Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

33.000 tonnellate di ferro… e un’indagine dove AIS e log sono trappole da cyber intelligence

📌 Link all'articolo : redhotcyber.com/post/33-000-to…

#redhotcyber #news #guardiaDifinanza #sanzioni #materialeFerroso #trafficoIllegale #agenziaDelleDogane

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

ServiceNow sotto attacco: come un’email può spalancare le porte della tua azienda

📌 Link all'articolo : redhotcyber.com/post/serviceno…

#redhotcyber #news #cybersecurity #hacking #servicenow #intelligenzaartificiale #vulnerabilita #furtoinformazioni

One Hundred Years Of Telly


The media in this post is not displayed to visitors. To view it, please log in.

Today marks an auspicious anniversary which might have passed us by had it not been for [Diamond Geezer], who reminds us that it’s a hundred years since the first public demonstration of television by John Logie Baird. In a room above what is today a rather famous Italian coffee shop in London’s Soho, he had assembled a complete mechanical TV system that he demonstrated to journalists.

Television is one of those inventions that owes its genesis to more than a single person, so while Baird was by no means the only one inventing in the field, he was the first to demonstrate a working system. With mechanical scanning and just 30 lines, it’s hardly HD or 4K, but it does have the advantage of being within the reach of the constructor.

Perhaps the saddest thing about Baird and his system is that while he was able to attract the interest of the BBC in it, when the time came for dedicated transmissions at a higher resolution, his by then partly mechanical system could not compete and he faded into relative obscurity. Brits instead received EMI’s 405 line system, which persisted until the very start of the 1980s, and eventually the German PAL colour system in the late 1960s.

So head on down to Bar Italia if you can to raise a coffee to his memory, and should you wish to have a go at Baird-style TV for yourself, then you may need to print yourself a disk.

Header image: Matt Brown, CC BY 2.0.


hackaday.com/2026/01/26/one-hu…

Create a Tiny Telephone Exchange with an Analog Telephone Adapter


The media in this post is not displayed to visitors. To view it, please log in.

An analog telephone adapter (ATA), or FXS gateway, is a device that allows traditional analog phones to be connected to a digital voice-over-IP (VoIP) network. In addition to this, you can even create a local phone exchange using just analog phones without connecting to a network as [Playful Technology] demonstrates in a recent video.

The ATA used in the video is the Grandstream HT802, which features one 10/100 Mbps Ethernet port and two RJ11 FXS ports for two POTS phones, allowing for two phones to be directly connected and configured using their own profiles.

By using a multi-FXS port ATA in this manner, you essentially can set up your own mini telephone exchange, with a long run of Cat-3 possible between an individual phone and the ATA. Use of the Ethernet port is necessary just once to configure the ATA, as demonstrated in the video. The IP address of the ATA is amusingly obtained by dialing *** on a connected phone and picking 02 as menu option after which a synthetic voice reads out the number. This IP address gets you into the administration interface.

To configure the ATA as an exchange, the local loopback address is used, along with a dial alias configured in the ‘Dial Plan’ section. This way dialing e.g. 102 gets internally converted to dial the other FXS port. By setting up a similar plan on the other FXS port both phones can call each other, but it’s also possible to auto-dial when you lift the handset off the hook.

The rather hacky configuration ought to make clear that the ATA was not designed to be used in this manner, but if your use case involves this kind of scenario, it’s probably one of the cheaper ways to set up a basic, small phone exchange. There are even ATA models that have more than two ports, opening up more possibilities. Just keep in mind that not every ATA may support this kind of tweaking.

youtube.com/embed/-dD4Xepac8o?…


hackaday.com/2026/01/26/create…

Restoring a 1924 Frigidaire B-9 Refrigerator Back to Working Condition


The media in this post is not displayed to visitors. To view it, please log in.

Before the refrigerator became a normal part of any kitchen, those with enough money to throw around could get an icebox, which used melting ice to cool food and drinks in a second compartment. As refrigerators became available for sale in the 1920s, this created somewhat awkward transition models, like the 1924 Frigidaire B-9 that [David Allen] recently got offered for a restoration. This was part of the restoration of a 1926 house, which foresaw putting this venerable unit back into operation.

As [David] explains, this refrigerator was still in use until about 1970 when it broke down, and repairs proved tricky. Clearly, the fault wasn’t that severe as [David] got it working again after a number of small repairs and a lot of maintenance. The running unit with its basic elements can be seen purring away in the completion video, with the journey to get there covered in a video series starting with the first episode.

What’s fascinating is that during this aforementioned transition period, the vapor compression electric cooling system was an optional extra, meaning that the basic layout is still that of an icebox. Correspondingly, instead of ice in the ice compartment, you find the low-side float evaporator, with the basement section containing the condensing unit, motor, and compressor. The temperature sensor is also a miracle of simplicity, using bellows that respond to the temperature and thus volume of the evaporator coolant, which trigger a switch that turns on the compressor.

Despite a hundred years having passed since this refrigerator was constructed, at its core it works exactly the same as the unit we have in our kitchens today, albeit with higher efficiency, more electronics, and with the sulfur dioxide refrigerant replaced with something less toxic to us humans.

youtube.com/embed/lieog1_yNCo?…

youtube.com/embed/xICtNFbvEH0?…


hackaday.com/2026/01/26/restor…

Keebin’ with Kristina: the One with the Split with the Num Pad


The media in this post is not displayed to visitors. To view it, please log in.

Illustrated Kristina with an IBM Model M keyboard floating between her hands.

I love, love, love Saturn by [Rain2], which comes in two versions. The first, which is notably more complex, is shown here with its rings-of-Saturn thumb clusters.

A brightly-colored split with a built-in num pad on the right half.Image by [Rain2] via redditSo what was the impetus for this keyboard? It’s simple: a friend mentioned that ergo keyboards are a no-go if you need a num pad really bad.

Saturn has one built right in. The basic idea was to add a num pad while keeping the total number of keys to a minimum. Thanks to a mod key, this area can be many things, including but not limited to a num pad.

As far as the far-out shape goes, and I love that the curvature covers the thumb cluster and the index finger, [Rain2] wanted to get away from the traditional thumb cluster design. Be sure to check out the back of the boards in the image gallery.

Unfortunately, this version is too complicated to make, so v2 does not have the cool collision shapes going for it. But it is still an excellent keyboard, and perhaps will be open source someday.

Phanny Kicks Butt


Say hello to Phanny, a custom 52-key wireless split from [SfBattleBeagle]. This interestingly-named board has a custom splay that they designed from the ground up along with PCBWay, who sponsored the PCBs in the first place.

The Phanny keyboard, a 52-key custom, wireless, split keyboard with a questionable but memorable name.Image by [SfBattleBeagle] via GitHubI personally think the thumb keys go a little too far inward for my taste, but I’m certain that [SfBattleBeagle]’s hands must be different. Probably doesn’t have these stubby little thumbs.

While Ergogen is all the rage, [SfBattleBeagle] still opts to use Fusion and KiCad, preferring the UI of the average CAD program. If you’re wondering about the lack of palm rests, the main reason is that [SfBattleBeagle] tends to bounce between screens, as well as moving between the split and the num pad. To that end, they are currently designing a pair of sliding wrist skates that I would love to hear more about.

Be sure to check out the GitHub repo for all the details and a nice build guide. [SfBattleBeagle] says this is a fun project and results in a very comfy board.

The Centerfold: Mantis WIP is Captivating


A rather nice render of a rather nice keyboard with multi-directional key tops.Image by [luckybipedal] via redditI love it when I can provide a lovely centerfold that’s also got a lot of story behind it. This is Mantis, a work-in-progress by [luckybipedal] aka [Felix Kühling]. You can read a lot more on GitHub, and the reasoning behind the design choices in [Felix]’s write-up over on KBD News. [Felix] expects to build the first prototypes in March or April, and publish a final design and build guide later this spring.

Via reddit

Do you rock a sweet set of peripherals on a screamin’ desk pad? Send me a picture along with your handle and all the gory details, and you could be featured here!

Historical Clackers: the Masspro


I must say, the Antikey Chop doesn’t have much to say about the Masspro typewriter, and for good reason.
The Masspro, a lovely minimal typewriter with an interesting, hieroglyphic-like logo.Image via The Antikey Chop
But here’s what we know: the Masspro was invented by a George Francis Rose, who was the son of Frank S. Rose, inventor of the Standard Folding Typewriter. That machine was the predecessor to the Corona No. 3.

Frank died right as the Rose Typewriter Co. was starting to get somewhere. George took over, but then it needed financing pretty badly.

Angel investor and congressman Bill Conger took over the company, relocated, and renamed it the Standard Folding Typewriter Co. According to the Antikey Chop, “selling his father’s company was arguably George’s greatest contribution to typewriter history”.

George Rose was an engineer like his father, but he was not very original when it came to typewriters. The Masspro is familiar yet foreign, and resembles the Corona Four. Although the patent was issued in 1925, production didn’t begin until 1932, and likely ended within to years.
The Masspro typewriter in red.Image via Oz Typewriter
Why? It was the wrong machine at the wrong time. Plus, it was poorly built, and bore a double-shift keyboard which was outdated by this time. And, oh yeah, the company was started during the Depression.

But I like the Masspro. I think my favorite part, aside from the open keyboard, is the logo, which looks either like hieroglyphics or letters chiseled into a stone tablet.

I also like the textured firewall area where the logo is stamped. The Antikey Chop calls this a crinkle finish. Apparently, they came in black, blue, green, and red. The red isn’t candy apple, it’s more of an ox-blood red, and that’s just fine with me. I’d love to see the blue and green, though. Oh, here’s the green.

Finally, a Trackball Mouse With Nice Switches


Okay, so Keychron’s new Nape Pro mouse is pretty darn cool, and this is the best picture I could find that actually shows how you’re supposed to implement this thing on your desk. Otherwise, it looks like some kind of presentation remote.
Image via Yanko Design
So the idea here is to never take your hands off the keyboard to mouse, although you can use it off to the side like a regular trackball if you want. I say the ability to leave your fingers on the home row is even better.

There are plenty of keyboards with trackpads and other mousing functions that let you do this. But maybe you’re not ready to go that far. This mouse is a nice, easy first step.

The ball is pretty small at 25 mm. For comparison, the M575 uses a 34 mm ball, which is pretty common for trackball mice. Under those six buttons are quiet Huano micro switches, which makes sense, but I personally think loud-ish mice are nice enough.

I’ve never given it much thought, but the switches on my Logitech M575 are nice and clicky. I wonder how these compare, but I don’t see a sound sample. If the Nape Pro switches sound anything like this, then wowsers, that is quiet.
The Keychron Nape Pro positioned on the right side of a TKL keyboard.Image via Yanko Design
The super-cool part here is the software and orientation system, which they call OctaShift. The thing knows how it’s positioned and can remap its functions to match. M1 and M2 are meant to be your primary mouse buttons, and they are reported to be comfortable to reach in any position.

Inside you’ll find a Realtek chip with a 1 kHz polling rate along with a PixArt PAW3222 sensor, which puts this mouse in the realm of decent wireless gaming mice. But the connectivity choice is yours between dongle, Bluetooth, and USB-C cable.

And check this out: the firmware is ZMK, and Keychron plans to release the case STLs. Finally, it seems the mouse world is catching up with the keyboard world a bit.


Got a hot tip that has like, anything to do with keyboards? Help me out by sending in a link or two. Don’t want all the Hackaday scribes to see it? Feel free to email me directly.


hackaday.com/2026/01/26/keebin…

When Digital Sovereignty got real


The media in this post is not displayed to visitors. To view it, please log in.

When Digital Sovereignty got real
IT'S MONDAY, AND THIS IS DIGITAL POLITICS. I'm Mark Scott, and will be speaking on a webinar hosted by the Knight Georgetown Institute on Jan 28. The topic: how to improve access to social media data to support greater transparency and accountability. You can sign up here (the webinar starts at 11am ET / 5pm CET / 4pm UK).

— Even some of the United States' closest allies are re-evaluating their ties to American tech amid growing concerns about Washington's worldview.

— It's official. ByteDance sold off its US TikTok unit. But does the fire sale actually solve the underlying national security and privacy concerns?

— Many teenagers are OK with a smartphone ban at school. They are less keen on their devices being taken away forever.

Let's get started:



digitalpolitics.co/newsletter0…

Astronomy Live on Twitch


The media in this post is not displayed to visitors. To view it, please log in.

Although there are a few hobbies that have low-cost entry points, amateur astronomy is not generally among them. A tabletop Dobsonian might cost a few hundred dollars, and that is just the entry point for an ever-increasing set of telescopes, mounts, trackers, lasers, and other pieces of equipment that it’s possible to build or buy. [Thomas] is deep into astronomy now, has a high-quality, remotely controllable telescope, and wanted to make it more accessible to his friends and others, so he built a system that lets the telescope stream on Twitch and lets his Twitch viewers control what it’s looking at.

The project began with overcoming the $4000 telescope’s practical limitations, most notably an annoyingly short Wi-Fi range and closed software. [Thomas] built a wireless bridge with a Raspberry Pi to extend connectivity, and then built a headless streaming system using OBS Studio inside a Proxmox container. This was a major hurdle as OBS doesn’t have particularly good support for headless operation.

The next step was reverse engineering the proprietary software the telescope uses for control. [Thomas] was able to probe network traffic on the Android app and uncovered undocumented REST and WebSocket APIs. From there, he gained full control over targeting, parking, initialization, and image capture. This allowed him to automate telescope behavior through Python scripts rather than relying on the official Android app.

To make the telescope interactive, he built a Twitch-integrated control system that enables viewers to vote on celestial targets, issue commands, and view live telemetry, including stacking progress, exposure data, and target coordinates. A custom HTML/CSS/JavaScript overlay displays real-time status, and there’s a custom loading screen when the telescope is moving to a new target. He also added ambient music and atmospheric effects, so the stream isn’t silent.

If [Thomas]’s stream is your first entry point into astronomy and you find that you need to explore it more on your own, there are plenty of paths to build your way into the hobby, especially with Dobsonian telescopes, which can be built by hand, including the mirrors.


hackaday.com/2026/01/26/astron…

The cURL Project Drops Bug Bounties Due To AI Slop


The media in this post is not displayed to visitors. To view it, please log in.

Over the past years, the author of the cURL project, [Daniel Stenberg], has repeatedly complained about the increasingly poor quality of bug reports filed due to LLM chatbot-induced confabulations, also known as ‘AI slop’. This has now led the project to suspend its bug bounty program starting February 1, 2026.

Examples of such slop are provided by [Daniel] in a GitHub gist, which covers a wide range of very intimidating-looking vulnerabilities and seemingly clear exploits. Except that none of them are vulnerabilities when actually examined by a knowledgeable developer. Each is a lengthy word salad that an LLM churned out in seconds, yet which takes a human significantly longer to parse before dealing with the typical diatribe from the submitter.

Although there are undoubtedly still valid reports coming in, the truth of the matter is that the ease with which bogus reports can be generated by anyone who has access to an LLM chatbot and some spare time has completely flooded the bug bounty system and is overwhelming the very human developers who have to dig through the proverbial midden to find that one diamond ring.

We have mentioned before how troubled bounty programs are for open source, and how projects like Mesa have already had to fight off AI slop incidents from people with zero understanding of software development.


hackaday.com/2026/01/26/the-cu…

Does Carbon Fiber PLA Make Sense?


The media in this post is not displayed to visitors. To view it, please log in.

Art of 3D printer in the middle of printing a Hackaday Jolly Wrencher logo

Carbon fiber (CF) has attained somewhat of a near-mystical appeal in consumer marketing, with it being praised for being stronger than steel while simultaneously being extremely lightweight. This mostly refers to weaved fibers combined with resin into a composite material that is used for everything from car bodies to bike frames. This CF look is so sexy that the typical carbon-fiber composite weave pattern and coloring have been added to products as a purely cosmetic accent.

More recently, chopped carbon fiber (CCF) has been added to the thermoplastics we extrude from our 3D printers. Despite lacking clear evidence of this providing material improvements, the same kind of mysticism persists here as well. Even as evidence emerges of poor integration of these chopped fibers into the thermoplastic matrix, the marketing claims continue unabated.

As with most things, there’s a right way and a wrong way to do it. A recent paper by Sameh Dabees et al. in Composites for example covered the CF surface modifications required for thermoplastic integration with CF.

Carbon Fibers


There are a number of ways to produce CF, often using polyacrylonitrile, rayon, or pitch as the feedstock. After spinning this precursor into a suitable filament, heating induces carbonization and produces the carbon fiber.
Schematic representation of carbon fiber preparation from polyacrylonitrile.A 6 μm diameter carbon filament, compared to 50 μm diameter human hair. (Source: Wikimedia)A 6 μm diameter carbon filament, compared to 50 μm diameter human hair. (Source: Wikimedia)
Following this process, the CF is typically in the form of a few micrometer-thick fiber that is essentially pure carbon. To create a structural interface between the CF and the polymer of a composite material, some kind of process has to take place that creates this interface.

The fundamental difference between thermoset and thermoplastic polymers is that thermoset polymers are reacting in the mold as it sets, providing an environment in which the epoxy precursor and hardener can interact with the normally not chemically very reactive CF to form covalent bonds.

In comparison, thermoplastic polymers are already finalized, with covalent bonds between thermoplastics and CF unlikely. This means that the focus with CF-reinforced thermoplastics is mostly on weaker, non-covalent interactions, such as Van der Waals forces, pi-interactions and hydrogen bonds. Each of these interactions is further dependent on whether the thermoplastic is compatible, such as the presence of aromatic rings for pi-interactions.

Making It Stick


With those challenges in mind, how can thermoplastics be coaxed into forming a significant interface with CF? As noted in the earlier cited work by Sameh Dabees et al., there is no single surface treatment for CF that would work for every thermoplastic polymer, as a logical result of the limitations imposed by the available non-covalent interactions.
Carbon fiber in PLA after FDM printing, showing clear voids. (Credit: I built a thing, YouTube)Carbon fiber in PLA after FDM printing, showing clear voids. (Credit: I built a thing, YouTube)
One way to prepare the CF is by applying a coating to the fiber, called a sizing. By applying a sizing to the fiber that is compatible with the target thermoplastic, the interface with the bulk material is expected to improve. In one cited study involving a polyamide-acid sizing for polyimide bulk material, this coating created an approximately 85 nm interface, with an interfacial shear strength increased by 32.3%. In another study targeting CF-PEEK, this had a polyimide-based, water-soluble sizing applied that also significantly improved the shear strength.

Of course, this sizing has to actually adhere to the CF, lest it simply vanishes into the bulk thermoplastic material. This is a problem that is easily observable in FDM-printed thermoplastic polymers as distinct voids around the CF where the bulk polymer pulled away during crystallization, and no interface formed. Obviously, these voids create a weak point instead of strengthening the material.

Fiber Modding


Although CF is often confused with carbon nanotubes, it does not have the rigidly ordered structure that they do. Instead it has a graphite structure, owing to the way that they are produced, meaning sheets of graphite placed together in a disordered fashion. Despite this, the external surface is still smooth, which is where the chemical inertness comes from. Combined with the lack of reactivity from the side of thermoplastics, this highlights the need for something to bridge the gap.
Various carbon fiber surface modification methods. (Credit: Dabees et al., 2025, Composites)Various carbon fiber surface modification methods. (Credit: Dabees et al., 2025, Composites)
The review paper by Dabees et al. covers the most common types of surface treatments, with the above graphic providing a summary of the methods. Perhaps one of the most straightforward methods is the coating of the CF with an epoxy, thus shifting the interface from CF-thermoplastic to thermoset-thermoplastic. This kind of hybrid approach shows promising results, but is also cumbersome and not a universal fix.

Note that virtually all research here is focused on thermoplastic polymers like polycarbonate and PEEK, as these are most commonly used in industrial and medical settings. Yet even within that more limited scope the understanding of the exact effects of these modifications remains poorly investigated. Much of this is due to how hard it is to characterize the effects of one treatment when you take all other variables into account.

Perhaps most frustrating of all is how hard it is to research this topic considering the scale of the CF surface and the miniscule thickness of the CF-polymer interface. Relying on purely mechanical tests to quantify the impact is then tempting, but ultimately leaves us without a real understanding of why one method seems to work better than another.

Vibes Vs Science


The overall conclusion that we draw from this particular review paper is that although we know that composite materials can often provide improvements, in the case of thermoplastic-CF composites we realize that our understanding of the fundamentals is still rather lacking.

Outside of the less mainstream world of industrial and medical settings, CF is now widely being added to thermoplastic polymers, primarily in the form of filaments for FDM 3D printers. Without detailed information on whether the manufacturers of these filaments perform any kind of CF surface modification, it is very hard to even compare different CF-polymer filaments like this, even before taking into account individual FDM printer configurations and testing scenarios.

Considering that CF has for a few years now been identified as a potential carcinogen akin to asbestos, this raises the question of whether we really want to put CF and particularly the very small chopped carbon fibers into everything around us and thermoplastics in particular. When the empirical evidence available to us today shows that any mechanical improvements are not due to a solid CF-polymer interface, and any potential carcinogenic risks still years into the future of becoming clear, then the logical choice would be to hold back on CF-thermoplastics until we gain a better understanding of the benefits and risks.


hackaday.com/2026/01/26/does-c…

Augmented Reality Project Utilizes the Nintendo DSi


The media in this post is not displayed to visitors. To view it, please log in.

[Bhaskar Das] has been tinkering with one of Nintendo’s more obscure handhelds, the DSi. The old-school console has been given a new job as part of an augmented reality app called AetherShell.

The concept is straightforward enough. The Nintendo DSi runs a small homebrew app which lets you use the stylus to make simple line drawings on the lower touchscreen. These drawings are then trucked out wirelessly as raw touch data via UDP packets, and fed into a Gemini tool which transforms them into animation frames. These are then sent to an iPhone app, which uses ARKit APIs and the phone’s camera to display the animations embedded into the surrounding environment via augmented reality.

One might question the utility of this project, given that the iPhone itself has a touch screen you can draw on, too. It’s a fair question, and one without a real answer, beyond the fact that sometimes it’s really fun to play with an old console and do weird things with it. Plus, there just isn’t enough DSi homebrew out in the world. We love to see more.

youtube.com/embed/I389PbAJmVE?…


hackaday.com/2026/01/25/augmen…

LLM-Generated Newspaper Provides Ultimate in Niche Publications


The media in this post is not displayed to visitors. To view it, please log in.

... does this count as fake news?

If you’re reading this, you probably have some fondness for human-crafted language. After all, you’ve taken the time to navigate to Hackaday and read this, rather than ask your favoured LLM to trawl the web and summarize what it finds for you. Perhaps you have no such pro-biological bias, and you just don’t know how to set up the stochastic parrot feed. If that’s the case, buckle up, because [Rafael Ben-Ari] has an article on how you can replace us with a suite of LLM agents.
The AI-focused paper has a more serious aesthetic, but it’s still seriously retro.
He actually has two: a tech news feed, focused on the AI industry, and a retrocomputing paper based on SimCity 2000’s internal newspaper. Everything in both those papers is AI-generated; specifically, he’s using opencode to manage a whole dogpen of AI agents that serve as both reporters and editors, each in their own little sandbox.

Using opencode like this lets him vary the model by agent, potentially handing some tasks to small, locally-run models to save tokens for the more computationally-intensive tasks. It also allows each task to be assigned to a different model if so desired. With the right prompting, you could produce a niche publication with exactly the topics that interest you, and none of the ones that don’t. In theory, you could take this toolkit — the implementation of which [Rafael] has shared on GitHub — to replace your daily dose of Hackaday, but we really hope you don’t. We’d miss you.

That’s news covered, and we’ve already seen the weather reported by “AI”— now we just need an agenetic sports section and some AI-generated funny papers. That’d be the whole newspaper. If only you could trust it.

Story via reddit.


hackaday.com/2026/01/26/llm-ge…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Emergency #Microsoft update fixes in-the-wild #Office zero-day
securityaffairs.com/187349/hac…
#securityaffairs #hacking

reshared this

Data Act, c’è un aggiornamento delle FAQ: cosa cambia per aziende e utenti


@Informatica (Italy e non Italy 😁)
La Commissione Europea aggiorna le FAQ sul Data Act, fornendo chiarimenti pratici su accesso e uso dei dati, interoperabilità dei servizi digitali e rispetto delle norme UE, tra cui il GDPR, per supportare aziende e professionisti nella compliance e nella

Cybersecurity & cyberwarfare ha ricondiviso questo.

#ShinyHunters claims 2 Million #Crunchbase records; company confirms breach
securityaffairs.com/187340/dat…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

Gli utenti di TikTok subiscono interruzioni dopo l'accordo con gli Stati Uniti

TikTok ha riscontrato diffusi problemi tecnici durante il primo fine settimana dopo la vendita delle sue attività negli Stati Uniti, con utenti che hanno segnalato errori di accesso, caricamenti interrotti, pagine "Per te" reimpostate e commenti mancanti.

1003thepeak.iheart.com/content…

@informatica

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Scoperta Shock su Instagram: Post Privati Accessibili Senza Login!

📌 Link all'articolo : redhotcyber.com/post/scoperta-…

#redhotcyber #news #cybersecurity #hacking #instagram #vulnerabilita #privacy #sicurezzainformatica #protezioneonline #datipersonali #accessoai

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Vertice Ue‑India a Nuova Delhi: accordo di libero scambio “più vicino che mai”

L’Europa, dopo il Mercosur, punta così a rafforzare le relazioni economiche con un partner di scala globale, guardando a oriente

agi.it/estero/news/2026-01-24/…

@politica

Grazie a @quinta e @elCelio per la segnalazione e le fonti

Cybersecurity & cyberwarfare ha ricondiviso questo.

RE: wetdry.world/@16af93/115961732…

Because not using AI tools for what they excel at will produce less secure code.

For example, they are great at debugging (words.filippo.io/claude-debugg…), they can find real issues in code review, they know more math than me or most of my colleagues, and they can write static analyzers I would have never had the time to write myself.

in reply to Filippo Valsorda

@16af93 @djspiewak This toot is so disappointing. There are many reasonable things one could say about llm ethics but "your ethics argument is invalid because you are also using unethical things!!!" feels not in good faith.

You're right that there's no ethical consumption under capitalism. That doesn't mean we shouldn't care, or try to do better.

in reply to Filippo Valsorda

Using AI to generate test cases for my current project, and it's just so valuable. Would have never done that on my own. Especially because the cost of setting up the entire testing pipeline is often quite high for me (remembering or learning a testing framework).

I use QuickCheck for Haskell, i.e., I test invariants on my code with random inputs. It's so nice to describe the expected invariants in natural language and have them almost ready to test.

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Here are three lines from my AGENTS.md that make agents a lot better with Go.

Go has great CLI tools, but many people don't know about them, and so agents are not trained to reach for them.

Maybe the Go project should maintain a Go development skill?

in reply to Filippo Valsorda

Great idea. I've been doing a lot more Go with Claude at work recently.
We're trying to solve exactly these kinds of context engineering problems. This blog post is from one of our Go engineers and explains what we're doing. May be of interest. 🙏

tessl.io/blog/making-claude-go…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

149 Milioni di Account Esposti: Il Database Che Nessuno Doveva Vedere

📌 Link all'articolo : redhotcyber.com/post/149-milio…

#redhotcyber #news #cybersecurity #hacking #malware #leakdidati #violazionididati #sicurezzainformatica #databreach #protezionedidati

Cybersecurity & cyberwarfare ha ricondiviso questo.

Energy sector targeted in multi-stage #phishing and #BEC campaign using SharePoint
securityaffairs.com/187332/cyb…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

North Korea–linked #KONNI uses #AI to build stealthy #malware tooling
securityaffairs.com/187317/apt…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Sicurezza email sotto pressione: raddoppiano i kit di phishing nel 2025

📌 Link all'articolo : redhotcyber.com/post/sicurezza…

#redhotcyber #news #phishing #cybersecurity #intelligenzaartificiale #malware #kitdiattacchi #servizidiphishing #attacchimalevoli

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

❌ SE PENSI CHE UN FIREWALL BASTI, QUESTO CORSO NON FA PER TE. ❌

Se invece vuoi capire:
• come ragiona un attaccante
• perché certi sistemi cadono sempre
• cosa c’è prima del pentest
allora sei nel posto giusto.

🔥 Cyber Offensive Fundamentals – Live Class

40 ore. Live. Niente scorciatoie.

🔗 Programma: redhotcyber.com/linksSk2L/cybe…
🎥 Intro del prof: youtube.com/watch?v=0y4GYsJMoX…

💎 Prima edizione = prezzo irripetibile
⛔ Numero chiuso

Per info e iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com

#redhotcyber #formazione #pentesting #pentest #formazionelive #ethicalhacking #hacking #cybersecurity #penetrationtesting #cti #cybercrime #infosec #corsi #liveclass #hackerhood #pentesting

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

209 – Robot che imparano a fare tutto guardando i nostri video camisanicalzolari.it/209-robot…
in reply to Marco Camisani Calzolari

🤖 Tracking strings detected and removed!

🔗 Clean URL(s):
camisanicalzolari.it/209-robot…

❌ Removed parts:
?utm_source=dlvr.it&utm_medium=mastodon

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Russia-linked #Sandworm #APT implicated in major cyber attack on Poland’s power grid
securityaffairs.com/187309/bre…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Quando il Malware si Nasconde nei Video! La Tecnica PixelCode Smonta le Regole

📌 Link all'articolo : redhotcyber.com/post/quando-il…

#redhotcyber #news #pixelcode #steganografia #crittografia #sicurezzainformatica #hacking #malware #cybersecurity #informatica #codicebinario

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Come un semplice file di Visual Studio Code può diventare una backdoor per hacker statali

📌 Link all'articolo : redhotcyber.com/post/come-un-s…

#redhotcyber #news #cybersecurity #hacking #malware #git #visualstudiocode #sicurezzainformatica #minacceinformatiche #evoluzione

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚀 RHC CONFERENCE 2026 (V EDIZIONE) - Termine massimo 28 febbraio

Se siete ancora indecisi, è ora di decidersi. Scrivete a sponsor@redhotcyber.com.

📍 Pagina dell'evento: redhotcyber.com/red-hot-cyber-…

#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Microsoft Teams saprà dove sei: la posizione geografica verrà dedotta dal Wi-Fi

📌 Link all'articolo : redhotcyber.com/post/microsoft…

#redhotcyber #news #microsoftteams #posizionefisica #retewifi #utentewindows #utentemacos #istanzecloud #cloudstandard #multitenant

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Khaby Lame vende i diritti della sua identità digitale per 900 milioni di dollari. Ma c’è da riflettere

📌 Link all'articolo : redhotcyber.com/post/khaby-lam…

#redhotcyber #news #khobylame #creatoritaliano #diritticommerciali #partnership #licenze #ecommerce #marchio #italianisucces #socialmedia

Bike Spokes, Made of Rope


The media in this post is not displayed to visitors. To view it, please log in.

We know this one is a few years old, but unless you’re deep into the cycling scene, there’s a good chance this is the first time you’ve heard of [Ali Clarkson’s] foray into home made rope spokes.

The journey to home-made rope spoke begun all the way back in 2018, shortly after the company Berd introduced their very expensive rope spokes. Berd’s spokes are made of a hollow weaved ultrahigh molecular weight polyethylene (UHMWPE) rope with very low creep. They claim wheels stronger than steel spoke equivalents at a fraction of the weight. Naturally forum users asked themselves, “well why can’t we make our own?” As it turns out, there are a handful of problems with trying this at home.

There are a number of ways to skin this proverbial cat, but they all center around some very special nautical ropes, namely, Robline DM20. This rope has excellent wear and creep characteristics, in a hollow weave much like what Berd developed. The hubs also require the addition of a bevel around the spoke holes to prevent wear. Beyond those two similarities, there are quite a number of ways to lace the spokes between the hub and wheels.

As detailed by [Ali Clarkson], one method involves creating loops out of bike spokes, with a custom jig and some brazing. Then a length of rope is passed through the hub and a special hitch is used to keep it in place. Two loops are made in the ends of this length of rope and passed through the spoke ends made earlier. Finally everything is brought up to tension and trued much like a normal wheelset. The front wheel ended up weighing around 700g, a rather impressive feat for a 24 inch downhill wheel.

However, a number of other methods have been tried on the forum threads. Namely, a number of users have attempted to varying degrees of success putting a length of spoke inside the hollow rope weave and “Chinese finger trapping” it together. The key issue here is sourcing a glue strong enough to hold the spoke piece on at lower tensions, but flexible enough to not crack with the cyclical loading on a rim.

Ultimately, this is a great look at the properties of some extremely special rope. This also isn’t the first time we have seen strange bicycle wheels made with UHMWPE.

youtube.com/embed/6hXOYfnhStI?…


hackaday.com/2026/01/25/bike-s…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Truffe dei falsi abbonamenti in scadenza – Marco Camisani Calzolari testimonial della Polizia di Stato camisanicalzolari.it/truffe-de…

reshared this

Hackaday Links: January 25, 2026


The media in this post is not displayed to visitors. To view it, please log in.

Hackaday Links Column Banner

If predictions hold steady, nearly half of the United States will be covered in snow by the time this post goes live, with the Northeast potentially getting buried under more than 18 inches. According to the National Weather Service, the “unusually expansive and long-duration winter storm will bring heavy snow from the central U.S. across the Midwest, Ohio Valley, and through the northeastern U.S. for the remainder of the weekend into Monday.” If that sounds like a fun snow day, they go on to clarify that “crippling to locally catastrophic impacts can be expected”, so keep that in mind. Hopefully you didn’t have any travel plans, as CNBC reported that more than 13,000 flights were canceled as of Friday night. If you’re looking to keep up with the latest developments, we recently came across StormWatch (GitHub repo), a slick open source weather dashboard that’s written entirely in HTML. Stay safe out there, hackers.

Speaking of travel, did you hear about Sebastian Heyneman’s Bogus Journey to Davos? The entrepreneur (or “Tech Bro” to use the parlance of our times) was in town to woo investors attending the World Economic Forum, but ended up spending the night in a Swiss jail cell because the authorities thought he might be a spy. Apparently he had brought along a prototype for the anti-fraud device he was hawking, and mistakenly left it laying on a table while he was rubbing shoulders. It was picked up by security guards and found to contain a very spooky ESP32 development board, so naturally he was whisked off for interrogation. A search of his hotel room uncovered more suspicious equipment, including an electric screwdriver and a soldering iron. Imagine if a child had gotten their hands on them?


But the best part of the story is when Sebastian tries to explain the gadget’s function to investigators. When asked to prove that the code on the microcontroller wasn’t malicious, he was at a loss — turns out our hero used AI to create the whole thing and wasn’t even familiar with the language it was written in. In his own words: “Look, I’m not a very good hardware engineer, but I’m a great user of AI. I was one of the top users of Cursor last year. I did 43,000 agent runs and generated 25 billion tokens.” Oof. Luckily, the Swiss brought in a tech expert who quickly determined the device wasn’t dangerous. He was even nice enough to explain the code line-by-line to Sebastian before he was released. No word on whether or not they charged him for the impromptu programming lesson.

It wasn’t hard for the Swiss authorities to see what was inside the literal black box Sebastian brought with him, but what if that wasn’t possible? Well, if you’ve got an x-ray machine handy, that could certainly help. The folks at Eclypsium recently released a blog post that describes how they compared a legit FTDI cable with a suspect knock-off by peering at their innards. What we thought was particularly interesting was how they were able to correctly guess which one was the real deal based on the PCB design. The legitimate adapter featured things like ground pours and decoupling caps, and the cheap one…didn’t. Of course, this makes sense. If you’re looking to crank something out as cheaply as possible, those would be the first features to go. (Editor’s note: sarcasm.)

It doesn’t take an x-ray machine or any other fancy equipment to figure out that the Raspberry Pi 5 is faster than its predecessors. But quantifying just how much better each generation of Pi is compared to the other members of the family does require a bit more effort, which is why we were glad to see that The DIY Life did the homework for us. It’s not much of a spoiler to reveal that the Pi 5 won the head-to-head competition in essentially every category, but it’s still interesting to read along to see how each generation of hardware fared in the testing.

Finally, Albedo has released a fascinating write-up that goes over the recent flight of their Very Low Earth Orbit (VLEO) satellite, Clarity-1. As we explained earlier this week, operating at a lower orbit offers several tangible benefits to spacecraft. One of the major ones is that such an orbit decays quickly, meaning a spacecraft could burn up just months or even days after its mission is completed. For Albedo specifically, they’re taking advantage of the lower altitude to snap closeup shots of the Earth. While there were a few hiccups, the mission was overall a success, providing another example of how commercial operators can capitalize on this unique space environment.


See something interesting that you think would be a good fit for our weekly Links column? Drop us a line, we’ve love to hear about it.

Cybersecurity & cyberwarfare ha ricondiviso questo.

Gli utenti di TikTok impazziscono per la raccolta di "stati di immigrazione" dell'app: ecco cosa significa

Molti utenti stanno anche postando sui social media commenti sul testo dell'informativa, in cui si afferma che TikTok potrebbe raccogliere informazioni sensibili sui suoi utenti, tra cui la loro "vita sessuale o orientamento sessuale, stato di transgender o non binario, cittadinanza o stato di immigrazione".

techcrunch.com/2026/01/23/tikt…

@informatica

in reply to [AF]2050

@AleF2050 esattamente. Probabilmente biden avrebbe semplicemente fatto chiudere il Tik Tok statunitense, mentre Trump ha deciso di trasformarlo in un asset statunitense e di far entrare nel business i suoi amici della Silicon Valley.
Poi presto anche convinto del fatto che i cinesi una bella back door L'hanno sicuramente infilata dentro al codice

@informatica

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

La Cina ti spia. Gli USA di più. TikTok USA si impegna a raccogliere dati precisi sulla posizione degli utenti

La nuova joint venture statunitense di TikTok ha apportato modifiche alla propria politica sulla privacy, tra cui l'ampliamento del tipo di dati sulla posizione che l'azienda può raccogliere dai suoi 200 milioni di utenti americani.

bbc.com/news/articles/cvgnj7v2…

@informatica

Cybersecurity & cyberwarfare ha ricondiviso questo.

Ecco Rayhunter: un nuovo strumento open source di EFF per rilevare lo spionaggio cellulare (post di marzo 2025)

Rayhunter è un nuovo strumento open source che abbiamo creato, basato su un hotspot mobile conveniente, che speriamo consenta a chiunque, indipendentemente dalle competenze tecniche, di cercare CSS in tutto il mondo

eff.org/deeplinks/2025/03/meet…

@pirati

Cybersecurity & cyberwarfare ha ricondiviso questo.

L'ICE chiede alle aziende informazioni sugli strumenti "Ad Tech e Big Data" che potrebbero utilizzare nelle indagini

Un nuovo documento federale dell'ICE dimostra come il governo stia prendendo sempre più in considerazione gli strumenti commerciali per l'applicazione della legge e la sorveglianza.

wired.com/story/ice-asks-compa…

@informatica