Salta al contenuto principale

Cybersecurity & cyberwarfare ha ricondiviso questo.


Problemi con il Desktop remoto dopo il Patch Tuesday. Microsoft corre ai ripari

📌 Link all'articolo : redhotcyber.com/post/problemi-…

#redhotcyber #news #microsoft #windows #desktopremoto #aggiornamentodisicurezza #problematicritico

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Codice Generato dall’AI: Quando la Sicurezza Diventa una grande illusione

📌 Link all'articolo : redhotcyber.com/post/codice-ge…

#redhotcyber #news #sicurezzainformatica #intelligenzaartificiale #sviluppoapplicazioni #testdisicurezza


in reply to informapirata ⁂

questo è il risultato quando oltre a spacciarla la droga se la consumano pure….”siempre hay que separar las drogas!”
in reply to Fabio Tavano

@grabbi_it "ah, la vanità! Il mio peccato preferito..." diceva un luciferino Al Pacino.

Il fatto è che certa gente dovrebbe evitare di esporsi e imparare a volare a bassissima quota, anzi dovrebbe proprio prendere il brevetto di volo stealth.

Scommetto che se Bornigia si fosse fatto i cazzi suoi, nessuno sarebbe andato a scassargli i cabbasisi



Chi di ICE ferisce…


@Informatica (Italy e non Italy 😁)
I tragici eventi che stanno avvenendo negli USA per mano degli agenti della Immigration and Custom Enforcement (ICE) hanno stimolato azioni di contro-offensiva che sfruttano la Rete per proteggere i cittadini e denunciare quanto sta accadendo sulle strade americane.
Source

L'articolo zerozone.it/politica-societa/c…


Cybersecurity & cyberwarfare ha ricondiviso questo.


Occorre rimuovere Grok e X dagli app store: la richiesta di 28 organizzazioni

📌 Link all'articolo : redhotcyber.com/post/occorre-r…

#redhotcyber #news #dirittidigitali #sicurezzainternet #rimuozziaapp #protezioneonline #pedopornografia


Cybersecurity & cyberwarfare ha ricondiviso questo.


Net-NTLMv1, Mandiant pubblica le tabelle che mostrano quanto sia ancora vulnerabile

📌 Link all'articolo : redhotcyber.com/post/net-ntlmv…

#redhotcyber #news #cybersecurity #hacking #netntlmv1 #sicurezzainformatica #mandiant #tabellerainbow




Cybersecurity & cyberwarfare ha ricondiviso questo.


La tua busta paga è a zero! Complimenti, qualcuno ha risposto male al telefono

📌 Link all'articolo : redhotcyber.com/post/la-tua-bu…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #ingegneriasociale #phishing #vishing


Cybersecurity & cyberwarfare ha ricondiviso questo.


201 – L’intelligenza Artificiale che sposta i voti, in silenzio… camisanicalzolari.it/201-linte…

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Questo è un post di test cui puoi rispondere liberamente

Il post è stato indirizzato al gruppo @test che è l'account di una categoria del forum Citiverse.

La puoi trovare a questo link:

citiverse.it/category/5/test

@Test

reshared this

Unknown parent

mastodon - Collegamento all'originale
informapirata ⁂
@sherpa grazie! Ne terrò conto 😅
@test


The Cutest Weather Forecast on E-Ink and ESP32


A photo of the cats and the generated image

There’s a famous book that starts: “It is a truth universally acknowledged that a man in possession of a good e-ink display, must be in want of a weather station.” — or something like that, anyway. We’re not English majors. We are, however, major fans of this feline-based e-ink weather display by [Jesse Ward-Bond]. It’s got everything: e-ink, cats, and AI.
The generated image needs a little massaging to look nice on the Spectra6 e-ink display.
AI? Well, it might seem a bit gratuitous for a simple weather display, but [Jesse] wanted something a little more personalized and dynamic than just icons. With that in the design brief, he turned to Google’s Nano Banana API, feeding it the forecast and a description of his cats to automatically generate a cute scene to match the day’s weather.

That turned out to not be enough variety for the old monkey brain, so the superiority of silicon — specifically Gemini–was called upon to write unique daily prompts for Nano Banana using a random style from a list presumably generated by TinyLlama running on a C64. Okay, no, [Jesse] wrote the prompt for Gemini himself. It can’t be LLM’s all the way down, after all. Gemini is also picking the foreground, background, and activity the cats will be doing for maximum neophilia.

Aside from the parts that are obviously on Google servers, this is all integrated in [Jesse]’s Home Assistant server. That server stores the generated image until the ESP32 fetches it. He’s using a reTerminal board from SeedStudio that includes an ESP32-S3 and a Spectrum6 coloor e-ink display. That display leaves something to be desired in coloration, so on top of dithering the image to match the palette of the display, he’s also got a bit of color-correction in place to make it really pop.

If you’re interested in replicating this feline forecast, [Jesse] has shared the code on GitHub, but it comes with a warning: cuteness isn’t free. That is to say, the tokens for the API calls to generate these images aren’t free; [Jesse] estimates that when the sign-up bonus is used up, it should cost about fourteen cents a pop at current rates. Worth it? That’s a personal choice. Some might prefer saving their pennies and checking the forecast on something more physical, while others might prefer the retro touch only a CRT can provide.


hackaday.com/2026/01/17/the-cu…



The Journey of Finding the Right Press Brake


Press brakes are invaluable tools when working with sheet metal, but along with their almost infinite versatility comes a dizzying number of press brake types. After starting with an old-school, purely mechanical press brake, [Wes] of Watch Wes Work fame had been thinking of upgrading said press brake to a hydraulic configuration, but soured on this after facing all the disadvantages of the chosen approach. Thus, one does what any rational person does and purchases a used and very much untested 45-ton computer-controlled hydraulic press brake.

The video first explores the pros and cons of the various types of press brakes, with the issue of providing a balanced force across the entirety of the press brake’s dies being the largest problem. Although various mechanical and hydraulic solutions were attempted over the decades, a computer-controlled press brake like this Gasparini PBS 045 that [Wes] got is probably one of the more effective solutions, even if it provides the headache of more electrical and electronic things that can go wrong. The above screenshot of its basic workings should make that quite obvious, along with [Wes]’s detailed explanation.

As it turned out, this about 25-year-old Italian press brake wasn’t in such a terrible nick, but needed some badly needed TLC and obligatory breaker testing to bring it back to life. While it doesn’t like you not centering the part, this can be worked around by specifying that the part is actually larger than it is. Although [Wes] got it working well enough to do some work with it, it still has some gremlins left in it that will hopefully be hunted down over the coming time and video(s).

youtube.com/embed/X4z7UmUZyig?…


hackaday.com/2026/01/17/the-jo…


Cybersecurity & cyberwarfare ha ricondiviso questo.


«Ho deciso di fare un passo indietro» - Il comunicato di Guido Scorza sulle dimissioni irrevocabili dal #GarantePrivacy

«Credo si tratti di una decisione giusta e necessaria nell’interesse dell’istituzione anche se, permettetemi di pensarlo, non posso che ritenerla ingiusta nella sostanza e nelle modalità che mi hanno portato ad assumerla.»

guidoscorza.it/cosedaexgarante…

@privacypride


Cybersecurity & cyberwarfare ha ricondiviso questo.


🌑Garante Privacy: Dimissioni di Guido Scorza componente del Collegio🌑

Guido Scorza, componente del Collegio del Garante per la protezione dei dati personali, ha rassegnato in data odierna le proprie dimissioni dall’incarico

garanteprivacy.it/home/docweb/…

@privacypride

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


HaveIBeenFlocked.com ha pubblicato informazioni rilasciate dai dipartimenti di polizia che, utilizzando Flock, hanno involontariamente divulgato i dettagli di milioni di obiettivi di sorveglianza

Obiettivi di sorveglianza e indagini a rischio per un errore della polizia.
Flock ha risposto a questa rivelazione minacciando un sito che le aveva divulgate e limitando le informazioni che il pubblico può ottenere tramite richieste di accesso ai documenti pubblici.

404media.co/police-unmask-mill…

@pirati


Police Unmask Millions of Surveillance Targets Because of Flock Redaction Error


A handful of police departments that use Flock have unwittingly leaked details of millions of surveillance targets and a large number of active police investigations around the country because they have failed to redact license plates information in public records releases. Flock responded to this revelation by threatening a site that exposed it and by limiting the information the public can get via public records requests.

Completely unredacted Flock audit logs have been released to the public by numerous police departments and in some cases include details on millions Flock license plate searches made by thousands of police departments from around the country. The data has been turned into a searchable tool on a website called HaveIBeenFlocked.com, which says it has data on more than 2.3 million license plates and tens of millions of Flock searches.

The situation highlights one of the problems with taking a commercial surveillance product and turning it into a searchable, connected database of people’s movements and of the police activity of thousands of departments nationwide. It also highlights the risks associated with relying on each and every law enforcement customer to properly and fully redact identifiable information any time someone requests public records; in this case, single mistakes by individual police departments have exposed potentially sensitive information about surveillance targets and police investigations by other departments around the country.

Flock is aware of the exposure enabled by its own product design and has tried to do damage control with its law enforcement customers by blaming “increased public records act/FOIA activity seeking by the public,” according to an email Flock sent to police obtained via public record request. Flock has threatened Cris van Pelt, the creator of HaveIBeenFlocked, by going after his web hosts and claiming that he has violated their intellectual property rights and is posting information that “poses an immediate threat to public safety and exposes law enforcement officers to danger.” In recent weeks Flock severely limited the amount of information available on its audit logs, which are designed to be a transparency tool, raising questions about how much information journalists, regulators, and government agencies will be able to get about police use of Flock cameras in the future.

“I set up HaveIBeenFlocked to show how pervasive and prevalent this monitoring is, and to show just how many searches are getting done. That information, by itself, is shocking,” van Pelt told 404 Media. “To me, as a private citizen, that’s shocking, and I think that’s kind of what Flock is trying to hide or bury.” van Pelt added that he is committed to keeping the website online.

As 404 Media has reported before, Flock’s automated license plate reader cameras are connected to local, state, and/or national “networks” of cameras. When a police officer runs a search seeking the locations of a specific license plate, they are usually not just searching cameras owned by their own jurisdiction, they are usually searching all Flock cameras in that state or in the country. Each individual search creates a record of that search on as many as 80,000 different cameras around the country.

As a compliance and transparency measure, these search records can be obtained through a “search audit,” which are essentially huge spreadsheets of specific Flock searches that contain not just the searches of local police but of all police who have ever searched that camera. Using this data, we have previously been able to report that local police are regularly giving Immigrations and Customs Enforcement side-door access to Flock cameras, and we also reported that Texas searched tens of thousands of cameras nationwide for a woman who self-administered an abortion. Flock search audits have also been used to catch police who have allegedly illegally stalked people or otherwise abused the system.
An example of what search audits look like. License plate redaction done by 404 Media
Because these search audits are important tools for police transparency and accountability, they have become a popular type of public record to request for journalists, concerned citizens, privacy experts, city councils, and government regulators. In the vast majority of cases, the police departments releasing the search audit files redact the surveillance target’s license plate number. But in recent months, at least four police departments have released full Flock search audits without redacting anything at all, revealing information about a mix of more than a million individual surveillance targets, suspects, and crime victims. This means that any individual Flock customer could accidentally leak the specific search targets for millions of Flock searches nationwide; any single failure point anywhere in the country could dox the police activity and surveillance targets of other police departments elsewhere.

With the license plate information, you can determine not just what police are using Flock for, but who they are using it against. An unredacted search log file obtained by 404 Media shows more than 700,000 individual searches from June 2025 alone, performed by hundreds of law enforcement agencies nationwide, including hundreds of searches performed by US Border Patrol agents. They show the specific date and time of a search, the name of the officer who did the search, sometimes show the specific case number of a search, the police-stated “reason” of a search, as well as the number of Flock cameras searched. Crucially, they also show the license plate, allowing someone to connect a specific license plate and therefore person to reasons like “drug trafficking,” “fugitive,” “narc,” immigration enforcement, “homicide,” “oil and gas theft,” etc. As the Electronic Frontier Foundation found, they also expose the victims of a host of biased policing tactics and dubious searches, including hundreds of searches of “No Kings” protesters, audit log reasons that included “possible gypsy,” and the search for a woman who had a self-administered abortion.

“EFF has had this [unredacted] information but we’ve chosen not to publish it or share it because of concerns about doxing people—our policy is not to release data of surveillance victims,” Cara Gagliano, a senior staff attorney at the EFF, told me.

404 Media has also had unredacted versions of some of these files for months but has not published any of them. At first, just one or two police departments failed to do redactions. In recent weeks, however, it has become clear that many police departments are not redacting license plates; this led van Pelt to create HaveIBeenFlocked.com, a website that collates many of these search audit logs and allows people to search individual license plates to determine if they have been run through the Flock system, and if so, where and when. The number of police departments who have now released fully unredacted logs has become so numerous that it can no longer be ignored, and the releases have caused Flock to drastically reduce the amount of information that can be obtained from a search audit.

Rather than simply making sure that search audits exported for public records requests do not include license plates or are redacted by default, Flock has totally overhauled how the search logs work; in a December email to police customers obtained by 404 Media, Flock said that “to protect officer safety and active investigations, Network Audit Logs will no longer include: officer names, specific plates searched, vehicle fingerprint information.”

To be clear, Flock is not turning on license plate redaction by default: It is fully withholding officer names and license plate information from the police departments themselves.

“Flock is doing their best to have it both ways where they have no responsibility and also no accountability to the communities where their cameras are placed,” Chris Gilliard, privacy expert and author of the forthcoming Luxury Surveillance, told 404 Media. “Shoddy data hygiene by law enforcement is not seen as a threat or danger but accountability and transparency are.”
The letter from Cyble
In recent weeks, Flock, via a third party company called Cyble, has threatened van Pelt by filing bogus intellectual property takedown requests with Cloudflare and Hetzner, two of his web hosts. Takedown requests filed by Cyble state the site “presents a significant security risk to our client and its users. The website poses an immediate threat to public safety and exposes law enforcement officers to danger, in clear violation of our client’s users’ rights and its intellectual property rights. The website publicly and deliberately discloses extensive, sensitive information obtained from Flock and its automated license plate reader systems with the apparent intent to undermine law enforcement operations. It hosts three searchable databases that expose critical operational intelligence. Such disclosure of sensitive data substantially heightens the risk to officers and the public and necessitates urgent remedial action.”

“Please be informed that our client is a renowned company in the US and directly works with government agencies,” it continues. “In view of the above, kindly suspend the services and stop the hosting of the website at the earliest convenience.”

The EFF’s Gagliano told 404 Media that, though the EFF hasn’t published license plate information, “these takedowns are bogus. They’re blatantly misrepresenting saying this data is obtained from Flock—no, it’s data obtained from public records. There are issues around deciding whether you should make it all widely available, but it was received from public government agencies and Flock really doesn’t have much standing to be taken down.”

Cloudflare refused to take action on HaveIBeenFlocked, saying that it “found insufficient evidence of a violation,” according to an appeal email van Pelt shared with 404 Media.

Flock told 404 Media in an email “That website that is doxxing cops during active investigations. Today, we're busy working with journalists to cover the fact that our technology was pivotal in cracking open the case that found the Brown university / MIT serial killer in New England. If you'd like to report the news that matters, we'd be happy to speak to you about bringing justice to victims instead of activists trying to let murderers go free.” Cyble did not respond to a request for comment.

In a December email to police customers titled “What you Need to Know About Recent Online Disclosures,” a Flock executive said “We are aware that agencies across the country, particularly in states with broad public-records laws, are seeing increased PRA/FOIA activity seeking, among other things, LPR search logs. Recently, a third-party website began aggregating search information that has been released through these public-records processes.

We recognize that seeing investigative search activity displayed publicly can raise understandable concerns about officer safety, investigative integrity, community perception, and compliance with state law.”

The email added “To be clear: Flock has not been breached or compromised. We are CJIS compliant. Regardless, we are continuing to make changes to our Product to better protect you and your officers.”

That much is true, because in this case the sensitive material released was taxpayer-funded public records willingly released by police departments around the country.

On the HaveIBeenFlocked website, van Pelt defends his decision to run the site: “This website aggregates and reformats already-public information. This information represents a fraction of what's being shared with Flock and its government, commercial, and private partners on a daily basis,” he wrote. “Policies exist to prevent the release of this information—they are not adhered to. Laws and regulations exist to enforce the policies—they go unenforced. Police, Flock, and politicians have been ignoring these problems for years while your private movements continue to be collected, catalogued, sold and traded.”

“This website exposes the problem because, as the old saying goes, sunlight is the best disinfectant. Law enforcement and legislation are needed to address the cause of the problem, and we highly encourage you to bring this site to the attention of your legislators,” he added. “We believe mass surveillance has no place in a free society, and this data should not be collected to begin with. If it is collected, warrants should be used, lookups should be rare, and police and private parties, like Flock and HaveIBeenFlocked.com, should not be permitted to act without functional restraints or oversight.”

A police accountability advocate who has seen the unredacted search audits but asked to remain anonymous because Flock has suggested such people are attacking the company and the police told 404 Media that the situation highlights broader problems with Flock.

"It could lead one to the conclusion that if that is an unacceptable outcome for customers, maybe they shouldn't be participating in a nationwide surveillance system," they said. "The platform is designed to collect as much data as possible. They want to make that as widely accessible and searchable as possible. They need the network effect so they can continue collecting data for their AI models. So, I struggle with the company’s framing of what’s happened. That framing is an attempt to dodge accountability for what their platform is doing which is collecting data without people's (and often informed elected officials') consent."

Flock going after HaveIBeenFlocked on dubious intellectual property grounds is similar to its strategy against DeFlock, a website that hosts an open source map of ALPR locations.

In a separate December email to Jim Williams, the police chief of Staunton, Virginia, Flock CEO Garrett Langley claimed that public records were being weaponized against the company. Langley claimed the company and police are under “coordinated attack” by activists “trying to turn a public records process into a weapon against you and against us.”

“Flock is building tools to help you fight the real crime affecting communities across the country. Many activists don't like that. Let's call this what it is: Flock, and the law enforcement agencies we partner with, are under coordinated attack. The attacks aren't new. You've been dealing with this for forever, and we've been dealing with this since our founding, from the same activist groups who want to defund the police, weaken public safety, and normalize lawlessness. Now, they're producing YouTube videos with misleading headlines,” Langley wrote. “They're also trying to turn a public records process into a weapon against you and against us. Make no mistake, we're fighting this fight for you, and, I hope, with you. I remain committed to building world-class technology to help you keep your communities safe. And doing so in a transparent, secure, and privacy centric way.”

Williams responded to Langley:

“As far as your assertion that we are currently under attack, I do not believe that this is so. I have dedicated the last 41 years of my life to serving the citizens of the City of Staunton as a police officer, the last 22 as the police chief,” he wrote. “What we are seeing here is a group of local citizens who are raising concerns that we could be potentially surveilling private citizens, residents and visitors and using the data for nefarious purposes. These citizens have been exercising their rights to receive answers from me, my staff, and city officials, to include our elected leaders. ln short, it is democracy in action.”

In a press release, the Staunton called Langley’s email “unsolicited” and said “The City of Staunton wants to make it clear that the Flock Safety CEO’s narrative does not reflect the city’s values.” Staunton canceled its Flock contract days later.


reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Mi dispiace Dave, temo di non poterlo fare! I PC si rifiutano di spegnersi dopo la patch di Microsoft

Quando progettare aggiornamenti con il culo è più pericoloso di quanto non sia creare HAL9000. Microsoft si giustifica: «è un bug di Secure Launch»

theregister.com/2026/01/16/pat…

@aitech

in reply to informapirata ⁂

i continui suicidi di MS 😂😂😂 speriamo che l’open source ne sappia approfittare ed in questo in Italia @ufficiozero ce la sta mettendo tutta 😉

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Ukraine–Germany operation targets #Black #Basta, Russian leader wanted
securityaffairs.com/187008/cyb…
#securityaffairs #hacking #ransomware

Cybersecurity & cyberwarfare ha ricondiviso questo.


Ucraina e Germania smantellano Black Basta? 2 arresti per ransomware, coinvolto un russo

📌 Link all'articolo : redhotcyber.com/post/ucraina-e…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #blackbasta #gruppocriminale #infiltrorete

reshared this



The Best Robot Mop System: Flat, Spinning, or Roller?


When it comes to designing a mopping robot, there are a number of approaches you can pick from, including just having the movement of the robot push the soggy mop over the floor, having spinning pads, or even a big spinning roller. But what difference does it make? Recently the [Vacuum Wars] channel ran a comparison to find out the answer.

The two spinning pad design is interesting, because it allows for the bot to move closer to objects or walls, and the base station doesn’t need the active scrubber that the simple static pad requires. The weakness of both types of flat mop design is that they are quickly saturated with dirt and moisture, after which they’ll happily smear it over the floor.

The spinning roller is the most complex, with the robot having its own onboard water tank, and a way to extract the dirty water from the mop and store it for disposal in the base station. Theoretically this would be the clear winner, with basically all of them having features like avoiding carpet.

Taking the test data from 150 different mopping robots that were made to clean up dried-up coffee stains, the results weren’t as clear-cut as one might perhaps expect due to the very limited scope of the test. But the comments to the video are perhaps more revealing. After all, most people don’t briefly run their robot mop over a few dried-up stains, but are faced with more severe real-life scenarios.

One commentator mentions their dogs dragging in a lot of mud on rainy days, in which case the spinning pads robot would end up spreading a thin film of mud across the floor. After upgrading to a spinning roller version this issue was resolved, though it’s readily admitted to be the more expensive system, with a much larger base station.

When in the video you see the details of what each approach involves on the side of the robot, the base station and the human caretaker, trade-offs are clear. Having the fixed flat pad is simple, but moves all complexity to the base station, with the spinning pads removing at least the need to motorize the base station. If you have small children or pets with muddy paws around, neither option works well, so you either have to whip out the human-powered mop or shell out for the high-end robotic solution.

Of course, you can also build your own super-charged robot mop, or a very thorough one, but definitely avoid mopping robots that are too cheap to actually work.

youtube.com/embed/Tz6U9QkXn5I?…


hackaday.com/2026/01/17/the-be…


Cybersecurity & cyberwarfare ha ricondiviso questo.


Un nuovo gruppo cyber legato alla Cina colpisce gli USA: cosa sappiamo su UAT-8837

📌 Link all'articolo : redhotcyber.com/post/un-nuovo-…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #sicurezzainformatica #attacchinformatici

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


We are sunsetting the Tuscolo2025h2 CT log shard, and unfortunately its archive is larger than the (reasonable!) @internetarchive item limit of 1100 GB.

Instead, we made a .torrent file, and are seeding it with a custom memory-safe client. github.com/geomys/ct-archive#g…

Suggestions for a long-term home (or long-term seeding of the torrent) welcome!

groups.google.com/a/chromium.o…

in reply to Filippo Valsorda

Could you at least upload the log in split parts so it's at least still in IA?
in reply to klea

@jmjl that feels a bit too much like bypassing @internetarchive limits, which I wouldn't want to do without permission.


Get Bored!


My son went over to a friends house this afternoon, when my wife had been planning on helping him with his French homework. This meant she had an hour or so of unexpected free time. Momentarily at a loss, she asked me what she should do, and my reply was “slack off”, meaning do something fun and creative instead of doing housework or whatever. Take a break! She jokingly replied that slacking off wasn’t on her to-do list, so she wouldn’t even know how to start.

But as with every joke, there’s more than a kernel of truth to it. We often get so busy with stuff that we’ve got to do, that we don’t leave enough time to slack, to get bored, or to simply do nothing. And that’s a pity, because do-nothing time is often among the most creative times. It’s when your mind wanders aimlessly that you find inspiration for that upgrade to the z-stage on your laser cutter, or whatever the current back-burner project of the moment is.

You don’t get bored when you’re watching TV, playing video games, or scrolling around the interwebs on your phone, and it’s all too easy to fall into these traps. To get well and truly bored requires discipline these days, so maybe putting “slack” into your to-do list isn’t a bad idea after all. My wife was right! And that’s why I volunteered to take my son to parkour on Sundays – it’s and hour of guaranteed, 100% uninterruptible boredom. How do you make sure you get your weekly dose of slack?

This article is part of the Hackaday.com newsletter, delivered every seven days for each of the last 200+ weeks. It also includes our favorite articles from the last seven days that you can see on the web version of the newsletter. Want this type of article to hit your inbox every Friday morning? You should sign up!


hackaday.com/2026/01/17/get-bo…


Cybersecurity & cyberwarfare ha ricondiviso questo.


#China-linked #APT #UAT-8837 targets North American critical infrastructure
securityaffairs.com/186999/bre…
#securityaffairs #hacking

Cybersecurity & cyberwarfare ha ricondiviso questo.


Ritorna Gootloader più pericoloso che mai: il malware incastonato nello ZIP torna alla ribalta

📌 Link all'articolo : redhotcyber.com/post/ritorna-g…

#redhotcyber #news #malware #cybersecurity #hacking #gootloader



Arnis Brings the World to Minecraft: Bedrock Edition


A couple of years ago, we covered a project called Arnis, created by [Louis Erbkamm], which allowed you to generate any portion of Earth into Minecraft blocks and maps. It was already impressive, but since we last checked in the open source project has made some incredible progress.

When we first covered Arnis, it was stuck on the Java edition of Minecraft. But now the project has been updated to support the more modern Bedrock Edition, meaning you can put your home into any device’s version of Minecraft!

Beyond Bedrock version support, the actual tool has improved with proper elevation generation using data provided from NASA. This allows you to view the Alps or the Himalayas in all their voxel glory, or explore an entire map of the Moon. Perhaps what’s even more impressive is that the generation is accurate enough to be used in an actual research study involving flood mitigation education.

All of this has been made possible with help from a passionate community who have volunteered their time to assist [Louis] with the project — a testament to the power of open source.


hackaday.com/2026/01/17/arnis-…



The eMac: Using Apple’s Forgotten Educational Mac in 2025



Beauty truly is in the eye of the beholder. (Credit: MattKC, YouTube)Beauty truly is in the eye of the beholder. (Credit: MattKC, YouTube)
What’s it like to use a 2002-era Apple eMac all-in-one in 2025? That’s what [MattKC] asked himself after obtaining one of these systems from a seller who ominously mentioned that it had been ‘left outside for years’.

The Apple iMac is a bit of a cult symbol, whether you’re talking about the iconic fruity iMac G3 or the desk lamp-like iMac G4, but few reminisce or actively collect the Apple eMac. Manufactured from 2002 to 2006, it featured the PowerPC 7450 (G4e) CPU with clock speeds ranging from 700 MHz to 1.42 GHz, as well as a 17″ CRT. In terms of design it was basically a bland iMac G3 that was firmly targeting the education markets to try and regain market share after Windows PCs had begun to eat its lunch there.

As for the model that [MattKC] purchased, it was this earliest model, featuring a 700 MHz PowerPC G4 CPU in addition to 640 MB SDRAM. Despite the seller’s description it seems to be in good nick with it firing right up, and even a glance inside after beating the challenge of 2.5 mm hex screws showed it to be in relatively good condition.

Unlike the iMac G3, you can play the Mac port of Halo on it, but the Minecraft port is very much not performant. With generally multimedia and gaming working well, it does show why the eMac was released, as it’s quite capable relative to an iMac G3 which would have struggled with the educational software of the era. We definitely hope that [MattKC] restores it to its full glory instead of ripping out its innards, as the neglected status of the eMac makes it much more likely to go extinct than PowerPC-based iMacs.

youtube.com/embed/6dYLtxdwYlw?…


hackaday.com/2026/01/17/the-em…


Cybersecurity & cyberwarfare ha ricondiviso questo.


VLAN: quando la segmentazione diventa un’illusione di sicurezza

📌 Link all'articolo : redhotcyber.com/post/vlan-quan…

#redhotcyber #news #vlan #sicurezzainformatica #reteinformatica


Cybersecurity & cyberwarfare ha ricondiviso questo.


Stati Uniti: la difesa nel cyberspace non basta più. Occorre più Attacco

📌 Link all'articolo : redhotcyber.com/post/stati-uni…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #sicurezzainformatica #attacchihacker



Cybersecurity & cyberwarfare ha ricondiviso questo.


Meishi - Connections Reflect Your Privacy

L'app contatti 📞📱 Privacy-First che aggiorna automaticamente 🔄 i dati dei contatti rispettando privacy e conformità GDPR ✅ grazie a P2P 🔗 e E2EE Signal Protocol 🔓. Alternativa Apple/Google 🚫. Open source 🌐 e Freemium. Versione Premium per backup/ripristino, condivisione dei dati granulare e gruppi illimitati.

meishiapp.com/

@privacypride


Cybersecurity & cyberwarfare ha ricondiviso questo.


BREACHFORUMS DATABASE LEAK: 323.986 utenti con 70k IP e PGP privata

📌 Link all'articolo : zurl.co/VqGEN

Nel gennaio 2026 un archivio contenente il #database #utenti di #BreachForums, noto #forum di cybercriminalità, è stato pubblicato su un sito esterno, esponendo i #dati di circa 324.000 account registrati tra il 2022 e l’agosto 2025. Fonti indipendenti come BleepingComputer e Resecurity hanno analizzato il dump, confermandone l’autenticità e sottolineando le possibili conseguenze per l’operatività degli attori che frequentavano la piattaforma.

A cura di Inva Malaj del gruppo DarkLab

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #database #breachforums #cybercriminalita #sicurezzainformatica #protezionedatidipersonali #furtofotoconsenso #databreach


Cybersecurity & cyberwarfare ha ricondiviso questo.


🚨 💥OFFERTA LAMPO IMPERDIBILE 🚨💥

FINO A LUNEDI' 19 GENNAIO -15% PER LA SETTIMA LIVE CLASS "𝗗𝗔𝗥𝗞 𝗪𝗘𝗕 𝗘 𝗖𝗬𝗕𝗘𝗥 𝗧𝗛𝗥𝗘𝗔𝗧 𝗜𝗡𝗧𝗘𝗟𝗟𝗜𝗚𝗘𝗡𝗖𝗘" IN PARTENZA A MARZO

Per info e iscrizioni: 📱 💬 379 163 8765 ✉️ formazione@redhotcyber.com

✅ Pagina del corso: redhotcyber.com/linksSk2L/acad…
✅ Presentazione del corso del prof. Pietro Melillo : youtube.com/watch?v=9VaQUnTz4J…
✅ Webinar introduttivo di presentazione al corso : youtube.com/watch?v=ExZhKqjuwf…

#redhotcyber #formazione #formazioneonline #ethicalhacking #cti #cyberthreatintelligence #cybersecurity #cybercrime #cybersecuritytraining #cybersecuritynews #privacy #cti #cyberthreat #intelligence #infosec #corsi #corsiprartici #liveclass


Cybersecurity & cyberwarfare ha ricondiviso questo.


Attacco al Ministero dell’interno francese: Credenziali condivise via email e dati sottratti

📌 Link all'articolo : redhotcyber.com/post/attacco-a…

#redhotcyber #news #cyberattacco #hacking #sicurezzainformatica #ministrodegliinterni #polizianazionale

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


La Memoria a caldo: una storia di innovazione che passa dall’Italiana Olivetti

📌 Link all'articolo : redhotcyber.com/post/la-memori…

#redhotcyber #news #memoriaafil #magnetostrizione #tecnologia #informatica #memorie #tempidaccess

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


200 – Se internet si spegne, si blocca la vita di tutti i giorni camisanicalzolari.it/200-se-in…

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


B.E.L.L.A.: il protocollo che trasforma lo smartphone in alleato, non in padrone

📌 Link all'articolo : redhotcyber.com/post/b-e-l-l-a…

#redhotcyber #news #tecnologiaelibertà #benessere digitale #sfidadellatecnologia #uominie tecnologia



Crittografia post quantum nel settore finanziario: centrale la sicurezza della supply chain


@Informatica (Italy e non Italy 😁)
La rotta del G7 Cyber non prevede nuovi obblighi regolatori, ma offre un quadro di riferimento condiviso: una roadmap per autorità, istituzioni finanziarie e fornitori tecnologici, declinata in sei fasi principali della

reshared this



DIY, Full-Stack Farm Automation


Recently, [Vinnie] aka [vinthewrench] moved from Oregon to Arkansas to start a farmstead. This is a style of farming that focuses not just on a profitable farm where produce is sold at market, but also on a homestead where much of one’s own food is grown on the farm as well. Like any farm, though, it’s extremely hard work that takes a tremendous amount of time. Automation and other technology can make a huge impact in these situations, and [Vinnie] is rolling out his own software stack to help with this on his farm.

He calls his project the Pi Internet of Things, or PioT, and as its name suggests is based around the Raspberry Pi. Since this will all be outdoors and exposed to the extremes of Arkansas weather, everything built under the auspices of this project prioritizes ruggedness, stability, and long-term support, all while avoiding any cloud service. The system also focuses on being able to ride through power outages. The server side, called piotserver, uses a REST API to give the user access to the automation systems through a web interface

[Vinnie] also goes into detail about why existing systems like Home Assistant and Open Sprinkler wouldn’t work in his situation, and why a ground-up solution like this is more appropriate for his farm. This post is largely an overview of his system, but some of his other posts go into more detail about things like integrating temperature sensors, rainfall monitoring, controlling irrigation systems, and plenty of other farm automation tasks that are useful for any farmer or gardener.

We’ve also seen some other projects of his here like this project which converts a common AC sprinkler system to an easier-to-use DC system, and a DIY weather station that operates in the 915 MHz band. He’s been a great resource for anyone looking to have technology help them out with their farm or garden, but if you’re just getting started on your green thumb be sure to take a look at this starter guide as well.


hackaday.com/2026/01/16/diy-fu…



How Accurate is a 125 Year Old Resistance Standard?



Internals of the 1900 Evershed & Vignoles Ltd 1 ohm resistance standard. (Credit: Three-phase, YouTube)Internals of the 1900 Evershed & Vignoles Ltd 1 ohm resistance standard. (Credit: Three-phase, YouTube)
Resistance standards are incredibly useful, but like so many precision references they require regular calibration, maintenance and certification to ensure that they stay within their datasheet tolerances. This raises the question of how well a resistance standard from the year 1900 performs after 125 years, without the benefits of modern modern engineering and standards. Cue the [Three-phase] YouTube channel testing a genuine Evershed & Vignoles Ltd one ohm resistance standard from 1900.

With mahogany construction and brass contacts it sure looks stylish, though the unit was missing the shorting pin that goes in between the two sides. This was a common feature of e.g. resistance decade boxes of the era, where you inserted pins to connect resistors until you hit the desired total. Inside the one ohm standard is a platinoid resistor, which is an alloy of copper, nickel, tungsten, and zinc. Based on the broad arrow mark on the bottom this unit was apparently owned by the UK’s Ordnance Board, which was part of what was then called the War Office.

After a quick gander at the internals, the standard was hooked up to a Keithley DMM7510 digital bench meter. The resistance standard’s ‘datasheet’ is listed on top of the unit on the brass plaques, including the effect of temperature on its accuracy. Adjusting for this, the measured ~1.016 Ω was within 1.6% tolerance, with as sidenote that this was with the unit not having been cleaned or otherwise having had maintenance performed on it since it was last used in service. Definitely not a bad feat.

youtube.com/embed/gRksE0-k8U8?…


hackaday.com/2026/01/16/how-ac…