Robots Talking to Robots
Although there are a few robots on the market that can make life a bit easier, plenty of them have closed-source software or smartphone apps required for control that may phone home and send any amount of data from the user’s LAN back to some unknown server. Many people will block off Internet access for these types of devices, if they buy them at all, but that can restrict the abilities of the robots in some situations. [Max]’s robot vacuum has this problem, but he was able to keep it offline while retaining its functionality by using an interesting approach.
Home Assistant, a popular open source home automation system, has a few options for voice commands, and can also be set up to transmit voice commands as well. This robotic vacuum can accept voice commands in lieu of commands from its proprietary smartphone app, so to bypass this [Max] set up a system of automations in Home Assistant that would command the robot over voice. His software is called jacadi and is built in Go, which uses text-to-speech to command the vacuum using a USB speaker, keeping it usable while still offline.
Integrating a voice-controlled appliance like this robotic vacuum cleaner allows things like scheduled cleanings and other commands to be sent to the vacuum even when [Max] isn’t home. There are still a few limitations though, largely that communication is only one way to the vacuum and the Home Assistant server can’t know when it’s finished or exactly when to send new commands to the device. But it’s still an excellent way to keep something like this offline without having to rewrite its control software entirely.
He’s a Wrapper (Wire Wrapper, That Is)
Before PCBs, wiring electronic circuits was a major challenge in electronics production. A skilled person could make beautiful wire connections between terminal strips and components with a soldering iron, but it was labor-intensive and expensive. One answer that was very popular was wire wrapping, and [Sawdust & Circuits] shows off an old-fashioned wire wrap gun in the video below.
The idea was to use a spinning tool to tightly wrap solid wire on square pins. A proper wrap was a stable alternative to soldering. It required less skill, no heat, and was easy to unwrap (using a different tool) if you changed your mind. The tech started out as wiring telephone switchboards but quickly spread.
Not all tools were guns or electric. Some used a mechanical handle, and others were like pencils — you simply rotated them by hand. You could specify levels for sockets and terminals to get a certain pin length. A three-level pin could accept three wire wrap connections on a single pin, for example. There were also automated machines that could mass-produce wire-wrapped circuits.
The wire often had thin insulation, and tools usually had a slot made to strip the insulation on the tiny wires. Some guns created a “modified wrap” that left insulation at the top one or two wraps to relieve stress on the wire as it exited the post. If you can find the right tools, wires, and sockets, this is still a viable way to make circuits.
Want to know more about wire wrapping? Ask [Bil Herd].
youtube.com/embed/TzlM8yZR5RI?…
La setta dei cretini che seguono le mode sui social ha un nuovo feticcio: l'#OATzempic..
Frullato d'avena e limone per emulare gli effetti di Ozempic, in barba alla scienza e all'intelligeza.
Dovete estinguervi subito!
open.substack.com/pub/signorin…
Social Debug: Oatzempic?! Siete una massa di cretini!
Altro che scienza: basta un frullato (di merda) e l’algoritmo pensa che tu stia guarendo!Claudia aka signorina37 (Rumore di Fondo)
Cybersecurity & cyberwarfare reshared this.
Why PlayStation Graphics Wobble, Flicker and Twitch
Although often tossed together into a singular ‘retro game’ aesthetic, the first game consoles that focused on 3D graphics like the Nintendo 64 and Sony PlayStation featured very distinct visuals that make these different systems easy to distinguish. Yet whereas the N64 mostly suffered from a small texture buffer, the PS’s weak graphics hardware necessitated compromises that led to the highly defining jittery and wobbly PlayStation graphics.
These weaknesses of the PlayStation and their results are explored by [LorD of Nerds] in a recent video. Make sure to toggle on subtitles if you do not speak German.
It could be argued that the PlayStation didn’t have a 3D graphics chip at all, just a video chip that could blit primitives and sprites to the framebuffer. This forced PS developers to draw 3D graphics without such niceties like a Z-buffer, putting a lot of extra work on the CPU.
This problem extends also to texture mapping, by doing affine texture mapping, as it’s called on the PS. This mapping of textures is rather flawed and leads to the constant shifting of textures as the camera’s perspective is not taken into account. Although this texture mapping can be improved, the developers of the game have to add more polygons for this, which of course reduces performance. This is the main cause of the shifting and wobbling of textures.
Another issue on the PS was a lack of mipmapping support, which means a sequence of the same texture, each with each a different resolution. This allows for high-resolution textures to be used when the camera is close, and low-resolution textures when far away. On the PS this lack of mipmapping led to many texture pixels being rendered to the same point on the display, with camera movement leading to interesting flickering effects.
When it came to rendering to the output format, the Nintendo 64 created smooth gradients between the texture pixels (texels) to make them fit on the output resolution, whereas the PS used the much more primitive nearest neighbor interpolation that made especially edges of objects look like they both shimmered and changed shape and color.
The PS also lacked a dedicated floating point unit to handle graphics calculations, forcing a special Geometry Transformation Engine (GTE) in the CPU to handle transformation calculations, but all in integer calculations instead of with floating point values. This made e.g. fixed camera angles as in Resident Evil games very attractive for developers as movement would inevitably lead to visible artefacts.
Finally, the cartridge-based games of the N64 could load data from the mask ROMs about 100x faster than from the PS’s CDs, and with much lower latency. All of these differences would lead to entirely different games for both game consoles, with the N64 being clearly superior for 3D games, yet the PS being released long before the N64 for a competitive price along with the backing of Sony would make sure that it became a commercial success.
youtube.com/embed/0psAfIFPtVI?…
securityaffairs.com/187702/cyb…
#securityaffairs #hacking
Italian university La Sapienza still offline to mitigate recent cyber attack
Rome’s La Sapienza University was hit by a cyberattack that disrupted IT systems and caused widespread operational issues.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Il governatore della Columbia Britannica afferma che la richiesta di assistenza degli Stati Uniti da parte dei separatisti dell'Alberta è "tradimento"
"Andare in un paese straniero e chiedere aiuto per smantellare il Canada è una parola antica, e questa parola è tradimento", ha detto Eby, prima dell'incontro a porte chiuse a Ottawa.
reshared this
Politica interna, europea e internazionale reshared this.
CIA’s World Factbook is Gone
Before the Internet, there was a certain value to knowing how to find out about things. Reference librarians could help you locate specialized data like the Thomas Register, the EE and IC Masters for electronics, or even an encyclopedia or CRC handbook. But if you wanted up-to-date info on any country of the world, you’d often turn to the CIA. The originally classified document was what the CIA knew about every country in the world. Well, at least what they’d admit to knowing, anyway. But now, the Factbook is gone.
The publication started in 1962 as the classified “The National Basic Intelligence Factbook,” it went public in 1971 and became “The World Factbook” in the 1980s. While it is gone, you can rewind it, including a snapshot taken just before it went dark on Archive.org.
Browsing the archives, it looks like the last update was in September of 2025. It would be interesting to see a project like Wikipedia take the dataset, house it, and update it, although you can presume the CIA was better equipped. The data is public domain, after all.
Want to know things about Croatia? Unfortunately, the archive seems to have missed some parts of some pages. However, there are other mirrors, including some that have snapshots of the data in one form or another. Of course, these are not always the absolute latest (the link has data from 2023). But we would guess the main languages (Croatian and Serbian) haven’t changed. You can also find the internet country suffix (.hr) and rankings (for example, in 2020, Croatia ranked 29th in the world for the number of broadband internet subscribers scaled for population and 75th in total broadband usage.
We are sorry to see such a useful reference go, but reference books are definitely an endangered species these days.
Windows 7 e Vista: rilasciate le patch fino a gennaio 2026 con immagini ISO speciali
📌 Link all'articolo : redhotcyber.com/post/windows-7…
#redhotcyber #news #windows7 #supporto #microsoft #aggiornamenti #patch #sicurezza #cybersecurity #hacking
Windows 7 e Vista: rilasciate le patch fino a gennaio 2026 con immagini ISO speciali
Un ricercatore crea immagini ISO di Windows 7 e Vista con patch fino a gennaio 2026, prolungando la vita di questi sistemi operativi.Redazione RHC (Red Hot Cyber)
reshared this
Minacce nei log cloud? Scopri come il SOC può distinguerle prima che esplodano
📌 Link all'articolo : redhotcyber.com/post/minacce-n…
#redhotcyber #news #cybersecurity #hacking #malware #ransomware #cloudsecurity #sicurezzainformatica
Minacce nei log cloud? Scopri come il SOC può distinguerle prima che esplodano
Un nuovo approccio per analizzare gli alert cloud e riconoscere gli attacchi informatici tramite la correlazione con le tecniche MITRE ATT&CK.Carolina Vivianti (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Campagna di phishing su Signal in Europa: sospetto coinvolgimento di attori statali
📌 Link all'articolo : redhotcyber.com/post/campagna-…
#redhotcyber #news #cybersecurity #hacking #malware #phishing #signal #sicurezzainformatica
Campagna di phishing su Signal in Europa: sospetto coinvolgimento di attori statali
Un sofisticato attacco di phishing prende di mira gli utenti di Signal e WhatsApp in Germania e nel resto d'Europa, rubando credenziali e monitorando le comunicazioni.Bajram Zeqiri (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187697/sec…
#securityaffairs #hacking
CISA pushes Federal agencies to retire end-of-support edge devices
CISA ordered U.S. federal agencies to improve management of edge network devices and replace unsupported ones within 12–18 months.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Welding Nuts Inside Metal Tubes, Painlessly
[Jer Schmidt] needed a way to put a lot of M8 bolts into a piece of square steel tubing, but just drilling and tapping threads into the thin steel wouldn’t be strong enough. So he figured out a way to reliably weld nuts to the inside of the tube, and his technique works even if the tube is long and the inside isn’t accessible.Two smaller holes on either side. Weld through the holes. A little grinding results in a smooth top surface.
Essentially, one drills a hole for the bolt, plus two smaller holes on either side. Then one welds the nut to the tubing through those small holes, in a sort of plug weld. A little grinding is all it takes to smooth out the surface, and one is left with a strong threaded hole in a thin-walled tube, using little more than hardware store fasteners.
The technique doesn’t require access to the inside of the tube for the welding part, although getting the nut back there in the first place does require a simple helper tool the nut can slot into. [Jer] makes one with some scrap wood and a table saw, just to show it doesn’t need to be anything fancy.
Another way to put a threaded hole into thin material is to use a rivnut, or rivet nut (sometimes also used to put durable threads into 3D prints) but welding a plain old nut to the inside was far more aligned with what [Jer] needed, and doesn’t rely on any specialty parts or tools.
[Jer]’s upcoming project requires a lot of bolts all the way down long tubing, which is what got him into all of this. Watch it in action in the video below, because [Jer] has definitely worked out the kinks, and he steps through a lot of tips and tricks to make the process painless.
Thanks [paulvdh] for the tip!
youtube.com/embed/nC161Ni67-E?…
Driving Sim Handbrake Based on Load Cell
Simulator-style video games are designed to scale in complexity, allowing players to engage at anything from a casual level to highly detailed, realistic simulation. Microsoft Flight Simulator, for example, can be played with a keyboard and mouse, a controller, or a huge, expensive simulator designed to replicate a specific airplane in every detail. Driving simulators are similar, and [CNCDan] has been hard at work on his DIY immersive driving sim rig, with this hand brake as his latest addition.
For this build, [CNCDan] is going with a lever-style handbrake which is common in motorsports like drifting and rallying. He has already built a set of custom pedals, so this design borrows heavily from them. That means that the sensor is a load cell, which takes input force from a lever connected to it with a spring mechanism. The signal is sent to an Arduino for processing, which is set up to send data over USB like any joystick or controller. In this case, he’s using an Arduino that was already handling inputs from his custom shifter, so he only needed to use another input and add some code to get his handbrake added into his sim.
[CNCDan] built a version of this out of laser-cut metal parts, but also has a fully 3D printable one available as well. Plenty of his other videos about his driving rig are available as well, from the pedal assembly we mentioned earlier to the force-feedback steering wheel. It’s an impressive set of hardware with a feel that replicates racing about as faithfully as a simulator could. Interestingly, we’ve also seen this process in reverse as well where a real car was used instead as a video game controller.
youtube.com/embed/xzpE0UGo8F0?…
lauseta likes this.
Fidget Clicker Becomes Miniature Game Console
Fidget toys are everywhere these days. A particularly popular type simply puts some keyboard switches on a plate to provide a certain type of clicky satisfaction. [wjddnjsdnd] took that concept a step further, building a keychain-sized fidget toy that actually has games on it.
The build is based around six key switches in a 2 x 3 array. The key switches are notable in this case for being magnetic shaft keys. Rather than using a mechanical switch to indicate a keypress, the keycap instead merely moves a magnet which triggers a signal in a hall effect sensor beneath the key. In this case, the build uses A3144 hall effect sensors, which are read by the Arduino Nano running the show. The Nano is also hooked up to a small SSD1306 OLED display over I2c, which it uses for displaying the game state. There’s also a TP4056 module to handle charging the attached 380 mAh lithium-ion battery which powers the pocket-sized device.
The Arduino Nano is not a powerful platform for gaming, but it can handle the basics. The Gamebox Clicker, as it’s called, features a Pong clone, a stairs game, and a recreation of Snake. Think early mobile phone games, and you’d be on the money.
It’s an interesting build, and one that would be a great way to get used to using magnetic key switches as well as small embedded displays. We’ve seen Arduino boards turned into microconsoles many times before, too. If you’d like to sound off about magnetic vs. mechanical key switches, jump into the comments, or otherwise let us know about your best electronic fidget projects on the tipsline. Happy hacking.
Hackaday Podcast Episode 356: Nanoprinting, Vibe Coding, and Keebin’ with Kristina, IN HELL!
This week, Hackaday’s Elliot Williams and Kristina Panos met up over coffee to bring you the latest news, mystery sound results show, and of course, a big bunch of hacks from the previous seven days or so.
We found no news to speak of, except that Kristina has ditched Windows after roughly 38 years. What is she running now? What does she miss about Windows? Tune in to find out.
On What’s That Sound, Kristina thought it was a jackhammer, but [Statistically Unlikely] knew it was ground-tamper thingy, and won a Hackaday Podcast t-shirt! Congratulations!
After that, it’s on to the hacks and such, beginning with 3D printing on the nano scale, and a couple of typewriter-based hacks. Then we take a look at the beauty of the math behind graph theory, especially when it comes to circuit sculptures and neckties.
We also talk display hacking, macro pads with haptic feedback knobs, and writing code in Welsh. Finally, we discuss the Virtual Boy, and ponder whether vibe coding is killing open source.
Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!
html5-player.libsyn.com/embed/…
Download in DRM-free MP3 and savor at your leisure.
Where to Follow Hackaday Podcast
Places to follow Hackaday podcasts:
Episode 356 Show Notes:
News:
- No news is good news, except that Kristina ditched Windows after ~38 years!
What’s that Sound?
- Congrats to [Statistically Unlikely] who knew this was an Earth-stomping machine!
Interesting Hacks of the Week:
- The Latest From RepRapMicron – Nail Gel, First Objects, And More
- Lego Typewriter Writes Plastic Letters
- Comprehensive Power Management For The Raspberry Pi
- Crouching Typewriter, Hidden PC
- The Graph Theory Of Circuit Sculptures
- DIY Macropad Rocks A Haptic Feedback Wheel
Quick Hacks:
- Elliot’s Picks:
- 5K IMac Turned Into 5K Display
- CPU Scheduler Divines The Will Of The Heavens
- An Event Badge Re-Imagined As A Cyberdeck
- Ysgrifennu Côd Yn Gymraeg (Writing Code In Welsh)
- Kristina’s Picks:
- Ordering Pizza On Your Sega Dreamcast Is Very Clunky Indeed
- Need A Curved Plastic Mesh? Print Flat, Curve Later
- Running DOOM And Super Mario 64 Inside A PDF File
Can’t-Miss Articles:
hackaday.com/2026/02/06/hackad…
It’s Not a Lomo Smena 8M, But it’s Not Far Off
The joy of camera hacking lies for many at the low end of the market. Not working with many-thousand-dollar Leicas, but in cheap snapshot cameras that can be had for next to nothing at a thrift store. [Marek Sokal] has a perfect example, in a 3D printed 35mm camera body using the lens and shutter assembly from a vintage Soviet Lomo Smena 8M.
The build is a work in progress, a printed assembly that holds the 35mm film cartridge, provides the focal plane for the film, and houses the take-up reel. It fits together with M2 screws, as per the Lomo lens.
We like this build, because we can see beyond the Lomo. In a box above the desk where this is being written there is a pile of old plastic snapshot cameras from the 1960s through 1980s, none of which is worth anything much, but all of which have a similar shutter and lens assembly. In many cases it’s not a huge task to do with them what [Marek] has with the Lomo and mount them to a back like this. The LEGO film camera may not have gained approval, but this prove that making cameras of your own is still pretty easy.
The Weird Propeller That Offers Improved Agility On The Water
When it comes to seaborne propulsion, one simple layout has largely dominated over all others. You pair some kind of engine with some kind of basic propeller at the back of the ship, and then you throw on a rudder to handle the steering. This lets you push the ship forward, left, and right, and stopping is just a matter of turning the engine off and waiting… or reversing thrust if you’re really eager to slow down.
This basic system works for a grand majority of vessels out on the water. However, there is a more advanced design that offers not only forward propulsion, but also steering, all in the one package. It may look strange, but the Voith Schneider propeller offers some interesting benefits to watercraft looking for an edge in maneuverability.
Spinning Underwater Wings
A modern Voith-Schneider propeller. Credit: Voith AG, Heidenheim
The Voith Schneider propeller design looks rather unlike any propeller you might have seen before. Perhaps the most obvious reason is because of its axis of operation. Traditional propellers tend to operate in an axis parallel with the waterline, or at least within a few degrees or so. However, the Voith Schneider design spins about the vertical axis instead. This is because it uses vertically-oriented blades mounted on a rotating plate. Each blade has a hydrofoil profile, which enables it to generate thrust when moving through the water. By spinning these blades at speed and varying their angle of attack, it’s possible to create a thrust vector in any direction on the horizontal plane. A special gear system is used to vary the angle of each blade as the plate rotates, such that the overall net thrust generated by all the blades is in the desired direction of travel.The angle of attack of each blade changes as the disc rotates, providing thrust in the desired direction. Controlling the angle of attack of all the blades in this way allows the thrust vector to be pointed in any direction in a full 360 degrees of rotation. It thus provides a great deal of flexibility when controlling a vessel on the water. Credit: Voith AG, Heidenheim
This design has certain key advantages over a traditional maritime propulsion setup. Namely, by fitting a vessel with Voith-Schneider propellers, it’s possible to add a great deal of maneuverability, to the point where a traditional rudder becomes entirely unnecessary. Instead of having to thrust the ship forwards and then turn, it’s possible to directly push the vessel with each individual thruster in the direction that is desired. This can be particularly useful for low-speed operations like docking, and provides a much more instantaneous change of direction than is possible with a regular propeller and rudder setup.
Voith Schneider thrusters are particularly useful for ships like tugs where precision maneuverability is a huge aid to operations. Numerous thrusters are often to a given vessel, providing greater total thrust and additional control. It’s also typical to fit Voith Schneider propellers with a guard underneath, which prevents grounding damage and can act as a sort of nozzle that improves low-speed performance. These propellers are perhaps not the ideal choice for watercraft aiming for outright speed, but for lower-speed work, they can offer great benefits in control.A pair of Voith Schneider propellers fitted to a tug. Note the protective plate underneath the thrusters which protects against damage. Credit: Voith AG, Heidenheim
The design looks somewhat unintuitive and even futuristic, but it actually goes back a long way. The first prototype was actually designed as a water turbine for generating electricity. However, it proved unexceptional in this role. It was only when the device was tested as a pump that engineers realized it could be repurposed as a combined thruster to replace a traditional propeller and rudder. A patent was issued in Germany in 1972, and the first prototype was tested on the water all the way back in 1928, on a small 60-horsepower vessel known as the Torqueo. The design soon found use on a number of German vessels in the interwar period, including minesweepers. The Voith Schneider design can be operated quite slowly while still providing thrust, minimizing cavitation and thus sound signature, which is considered advantageous for this role. In some German designs, such as the failed Graf Zeppelin aircraft carrier, the thrusters were even installed alongside regular propulsion systems, and made retractable so they wouldn’t present additional drag when not in use. Some decades later, the US Navy itself would later field similarly-equipped minesweepers in the 1990s, though all examples were dismantled and sold off by the early 2000s. Beyond military uses, the thruster has found application in a number of ferries and tugs around the world, and remain in production today.The US Navy’s Osprey class minehunters used twin Voith Schneider propellers, including the USS Raven pictured here in the North Arabian Gulf. Top speed of the class stands at 12 knots, a hair slower than the Italian Lerici class the type is based on, which uses conventional propulsion and rudders. Credit: public domain, DOD
Despite their unique abilities, Voith Schneider propellers remain a curio rather than a fixture in the shipping world. In the past century of their existence, just 4,500 examples have been built, near exclusively by Voith AG, and thus they are equipping a relatively small amount of the global maritime fleet. They compete with more familiar designs, such as azimuth thrusters, which are widely popular and more intuitive to understand. Given their oddball nature, and moderate level of mechanical complexity, they’re perhaps never going to supplant the tried-and-true prop and rudder that propels most conventional vessels. Still, if you’re looking to build a ship that can elegantly strafe in any direction you want to go, it’s hard to go past the Voith Schneider concept for all the benefits it brings.
BreezyBox: A BusyBox-Like Shell and Virtual Terminal for ESP32
Much like how BusyBox crams many standard Unix commands and a shell into a single executable, so too does BreezyBox provide a similar experience for the ESP32 platform. A demo implementation is also provided, which uses the ESP32-S3 platform as part of the Waveshare 7″ display development board.
Although it invokes the BusyBox name, it’s not meant to be as stand-alone as it uses the standard features provided by the FreeRTOS-based ESP-IDF SDK. In addition to the features provided by ESP-IDF it adds things like a basic virtual terminal, current working directory (CWD) tracking and a gaggle of Unix-style commands, as well as an app installer.
The existing ELF binary loader for the ESP32 is used to run executables either from a local path or a remote one, a local HTTP server is provided and you even get ANSI color support. Some BreezyBox apps can be found here, with them often running on a POSIX-compatible system as well. This includes the xcc700 self-hosted C compiler.
You can get the MIT-licensed code either from the above GitHub project link or install it from the Espressif Component Registry if that’s more your thing.
youtube.com/embed/wlDsaQgWCaI?…
La Sapienza riattiva i servizi digitali dopo l’attacco hacker
📌 Link all'articolo : redhotcyber.com/post/la-sapien…
#redhotcyber #news #cybersecurity #hacking #malware #ransomware #sicurezzainformatica #attacchinformatici #identitymanagement #spid
La Sapienza riattiva i servizi digitali dopo l'attacco hacker
La Sapienza ripristina i servizi digitali dopo l'attacco hacker del 2 febbraio. Ripartenza graduale con controlli e limitazioni.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
221 - Questi sono gli strumenti AI che uso davvero ogni giorno - Marco Camisani Calzolari
Questi sono gli strumenti AI che uso davvero ogni giorno “Marco, ma quali sono gli strumenti di Intelligenza Artificiale che usi veramente ogni giorno, o quasi?” Me lo chiedete in continuazione; allora ho pensato di dirvelo apertamente, perché può es…Web Staff MCC (Marco Camisani Calzolari)
Cybersecurity & cyberwarfare reshared this.
La minaccia Stan Ghouls corre su Java: come proteggere i tuoi sistemi
📌 Link all'articolo : redhotcyber.com/post/la-minacc…
#redhotcyber #news #cybersecurity #hacking #malware #ransomware #gruppihacker #stanGhouls #netSupport
La minaccia Stan Ghouls corre su Java: come proteggere i tuoi sistemi
Un gruppo di hacker chiamato Stan Ghouls attacca organizzazioni finanziarie, industriali e IT in Uzbekistan e Russia con software legittimo.Bajram Zeqiri (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
NIS2 applicata alle PMI: strategie economiche per un approccio efficace
📌 Link all'articolo : redhotcyber.com/post/nis2-appl…
#redhotcyber #news #sicurezzainformatica #normativaNIS2 #PMIitaliane #culturadellasicurezza #gestionedelrischio
NIS2 applicata alle PMI: strategie economiche per un approccio efficace
Scopri come proteggere la tua PMI dagli attacchi informatici con strategie economiche ed efficaci.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Dipendenza dai giganti cloud: l’UE inizia a considerare Amazon, Google e Microsoft una minaccia
📌 Link all'articolo : redhotcyber.com/post/dipendenz…
#redhotcyber #news #sovranitadigitale #cloudcomputing #sicurezzadatidellue #amazon #googledataprotection
Dipendenza dai giganti cloud: l'UE inizia a considerare Amazon, Google e Microsoft una minaccia
L'UE monitora Amazon, Google e Microsoft per salvaguardare la stabilità economica e la sicurezza dei dati sensibili.Marcello Filacchioni (Red Hot Cyber)
reshared this
Toybox Tractor: Plywood, Lathe Hacks, and 350W of Fun
When you think of a toy tractor, what probably comes to mind is something with fairly simple lines, maybe the iconic yellow and green, big rear tires, small front ones. Well, that’s exactly what [James] built, with simple, clean lines and a sturdy build that will hold up to driving around off-road in the garden. This Tractor is a great build, combining CAD, metal and wood work, some 3D printing, and electronics.
Starting at the power plant for the build, [James] went with a 350W DC motor powered by a 36V Li-ion battery from an e-bike. The motor turns a solid rear axle he made on a mini-lathe, connected to a set of riding lawn mower wheels. The mini-lathe spindle bore was too small to accommodate the shaft, and the lathe was not long enough to use the tailstock, so [James] had to get creative, using a vice and a piece of wood to make a stand–in tailstock, allowing him to turn this custom rear axle. The signature smoothly curved bonnet was made possible with plywood and body filler, rather than the sheet metal found on full-sized tractors. In fact, most of the build’s frame used plywood, giving it plenty of strength and, once painted, helping give it the appearance of a toy pulled out of a toybox.
This build had a bit of many domains in it, and all combined into a fantastic final result that no doubt will bring a smile to any face that gets to take the Tractor for a ride. Thanks [James] for documenting your build process, the hacks needed to pull off the tough bits along the way in making this fun toy. If you found this fun, be sure to check out another tractor related project.
Valutazione e mitigazione del crescente rischio di 0-day scoperti da LLM
«I modelli di intelligenza artificiale sono ora in grado di individuare vulnerabilità di elevata gravità su larga scala. Riteniamo che questo sia il momento di agire rapidamente, per potenziare i difensori e proteggere la maggior quantità di codice possibile finché c'è tempo.»
like this
reshared this
Cloudflare contro AGCOM: le richieste di Piracy Shield non sono tecnicamente possibili
Matthew Prince, ceo e co-fondatore di Cloudflare, non usa mezze misure. In una intervista con Il Sole 24 Ore parla di ritorsioni, di leggi «illegali», di un’Autorità che «non capisce come funziona Internet» e di un’Italia che rischia di pagare un prezzo altissimo.
pillole.graffio.org/pillole/cl…
Cloudflare contro AGCOM: le richieste di Piracy Shield non sono tecnicamente possibili
Il ceo di Cloudflare contro la multa Agcom per le norme antipirateria: «È una ritorsione, valutiamo il da farsi su Milano Cortina» Matthew Prince, ceo e...pillole.graffio.org
reshared this
reshared this
@pierobosio esatto. E l'alternativa è che se i residenti e i commercianti della strada non vogliono che la loro via venga chiusa, devono assicurarsi che non vengano vendute mele da parte di contadini senza licenza... 😁 😄 🤣
Informatica (Italy e non Italy) reshared this.
reshared this
Questa volta sembra davvero che l'esercito russo in Ucraina non abbia più accesso a Starlink
Secondo il governo ucraino e alcuni account Telegram dal fronte, SpaceX avrebbe limitato il controverso utilizzo di Starlink all'esercito russo che si trova in territorio ucraino. Una mossa che potrebbe impattare sulle operazioni militari
wired.it/article/cosa-sappiamo…
Cosa significa che Starlink non è più accessibile all'esercito russo in Ucraina
Secondo il governo ucraino e alcuni account Telegram dal fronte, SpaceX avrebbe disattivato Starlink ai militari di Mosca. Una mossa che potrebbe impattare sulle operazioni militari e anche sull'uso dei droni.Matteo Suanno (Wired Italia)
reshared this
Bitcoin sta crollando così forte che i miners stanno staccando la spina alle loro apparecchiature
#Bitcoin sta crollando, raggiungendo minimi storici ben al di sotto dei 70.000 dollari. Al momento in cui scriviamo, il token si aggira appena sopra i 63.000 dollari, livelli che non vedevamo da ottobre 2024.
futurism.com/future-society/bi…
Bitcoin Is Crashing So Hard That Miners Are Unplugging Their Equipment
Bitcoin's plunge has made it far less economical to mine the digital token. Some companies are starting to unplug their equipment.Victor Tangermann (Futurism)
reshared this
Come gli autocrati si intromettono nelle elezioni - L'amministrazione Trump ha gli occhi puntati sulle elezioni di medio termine e oltre.
La Casa Bianca di Trump sta cambiando le regole del nostro sistema politico attraverso l'intimidazione, la distorsione delle informazioni, la corruzione finanziaria e lo smantellamento di cariche governative.
theatlantic.com/podcasts/2026/…
How Autocrats Meddle With Elections
The Trump administration has its eyes on the midterms and beyond.Anne Applebaum (The Atlantic)
reshared this
Gli hacker cinesi di Salt Typhoon hanno fatto un blitz digitale nelle aziende norvegesi
In un rapporto pubblicato venerdì, il servizio di sicurezza della polizia norvegese ha affermato che il gruppo di hacker, che si ritiene lavori per il governo cinese, ha preso di mira dispositivi di rete vulnerabili per condurre attività di spionaggio.
techcrunch.com/2026/02/06/chin…
China's Salt Typhoon hackers broke into Norwegian companies | TechCrunch
Norway's government accused China’s Salt Typhoon hacking group of conducting a cyberespionage campaign in the country.Lorenzo Franceschi-Bicchierai (TechCrunch)
reshared this
Baby you're a firework..
🚨 nuova rivendicazione #ransomware Italia 🚨
🏴☠️ gruppo #Qilin
🧬 Parente Fireworks | Melara (RO)
🎯 settore: intrattenimento
🔗 parente.it
🗓️ 06 febbraio 2026
📄 sample: -
▪️ dati esfiltrati dichiarati: -
▪️ dati esfiltrati pubblicati: -
⏲️ scadenza: -
Cybersecurity & cyberwarfare reshared this.
Misure di base NIS2: governance, ruoli e specifiche tecniche spiegate da ACN
@Informatica (Italy e non Italy 😁)
Le misure di base NIS2 non sono semplice adempimento burocratico, ma un framework di governance strutturato. ACN spiega come linguaggio comune e ruoli chiari siano fondamentali per un’implementazione efficace
L'articolo Misure di base NIS2: governance, ruoli
Informatica (Italy e non Italy) reshared this.
Robot in cerca di carne: Quando l’AI affitta periferiche. Il tuo corpo!
📌 Link all'articolo : redhotcyber.com/post/robot-in-…
#redhotcyber #news #intelligenzaartificiale #ai #tecnologia #etica #diritto #regolamentazione #europa #usa
Robot in cerca di carne: Quando l'AI affitta periferiche. Il tuo corpo!
Un nuovo mercato dove le macchine 'affittano' esseri umani per agire nel mondo reale, sollevando interrogativi etici e di sicurezza.Silvia Felici (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
🚨 nuova rivendicazione #ransomware Italia 🚨
🏴☠️ gruppo #TheGentlemen
🧬 Silvi SRL | Montecchio Emilia( RE)
🎯 settore: automazione industriale
🔗 silvi.it
🗓️ 06 febbraio 2026
📄 sample: -
▪️ dati esfiltrati dichiarati: -
▪️ dati esfiltrati pubblicati: -
⏲️ scadenza: 16 febbraio 2026
reshared this
La CISA chiede alle agenzie federali di sostituire i dispositivi edge a rischio di fine vita
- La CISA ha emesso una direttiva operativa vincolante che richiede la rimozione dei dispositivi edge non supportati
- Rappresentano “rischi sproporzionati e inaccettabili” che possono essere facilmente risolti
- Ogni organizzazione dovrebbe concentrarsi sul rinnovamento dell'hardware, non solo il governo
informapirata ⁂ reshared this.
Che ne pensate di questa idea? Fatelo sapere a @lanternaverde
reshared this
Grazie a questo articolo ho capito che per noi iscritti a Lemmy, gran parte di Mastodon è a tutti gli effetti una specie di dark web! Questo sinceramente lo trovo un po' frustrante. A meno che...
Ecco la mia idea
SEGUE
Dentro il Social WARM – Parte 3: Mastodon, il social a flusso continuo
Guide a Mastodon in italiano o in altre lingue, ne hanno scritte porci e cani, ma quella che state leggendo adesso non è…informapirata
like this
reshared this
In pratica, siccome noi vediamo quelli di Mastodon solo se taggano una comunità Lemmy, potrebbero ricordarsi di scrivere nei loro post il gruppo @caffeitalia@feddit.it così li vediamo anche noi.
Che ne pensate?
like this
reshared this
Caffè Italia reshared this.
ottima idea! Tutti a scrivere su @caffeitalia!!!
Approfitto per farti i miei complimenti, perché ho notato che hai spezzato il mssaggio in due parti e hai scritto un titolo lungo, ma poi hai scritto il resto del testo nel messaggio di risposta che (a differenza del messaggio iniziale) è perfettamente leggibile dagli utenti Mastodon 👍
L'hai fatto apposta, vero?
Caffè Italia reshared this.
NEW: In a new report, Norway says China's Salt Typhoon compromised several organizations in the country with the goal of espionage. The country did not name the victims.
techcrunch.com/2026/02/06/chin…
China's Salt Typhoon hackers broke into Norwegian companies | TechCrunch
Norway's government accused China’s Salt Typhoon hacking group of conducting a cyberespionage campaign in the country.Lorenzo Franceschi-Bicchierai (TechCrunch)
reshared this
Microsoft crea uno scanner per rilevare le backdoor nei modelli linguistici
📌 Link all'articolo : redhotcyber.com/post/microsoft…
#redhotcyber #news #microsoft #intelligenzaartificiale #backdoor #modellilinguistici #cybersecurity
Microsoft crea uno scanner per rilevare le backdoor nei modelli linguistici
Microsoft introduce uno scanner per rilevare backdoor nei modelli linguistici open-weight, basato su tre indicatori che segnalano la presenza di meccanismi nascosti.Carolina Vivianti (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187690/hac…
#securityaffairs #hacking
Record-breaking 31.4 Tbps DDoS attack hits in November 2025, stopped by Cloudflare
AISURU/Kimwolf botnet hit a record 31.4 Tbps DDoS attack lasting 35 seconds in Nov 2025, which Cloudflare automatically detected and blocked.Pierluigi Paganini (Security Affairs)
reshared this
Allanon 🇮🇹
in reply to Claudia • • •Il meccanismo è malato fino al midollo: un tizio inventa una minchiata qualsiasi, la prepara ad-hoc per stuzzicare l'algoritmo, lo spara sui social per fare soldi e i creduloni abboccano e cliccano/comprano/fanno cose stupide.
Io sono sempre stato dell'idea che se uno è stupido/ignorante la colpa non è al 100% sua.
Sarebbe come condannare quella povera gente che ancora cade nelle truffe telefoniche... Ma come si fa?
La TV potrebbe fare tanto per queste persone.
Ho troppa pietà? 🙂
Claudia
in reply to Allanon 🇮🇹 • • •@allanon condannare le persone ingenue, a volte, ci rende fin troppo cinici e cattivi. Oggi, nel 2026, abbiamo navicelle spaziali e macchine sparate nello spazio, abbiamo bombe intelligenti e trivelle supersoniche, abbiamo robot che operano a distanza e eccellenze mondiali per la riduzione di alcune malattie e patologie. Ma abbiamo perso l'abitudine di insegnare e di spiegare a chi non è al nostro stesso livello le basi della nuova vita.
Prendiamo in giro quello che compra su siti cinesi ma non gli spieghiamo il perché. Prendiamo in giro quello che si fa truffare perché pensavo fosse vero, ma non cerchiamo di capire come mai.
Tutti i mezzi di comunicazione sono impegnati a riportare notizie di guerra, femminicidi, tutti pronti a puntare il dito verso qualcuno, a commentare l'ennesimo fatto di cronaca. E nessuno che si siede accanto alle persone a telecamere e microfoni spenti, per parlare.
Manca la comunicazione, manca l'empatia, manca anche la voglia di comprendere le cose nuove. E questo mi fa arrabbiare veramente tanto, essere in un futuro favoloso e usare i social per grattarsi le chiappe... e comunque sì, tu sei troppo buono!
Allanon 🇮🇹
in reply to Claudia • • •Vedi, qui su Mastodon c'è una comunità abbastanza skillata, bisognerebbe mettere le mani nella melma (X, FB, ecc...) e sprofondarci, ma è faticoso perché l'algoritmo e i bot remano contro.
Forse farò un esperimento con un account dedicato... Magari qualcuno riprende i sensi!
E cmq, si sono buono, ma non troppo, anch'io ho i miei limiti 😉
Claudia
in reply to Allanon 🇮🇹 • • •@allanon remano contro, ma se hai una piccola bolla funziona. Io sono nessuno sui social, e purtroppo non ho la voce imponente di tanti che hanno scelto di snobbare (per giuste ragioni) altri social senza dare almeno una mano alle persone.
Si lamentano sempre "eh ma io in quella fogna non ci sto", eppure la maggior parte delle persone da aiutare stanno là.
Una bella campagna migratoria, spiegando la facilità di passare al fediverso rispetto alla deriva politica di X e FB, fatta da persone con un bel seguito, sarebbe meravigliosa.
Ma storcono la bocca, e poi la cattiva sono sempre io =D
Allanon 🇮🇹
in reply to Claudia • • •Me la sono legata al dito e prima o poi gli arriverà il conto 😉
Cmq appena finisco una roba ci provo a dare un minimo di aiuto.
Quelli con tanto seguito purtroppo sono presi per il collo: se escono dal solco addio click e guadagni.