os_dep_linux/usb_intf.c. I copied the 0x0102 line and changed both IDs so there was now a 0x0103 line, too:
{USB_DEVICE_AND_INTERFACE_INFO(0x37ad, 0x0103, 0xff, 0xff, 0xff), .driver_info = RTL8852C},
/* TP-Link Archer TX50U */
Now it was a simple matter of asking dkms to rebuild and reinstall the driver. Blinking lights were a good sign and, in fact, it worked and worked well.

DKMS


If you haven’t used DKMS much, it is a reasonable system that can rebuild drivers for specific Linux kernels. It basically copies each driver and version to a directory (usually /usr/src) and then has ways to build them against your kernel’s symbols and produce loadable modules.

The system also maintains a build/install state database in /var/lib. A module is “added” to DKMS, then “built” for one or more kernels, and finally “installed” into the corresponding location for use by that kernel. When a new kernel appears, DKMS detects the event — usually via package manager hooks or distribution-specific kernel install triggers — and automatically rebuilds registered modules against the new kernel headers. The system tracks which module versions are associated with which kernels, allowing parallel kernel installations without conflicts. This separation of source registration from per-kernel builds is what allows DKMS to scale cleanly across multiple kernel versions.

If you didn’t use DKMS, you’d have to manually rebuild kernel modules every time you did a kernel update. That would be very inconvenient for things that are important, like video drivers for example.

Of course, not everything is rosy. The NVidia drivers, for example, often depend on something that is prone to change in future Linux kernels. So one day, you get a kernel update, reboot, and you have no screen. DKMS is the first place to check. You’ll probably find it has some errors when building the graphics drivers.

Your choices are to look for a new driver, see if you can patch the old driver, or roll back to a previous working kernel. Sometimes the changes are almost trivial like when an API changes names. Sometimes they are massive changes and you really do want to wait for the next release. So while DKMS helps, it doesn’t solve all problems all the time.

Extras and Thoughts


I skipped over the part of turning off secure boot because I was too lazy to add a signing key to my BIOS. I’ll probably go back and do that later. Probably.

You have to wonder why this is so hard. There is already a way to pass the module options. It seems like you might as well let a user jam a USB ID in. Sure, that wouldn’t have helped for the enumeration case, but it would have been perfectly fine to me if I had just had to put a modprobe or insmod with a parameter to make the card work. Even though I’m set up for rebuilding kernel modules and kernels, many people aren’t, and it seems silly to force them to recompile for a minor change like this.

Of course, another fun answer would be to have vendors actually support their devices for Linux. Wouldn’t that be nice?

You could write your own drivers if you have sufficient documentation or the desire to reverse-engineer the Windows drivers. But it can take a long time. User-space drivers are a little less scary, and some people like using Rust.

What’s your Linux hardware driver nightmare story? We know you have one. Let us hear about it in the comments.


hackaday.com/2026/03/04/linux-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

NSO Group has spent at least $7.6 million to lobby in Washington D.C., according to this report.

And it's gonna continue to pressure the U.S. government to get removed from the blocklist it was put on in 2021, in an attempt to get into the U.S. market.

NSO has hired a lot of people for its lobbying efforts.

techpolicy.press/will-nsos-us-…

reshared this

Success With FreeDOS on a Modern Platform


The media in this post is not displayed to visitors. To view it, please log in.

Last summer we took a look at FreeDOS as part of the Daily Drivers series, and found a faster and more complete successor to the DOS of old. The sojourn into the 16-bit OS wasn’t perfect though, as we couldn’t find drivers for the 2010-era network card on our newly DOS-ified netbook. Here’s [Inkbox] following the same path, and bringing with it a fix for that networking issue.

The video below is an affectionate look at the OS alongside coding a TRON clone in assembler, and it shows a capable environment within the limitations of the 16-bit mode. The modern laptop here can’t emulate a BIOS as it’s UEFI only, and after trying a UEFI-to-BIOS emulator with limited success, he hits on a different approach. With just enough Linux to support QEMU, he has a lightweight and extremely fast x86 BIOS platform with the advantage of legacy emulation of network cards and the like.

The point of Daily Drivers is wherever possible to use real hardware and not an emulator, as it’s trying to be the machine you’d use day to day. But we can see in a world where a BIOS is no longer a thing it becomes ever more necessary to improvise, and this approach is better than just firing up an emulator from a full-fat Linux desktop. If you fancy giving it a try, it seems less pain than the route we took.

You can read our look at FreeDOS 1.4 here.

youtube.com/embed/mwLIgdRj5bI?…


FreeDOS logo: Bas Snabilie for the FreeDOS Project, CC BY 2.5.


hackaday.com/2026/03/04/succes…

Cybersecurity & cyberwarfare ha ricondiviso questo.

This Google research on the Coruna iOS exploits is very interesting. And perhaps the most interestig things are all the open questions that are not answered here.

cloud.google.com/blog/topics/t…

Phishing su Zoom e Meet: la nuova frontiera dell’abuso di software legittimo


@Informatica (Italy e non Italy)
È stata identificata una campagna di social engineering mirata su utenti Zoom e Google Meet in cui i criminali informatici non distribuiscono malware ma usano software commerciali autentici per finalità di sorveglianza nascosta. Ecco tutti i

Postcard from Brussels: the digital vibe shift


The media in this post is not displayed to visitors. To view it, please log in.

Postcard from Brussels: the digital vibe shift
WELCOME BACK TO THE FREE MONTHLY EDITION of Digital Politics.I'm Mark Scott, and the world appears to be veering out of control (again). You're here for digital policy. But for the latest on the evolving crisis in the Middle East, see here, here, here, here and here.

— The mood within European Union policymaking circleshas markedly changed when it comes to digital sovereignty, online competition and platform governance.

— The likelihood of a digital-focused transatlantic trade war has risen significantly in the wake of the US Supreme Court's overturning of Donald Trump's tariff regime.

— Who's actually funding Europe's AI industry? The answer isn't who you would think.

Let's get started:


THE NEW REALITY OF THE BRUSSELS BUBBLE


THE EU QUARTER CAN BE A STRANGE PLACE. Among the glass-fronted European Commission buildings, the hustle and bustle of multilingual lobbyists and the cavalcade of European Parliament lawmakers that most people have never heard of, it's difficult to decipher fact from fiction. I've spent most of the last two weeks entrenched in the so-called Brussels bubble. I come bearing news: the EU's collective digital policymaking priorities are in flux — and a new reality is starting to emerge.

First, a caveat. This analysis is based on conversations before the US and Israeli attacks on Iran over the weekend. Such an open-ended conflict will inevitably change political priorities, including those associated with tech. I don't know how that will shake out. Reader discretion is advised.

What is unmistakable, however, is that three fundamental shifts are underway in how the 27-country bloc approaches digital policymaking. This shift is couched in 1) the deregulatory environment created by Mario Draghi's 2024 competitiveness report; 2) the dominance of the center-right European People's Party across all EU institutions; and 3) a relegation of tech-related issues behind those linked to Ukraine and trade.

First, the EU is implementing a version of digital sovereignty that will try to onshore infrastructure and seek to reduce the Continent's independence on US tech giants. This move began before Donald Trump's second term in the White House. But over the last 12 months, even staunch US allies in Eastern Europe and the Baltics have come to recognize that Washington can no longer be seen as a short-term trusted partner. That has jumpstarted a policy agenda aimed at investing public European money into local alternatives to gradually wean the bloc off US tech.

This is still an early-stage movement. Many within more defense-focused policy circles fret that a so-called "rip-and-replace" strategy, which would see the likes of AWS infrastructure give way to a European alternative, would create systemic vulnerabilities which would not be in EU member countries' short-term national interests. More fiscally hawkish officials also worry that throwing EU public funds at often legacy industrial players — many of which are the only ones currently positioned to offer alternatives to Silicon Valley — would not represent good value for money.

Thanks for reading the free monthly version of Digital Politics. Paid subscribers receive at least one newsletter a week. If that sounds like your jam, please sign up here.

Here's what paid subscribers read in February:
— Digital policymaking needs a fundamental rethink; US attacks against Europe's online safety regime are not really about the bloc's online safety regime; Southeast Asia still dominates the world's semiconductor industry. More here.
— Public security and combating disinformation are increasingly intertwined, often in ways that should leave us feeling queasy; How Brussels' latest regulatory enforcement about TikTok plays into the EU's wider legislative agenda; Polarized social media has led to a public exodus from these platforms. More here.
— Be wary of anyone at India's AI Impact Summit peddling easy solutions for AI governance; The rise of kids' social media bans is example of the lack of quantifiable evidence in digital policymaking; The Global Majority is missing from the global data center boom. More here.
— What is, and what is not, working within the EU's Digital Services Act; Debrief from the AI Impact Summit: more trade show than policymaking; One-third of US teenagers use AI chatbots every day. More here.

And yet, my conversations with EU officials over the last two weeks made it clear that such a "Make Europe Great Again" digital sovereignty strategy — including now open discussions of funding European alternatives to American social media companies — has been baked into the bloc's policy priorities.

Second (and this is related to the first point) is a growing awareness and willingness to use the EU's digital competition rulebook to fast-track the newly-empowered digital sovereignty strategy.

While some officials and advocates would like to pour money into European alternatives (and that inevitably will happen), others are taking a more nuanced approach. That includes galvanizing the EU's Digital Markets Act to reduce market concentration which, in turn, would open up space for European alternatives to flourish.

This strategy is based on the somewhat naive belief that if only Big Tech didn't control the market, then a steady flow of European and non-European firms would be able to compete in everything from social media to online marketplaces to cloud computing infrastructure. Such a theory misunderstands the network effects from which consumers benefit when such services are bundled together — often at a cheaper price compared to buying such digital wares individually.

But as the DMA undergoes a current review, policymaking hope to extend the competition levers within this legislation to more aggressively hobble US tech firms, as well as expand areas of interoperability so that smaller firms can build on top of these platforms by offering people the ability to connect often rival services to each other. This is already available for messaging services within the bloc, and some EU startups now offer that ability.

Policymakers are also looking to extend that functionality — and, goes the theory, reduce Big Tech's market dominance and boost the bloc's digital sovereignty — to the likes of social media.

Third: the era of vigorous enforcement of the bloc's online safety and platform governance rules will be replaced by more nuanced policymaking aimed at balancing internal political priorities with those coming from outside the bloc.

That may sound odd, given my take on the EU's online safety landscape from last week. But the political winds have shifted away from comprehensive enforcement on topics like platform design and disinformation (editor's note: this does not constitute illegal content under the bloc's Digital Services Act). In its place, there will be more kneejerk policymaking attempts around populist topics like social media bans for teenagers, which meet short-term priorities for national leaders without addressing the long-term harm derived from how these platforms are designed.

It would be wrong to think that attacks from the US on the DSA had not played a role in this shift. The European Commission is a political beast. The repeated (and unfounded) claims that these rules equate to censorship of Americans' First Amendment rights have been heard at the very top of the Berlaymont building.

But, in truth, the shift away from aggressive, fast and comprehensive enforcement of the bloc's online safety rules has been driven by a change in the EU's internal dynamics.

Many center-right politicians — and such lawmakers now hold a majority in the European Commission, European Parliament and Council of the EU — are openly skeptical of the need for these rules. The complexities of implementing the DSA, in which Brussels enforcers are struggling to have a meaningful impact, have run up against shifting political priorities that promote deregulation and a more populist digital agenda.

That doesn't mean Brussels won't continue enforcing the DSA. But it is no longer first among legislative equals as EU officials turn their attention to digital sovereignty and the use of the bloc's competition rules to lift up European alternatives to their US and Chinese competitors.


Chart of the week


EUROPE WANTS TO GO IT ALONE ON AI. But which investors lie at the heart of the Continent's strategic ambitions for the emerging technology?

The University of Amsterdam's Leevi Saari crunched investment funds for all AI-linked European startups (including those from non-EU countries.) He then ranked which investors were central to these deals, ranking them on so-called "betweenness centrality," or a figure that measures the importance of certain actors in how the Continent's AI startups grow.

At the top of the list is French public investor BPI France, which plays a central role in the country's AI scene. Only one American Big Tech firm — Nvidia — makes the list (at number six.) Top-tier US venture capitalists and Europe's billionaire class, like Xavier Niel, also underpin how AI investment works across Europe, based on Saari's analysis.
Postcard from Brussels: the digital vibe shiftSource: Leevi Saari


ARE WE HEADING TOWARD A TRANSATLANTIC (DIGITAL) TRADE WAR?


THE RECENT US SUPREME COURT 6-3 DECISIONto invalidate 60 percent of US tariffs against third-party countries feels like a lifetime ago. In truth, it only happened on Feb 20. The world is rightly preoccupied with other matters. But the ongoing global omnishambles should take away from the fact that the EU-US trade deal — known as the Turnberry Framework — is on life support after the European Parliament refused to ratify it; and US President Trump threatened a new round of potential tariffs, including those that targeted the 27-country bloc (more on that below).

Trade negotiators, on both sides, are seeking a compromise. Maroš Šefčovič, the EU's trade czar, held meetings with his US counterpart, and said that "full respect for the EU-US deal is paramount."

If only things were that simple.

I still believe that any future transatlantic trade beef would likely be limited to the offline, not online, world. The US runs a significant trade surplus with the EU on digital services, whereas it runs an almost identical trade deficit on non-digital goods. If Washington really wants to hurt Brussels (and other European capitals), then it makes a lot more sense to slap tariffs on French wine and German cars than it does to tax incoming digital services from the likes of <<checks notes>> almost no EU-based firm (I joke, but only just.)

This, however, is where things get sticky. As part of the White House's new arsenal of potential tariff measures are so-called Section 301 investigations. These probes allow the US Trade Representative to look into any country's trading practices to determine if they are discriminatory or unfair against US firms. When it comes to Europe, the Trump administration has already made clear its anger toward the bloc's digital rulebook.

"The European Union and certain EU Member States have persisted in a continuing course of discriminatory and harassing lawsuits, taxes, fines, and directives against U.S. service providers," the USTR said in late 2025. "If the EU and EU Member States insist on continuing to restrict, limit, and deter the competitiveness of U.S. service providers through discriminatory means, the United States will have no choice but to begin using every tool at its disposal to counter these unreasonable measures."

Shots fired, if you will.

Sign up for Digital Politics


Thanks for getting this far. Enjoyed what you've read? Why not receive weekly updates on how the worlds of technology and politics are colliding like never before. The first two weeks of any paid subscription are free.

Subscribe
Email sent! Check your inbox to complete your signup.


No spam. Unsubscribe anytime.

There is still a long way to go before Washington starts specific 301 investigations into Europe — let alone before it leads to a tit-for-tat trade war with Washington. US President Trump, however, is looking for any opportunity to impose new tariffs. And for the EU, that's most likely connected to the bloc's competition laws, known as the Digital Markets Act, and national digital services taxes, which almost exclusively are paid by American tech firms.

That contrasts with the public attention focused by some in the White House against the bloc's online safety rules. Such ire may represent red meat in the ongoing culture war issue of platform governance. But for almost all US tech giants, the bigger issue remains EU digital competition rules and these unilateral digital services taxes.

If I was to be a betting man, I would put all my money on upcoming 301 investigations to focus on these two digital issues in how Washington responds to last month's US Supreme Court decision. Former administrations, on both sides of the aisle, have raised objections to these laws. Competition rules and digital services taxes would neatly fix into the definition required to start such investigations. And the focus on tech — compared to more analogue products — provides the White House with a strong corporate lobbying constituency willing to back a more aggressive stance with Europe.

For now, such speculation remains what it is: speculation. Officials' attention is also drawn elsewhere.

But in the coming months, I would wager the US will attempt to use such digital-focused 301 investigations to force the issue. In response, Europe already has a suite of tech-focused tariff responses that would be aimed at Silicon Valley — including potential hefty EU tariffs and, if things really go badly, potential Continent-wide bans on certain digital services.

Hopefully, we do not get to such a stage, for the sake of officials on both sides of the Atlantic. In the wake of the Turnberry deal (almost of which did not affect the digital world), most people breathed a sigh of relief that we had avoided a transatlantic trade war. That threat is now back — and all bets may soon be off.


What I'm reading


— Chatham House published an analysis into how so-called Middle Powers countries could navigate the dual hegemony of the US and China on AI. More here.

— A report from Citrini, a research group, into the potential labor force and market impact of mass adoption of AI led to a significant fall in US financial markets. Read the analysis here.

— We are living in a 'sovereignty paradox' in which the more governments and companies try to build their own AI systems, the more they rely on a small number of foreign providers, argues Damien Kopp for the Digital New Deal

— More than 60 data protection authorities from around the world signed a joint voluntary statement on the privacy impact on AI-generated imagery. More here.

— The US federal government ordered all agencies to stop using Anthropic's AI systems after it refused to meet certain commitments, including the use of its technology to surveil American citizens within the country and to power unmanned military equipment. Here is Anthropic's statement. And here is the statement from OpenAI's Sam Altman after the company agreed to work with the US Department of War.



digitalpolitics.co/newsletter0…