Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Siamo a cinque, in un giorno.
Ah, che bella la sicurezza!

🚨 nuova rivendicazione #ransomware Italia 🚨

🏴‍☠️ gruppo #Qilin
🧬 Casartigiani - Confederazione Autonoma Sindacati Artigiani | Roma
🎯 settore: attività dei sindacati di lavoratori
🔗 casartigiani.org
🗓️ 16 febbraio 2026

📄 sample: sì
▪️ dati esfiltrati dichiarati: -
▪️ dati esfiltrati pubblicati: -
⏲️ scadenza: -

#ransomNews #cybersecurity #cyberthreats

reshared this

The global AI governance bonanza


The media in this post is not displayed to visitors. To view it, please log in.

The global AI governance bonanza
IT'S MONDAY, AND THIS IS DIGITAL POLITICS. I'm Mark Scott, and I won't be in New Delhi for India's AI Impact Summit this week. For those of you who are, here's the official agenda. God speed navigating the endless side events.

— This week's AI conference in India pits different visions of the emerging technology against each other. You should be wary of all of them.

— The global rush to ban kids from using social media is a prime example of the lack of quantifiable evidence used to make digital rules.

— The Global Majority is missing from the worldwide data center boom.

Let's get started.



digitalpolitics.co/newsletter0…

A Novelty Clock Makes The Best Tiny Mac Yet


The media in this post is not displayed to visitors. To view it, please log in.

We’re lucky enough in 2026 to have cheap single-board computers fast enough to emulate machines from the 1990s, touching on the 32-bit era. We’ve seen a few projects as a result, emulating the Apple Macs of the 68000 era, but even with the best 3D printing, they can disappoint when it comes to the case. So when [This Does Not Compute] saw a novelty alarm clock using a very well-modelled mini replica of an early Mac, putting a Mac emulator in it was the obvious way to go.

The project uses a Raspberry Pi with a small colour LCD. The video below the break takes us through the process of gutting it and mounting the Pi and display on a custom 3D-printed bracket. In an unexpected touch, parts of the original LCD are used to give the curved corners, which owners of an original Mac will remember. It may have a little further to go in that its fake floppy drive is begging to be converted to an SD card slot, and it has a now-unused brightness dial. But we’d say it’s one of the best little Mac emulators we’ve seen so far, if perhaps not the smallest.

youtube.com/embed/dRr5iVjMfqs?…


hackaday.com/2026/02/16/a-nove…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚨 nuova rivendicazione #ransomware Italia - e la terna è servita!

🏴‍☠️ gruppo #akira
🧬 iSMA Controlli SPA | Sant'Olcese (GE)
🎯 settore: manifattura elettrica
🔗 ismacontrolli.com
🗓️ 16 febbraio 2026

📄 sample: -
▪️ dati esfiltrati dichiarati: -
▪️ dati esfiltrati pubblicati: -
⏲️ scadenza: -

#ransomNews #cybersecurity #cyberthreats

Cybersecurity & cyberwarfare ha ricondiviso questo.

#ShinyHunters leaked 600K+ #Canada #Goose customer records, but the firm denies it was breached
securityaffairs.com/188046/cyb…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚨 nuova rivendicazione #ransomware Italia - take two

🏴‍☠️ gruppo #Dragonforce
🧬 Wipro Ferretto SRL | San Polo D'Enza (RE)
🎯 settore: IT magazzini
🔗 wiproferretto.com
🗓️ 16 febbraio 2026

📄 sample: sì
▪️ dati esfiltrati dichiarati: 301.82GB
▪️ dati esfiltrati pubblicati: -
⏲️ scadenza: 24 febbraio 2025

#ransomNews #cybersecurity #cyberthreats

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Privacy addio? OpenAI sta raccogliendo i numeri di chiunque: tu sei nella lista?

📌 Link all'articolo : redhotcyber.com/post/privacy-a…

#redhotcyber #news #chatgpt #openai #ecosistemaopenai #importazionecontatti #hashing

Cybersecurity & cyberwarfare ha ricondiviso questo.

Anthropic cerca di nascondere le azioni dell'IA di Claude e gli sviluppatori insorgono

Anthropic ha aggiornato Claude Code, il suo strumento di programmazione basato sull'intelligenza artificiale, modificando l'output di avanzamento per nascondere i nomi dei file che lo strumento stava leggendo, scrivendo o modificando. Tuttavia, gli sviluppatori hanno reagito, affermando di aver bisogno di vedere a quali file si accede

theregister.com/2026/02/16/ant…

@aitech

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

L'azienda israeliana Paragon ha esposto la propria dashboard di spyware su LinkedIn, svelando l'architettura nascosta di un impero di sorveglianza da miliardi di dollari!

Ciò che mostrano le immagini è agghiacciante: un numero di telefono ceco etichettato "Valentina", registri di intercettazione contrassegnati come "Completati" e categorie di dati a livello di applicazione che prendono di mira servizi crittografati.

ahmedeldin.substack.com/p/the-…

@informatica

Cybersecurity & cyberwarfare ha ricondiviso questo.

I wish that those surveys so often cited by InfoSec pundits that ask

Do you fully trust AI output?
Do you always verify AI output?

also asked

Do you fully trust your colleagues' output?
Do you always verify your colleagues' output?

Just to have comparative numbers, you know.

in reply to Filippo Valsorda

apples and oranges.

human output follows human patterns, making it easier to intuit where bugs will be. LLM output exhibits stochastic randomness in a way that breaks that intuition (I have to mode-switch for this reason when I'm reviewing vibe coded stuff that clients send me)

LLM output comes with no ability to explain why a change was made, and almost always results in a difficult PR review process, because nobody involved actually walked the path to produce the result.

in reply to Graham Sutherland / Polynomial

@gsuberland I am pretty sure a mental model can be developed for where LLMs tend to make mistakes, if nothing else because smarter people than me describe it.

The rest of your points seem not really related to what I was commenting, which was a pundit posting about how the gap between "% of respondents that fully trust AI" and "% of respondents. who always review AI" is going to be where security dies, when you'd observe the same gap for e.g. third-party deps.

in reply to Graham Sutherland / Polynomial

the remainder of my points are still relevant.

if a person wrote it, I can trust that they went through the process of doing so, and therefore at least notionally understand both the problem space and the solution space. that means that I can implicitly apply some modicum of trust in that process, and that the person will be able to engage in a productive conversation with me if I have queries. I can't do that with LLM output. that means some gap between the trust models is acceptable.

in reply to Graham Sutherland / Polynomial

like, a system is what it does, and ultimately it's an intellectual laziness machine for people who have either confused short-sighted KPIs for productivity or are dishonestly promoting the thing for money. if you want to know where security dies, it's in a future where people have atrophied their cognitive skills and intellectual curiosity in exchange for perpetually rented sycophantic blathering.
Questa voce è stata modificata (2 mesi fa)
in reply to ✧✦Catherine✦✧

@whitequark @gsuberland oh ffs, not everything has to collapse down to "are you a booster or an anti."

I just posted that I am annoyed at surveys that capture the gap between those cherry-picked % for AI without any context or comparison, and at commenters that make the world of that gap.

If you want an actually nuanced take on these tools, go read Russ as linked from the thread.

Also, @whitequark, can you take a hint that it's time to disengage or do I have to block you. I wouldn't like to!

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚨 nuova rivendicazione #ransomware Italia 🚨

🏴‍☠️ gruppo #akira
🧬 Icat Food SPA | Genova
🎯 settore: alimentare
🔗 icatfood.it
🗓️ 16 febbraio 2026

📄 sample: -
▪️ dati esfiltrati dichiarati: -
▪️ dati esfiltrati pubblicati: -
⏲️ scadenza: -

#ransomNews #cybersecurity #cyberthreats

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Vulnerabilità zero-day in Google Chrome. Exploit rilasciato: aggiornare subito

📌 Link all'articolo : redhotcyber.com/post/vulnerabi…

#redhotcyber #news #cybersecurity #hacking #malware #googlechrome #vulnerabilita #zeroday #useafterfree

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Microsoft alerts on DNS-based #ClickFix variant delivering malware via nslookup
securityaffairs.com/188039/hac…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🔥 SONO UFFICIALMENTE APERTE LE ISCRIZIONI! 🔥

Per info e iscrizioni: 📱 💬 379 163 8765 ✉️ formazione@redhotcyber.com

#redhotcyber #formazione #cybersecurity #darkweb #cyberthreatintelligence #ethicalhacking #infosec #intelligence

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

2149 BREAK THE SPHERE! La CTF di RHC & Hack The Box all’interno della RHC Conference

📌 Link all'articolo : redhotcyber.com/post/2149-brea…

#redhotcyber #news #cittastato #velos7 #intelligenzaartificiale #aegissphere #consiglio #speculari #controllodelle

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

0APT e l’illusione operativa: quando il ransomware è solo narrativa

📌 Link all'articolo : redhotcyber.com/post/0apt-e-li…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #cybercrime #sicurezzainformatica

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Google fixes first actively exploited #Chrome zero-day of 2026
securityaffairs.com/188029/sec…
#securityaffairs #hacking

Inside a Fake Mean Well DIN-rail PSU


The media in this post is not displayed to visitors. To view it, please log in.


Looks just like the real deal in a dark cabinet. (Credit: Big Clive, YouTube)Looks just like the real deal in a dark cabinet. (Credit: Big Clive, YouTube)
These days, you can get fakes, bootlegs, and similar for just about anything. While a fake handbag isn’t such a big deal, in the case of a DIN-rail power supply, you’d better make sure that you got the real deal. Case in point, the fake ‘Mean Well’ DIN-rail PSU that [Big Clive] got his mitts on for a detailed analysis and teardown.

Even without taking a PSU apart there are often clear clues that you might be dealing with a fake, starting with the logo and the rest of the markings. Here it’s clear that the logo is designed to only appear to be the MW one at a quick glance, with the rest of the label being poorly copied English gibberish containing copious “unnecessary” double “quotes”.

So what do you get for £3-5 in this +12VDC, 1.25A rated PSU? Shockingly, the insides are actually quite decent and probably close to the genuine MW, with basic noise filtering, proper isolation, and apparently a real class-Y safety capacitor. Similarly, the chosen DK124 control IC is more than capable of the task, with a good circuit for the adjustable voltage control.

This is possibly one of those cases where an off-the-shelf industrial design was stuffed into a case that tries to hitch a ride on the brand recognition of Mean Well rather than some national brand name. It’ll be interesting to see how close this circuitry is to the genuine MW PSU. We’ll find out once [Clive] gets the real deal in for a teardown. Perhaps it’s actually a solid clone of an older MW unit?
Schematic of the fake Mean Well PSU. (Credit: Big Clive, YouTube)Schematic of the fake Mean Well PSU. (Credit: Big Clive, YouTube)
youtube.com/embed/pOb51Q718F8?…


hackaday.com/2026/02/16/inside…

Microfluidic Display Teaches The Basics


The media in this post is not displayed to visitors. To view it, please log in.

We’ve always been interested in fluidic logic and, based on [soiboi’s] videos, he is too. His latest shows how to use silicone and a vacuum to build a multiplexed dot matrix display. This is a fascinating look at how you design with air instead of electrons.

Just like a regular display, it isn’t efficient to control each element separately. Usually, it’s better to multiplex such that 16 “pixels” need only row and column air valves. Just as you might use transistors, the project uses “air transistors” to build logic gates.

Each pixel is a bit of silicone that can be sucked down only when a row and column are drawing a vacuum simultaneously. The air transistor is a similar membrane that a control input can suck down. In its relaxed position, two air channels are blocked by the membrane. When the membrane moves away, the two channels connect. This is analogous to a Field Effect Transistor (FET), where the channel conducts electricity when the gate is active and does not conduct when the gate is inactive.

We appreciated the step-by-step development. The video moves from a pixel step-by-step to small arrays and then to a 4×4 array. If this is your first encounter with fluidic logic, you can learn more about it. The last time we checked in with [soiboi], he was creating fluidic robots.

youtube.com/embed/VZ2ZcOzLnGg?…


hackaday.com/2026/02/15/microf…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

📣 ISCRIVITI AL WEBINAR GRATUITO DI PRESENTAZIONE DEL CORSO "CYBER OFFENSIVE FUNDAMENTALS" – LIVELLO BASE 🚀

📅 Data Webinar: Martedì 17 Febbraio
🕕 Orario: 18:00
🖥️ Google Meet

🔗 Programma: redhotcyber.com/linksSk2L/cybe…
🎥 Intro del prof: youtube.com/watch?v=0y4GYsJMoX…

Per ricevere il link al webinar e per iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com

#redhotcyber #formazione #pentesting #pentest #formazioneonline #ethicalhacking #cybersecurity #penetrationtesting #cti #cybercrime #infosec #corsi #liveclass #hackerhood #pentesting

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Azienda italiana all’asta per 200$: ecco come il cyber-crimine colpisce il nostro tessuto produttivo (e come difendersi)

📌 Link all'articolo : redhotcyber.com/post/azienda-i…

Gli accessi di un’azienda #italiana sono stati messi in vendita nelle vetrine digitali del #crimine #informatico. Con un fatturato dichiarato di 1,7 milioni di euro nel #report finanziario 2024, l’azienda è stata messa all’asta su un noto #forum #underground da un attore malevolo identificato come “privisnanet”.

A cura di Bajram Zeqiri

#redhotcyber #news #cybersecurity #hacking #aziendaitaliana #venditaaccessi #forumunderground #fatturatoconsorprendenza #acquistosistemi #sicurezzainformatica #datipersonali #protezioneaziendale #riservatezza #informaticaitaliana

Cybersecurity & cyberwarfare ha ricondiviso questo.

Japanese sex toys maker #Tenga discloses data breach
securityaffairs.com/188022/dat…
#securityaffairs #hacking

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Gli spioni si sono fatti spiare! Paragon Graphite si “auto-leaka” la dashboard

📌 Link all'articolo : redhotcyber.com/post/quando-gl…

#redhotcyber #news #spyware #graphite #sorveglianza #sicurezzainformatica #malware #hacking

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚀 RHC CONFERENCE 2026 (V EDIZIONE) - Termine massimo 28 febbraio

Se siete ancora indecisi, avete tempo fino al 28 febbraio per partecipare come sponsor alla quinta edizione della RHC Conference.
Per informazioni e sponsorizzazioni, scrivete a sponsor@redhotcyber.com.

La RHC Conference, è l’appuntamento annuale gratuito, creato dalla community di RHC, per far accrescere l’interesse verso le tecnologie digitali, l’innovazione digitale e la consapevolezza del rischio informatico.

📍 Pagina dell'evento: redhotcyber.com/red-hot-cyber-…
📍 Video Riassuntivo della precedente IV edizione: youtube.com/watch?v=J1i9S4LOWS…

#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Italia sotto attacco: 2.400 cyber attacchi a settimana, il 15% in più della media globale

📌 Link all'articolo : redhotcyber.com/post/italia-so…

#redhotcyber #news #cyberattacchi #sicurezzainformatica #hacking #malware #ransomware #attacchinformatici

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

RHC Intervista Anubis Ransomware: il punto di vista su RAMP, LockBit e il “mercato” RaaS

📌 Link all'articolo : redhotcyber.com/post/rhc-inter…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #attacchinformatici #sicurezzadigital

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Un agente IA attacca un manutentore open source: il caso spaventa la community

📌 Link all'articolo : redhotcyber.com/post/un-agente…

#redhotcyber #news #intelligenzaartificiale #opensource #sicurezzainformatica #conflittisonline #interazioniumane

reshared this

Removing the BIOS Administrator Password on a ThinkPad Takes Timing


The media in this post is not displayed to visitors. To view it, please log in.


This would be a bad time to slip. (Credit: onionboots, YouTube)This would be a bad time to slip. (Credit: onionboots, YouTube)
In the olden days, an administrator password on a BIOS was a mere annoyance, one quickly remedied by powering off the system and pulling its CMOS battery or moving a jumper around. These days, you’re more likely to find a separate EEPROM on the mainboard that preserves the password. This, too, is mostly just another annoyance, as [onionboots] knew. All it takes is shorting out this EEPROM at the right time to knock it offline, with the ‘right time’ turning out to be rather crucial.

While refurbishing this laptop for a customer, he thought it’d be easy: the guide he found said he just had to disassemble the laptop to gain access to this chip, then short out its reset pin at the right time to make it drop offline and keep it shorted. Important here is that you do not short it when you are still booting the system, or it won’t boot. This makes for some interesting prodding of tiny pins with a metal tool.

What baffled him was that although this method worked, and he could now disable the password, on the next boot, it would be enabled again. As it turns out, to actually save the new supervisor password status to the EEPROM, you should stop shorting its pin, else you cannot write to it. Although the guide said to keep shorting it, this was, in hindsight, a clear case of relying too much on instructions and less on an obvious deduction. Not like any of us are ever guilty of such an embarrassing glitch, natch.

At any rate, it was still infinitely faster than trying to crack such a password with a brute-force method, even if helped by an LLM.

youtube.com/embed/AOAA6aWwplM?…


hackaday.com/2026/02/15/removi…

Hackaday Links: February 15, 2026


The media in this post is not displayed to visitors. To view it, please log in.

Hackaday Links Column Banner

It probably won’t come as much of a surprise to find that most of the Hackaday staff aren’t exactly what you’d call sports fanatics, so we won’t judge if you didn’t tune in for the Super Bowl last week. But if you did, perhaps you noticed Ring’s Orwellian “Search Party” spot — the company was hoping to get customers excited about a new feature that allows them to upload a picture of their missing pet and have Ring cameras all over the neighborhood search for a visual match. Unfortunately for Ring, the response on social media wasn’t quite what they expected.
Nope, don’t like that.
One commenter on YouTube summed it up nicely: “This is like the commercial they show at the beginning of a dystopian sci-fi film to quickly show people how bad things have gotten.” You don’t have to be some privacy expert to see how this sort of mass surveillance is a slippery slope. Many were left wondering just who or what the new system would be searching for when it wasn’t busy sniffing out lost pups.

The folks at Wyze were quick to capitalize on the misstep, releasing their own parody ad a few days later that showed various three-letter agencies leaving rave reviews for the new feature. By Thursday, Ring announced they would be canceling a planned expansion that would have given the divisive Flock Safety access to their network of cameras. We’re sure it was just a coincidence.

Speaking of three-letter agencies, the Environmental Protection Agency has announced this week that they will no longer incentivize the inclusion of stop-start systems on new automobiles. The feature, which shuts off the engine when the vehicle comes to a stop, was never actually required by federal law; rather, the EPA previously awarded credits to automakers that added the feature, which would help them meet overall emission standards. Manufacturers are free to continue offering stop-start systems on their cars if they wish, but without the EPA credits, there’s little benefit in doing so. Especially since, as Car and Driver notes, it seems like most manufacturers are happy to be rid of it. The feature has long been controversial with drivers as well, to the point that we’ve seen DIY methods to shut it off.

An incredible story ran in The Washington Post yesterday (free to read archive) that’s so wild that it’s almost hard to believe. In fact, if it wasn’t from The Washington Post, we’d be sure it was some kind of conspiracy theory fanfic. The short version goes like this: a Norwegian researcher who was so confident the “Havana syndrome” wasn’t the result of a directed energy weapon decided to prove it by not only building some sort of pulsed RF device based on leaked classified documents, but fired the thing at himself as a test. We’re not sure what the Norwegian equivalent to the “Shocked Pikachu Face” meme is, but we’ll give you one guess as to what happened.

If that wasn’t crazy enough, the article goes on to casually mention that the US Department of Homeland Security secretly purchased a similar pulsed-energy weapon for several million dollars on the black market during the Biden administration, and is currently studying it. Despite it apparently containing Russian components, the Feds have yet to determine who actually built the thing. You’ll have a hard time finding a bigger proponent for the free exchange of information than Hackaday, but even we have to admit…maybe there are some things it’s better we don’t know about.
Perfect for Meshtastic
Of course, if you’re looking to really maximize the effects of your black market pulsed-energy weapon, you’ll need to get it up high (maybe, what the hell do we know). Or perhaps you’re just a radio enthusiast. In either event, if you’re within driving distance of Tennessee, you’ll want to keep an eye on this government auction for an 80-foot-tall mobile communications tower. According to the listing posted by the Madisonville Police Department, the towable rig was built in 2016, weighs in at a little over 10,000 pounds, and has been kept in storage. It just needs some air in the tires to get it moving again.

As of this writing, the high bid is just $565, but with 18 days left to go on the auction, we suspect that number will be considerably higher when the gavel drops. We’ll check back next month to see what it sold for, and on the off-chance that any of you actually buy it, please let us know.

If all this talk of mass surveillance and shady government dealings has you down, perhaps a quick game of web-based Descent will lighten the mood. It’s the product of a port to Three.js by [mrdoob], completed with the aid of Claude. We know many of you are critical of AI-produced code, and not without good reason, but the results in this case are pretty slick.

Finally, we’ll go out on a limb and guess that more than a few in the audience are fans of the film Short Circuit, which turns 40 years old this year. In celebration, an event is being planned for June in Astoria, Oregon, where parts of the movie were filmed. As if you needed any other reason to meet Steve Guttenberg, you’ll also get the chance to pose for pictures with Johnny 5 and sit in on Q&A discussions with the cast and crew. There’s even going to be licensed merch for sale, which we can only hope means you’ll be able to buy one of those miniature J5’s from Short Circuit 2. It’s not the sort of event Hackaday generally covers, but we’re certainly tempted.

youtube.com/embed/BO3KBwCXS-0?…


See something interesting that you think would be a good fit for our weekly Links column? Drop us a line, we’d love to hear about it.


hackaday.com/2026/02/15/hackad…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Implementazione open source ed estensione di PaperBanana di Google Research per figure accademiche, diagrammi e immagini di ricerca automatizzate, estese a nuovi domini come la generazione di diapositive.

github.com/llmsresearch/paperb…

@aitech

Cybersecurity & cyberwarfare ha ricondiviso questo.

L'IDF rivela: 50.632 soldati hanno la doppia cittadinanza. 828 gli Italiani | Ecco l'elenco completo, per paese

12.135 militari delle IDF hanno anche la cittadinanza americana, 4.602 hanno almeno due cittadinanze straniere e ci sono anche soldati con cittadinanza yemenita, libanese e siriana: questa è la lunga lista

ynet.co.il/news/article/rknlnk…

@politica

in reply to 🌚 I4Z 🌝

Queste "persone" si espongono alle conseguenze legali delle loro azioni, che dovrebbero essere anche personali; certo non si auspica nessuna azione violenta o illegale, ma è giusto che le vittime e chi cerca di rappresentarle possano intraprendere azioni legali ove possibile.
Questa voce è stata modificata (2 mesi fa)
in reply to Giacinto Boccia

@g_boccia su questo siamo d'accordo ☯️
Ma condividere una lista non leggibile se non da chi ha conoscenza della lingua, che scopo ha?

Credo fermamente nella giustizia e nelle conseguenze legali soprattutto di azioni infami, orribili e inaccettabili.

Ma condividere un link con un file che non serve a nessuno se non a chi conosce la lingua... Serve a ben poco.

Traduco la pagina web e poi?

È solo un'osservazione sulla reale fruibilità dei dati e sulla qualità dei post.

Software Development on the Nintendo Famicom in Family BASIC


The media in this post is not displayed to visitors. To view it, please log in.

Back in the 1980s, your options for writing your own code and games were rather more limited than today. This also mostly depended on what home computer you could get your hands on, which was a market that — at least in Japan — Nintendo was very happy to slide into with their ‘Nintendo Family Computer’, or ‘Famicom’ for short. With the available peripherals, including a tape deck and keyboard, you could actually create a fairly decent home computer, as demonstrated by [Throaty Mumbo] in a recent video.

After a lengthy unboxing of the new-in-box components, we move on to the highlight of the show, the HVC-007 Family BASIC package, which includes a cartridge and the keyboard. The latter of these connects to the Famicom’s expansion port. Inside the package, you also find a big Family BASIC manual that includes sprites and code to copy. Of course, everything is in Japanese, so [Throaty] had to wrestle his way through the translations.

The cassette tape is used to save applications, with the BASIC package also including a tape with the Sample 3 application, which is used in the video to demonstrate loading software from tape on the Famicom. Although [Throaty] unfortunately didn’t sit down to type over the code for the sample listings in the manual, it does provide an interesting glimpse at the all-Nintendo family computer that the rest of the world never got to enjoy.

youtube.com/embed/oGMEF-zbh_k?…


hackaday.com/2026/02/15/softwa…

Fred de CLX reshared this.

Dealing With Intermittent Water Utilities


The media in this post is not displayed to visitors. To view it, please log in.

In many places, municipal water from a utility is something that’s often taken for granted. A local government or water utility will employ a water tower or pumping facility to ensure that there’s always water available to every home and business connected to it, all day, every day, and at a relatively constant pressure. This isn’t true the world over, though, and in [Sameer]’s home of Rajasthan he has to deal with a particularly onerous problem with the local water supply. Although he is connected to a utility, there is only water available at certain times of day, and not on a reliable schedule or at a particularly high pressure. This causes all kinds of problems, but he was able to employ an ESP32 to solve some of the headaches.

Most of [Sameer]’s neighbors install small pumps on the water main to pull water into reservoirs when it’s available. This creates two major problems, the first of which is that with all these pumps running, they can sometimes pull a vacuum on the water main, which can draw in contaminants and cause cavitation in the pumps. The second is that, if these pumps are on a timer and run when there’s no water available, they can damage themselves. [Sameer]’s solution pairs a flow sensor with a pump that is controllable via an automation tool like Home Assistant. He also includes a hydraulic analysis of this particular situation, such as placing the sensor on the output side of the pump rather than the inlet, as well as making sure that there is a laminar flow of water in the pipe it is installed on to ensure that it is taking valid measurements.

With everything set up and running, the water pump can automatically detect if there is water available, pump it to the reservoir as long as it lasts, and then automatically turn off the pump to avoid any thermal damage from running dry. [Sameer] even includes a complete Home Assistant setup for those who would like to replicate his work. We also think that this has utility outside of household water supplies as well, perhaps those watering their gardens with stored rainwater or those using other unique, semi-automated water catchment systems.


hackaday.com/2026/02/15/dealin…

Can a Scan Tool Kill a Car?


The media in this post is not displayed to visitors. To view it, please log in.

It’s no real secret that modern-day cars are basically a collection of computers on wheels, which also means that we get all the joys of debugging complex computer systems and software with cars these days. Rather than a quick poke under the hood to rebuild a carburetor and adjust the engine timing by hand, you’ll be pulling out a scan tool to gain access to the computer and figure out why the darn thing won’t start after someone else used a scan tool on it, as happened to [DiagnoseDan].

The question was whether the third-party scan tool that was used by the owner had done something to the software settings that would prevent the engine of this 2012 Renault Megane RS from starting, such as erasing keys, or if it was something more subtle. With no stored fault codes and the engine having healthy fuel, spark, and cam sensor readings, the conclusion was that the ECU was not doing its fuel injector things for some reason.

Ultimately, the root cause was that the ECU had been modded, with a re-mapping performed in 2020, meaning that the scan tool that [Dan] was using couldn’t properly interact with the ECU. Reflashing the ECU with the original manufacturer’s firmware was thus the next step, which is pretty involved in itself.

Reinstalling the OS on the car proved to be the solution. Likely, the modded firmware had stored some fault codes, as the ECU normally doesn’t start the engine if there are active codes stored. The third-party scan tool was thus likely blameless, but the inability to just clear fault codes was the real issue.

youtube.com/embed/biS8vC-13uE?…


hackaday.com/2026/02/15/can-a-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Malicious npm and PyPI packages linked to Lazarus APT fake recruiter campaign
securityaffairs.com/188009/apt…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Un aggiornamento pensato per proteggere Windows ha finito per bloccarlo

📌 Link all'articolo : redhotcyber.com/post/un-aggior…

#redhotcyber #news #windows11 #aggiornamentowindows #problemidiavvio #errorekb5077181 #cybersecurity

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

📣 ISCRIVITI AL WEBINAR GRATUITO DI PRESENTAZIONE DEL CORSO "CYBER OFFENSIVE FUNDAMENTALS"

📅 Data: Martedì 17 Febbraio ore 18:00
Per ricevere il link: 📞 379 163 8765 ✉️ formazione@redhotcyber.com

#redhotcyber #formazione #pentesting #pentest #formazioneonline #ethicalhacking #cybersecurity

Cybersecurity & cyberwarfare ha ricondiviso questo.

SECURITY AFFAIRS #MALWARE NEWSLETTER ROUND 84
securityaffairs.com/188004/mal…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

Alright, here we go, crypto/mldsa API proposal with external μ, deterministic signatures, signature context, and pure seed encoding.

github.com/golang/go/issues/77…