Chinese Subs May Be Propelled Silently By Lasers
https://poliverso.org/display/0477a01e-1eb42f66-3cf3d43314c1eda1
Chinese Subs May Be Propelled Silently By Lasers If sharks with lasers on their heads weren’t bad enough, now China is working on submarines with lasers on their butts. At least, that’s what this report in the South China Morning Post claims https://www.scmp.com/news/china/science/article/3259875/chinese-scientists-close-laser-propulsion-superfast-silent-submarines,
Chinese scientists close in on laser propulsion for superfast, silent submarines
developing China’s next-generationStephen Chen (South China Morning Post)
The Privacy Post reshared this.
Assessing the Y, and How, of the XZ Utils incident
https://poliverso.org/display/0477a01e-85d4accb-dde3ef89e9f1e715
Assessing the Y, and How, of the XZ Utils incident High-end APT groups perform highly interesting social engineering campaigns in order to penetrate well-protected targets. For example, carefully constructed forum responses on precision targeted accounts and followup “out-of-band” interactions regarding underground rail system simulator software helped https://securelist.com/
Securelist | Kaspersky’s threat research and reports
The Securelist blog houses Kaspersky’s threat intelligence reports, malware research, APT analysis and statisticsSecurelist
The Privacy Post reshared this.
Volkswagen sotto attacco: 19.000 documenti di proprietà intellettuale violati dagli hacker cinesi
https://poliverso.org/display/0477a01e-44169b97-2444b32ac75c6376
Volkswagen sotto attacco: 19.000 documenti di proprietà intellettuale violati dagli hacker cinesi In una violazione significativa che ha scosso l’industria automobilistica, i media tedeschi hanno riferito che gli aggressori si sono infiltrati nei sistemi del Gruppo Volkswagen, una delle più grandi case automobilistiche del mondo.
The Privacy Post reshared this.
RHC Conference 2024. I giovani in prima fila per un futuro più sicuro e illuminato nel mondo cyber!
https://poliverso.org/display/0477a01e-4ca1f596-fd7713d42c3279b0
RHC Conference 2024. I giovani in prima fila per un futuro più sicuro e illuminato nel mondo cyber! La conferenza di RHC che si è sviluppata nelle giornate di venerdì 19 e sabato 20 aprile https://www.redhotcyber.com/red-hot-cyber-conference/rhc-conference-2024/, ha visto la presenza di molti ragazzi giovani provenienti dalle
RHC Conference 2024 - il blog della sicurezza informatica
Red Hot Cyber è lieta di annunciare la Cybersecurity al centro dell'Italia, la RHC Conference 2024 che si terrà a RomaRed Hot Cyber
The Privacy Post reshared this.
1/2 🚨 We're joining 128 civil society groups to call on MEPs in @EP_Justice to reject the Schengen Borders Code reform in today's vote.
The reform will introduce a harmful new system to 'manage migration' within the Schengen bloc #RejectTheCode ❌
Read more: https://borderviolence.eu/reports/civil-society-reject-schengen-borders-code/
reshared this
New note by cybersecurity
https://poliverso.org/display/0477a01e-8466-28cf-490a-2c1484182969
ACN presenta la relazione annuale sulla cybersecurity in Italia. Segui la diretta (video) https://www.key4biz.it/acn-presenta-la-relazione-annuale-sulla-cybersecurity-in-italia-segui-la-diretta-video/487781/Presentata oggi la Relazione annuale realizzata dall’Agenzia per la cybersicurezza nazionale, Acn, relativa alle attività svolte nel 2023. La relazione, di 121 pagine, è organizzata in sette se
E' nata l’associazione ‘Italian Digital Revolution’
Presentata a Roma la neonata associazione ‘Italian Digital Revolution’: obietto la piena digitalizzazione del PaeseRedazione Key4biz (Key4biz)
The Privacy Post reshared this.
Relazione 2023 dell’ACN: Il resoconto di un anno dell’Agenzia per la Cybersicurezza Nazionale
https://poliverso.org/display/0477a01e-da9a792f-480f540b478feace
Relazione 2023 dell’ACN: Il resoconto di un anno dell’Agenzia per la Cybersicurezza Nazionale Poco fa è arrivato in redazione il comunicato stampa dell’ACN riguardo alla presentazione di oggi della Relazione annuale realizzata dall’Agenzia per la cybersicurezza nazionale, Acn, relativa alle attività svolte nel 2023 che pubblichiamo nella
The Privacy Post reshared this.
Flute Now Included on List of Human Interface Devices
https://poliverso.org/display/0477a01e-bda49bce-17deaf94f796445b
Flute Now Included on List of Human Interface Devices For decades now, we’ve been able to quickly and reliably interface musical instruments to computers. These tools have generally made making and recording music much easier, but they’ve also opened up a number of other out-of-the-box ideas we might not otherwise see or even think about. For example, [Joren] recently built a
The Privacy Post reshared this.
Informare gli interessati è una misura di mitigazione per ogni data breach.
https://poliverso.org/display/0477a01e-47e52023-5f484d0565ccc9b9
Informare gli interessati è una misura di mitigazione per ogni data breach. Nel caso di una violazione di sicurezza da cui possa derivare una compromissione dei dati personali (sì, questa è la definizione di data breach), informare gli interessati è una misura di mitigazione sempre efficace. Nell’ipotesi più comune delle organizzazione colpite da un
The Privacy Post reshared this.
Il modello SASE indirizza le criticità affrontate dalle aziende
https://poliverso.org/display/0477a01e-6c3f95bb-f15c84081b4fb9ac
Il modello SASE indirizza le criticità affrontate dalle aziende A cura di Aldo Di Mattia https://www.linkedin.com/in/aldodm/, Senior Manager Systems Engineering Public Administration Italy di FortinetNegli ultimi anni il concetto di hybrid workforce si sta affermando come la modalità di lavoro più efficace e congeniale per le aziende. Di fatto, però, la flessibilità
The Privacy Post reshared this.
Attenzione professionisti IT: Nuova backdoor MadMxShell minaccia la sicurezza online
https://poliverso.org/display/0477a01e-7e2f1309-88afae12056a2c38
Attenzione professionisti IT: Nuova backdoor MadMxShell minaccia la sicurezza online Il 17 aprile, i ricercatori di Zscaler hanno scoperto https://www.zscaler.com/blogs/security-research/malvertising-campaign-targeting-it-teams-madmxshell una campagna di distribuzione di software dannoso rivolta ai professionisti IT. Questa campagna utilizza
New Backdoor, MadMxShell | ThreatLabz
Learn about MadMxShell – a new backdoor used by threat actors to carry out malvertising attacks on IT professionals.Roy Tay (Zscaler)
The Privacy Post reshared this.
European AI Roundtable [Advocacy Lab Content]
https://poliverso.org/display/0477a01e-15b3f622-7d252df76516930d
European AI Roundtable [Advocacy Lab Content]In 27 March 2024, the Computer & Communications Industry Association (CCIA Europe) hosted the inaugural edition of the European AI Roundtable in Brussels.euractiv.com/section/artificia…
The Privacy Post reshared this.
No Active Components in This Mysterious Audio Oscillator
https://poliverso.org/display/0477a01e-a597f6b3-7cbbe2ae39e0c93a
No Active Components in This Mysterious Audio Oscillator What’s the simplest audio frequency oscillator you can imagine? There’s the 555, of course, and we can think of a few designs using just two transistors or even a few with just one. But how about an oscillator with no active components https://youtu.be/MssPu3M-WEQ? Now there’s a neat trick.Replicating [Stelian]’s
The simplest audio oscillator on the Internet
Find out how to build the simplest audio oscillator on the Internet. This is something that I haven't seen before online, even though it's a common challenge...YouTube
The Privacy Post reshared this.
New JEDEC DDR5 Memory Specification: Up To 8800 MT/s, Anti-Rowhammer Features
https://poliverso.org/display/0477a01e-8bc82a6c-b2223a3ecfb9cab0
New JEDEC DDR5 Memory Specification: Up To 8800 MT/s, Anti-Rowhammer Features https://hackaday.com/wp-content/uploads/2015/03/rowhammer.png“Row hammer http://commons.wikimedia.org/wiki/File:Row_hammer.svg#/media/File:Row_hammer.svg” by hackaday.comDsimic – Own work. Licensed under CC BY-SA 4.0 http://creativecommons.org/licenses/by-sa/4.0 via Wikimedia
The Privacy Post reshared this.
FLOSS Weekly Episode 780: Zoneminder — Better Call Randal
https://poliverso.org/display/0477a01e-63b5af8e-8d4ba940e3c87ca5
FLOSS Weekly Episode 780: Zoneminder — Better Call Randal This week Jonathan Bennett and Aaron Newcomb chat with Isaac Connor https://www.connortechnology.com/ about https://zoneminder.com/feed/! That’s the project that’s working to store and deliver all the bits from security cameras — but the CCTV world has changed a lot since Zoneminder first started, over 20 years ago.
The Privacy Post reshared this.
80s Function Generator is Both Beauty and Beast
https://poliverso.org/display/0477a01e-34518344-b7e24d64d9a29b4b
80s Function Generator is Both Beauty and Beast You know how the saying goes — they don’t make them like this anymore. It’s arguably true of pretty much any electronic device given the way technology changes over time, though whether or not it’s objectively a bad thing is going to vary from case to case.As a practical example, take a look at the insides of this 80’s vintage HP 3314A
The Privacy Post reshared this.
Amazon Ends California Drone Deliveries While Expanding to Arizona
https://poliverso.org/display/0477a01e-d130c9fc-6cda69690fde27a9
Amazon Ends California Drone Deliveries While Expanding to Arizona https://hackaday.com/wp-content/uploads/2024/04/amazon_mk27_drone.jpgThe outgoing MK27 drone used by Amazon today for deliveries. (Credit: Amazon)When Amazon started its Prime Air drone delivery service in 2022, it had picked College Station (Texas) and Lockeford (California) as its the first
The Privacy Post reshared this.
250.000 siti WordPress a rischio compromissione. Aggiornate il plugin Forminator
https://poliverso.org/display/0477a01e-554b0ec0-fb431971bee968cc
250.000 siti WordPress a rischio compromissione. Aggiornate il plugin Forminator Gli esperti JPCERT mettono in guardia https://jvn.jp/en/jp/JVN50132400/ su una serie di vulnerabilità https://www.redhotcyber.com/post/vulnerabilita-cve-2024-21893-ivanti-colpito-da-hacker-cinesi-unc5325-e-unc3886/ critiche nel plugin Forminator per WordPress, sviluppato
Vulnerabilità Ivanti CVE-2024-21893: Gli hacker cinesi UNC5325 e UNC3886 colpiscono le reti private
Ivanti sotto attacco: hacker cinesi sfruttano falle CVE-2024-21893 nella VPN per infiltrarsi nelle reti. Scopri cosa c'è dietro il recente attacco informaticoRedazione RHC (Red Hot Cyber)
The Privacy Post reshared this.
An Elbow Joint That Can
https://poliverso.org/display/0477a01e-f873a711-4e3d06864c859b30
An Elbow Joint That Can We’re not certain whether [Paul Gould]’s kid’s prosthetic elbow joint https://hackaday.io/project/195714-kids-prosthetic-elbow-3d-printed is intended for use by a real kid or is part of a robotics project — but it caught our eye for the way it packs the guts of a beefy-looking motorized joint into such a small space.At its heart is a cycloidal gearbox, in which the three sm
The Privacy Post reshared this.
EU Parliament ratifies Right to Repair Directive
https://poliverso.org/display/0477a01e-7df6a7b3-21f9582287dae1d7
EU Parliament ratifies Right to Repair DirectiveMembers of the European Parliament (MEPs) voted in favour of the Right to Repair Directive on Tuesday (23 April), aimed at improving consumer access to repair services in order to reduce waste.euractiv.com/section/digital/n…
reshared this
Programming Ada: First Steps on the Desktop
https://poliverso.org/display/0477a01e-b46822bd-91350e8107d0b917
Programming Ada: First Steps on the Desktop https://hackaday.com/wp-content/uploads/2024/04/Ada_Mascot_with_slogan.jpgWho doesn’t want to use a programming language that is designed to be reliable, straightforward to learn and also happens to be certified for everything from avionics to rockets and ICBMs? Despite Ada’s strong roots and impressive legacy, it has the reputation among the
The Privacy Post reshared this.
Hacker di Anonymous attaccano le Forze di Difesa Israeliane: 233.000 documenti militari compromessi
https://poliverso.org/display/0477a01e-4476e767-6ad0691dfdae1d70
Hacker di Anonymous attaccano le Forze di Difesa Israeliane: 233.000 documenti militari compromessi A seguito di un sospetto attacco informatico da parte di un gruppo di https://www.redhotcyber.com/post/i-padri-fondatori-della-community-hacker/ associato al collettivo Anonymous, le Forze di difesa israeliane (IDF) si trovano ad
I padri fondatori della community Hacker. L'hacking è un percorso, non una destinazione!
In questo articolo scopriremo i padri fondatori della community hacker. Due scienziati che presero parte al TMRC dell'MITMassimiliano Brolli (Red Hot Cyber)
The Privacy Post reshared this.
https://fpf.org/blog/the-old-line-state-does-something-new-on-privacy/
@privacy
On April 6, the Maryland Senate concurred with House amendments to SB 541, the Maryland Online Data Privacy Act (MODPA), sending the bill to Governor Moore for signature. If enacted, MODPA could be a paradigm-shifting addition to the state privacy law landscape. While recent state comprehensive privacy laws generally have added to the existing landscape […]
The Privacy Post reshared this.
Happy #WorldBookDay! 📚
Are you one of those celebrating it? We cannot think about a better gift today than “Ada & Zangemann – A Tale of Software, Skateboards, and Raspberry Ice Cream”, an enjoyable story for readers of any age! 😍
#SoftwareFreedom #FreeSoftware
Ada & Zangemann - A Tale of Software, Skateboards, and Raspberry Ice Cream - FSFE
Here you find additional information and resources about the book "Ada & Zangemann - A Tale of Software, Skateboards, and Raspberry Ice Cream" by Matthias ...FSFE - Free Software Foundation Europe
reshared this
EU Parliament overwhelmingly approves key telecoms regulation: price reductions down the road
https://poliverso.org/display/0477a01e-74c38f0f-77e9754a1a0425d7
EU Parliament overwhelmingly approves key telecoms regulation: price reductions down the roadThe European Parliament approved on Tuesday (23 April) the EU’s broadband act, the Gigabit Infrastructure Act (GIA), which aims to accelerate the deployment of high-capacity networks and reduce prices for consumerseuractiv.com/section/digital/n…
reshared this
Emails reveal how Bolt tried to shape Estonia’s opposition to gig work directive
https://poliverso.org/display/0477a01e-8ec44703-ec8e9c4961a1eef7
Emails reveal how Bolt tried to shape Estonia’s opposition to gig work directiveIn October 2023, mobility company Bolt, headquartered in Estonia, offered to draft a letter on behalf of the Estonian government to push back against the platform work directive — liaising directly with a government official who is a former Bolt
The Privacy Post reshared this.
Your Smart TV Does 4K, Surround Sound, Denial-of-service…
https://poliverso.org/display/0477a01e-e8a6f7a8-0a6ba6f48fb6512a
Your Smart TV Does 4K, Surround Sound, Denial-of-service… Any reader who has bought a TV in recent years will know that it’s now almost impossible to buy one that’s just a TV. Instead they are all “smart” TVs, with an on-board computer running a custom OS with a pile of streaming apps installed. It fits an age in which linear broadcast TV is looking increasingly archaic,
reshared this
Minacce nell’era digitale: Analisi degli attacchi ‘Man in the Middle’ e ‘Adversary in the Middle’
https://poliverso.org/display/0477a01e-118215ef-4aa2af2726c7f9f7
Minacce nell’era digitale: Analisi degli attacchi ‘Man in the Middle’ e ‘Adversary in the Middle’ In un’era di crittografia avanzata, che rende le tecniche tradizionali di intercettazione meno efficaci, i cyberattacchi si evolvono diventando sempre più sofisticati e insidiosi. Tra questi, due varianti particolarmente preoccupanti per
The Privacy Post reshared this.
Il gruppo APT29 colpisce Windows con un malware backdoor attraverso lo spooler di stampa
https://poliverso.org/display/0477a01e-0964d44f-de36cb29fd343226
Il gruppo APT29 colpisce Windows con un malware backdoor attraverso lo spooler di stampa Negli ultimi anni, i professionisti della sicurezza hanno osservato un aumento degli attacchi informatici contro organizzazioni nell’Europa orientale e occidentale, nonché nel Nordhttps://www.redhotcyber.com/post/i-padri-fondatori-della-community-hacker/
The Privacy Post reshared this.
Reverse Engineering the Quansheng Hardware
https://poliverso.org/display/0477a01e-105a6ce2-573cc165df0f1ec9
Reverse Engineering the Quansheng Hardware In the world of cheap amateur radio transceivers, the Quansheng UV-K5 can’t be beaten for hackability. But pretty much every hack we’ve seen so far focuses on the firmware. What about the hardware?To answer that question, [mentalDetector] enlisted the help of a few compatriots and vivisected a UV-K5 to find out what makes it tick. The result is
The Privacy Post reshared this.
Come le soluzioni EDR possono essere utilizzate dagli hacker come armi
https://poliverso.org/display/0477a01e-8c68747c-13199c0d1879e647
Come le soluzioni EDR possono essere utilizzate dagli hacker come armi Lo specialista di SafeBreach Shmuel Cohen ha dimostrato https://www.safebreach.com/blog/dark-side-of-edr-offensive-tool/ che le soluzioni EDR possono essere utilizzate come strumenti di attacco. Durante lo studio, Cohen ha analizzato uno dei https://www.redhotcyber.com/post/vulnerabil
Vulnerabilità 0day di FortiOS SSL-VPN utilizzata in attacchi contro governi e grandi organizzazioni
I criminali informatici hanno colpito governi e grandi organizzazioni utilizzando una vulnerabilità in FortiOS SSL-VPNRedazione RHC (Red Hot Cyber)
The Privacy Post reshared this.
FISA Emendament Act sezione 702. Gli Stati Uniti continueranno a monitorare il mondo!
https://poliverso.org/display/0477a01e-965d5d8b-3043ed6357a61077
FISA Emendament Act sezione 702. Gli Stati Uniti continueranno a monitorare il mondo! Dopo un aspro dibattito durato fino alle prime ore di sabato mattina, il Congresso degli Stati Uniti ha votato per prorogare di due anni la Sezione 702 https://www.dni.gov/files/icotr/Section702-Basics-Infographic.pdf del Foreign Intelligence Surveillance Act
The Privacy Post reshared this.
Lungimiranti: gli “uomini straordinari” ospiti della Red Hot Cyber Conference 2024
https://poliverso.org/display/0477a01e-a790a080-8852e8bde33bddae
Lungimiranti: gli “uomini straordinari” ospiti della Red Hot Cyber Conference 2024 Sono le 22:48 del 21 aprile 2024, sono passate più di 24 ore dalla fine della Conferenza di Red Hot Cyber a Roma https://www.redhotcyber.com/red-hot-cyber-conference/rhc-conference-2024/e mentre sto guidando per tornare a casa dopo una bellissima giornata passata in
The Privacy Post reshared this.
Akira: un ransomware da pole position! 250 organizzazioni colpite e 42 milioni di dollari di riscatto
https://poliverso.org/display/0477a01e-270d42a1-67f5131e7d0922a8
Akira: un ransomware da pole position! 250 organizzazioni colpite e 42 milioni di dollari di riscatto Dall’inizio del 2023, il ransomware Akira https://www.redhotcyber.com/post/ransomware-akira-distruggere-completamene-tutti-i-backup-e-la-chiave-del-successo/ ha compromesso le reti di oltre 250 organizzazioni e raccolto circa 42
Ransomware Akira: Distruggere completamene tutti i backup è la chiave del successo!
La cyber gang Akira sta colpendo molte aziende in questo ultimo periodo e punta sempre ad eliminare qualsiasi possibilità di utilizzo dei backup.Redazione RHC (Red Hot Cyber)
The Privacy Post reshared this.
Dual-Wavelength SLA 3D Printing: Fast Continuous Printing With ROMP And RFP Resins
https://poliverso.org/display/0477a01e-62f4a760-a4c8b9d9866091a4
Dual-Wavelength SLA 3D Printing: Fast Continuous Printing With ROMP And RFP Resins As widespread as 3D printing with stereolithography (SLA) is in the consumer market, these additive manufacturing (AM) machines are limited to a single UV light source and the polymerization of free-radical polymerization (FRP) resins. The effect is that the object
The Privacy Post reshared this.
Rebranding di HelloKitty: ora HelloGookie! Password di CD Projekt Red e dati Cisco rivelati!
https://poliverso.org/display/0477a01e-d55b79f8-3c8de3a264ff31f6
Rebranding di HelloKitty: ora HelloGookie! Password di CD Projekt Red e dati Cisco rivelati! Gli autori del https://www.redhotcyber.com/post/il-ransomware-cos-e-scopriamo-il-suo-significato/ HelloKitty hanno annunciato il cambio di nome in HelloGookie e hanno pubblicato le password di CD Projekt Red e i dati Cisco precedentemente
Il ransomware cos'è? Scopriamo il funzionamento e il significato del RaaS
Se vuoi sapere con precisione il ransomware cos'è, il suo significato, sei nel posto giusto. Scopriamo assieme questo fenomeno in questo articolo.Massimiliano Brolli (Red Hot Cyber)
The Privacy Post reshared this.
Optical Tweezers Investigate Tiny Particles
https://poliverso.org/display/0477a01e-0fa4ec87-55681f735bc81da1
Optical Tweezers Investigate Tiny Particles No matter how small you make a pair of tweezers, there will always be things that tweezers aren’t great at handling. Among those are various fluids, and especially aerosolized droplets, which can’t be easily picked apart and examined by a blunt tool like tweezers. For that you’ll want to reach for a specialized tool like this laser-based tool
The Privacy Post reshared this.
NASA’s Voyager 1 Resumes Sending Engineering Updates to Earth
https://poliverso.org/display/0477a01e-63540cc8-9069a202bb0b5c4e
NASA’s Voyager 1 Resumes Sending Engineering Updates to Earth After many tense months, it seems that thanks to a gaggle of brilliant engineering talent and a lucky break the Voyager 1 spacecraft is once more back in action. Confirmation came on April 20th https://www.jpl.nasa.gov/news/nasas-voyager-1-resumes-sending-engineering-updates-to-earth, when Voyager 1
NASA’s Voyager 1 Resumes Sending Engineering Updates to Earth
After some inventive sleuthing, the mission team can — for the first time in five months — check the health and status of the most distant human-made object in existence.NASA Jet Propulsion Laboratory (JPL)
The Privacy Post reshared this.
Ancient Cable Modem Reveals Its RF Secrets
https://poliverso.org/display/0477a01e-fea17d6d-4df995ccd416eefe
Ancient Cable Modem Reveals Its RF Secrets Most reverse engineering projects we see around here have some sort of practical endpoint in mind. Usually, but not always. Reverse-engineering a 40-year-old cable modem https://www.youtube.com/watch?v=8IflOWH8fzY probably serves no practical end, except for the simple pleasure of understanding how 1980s tech worked.You’ll be forgiven if the
The 40-Year-Old Cable Modem (part 1)
Technical deep-dive into one of the very first cable data modems -- from 1983!The NABU PC and Network Adaptor were an amazing technical achievement that neve...YouTube
The Privacy Post reshared this.
https://fpf.org/blog/chinas-interim-measures-for-the-management-of-generative-ai-services-a-comparison-between-the-final-and-draft-versions-of-the-text/
@privacy
Authors: Yirong Sun and Jingxian Zeng Edited by Josh Lee Kok Thong (FPF) and Sakshi Shivhare (FPF) The following is a guest post to the FPF blog by Yirong Sun, research fellow at the New York
China’s Interim Measures for the Management of Generative AI Services: A Comparison Between the Final and Draft Versions of the Text - Future of Privacy Forum
Authors: Yirong Sun and Jingxian Zeng Edited by Josh Lee Kok Thong (FPF) and Sakshi Shivhare (FPF) The following is a guest post to the FPF blog by Yirong Sun, research fellow at the New York University School of Law Guarini Institute for Global Lega…Future of Privacy Forum
The Privacy Post reshared this.
EDRi
in reply to EDRi • • •2/2 This reform:
❌ Normalises racial profiling
❌ Legalises 'internal transfers' AKA pushbacks
❌ Uses the harmful 'instrumentalisation' concept
❌ Expands the use of border surveillance tech
MEPs must uphold fundamental rights and #RejectTheCode ✊🏾
Booteille reshared this.