securityaffairs.com/188004/mal…
#securityaffairs #hacking
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 84
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscapePierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Alright, here we go, crypto/mldsa API proposal with external μ, deterministic signatures, signature context, and pure seed encoding.
github.com/golang/go/issues/77…
proposal: crypto/mldsa: new package
Go 1.26 added an internal implementation of the ML-DSA post-quantum signature algorithm, specified in FIPS 204. I propose we expose a public crypto/mldsa in Go 1.27 with the following API. // Packa...FiloSottile (GitHub)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187996/sec…
#securityaffairs #hacking
Security Affairs newsletter Round 563 by Pierluigi Paganini – INTERNATIONAL EDITION
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Nobody Can Complain When you Fart, If It’s For Science!
There are some stories that you can tell a writer has enjoyed composing, and, likely, whoever wrote the piece for Medical Express reporting on new smart underwear to measure human flatulence was in their element. It follows a University of Maryland project to create a clip-on hydrogen sensor that can be attached to a set of underwear to monitor gaseous emissions.
Lest you think that this research has a non-serious tone to it, it seems that gastroenterologists have incomplete data on what constitutes normal activity. The aim of this research is to monitor a large number of people to create a human flatus atlas that will inform researchers for years to come. Better still, they’re recruiting, so if you’re a regular Johnny Fartpants who misspent their youth lighting farts while drunk and would like to atone, get in touch.
We know that gut problems can be no fun at all, so fart jokes aside, if this research makes advancements in their study, it can only be a good thing. Meanwhile, if you are one of those superproducers they mention, perhaps you need to build the FartMaster 3000.
GameCube Dock for Switch, revisited.
While modern game consoles are certainly excellent, there is still something magical about the consoles of yore. So why not bring the magical nostalgia of a GameCube controller to the excellent modern Switch series of consoles?
This isn’t [Dorison Hugo’s] first attempt at building a Switch dock, but with seven years of development, there are a lot of updates in the project to unpack. One version allows the user to play on the Switch’s screen instead of on a docked display, and another comes with a mechanical lock to prevent the console from being stolen. But what really caught our eye is the modifications made to the OEM Switch docks.
As it turns out, there is enough space inside a Switch dock to stuff in four GameCube ports. Short of spinning a custom board, the trick was picking the right commercial adapter to start with. The Wii U branded adapter [Dorison] was using wouldn’t fit. However, a rather small third-party adapter from Input Integrity got the job done. Space was still rather tight, and the ports needed to be removed from the board to fit. Some cables with simple connectors on the GameCube connector side make cable management a bit simpler later. Holes have to be very neatly cut into the front of the Switch dock to complete the look, with the mods held in with some superglue, epoxy, and hot glue.
Shortly after the completion of the dock, the Switch 2 was released, so naturally, that dock went through a similar process. While there is more internal space for cable management on this iteration of the console, there is too little space for the ports to fit without modification. Shaving off a few millimeters from the top of the ports allows them to fit inside the case, but makes cutting professional-looking holes in the front panel all the more challenging. Unfortunately, there is no good way to connect the adapter’s USB cable to the dock’s PCB, so an extraUSB cable became necessary.
Regardless of any imperfections, both of [son’s] modified docks look excellent, with near-OEM quality!
youtube.com/embed/NfM-JLqdszg?…
The WalMart Atomic Clock
In the realm of first-world problems, your cheap wall clock doesn’t keep time, so you have to keep setting it. The answer? Of course, you connect it to NTP and synchronize the clock with an atomic time source. If you are familiar with how these generic quartz clock movements work, you can probably guess the first step is to gut the movement, leaving only the drive motor.
The motor is somewhat like a stepper motor. The ESP8266 processor can easily control the clock hands by sending pulses to the motor. The rest is simple network access and control. If the network time is ahead, the CPU gooses the clock a little. If it is behind, the CPU stalls the clock until it catches up.
If you’ve ever done a project like this, you know there is one major problem. At some point, the processor needs to know where the hands are now. On initial setup, you can force the issue. However, if the power goes out, it won’t work well. If the power goes out at, say, 8 AM and turns back on at 9 AM, the CPU will be happy to correct the time to agree with the NTP time. The problem is that the processor has no idea that the hands started at 8 AM, so the time will be off.
To combat this problem, the design uses an EERAM chip to store the current time. In the event of a power failure, the CPU knows where its hands are and can adjust accordingly.
While you usually use these movements to keep time, once you can control them, you can do any crazy thing you like. Or, even anything as artistic as you can dream up.
Real-Time 3D Room Mapping with ESP32, VL53L5CX Sensor and IMU
ST’s VL53L5CX is a very small 8×8 grid ranging sensor that can perform distance measurements at a distance of up to 4 meters. In a recent video,[Henrique Ferrolho] demonstrated that this little sensor can also be used to perform a 3D scan of a room. The sensor data can be combined with an IMU to add orientation information to the scan data. These data streams are then combined by an ESP32 MCU that streams the data as JSON to a connected computer.
Of course, that’s just the heavily abbreviated version, with the video covering the many implementation details that crop up when implementing the system, including noise filtering, orientation tracking using the IMU and a variety of plane fitting algorithms to consider.
Note that ST produces a range of these Time-of-Flight sensors that are more basic, such as the VL53VL0X, which is a simple distance meter limited to 2 meters. The VL53L5CX features the multizone array, 4-meter distance range, and 60 Hz sampling speed features that make it significantly more useful for this 3D scanning purpose.
The Python-based viewer that runs on the PC can be found on GitHub, along with the ESP32 firmware.
youtube.com/embed/s32OUzhjf4U?…
Quando la Russia scoprì i virus informatici: il memo segreto del 1989 che anticipò il cyber-caos
📌 Link all'articolo : redhotcyber.com/post/quando-la…
#redhotcyber #news #storiainformatica #kgb #virusinformatici #sicurezzainformatica #intelligencesovietica
Quando la Russia scoprì i virus informatici: il memo segreto del 1989 che anticipò il cyber-caos
Un memo interno del KGB del 1989 rivela come l'intelligence sovietica vide per la prima volta i virus informatici come problema reale.Redazione RHC (Red Hot Cyber)
reshared this
Video fake di Francesca Albanese: i governi indaghino su come si è verificata questa disinformazione, per prevenire future manipolazioni. La dichiarazione di Amnesty International
La risposta della Commissione UE agli attacchi dei ministri UE sulla Albanese è stata vergognosa. I ministri che hanno disinformato non devono solo cancellare i commenti sui social, ma devono scusarsi pubblicamente e ritrattare qualsiasi richiesta di dimissioni del funzionario ONU
amnesty.org/en/latest/news/202…
Global: European states must retract outrageous attacks on UN Special Rapporteur Francesca Albanese - Amnesty International
Ministers in Austria, Czechia, France, Germany and Italy have attacked UN Special Rapporteur Francesca Albanese based on a deliberately truncated video to misrepresent and gravely misconstrue her messages.Amnesty International
reshared this
Transparent Tribe: nuova ondata di attacchi di cyberspionaggio in India
📌 Link all'articolo : redhotcyber.com/post/transpare…
#redhotcyber #news #cybersecurity #hacking #malware #ransomware #phishing #trojan #cyberspionaggio
Transparent Tribe: nuova ondata di attacchi di cyberspionaggio in India
Il gruppo di hacker Transparent Tribe lancia una nuova ondata di attacchi di cyberspionaggio contro enti governativi e istituti scientifici in India.Redazione RHC (Red Hot Cyber)
reshared this
La vita dopo la morte è Social! L’AI che commenta, risponde e ti imita… da morto
📌 Link all'articolo : redhotcyber.com/post/la-vita-d…
#redhotcyber #news #meta #intelligenzaartificiale #socialmedia #brevetto #tecnologiaai #modellolinguistico
La vita dopo la morte è Social! L’AI che commenta, risponde e ti imita… da morto
Meta ottiene un brevetto per una tecnologia AI che simula l'attività di utenti defunti sui social media, suscitando questioni etiche e legali.Redazione RHC (Red Hot Cyber)
Ricardo Antonio Piana likes this.
reshared this
Reverse Engineering a Dash Robot with Ghidra
One of the joys of browsing secondhand shops is the possibility of finding old, perhaps restorable or hackable, electronics at low prices. Admittedly, they usually seem to be old flat-screen TVs, cheap speakers, and Blu-ray players, but sometimes you find something like the Dash, an educational toy robot. When [Jonathan] came across one of these, he decided to use it as a turtle robot. However, he found the available Python libraries insufficient, and improving on them required some reverse-engineering.
While [Jonathan] was rather impressed with the robot as it was – it had a good set of features, and thought had clearly been put into the design – he wanted a more open way to control it. There was already a quite useful, official Python program to control the robot over a BLE connection, but it only worked with Python 2 on OS X ([Jonathan] theorizes that it might have been written as a development tool, open-sourced, and not diligently supported afterwards). There were also a few third-party libraries ported to Python 3, but they all seemed to be missing some important features.
All the newer libraries were limited because the official library passed commands to an OS X binary, which handled the actual communication, so anyone wanting to do everything in Python would have to reverse-engineer the communications protocol. [Jonathan] therefore used Ghidra to decompile the binary. He first found the JSON structure used for message data, followed by a function that reads command information and sets up packets, and a mapping between Python command names and command IDs. Once he found the section that creates packets from data, he was able to port the program to Python 3. Interestingly, examining the binary revealed some previously unknown commands that appear to be capable of defining autonomous behavior.
We’ve previously seen Ghidra used on devices ranging from a camera to a router; if you’d like to learn more, there’s a HackadayU course on it.
Exploitation of a recent RCE in BeyondTrust remote access products, tracked as CVE-2026-1731, reportedly started less than 24h after a PoC was published
greynoise.io/blog/reconnaissan…
x.com/ethicalhack3r/status/202…
x.com/DefusedCyber/status/2022…
Reconnaissance Has Begun for the New BeyondTrust RCE (CVE-2026-1731): Here's What We See So Far
A PoC for CVE-2026-1731 hit GitHub on Feb 10. Within 24 hours, GreyNoise observed reconnaissance probing for vulnerable BeyondTrust instances.www.greynoise.io
reshared this
Russian TV isn't the most accurate media, but it passed a milestone last week when it aired a fake news headline from Russia's own info-ops group Matryoshka, passing a made-up headline on a fake Le Parisien site as a real event
Don't get high on your own supply, Russia
Russia’s Channel One airs fake front pages spread by Matryoshka bot network for the first time
On Jan. 29, the “Vremya Pokazhet” talk show on Russia’s Kremlin-controlled Channel One (Perviy Kanal) presented “proof” of what the program’s host said was criticism directed against Ukrainian President Volodymyr Zelensky by the French press.The Insider
reshared this
Yevgeny Prigozhin's influence operations have now been taken over by Russia's foreign intelligence service, the SVR, under a new company called StratConsult
alleyesonwagner.org/2026/02/14…
forbiddenstories.org/propagand…
istories.media/stories/2026/02…
dossier.center/africa-politolo…
Propaganda Machine: Secret documents reveal Russia’s foreign influence strategy across three continents - Forbidden Stories
Propaganda Machine Reading time: 12 min. Propaganda Machine: Secret documents reveal Russia’s foreign influence strategy across three continents The Company is a network of experts tasked with orchestrating disinformation campaigns around the world o…Louise Berkane (Forbidden Stories)
reshared this
Vintage Canadian Video Hardware Becomes Homebrew Computer
Are you in the mood for a retrocomputing deep dive into the Scriptovision Super Micro Script? It was a Canadian-made vintage video titler from the 80s, and [Cameron Kaiser] has written up a journey of repair and reverse-engineering for it. But his work is far more than just a refurbish job; [Cameron] transforms the device into something not unlike 8-bit homebrew computers of the era, able to upload and run custom programs with a limited blister keypad for input, and displaying output on a composite video monitor.
Hardware-wise, the Super Micro Script is almost a home computer, so [Cameron] got it accepting and running custom code.A video titler like the Super Micro Script gave people the ability to display bitmapped images (like text or simple graphics) onto a video stream electronically. A standalone device, under the hood, it uses a 6502 as CPU and a Motorola 6847 VDG video chip. [Cameron] observes that architecture-wise, it actually had a lot in common with early 8-bit home computers. Sure, it performed only one “job” but that really had more to do with its restrictive firmware than anything else.
[Cameron] obtained a used unit and repaired it, reverse-engineered the scrambled address and data lines (an anti-cloning and anti-tampering measure), and converted it into something for which he could write his own software and run his own programs. As for uploading those programs? A bit-banged serial port on I/O borrowed from the blister keypad, running at a frankly quite respectable 19.2 kbps.
We hope you’re intrigued, because [Cameron] has one more surprise: he created a MAME emulator for the Super Micro Script called SMSBUG. Originally created to make software development easier, its existence also means anyone can join in on the vintage computing fun. The emulator, along with other handy utilities and info, is available on GitHub.
Windows 12: cosa sappiamo sulle prossime mosse di Microsoft sul mercato AI
📌 Link all'articolo : redhotcyber.com/post/windows-1…
#redhotcyber #news #windows12 #intelligenzaartificiale #microsoft #sicurezzainformatica #innovazione #hardware
Windows 12: cosa sappiamo sulle prossime mosse di Microsoft sul mercato AI
Windows 12, PC con AI e nuove strategie Microsoft: ultime indiscrezioni e conferme sul futuro del sistema operativo.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Windows 98 on a 2020 ThinkPad P14s Gen 1 Laptop
The lovely thing about the x86 architecture is its decades of backwards compatibility, which makes it possible to run 1990s operating systems on modern-day hardware, with relatively few obstacles in the way. Recently [Yeo Kheng Meng] did just that with Windows 98 SE on a 2020 ThinkPad P12s Gen 1, booting it alongside Windows 11 and Linux from the same NVMe drive.
Naturally, after previously getting MS-DOS 6.22 from 1994 running on a 2020 ThinkPad X13, the step to doing the same with Windows 98 SE wasn’t that large. The main obstacles that you face come in the form of UEFI and hardware driver support.
Both ThinkPad laptops have in common that they support UEFI-CSM mode, also known as ‘classical BIOS’, as UEFI boot wasn’t even a glimmer yet in some drunk engineer’s eye when Win98 was released. After this everything is about getting as many hardware drivers scrounged together as possible.
[Yeo] ended up having to bodge on a USB 2.0 expansion card via a Thunderbolt dock as Win98 doesn’t have xHCI (USB 3.0) support. With that issue successfully bodged around using a veritable tower of adapters, installing Windows 98 was as easy as nuking Secure Boot in the BIOS, enabling UEFI-CSM along with Thunderbolt BIOS assist mode and disable Kernel DMA protection.
Because UEFI-CSM implementations tend to be buggy, the CREGFIX DOS driver was used to smooth things over. Another issue is the same that we chuckled about back in the day, as Windows 98 cannot address more than 512 MB of RAM by default. Fortunately patches by [Rudolph Loew] helped to fix this and some other smaller issues.
Unfortunately neither Intel nor NVIDIA have released Win98 drivers for quite some time, so there’s no graphics acceleration beyond basic VESA support and the SoftGPU driver. Disk access goes via the BIOS too rather than using an NVMe driver, so it’s not as zippy as it could be, but for Win9x it’s quite usable.
Finally ACPI wasn’t recognized by Win98, but it’s only fair to blame that on the complete flaming train wreck that is ACPI rather than anything to do with Windows. This particular issue was worked around by configuring the BIOS to support S3 power state and with that making Win98 happy again.
It’s honestly quite a shame that UEFI-CSM is largely ignored by new systems, as it makes installing even Windows 7 basically impossible, and thus creating probably the largest split within the x86 ecosystem since the arrival of AMD64/x86_64.
Thad Odido (Dutch ISP) hack seems to be a ScatteredLapsusHunters incident.
Hackers entered via phishing customer service, then scraped the ISP's Salesforce account
nos.nl/artikel/2602283-odido-h…
Odido-hackers kwamen binnen via phishing, deden zich voor als ICT-afdeling
Internetcriminelen ontfutselden de inloggegevens van klantenservicemedewerkers van Odido. Vervolgens wisten ze de gegevens van klanten geautomatiseerd uit het systeem te halen, melden bronnen aan de NOS.Joost Schellevis (NOS Nieuws)
reshared this
Because of the tactics used, or do you have anything else that you can attribute the attack on?
Wild if it was an attack from Advanced Persistent Teenagers, but haven't seen the attribution done to the group.
Profili Junior Invisibili: il lavoro Tech nel 2026 è solo per i più esperti
📌 Link all'articolo : redhotcyber.com/post/profili-j…
#redhotcyber #news #mercatotech #tech2026 #esperienzalavoro #profiliSenior #lavorojunior #intelligenzaartificiale #aifutura
Profili Junior Invisibili: il lavoro Tech nel 2026 è solo per i più esperti
Scopri i trend e le opportunità nel mercato del lavoro 2025: lavoro remoto, professioni tech, AI e molto altro. Leggi l'analisi del report Toptal Q4.Marcello Filacchioni (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187988/cyb…
#securityaffairs #hacking
Fintech firm Figure disclosed data breach after employee phishing attack
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an employee and steal a limited number of files.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
La Francia lancia un’arma contro la disinformazione online: “ai Troll risponderemo con il Troll”
📌 Link all'articolo : redhotcyber.com/post/la-franci…
#redhotcyber #news #disinformazione #trolling #umorismo #ironia #strategiadicomunicazione
La Francia lancia un'arma contro la disinformazione online: "ai Troll risponderemo con il Troll"
La Francia crea un account per contrastare la disinformazione online con umorismo e ironia.Redazione RHC (Red Hot Cyber)
reshared this
Honor Thy Error
Musician Brian Eno’s Oblique Strategies are like a Tarot card deck full of whimsical ideas meant to break up a creative-block situation, particularly in the recording studio. They’re loads of fun to pick one at random and actually try to follow the advice, as intended, but some of them are just plain good advice for creatives.
One that keeps haunting me is “Honor thy error as a hidden intention”, which basically boils down to taking a “mistake” and seeing where it leads you if you had meant to do it. I was just now putting the finishing touches on this week’s Hackaday Podcast, and noticed that we have been honoring a mistake for the past 350-something shows. Here’s how it happened.
When Mike and I recorded the first-ever podcast, I had no idea how to go about doing it. But I grew up in Nashville, and know my way around the inside of a music studio, and I’ve also got more 1990s-era music equipment than I probably need. So rather than do the reasonable thing, like edit the recording on the computer, we recorded to an archaic Roland VS-880 “Digital Studio” which is basically the glorified descendant of those old four-track cassette Portastudios.
If you edit audio in hardware, you can’t really see what you’re doing – you have to listen to it. And so, when I failed to notice that Mike and I were saying “OK, are you ready?” and “Sure, let’s go!”, it got mixed in with the lead-in music before we started the show off for real. But somehow, we said it exactly in time with the music, and it actually sounded good. So we had a short laugh about it and kept it.
And that’s why, eight years later, we toss random snippets of conversations into the intro music to spice it up. It was a mistake that worked. Had we been editing on the computer, we would have noticed the extra audio and erased it with a swift click of the mouse, but because we had to go back and listen to it, we invented a new tradition. Honor thy error indeed.
This article is part of the Hackaday.com newsletter, delivered every seven days for each of the last 200+ weeks. It also includes our favorite articles from the last seven days that you can see on the web version of the newsletter. Want this type of article to hit your inbox every Friday morning? You should sign up!
There’s Always Room for 3D Printed Batteries
There are many applications where you have limits on how much you can cram into a particular space. There are also many applications where you need as much battery as you can get. At the intersection of those applications, you may soon be able to 3D print custom batteries to fit into oddly shaped spaces that might otherwise go to waste.
Commercial batteries are typically cylindrical or rectangular. In theory, you could build tooling to make batteries of any size or shape you want, but it’s an expensive process in small quantities. [Lawrence Ulrich] on Spectrum talks about a new process, developed by [Gabe Elias], that can print anodes, cathodes, separators, and casings for custom battery shapes with no costly tooling.
As an example, consider an unmanned aerial vehicle crammed with avionics. You could put off-the-shelf batteries in the wings, but you’ll end up wasting a lot of space. A custom battery could fill the wing’s interior completely. The post also mentions batteries shaped like the earpieces of a pair of smart glasses.
A prototype showed that in the space of 48 cylindrical cells, the new process could deliver a printed battery that uses 35% more of the available volume and a 50% boost in energy density.
Could you do this yourself? Maybe, but it won’t be trivial. The current process requires a liquid electrolyte and the ability to produce thin layers of exotic materials. What oddly-shaped battery would you like to see? Us? We’d like to have a battery for a laptop that was spread uniformly so there wasn’t a heavy side that has the battery.
I’m Kholoud from Ga🥺za. My 90-year-old mother is blind, immobile, and recently had a stroke. She cries from painful sores because we ran out of diapers. Pleease heeelp us with the cost of diapers and one package of her stroke medication (Eliquis) only 🙏💔
securityaffairs.com/187982/unc…
#securityaffairs #hacking
U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog
The U.S. CISA adds a vulnerability in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
QR Code Innocui? Assolutamente No! Ecco Perché Sono un Vettore di Attacco Significativo
📌 Link all'articolo : redhotcyber.com/post/qr-code-i…
#redhotcyber #news #cybersecurity #hacking #malware #phishing #qrcode #sicurezzainformatica
QR Code Innocui? Assolutamente No! Ecco Perché Sono un Vettore di Attacco Significativo
I QR Code non sono solo comodi, ma anche un vettore di minaccia concreto per gli attacchi di phishing. Scopri come gli attaccanti li stanno usando.Silvia Felici (Red Hot Cyber)
reshared this
Building the Most Simple Motor in Mostly LEGO
Although [Jamie’s Brick Jams] has made many far more complicated motor design in the past, it’s nice to go back to the basics and make a motor that uses as few parts as possible. This particular design starts off with a driver coil and a magnetic rotor that uses two neodymium magnets. By balancing these magnets on both sides of an axis just right it should spin smoothly.The circuit for the simple motor. (Credit: Jamie’s Brick Jams, YouTube)
First this driver coil is energized with a 9 V battery to confirm that it does in fact spin when briefly applying power, though this means that you need to constantly apply pulses of power to make it keep spinning. To this end a second coil is added, which senses when a magnet passes by.
This sense coil is connected to a small circuit containing a TIP31C NPN power transistor and a LED. While the transistor is probably overkill here, it’ll definitely work. The circuit is shown in the image, with the transistor pins from left to right being Base-Collector-Emitter. This means that the sensor coil being triggered by a passing magnet turns the transistor on for a brief moment, which sends a surge of power through the driver coil, thus pushing the rotor in a typical kicker configuration.
Obviously, the polarity matters here, so switching the leads of one of the coils may be needed if it doesn’t want to spin. The LED is technically optional as well, but it provides an indicator of activity. From this basic design a larger LEGO motor is also built that contains many more magnets in a disc along with two circular coils, but even the first version turns out to be more than powerful enough to drive a little car around.
youtube.com/embed/sX7x0XwtlKQ?…
securityaffairs.com/187976/hac…
#securityaffairs #hacking #malware #Russia
Suspected Russian hackers deploy CANFAIL malware against Ukraine
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL malware.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187976/hac…
#securityaffairs #hacking #malware #Russia
Suspected Russian hackers deploy CANFAIL malware against Ukraine
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL malware.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Dimentica i fiori, quest'anno puntiamo alla privilege escalation! 🔐
C'è chi regala cioccolatini e chi, invece, ti consegna le chiavi del kernel.
In un'esistenza piena di glitch, l'amore è l'unica patch zero-day che risolve ogni falla!
Cerca qualcuno che non tema i tuoi crash di sistema, ma che sia pronto a fare il reboot insieme a te.❤️💻
#CyberMeme #CodingLove #HackerAmore #Root #SanValentino #redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy
Ricardo Antonio Piana likes this.
Cybersecurity & cyberwarfare reshared this.
Gemini sfruttato dagli hacker di Stato: la minaccia cresce, Google interviene
📌 Link all'articolo : redhotcyber.com/post/gemini-sf…
#redhotcyber #news #intelligenzaartificiale #gemini #google #cybersecurity #hacking #malware #ai
Gemini sfruttato dagli hacker di Stato: la minaccia cresce, Google interviene
Gli hacker utilizzano l'intelligenza artificiale di Google per clonare modelli e lanciare attacchi informatici. Scopri come stanno sfruttando la tecnologia.Carolina Vivianti (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
📣 ISCRIVITI AL WEBINAR GRATUITO DI PRESENTAZIONE DEL CORSO "CYBER OFFENSIVE FUNDAMENTALS" – LIVELLO BASE 🚀
📅 Martedì 17 Febbraio Orario: 18:00
Per ricevere il link: 📞 379 163 8765 ✉️ formazione@redhotcyber.com
#redhotcyber #formazione #pentesting #pentest #formazioneonline #ethicalhacking #cybersecurity
Cybersecurity & cyberwarfare reshared this.
La corsa cinese ai robot AI accelera: Xiaomi lancia la sua mossa chiave
📌 Link all'articolo : redhotcyber.com/post/la-corsa-…
All’inizio sembra quasi una notizia come tante, una di quelle che scorrono veloci. Poi però ti fermi, rileggi, e capisci che qualcosa si sta muovendo sul serio.
Nel mondo della #robotica e dell’intelligenza artificiale, soprattutto in #Cina, il ritmo è diventato incalzante, quasi febbrile. Il 12 febbraio #Xiaomi ha deciso di fare il suo ingresso ufficiale in questa partita affollata, scegliendo una strada che ormai è tutto tranne che neutrale: l’open source.
A cura di Carolina Vivianti
#redhotcyber #news #robotica #intelligenzaartificiale #opensource #robotics0 #alibabacloud #qwen3vl4binstruct #collaborazione #sviluppo #velocita #influenza #ecosistema #xiaomi
La corsa cinese ai robot AI accelera: Xiaomi lancia la sua mossa chiave
Xiaomi lancia modello open source per robotica avanzata con 4,7 mld parametriCarolina Vivianti (Red Hot Cyber)
Ricardo Antonio Piana likes this.
Cybersecurity & cyberwarfare reshared this.
Rock Sphere Machine Produces Off the Charts Satisfaction
[Michigan Rocks] says he avoided making rock spheres for a long time on account of the time and cost he imagined was involved. Well, all that is in the past in light of the fabulous results from his self-built Rock Sphere Machine! Turns out that it’s neither costly to make such a machine, nor particularly time-consuming to create the spheres once things are dialed in. The video is a journey of the very first run of the machine, and it’s a great tour.The resulting sphere? Super satisfying to hold and handle. The surface is beyond smooth, with an oil-like glossy shine that is utterly dry to the touch.
The basic concept — that of three cordless drills in tension — is adapted from existing designs, but the implementation is all his own. First a rough-cut rock is held between three diamond bits. The drills turn at 100 RPM while a simple water reservoir drips from above. After two hours, there’s a fair bit of slurry and the rock has definitely changed.
[Michigan Rocks] moves on to polishing, which uses the same setup but with progressively-finer grinding pads in place of the cutting bits. This part is also really clever, because the DIY polishing pads are great hacks in and of themselves. They’re made from little more than PVC pipe end caps with hex bolts as shafts. The end caps are filled with epoxy and topped with a slightly concave surface of hook-and-loop fastener. By doing this, he can cut up larger fuzzy-backed polishing pads and stick the pieces to his drill-mounted holders as needed, all the way down to 6000 grit. He shows everything about the pads at the 11:55 mark, and it’s an approach worth keeping in mind.
What is the end result like? See for yourself, but we think [Michigan Rocks] sums it up when he says “I wish you could feel this thing, it feels so smooth. It’s so satisfying to roll around in your hands. I’m so happy I made this machine. This is awesome.”
We’ve seen machines for making wooden spheres but this one makes fantastic use of repurposed stuff like inexpensive cordless drills, and the sort of wood structures anyone with access to hand tools can make.
youtube.com/embed/FSE1GE1mz2k?…
Thanks to [AloofPenny] for the tip.
Un milione di dati di italiani in vendita: il business nel Dark Web colpisce ancora!
📌 Link all'articolo : redhotcyber.com/post/un-milion…
Nel sottobosco digitale – tra canali chiusi, nickname effimeri e messaggi che durano pochi minuti – è comparso un annuncio che fa tremare i polsi: 1,1 milioni di “leads” #italiani messi in vendita come merce qualsiasi. Numeri di telefono con prefisso +39, email personali, nominativi, indicazioni di interesse.
Tutto impacchettato e prezzato. Tutto, soprattutto, italiano.
A cura di Bajram Zeqiri di Paragon
#redhotcyber #news #cybersecurity #hacking #darkweb #furtoDati #leads #datiPersonali #sicurezzaInformatica #frode #criminalitaInformatica #protezioneDati #vulnerabilita #privacy
Un milione di dati di italiani in vendita: il business nel Dark Web colpisce ancora!
Un milione di italiani in vendita: il business sommerso dei 'leads' colpisce ancora. Dati personali in vendita nel mercato nero.Bajram Zeqiri (Red Hot Cyber)
Ricardo Antonio Piana likes this.
reshared this
Buon Compleanno, Spacewar! L'alba dell'Hacking e del Gaming Moderno.
#Spacewar #SteveRussell #Hacking #Innovation #Retrogaming #MIT #DigitalHistory #InsertCoin #Bologna
Ricardo Antonio Piana likes this.
Cybersecurity & cyberwarfare reshared this.
Riassunto della settimana (Episodi 223-227) - Marco Camisani Calzolari
#DecisioniArtificiali | Il riassunto della settimana: 223 - Spesso usano “AI Open Source” per ingannarci 224 - La pubblicità è impazzita: stessa audience online vale poco, in TV vale oro 225 - AI creativa: il controllo vale più della potenza 226 - In…Web Staff MCC (Marco Camisani Calzolari)
Cybersecurity & cyberwarfare reshared this.
Why Diamond Transistors Are So Hard To Make
Many things about diamonds seem eternal, including the many engineering problems related to making them work as a silicon replacement in semiconductor technology. Yet much like a diamond exposed to a stream of oxygen-rich air and a roughly 750°C heat source, time will eventually erase all of them. As detailed in a recent [Asianometry] video, over the decades the challenges with creating diamond wafers and finding the right way to dope pure diamond have been slowly solved, even if some challenges still remain today.
Diamond is basically the exact opposite as silicon when it comes to suitability as a semiconductor material, with a large bandgap (5.5 eV vs the 1.2 of silicon), and excellent thermal conductivity characteristics. This means that diamond transistors are very reliable, albeit harder to switch, and heat produced during switching is rapidly carried away instead of risking a meltdown as with silicon semiconductors.
Unlike silicon, however, diamond is much harder to turn into wafers as you cannot simply melt graphite and draw perfectly crystallized diamond out of said molten puddle. The journey of getting to the state-of-the art soon-to-be-4″ wafers grown on iridium alongside the current mosaic method is a good indication of the complete pain in the neck that just this challenge already is.
Mosaic method of growing a diamond wafer, as filmed by Asianometry.
Doping with silicon semiconductors is done using ion implantation, but diamond has to be special and cannot just have phosphorus and boron implanted like its sibling. The main challenge here is that of availability of charge carriers from this doping, with diamond greedily hanging on to these charge carriers unless you run the transistor at very high temperatures.
Since you can only add so much dopant to a material before it stops being that material, a more subtle solution was sought. At this point we know that ion implantation causes damage to the diamond lattice, so delta-doping – which sandwiches heavily doped diamond between non-doped diamond – was developed instead. This got P-type transistors using boron, but only after we pacified dangling carbon electron bonds with hydrogen atoms and later more stable oxygen.
State-of-the art switching with diamond transistors is currently done with MESFETs, which are metal-semiconductor field-effect transistors, and research is ongoing to improve the design. Much like with silicon carbide it can take a while before all the engineering and production scaling issues have been worked out. It’s quite possible that we’ll see diamond integrated into silicon semiconductors as heatsinks long before that.
Assuming we can make diamond work for semiconductor transistors, it should allow us to pack more and smaller transistors together than even before, opening up many options that are not possible with silicon, especially in more hostile environments like space.
youtube.com/embed/NLmd5vL0zmk?…
R2D2 Gets New Brains
While it is fun to get toys that look like your favorite science fiction props, it is less fun when the electronics in them don’t measure up to the physical design. [Steve Gibbs] took a Hasbro R2D2 toy robot and decided to give it a brain upgrade along with enhanced sensors. You can see a video of the robot doing its thing and some build details below.
In this case, the toy from Hasbro was not working at all, so [Steve] saved it from the dumpster. Instead of a repair, he decided to just gut it and rebuild it with modern electronics. The ultrasonic sensor on the forward toe is a dead giveaway.
The robot responds to voice commands better than the original and can play sound effects and clips from Star Wars. You can also control the robot with a phone app. The new or upgraded sensors include microphones, a PIR sensor, a photoresistor to sense light, a smoke and CO2 sensor, a computer vision camera, and, of course, the ultrasonic range finder.
Some motors and the original speaker are in use, but R2 now sports additional LEDs and servos. All the extras required some surgery on the plastic body. Instead of regular batteries, the ‘bot now uses a LiPo battery, so the old battery compartment was cut out to make more room.
Even if you aren’t a die-hard Star Wars fan, this is a fantastic project, and May the 4th is right around the corner. These toys aren’t cheap, but if you can score one with bad electronics, you might be able to find something cheap or — like Steve — even free.
These toys are popular hacking targets. Now [Steve] needs a pit droid.
youtube.com/embed/9G0J15jvJCM?…
Questo account è gestito da @informapirata ⁂ e propone e ricondivide articoli di cybersecurity e cyberwarfare, in italiano e in inglese
I post possono essere di diversi tipi:
1) post pubblicati manualmente
2) post pubblicati da feed di alcune testate selezionate
3) ricondivisioni manuali di altri account
4) ricondivisioni automatiche di altri account gestiti da esperti di cybersecurity
NB: purtroppo i post pubblicati da feed di alcune testate includono i cosiddetti "redazionali"; i redazionali sono di fatto delle pubblicità che gli inserzionisti pubblicano per elogiare i propri servizi: di solito li eliminiamo manualmente, ma a volte può capitare che non ce ne accorgiamo (e no: non siamo sempre on line!) e quindi possono rimanere on line alcuni giorni. Fermo restando che le testate che ricondividiamo sono gratuite e che i redazionali sono uno dei metodi più etici per sostenersi economicamente, deve essere chiaro che questo account non riceve alcun contributo da queste pubblicazioni.
like this
reshared this
Jonathan Yu
in reply to Filippo Valsorda • • •