MOVEit nel mirino: patch urgenti per falle ad alta gravità in LoadMaster e WAF
📌 Link all'articolo : redhotcyber.com/post/moveit-ne…
#redhotcyber #news #cybersecurity #vulnerabilita #patch #aggiornamentidisicurezza #sicurezzainformatica
MOVEit nel mirino: patch urgenti per falle ad alta gravità in LoadMaster e WAF
Progress Software risolve vulnerabilità di Command Injection in LoadMaster e MOVEit WAF, rischio alto per le organizzazioni.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Philips Kid’s Kit Revisited
[Anthony Francis-Jones], like us, has a soft spot for the educational electronic kits from days gone by. In a recent video you can see below, he shows the insides of a Philips EE08 two-transistor radio kit. This is the same kit he built a few months ago (see the second video, below).
Electronics sure look different these days. No surface mount here or even printed circuit boards. The kit had paper cards to guide the construction since the kit could be made into different circuits.
The first few minutes of the video recap how AM modulation works. If you skip to about the ten-minute mark, you can see the classic instruction books for the EE08 and EE20 kits (download a copy in your favorite language), which were very educational.
There were several radios in the manual, but the one [Anthony] covers is the two-transistor version with a PNP transistor as a reflex receiver with a diode detector with a second transistor as an audio power amplifier.
We covered [Anthony’s] original build a few months ago, but we liked the deep dive into how it works. We miss kits like these. And P-Boxes, too.
youtube.com/embed/eC2wwNq92mw?…
youtube.com/embed/PWPHGEWwKbU?…
🚨 💥OFFERTA LAMPO IMPERDIBILE 🚨💥
FINO A LUNEDI' 19 GENNAIO -15% PER LA SETTIMA LIVE CLASS "𝗗𝗔𝗥𝗞 𝗪𝗘𝗕 𝗘 𝗖𝗬𝗕𝗘𝗥 𝗧𝗛𝗥𝗘𝗔𝗧 𝗜𝗡𝗧𝗘𝗟𝗟𝗜𝗚𝗘𝗡𝗖𝗘" IN PARTENZA A MARZO
Per info e iscrizioni: 📱 💬 379 163 8765 ✉️ formazione@redhotcyber.com
✅ Pagina del corso: redhotcyber.com/linksSk2L/acad…
✅ Presentazione del corso del prof. Pietro Melillo : youtube.com/watch?v=9VaQUnTz4J…
✅ Webinar introduttivo di presentazione al corso : youtube.com/watch?v=ExZhKqjuwf…
#redhotcyber #formazione #formazioneonline #ethicalhacking #cti #cyberthreatintelligence #cybersecurity #cybercrime #cybersecuritytraining #cybersecuritynews #privacy #cti #cyberthreat #intelligence #infosec #corsi #corsiprartici #liveclass
Live Class Dark Web e Cyber Threat Intelligence - Red Hot Cyber
Vuoi conoscere il darkweb e disporre degli strumenti per accedervi in sicurezza, effettuare ricerche e comprendere i concetti di cyber threat intelligence (CTI)? Questo corso fa per te.Red Hot Cyber
Ricardo Antonio Piana likes this.
Cybersecurity & cyberwarfare reshared this.
Fortinet risolve falla critica in FortiSIEM: aggiornamenti urgenti per evitare attacchi
📌 Link all'articolo : redhotcyber.com/post/fortinet-…
#redhotcyber #news #cybersecurity #hacking #malware #vulnerabilita #fortinet #fortisiem #cve202564155
Fortinet risolve falla critica in FortiSIEM: aggiornamenti urgenti per evitare attacchi
Fortinet ha rilasciato aggiornamenti per correggere una falla di sicurezza critica in FortiSIEM che potrebbe consentire a un aggressore di eseguire codice su istanze vulnerabili.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
ARM: il Futuro dell’Informatica è chi riuscirà a calcolare più velocemente spendendo il minor numero di Watt
📌 Link all'articolo : redhotcyber.com/post/arm-il-fu…
#redhotcyber #news #arm #qualcomm #apple #processori #tecnologia #gadget #smartphone #auto #mercato
ARM: il Futuro dell'Informatica è chi riuscirà a calcolare più velocemente spendendo il minor numero di Watt
Scopri come Arm sta plasmando il futuro dell'informatica con i suoi processori a basso consumo energetico.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
La Nascita di Wikipedia: Un’Esperienza di Libertà e Conoscenza
📌 Link all'articolo : redhotcyber.com/post/la-nascit…
#redhotcyber #news #wikipedia #encyclopediaonline #storiaDiWikipedia #jimmyWales #larrySanger
La Nascita di Wikipedia: Un'Esperienza di Libertà e Conoscenza
Scopri come Wikipedia è nata da un'idea semplice e innovativa di Jimmy Wales e Larry Sanger, diventando un fenomeno globale.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
The People vs Digital Omnibus
THIS IS DIGITAL POLITICS. But it's not Monday. I'm Mark Scott, and I apologize for the one-day delay in this week's newsletter. I've come down with what I really hope isn't Covid-19, so please forgive any typos in the dispatch below. Normal Monday transmission resumes next week.
— New polling suggests European citizens may not be as keen about the bloc's digital revamp as policymakers and industry.
— The United States' departure from more than 60 international organizations is another death knell in the open, interoperable internet.
– Despite global efforts, the US still dominates the market for data centers.
Let's get started:
Making Code a Hundred Times Slower With False Sharing
The cache hierarchy of the 2008 Intel Nehalem x86 architecture. (Source: Intel)
Writing good, performant code depends strongly on an understanding of the underlying hardware. This is especially the case in scenarios like those involving embarrassingly parallel processing, which at first glance ought to be a cakewalk. With multiple threads doing their own thing without having to nag the other threads about anything it seems highly doubtful that even a novice could screw this up. Yet as [Keifer] details in a recent video on so-called false sharing, this is actually very easy, for a variety of reasons.
With a multi-core and/or multi-processor system each core has its own local cache that contains a reflection of the current values in system RAM. If any core modifies its cached data, this automatically invalidates the other cache lines, resulting a cache miss for those cores and forcing a refresh from system RAM. This is the case even if the accessed data isn’t one that another core was going to use, with an obvious impact on performance.
The worst case scenario as detailed and demonstrated using the Google Benchmark sample projects, involves a shared global data structure, with a recorded hundred times reduction in performance. Also noticeable is the impact on scaling performance, with the cache misses becoming more severe with more threads running.
A less obvious cause of performance loss here is due to memory alignment and how data fits in the cache lines. Making sure that your data is aligned in e.g. data structures can prevent more unwanted cache invalidation events. With most applications being multi-threaded these days, it’s a good thing to not only know how to diagnose false sharing issues, but also how to prevent them.
youtube.com/embed/WIZf-Doc8Bk?…
Dad Makes Kid’s Balance Bike Into Electric Snow Trike Like a Boss
The balance bikes toddlers are rocking these days look like great fun, but not so great in the snow. Rather than see his kid’s favourite toy relegated to shed until spring, [John Boss] added electric power, and an extra wheel to make one fun-looking snow trike. Like a boss, you might say.
Physically, the trike is a delta configuration: two rear wheels and one front, though as you can see the front wheel has been turned into a ski. That’s not the most stable configuration, but by shifting the foot pegs to the front wheel and keeping the electronics down low, [John] is able to maintain a safe center of gravity. He’s also limiting the throttle so kiddo can’t go dangerously fast– indeed, the throttle control is in the rear electronics component. The kid just has a big green “go” button.
Bit-banging the throttle, combined with the weight of the kiddo up front, creates a strong tendency towards wheel-spin, but [John] fixes that with a some cleverly printed TPU paddles zip-tied to the harbor-freight wheels and tires he’s hacked into use. Those wheels are fixed to a solid axle that’s mounted to flat plate [John] had made up to attach to the bike frame. It’s all surprisingly solid, given that [John] is able to demonstrate the safety factor by going for a spin of his own. We would have done the same.
We particularly like the use of a tool battery for hot-swappable power. This isn’t the first time we’ve seen a kid’s toy get the tool battery treatment, but you aren’t limited to mobile uses. We’ve seen the ubiquitous 18V power packs in everything from fume extractors to a portable powerpack that can even charge a Tesla.
youtube.com/embed/L_3cA8oZP8w?…
A New Life For An Old Amplifier
An audio amplifier was once a fairly simple analogue device, but in recent decades a typical home entertainment amplifier will have expanded to include many digital functions. When these break they are often proprietary and not easy to repair, as was the case with a broken Pioneer surround-sound device given to [Boz]. It sat on the shelf for a few years until he had the idea of a jukebox for his ripped CDs, and his returning it to life with a new main board is something to behold.
Internally it’s a surprisingly modular design, meaning that the front panel with its VFD display and driver were intact and working, as were the class AB amplifier and its power supply. He had the service manual so reverse engineering was straightforward, thus out came the main board in favor of a replacement. He took the original connectors and a few other components, then designed a PCB to take them and a Raspberry Pi Pico and DAC. With appropriate MMBASIC firmware it looks as though it was originally made this way, a sense heightened by a look at the motherboard inside (ignoring a couple of bodges).
We like seeing projects like this one which revive broken devices, and this one is particularly special quality wise. We’re more used to seeing it with gaming hardware though.
FLOSS Weekly Episode 860: Elixir Origin Story
This week Jonathan and Randal chat with Jose Valim about Elixir! What led Jose to create this unique programming language? What do we mean that it’s a functional language with immutability?
youtube.com/embed/H4lC4JNUxOs?…
Did you know you can watch the live recording of the show right on our YouTube Channel? Have someone you’d like us to interview? Let us know, or have the guest contact us! Take a look at the schedule here.
play.libsyn.com/embed/episode/…
Direct Download in DRM-free MP3.
If you’d rather read along, here’s the transcript for this week’s episode.
Places to follow the FLOSS Weekly Podcast:
Theme music: “Newer Wave” Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 4.0 License
hackaday.com/2026/01/14/floss-…
Genetic Therapy Aims To Bring Hearing To Those Born Deaf
For those born with certain types of congenital deafness, the cochlear implant has been a positive and enabling technology. It uses electronics to step in as a replacement for the biological ear that doesn’t quite function properly, and provides a useful, if imperfect, sense of hearing to its users.
New research has promised another potential solution for some sufferers of congenital deafness. Instead of a supportive device, a gene therapy is used to enable the biological ear to function more as it should. The result is that patients get their sense of hearing, not from a prosthetic, but from their own ears themselves.
New Therapy
Cochlear implants are a popular treatment for many types of congenital deafness. Credit: Hear hear, CC BY SA 4.0
There are a number of causes of congenital deafness, each of which presents in its own way. In the case of OTOF-related hearing loss, it comes down to a genetic change in a single critical protein. The otoferlin gene is responsible for making the protein of the same name, and this protein is critical for normal, functional hearing in humans. It’s responsible for enabling the communication of signals between the inner hair cells in the ear, and the auditory nerve which conducts these signals to the brain. However, in patients with a condition called autosomal recessive deafness 9, a non-functional variant of the otoferlin gene prevents the normal production of this protein. Without the proper protein available, the auditory nerve fails to receive the proper signals from the hair cells in the ear, and the result is profound deafness.
The typical treatment for this type of congenital hearing loss is the use of a cochlear implant. This is an electronic device that uses a microphone to pick up sound, and then translates it into electrical signals which are sent to electrodes embedded in the cochlear. These simulate the signals that would normally come from the ear itself, and provide a very useful sense of hearing to the user. However, quality and fidelity is strictly limited compared to a fully-functional human ear, and they do come with other drawbacks as is common with many prosthetic devices.
The better understanding that we now have of OTOF-related hearing loss presented an opportunity. If it were possible to get the right protein where it needed to be, it might be possible to enable hearing in what are otherwise properly-formed ears.DB-OTO was initially trialled in mice, where it was able to improve hearing response by creating the protein necessary for nerve conduction between inner ear hair cells and the auditory nerve. Credit: research paper
The treatment to do that job is called DB-OTO. It’s a virus-based gene therapy which is able to deliver a working version of the OTOF gene. It uses a non-pathogenic virus to carry the proper genetic code that produces the otoferlin protein. However, it’s no good if this gene is expressed in just any context. Thus, it’s paired with a special DNA sequence called a Myo15 promoter which ensures the gene is only expressed in cochlear hair cells that would normally express the otoferlin protein. Treatment involves delivering the viral gene therapy to one or both ears through a surgical procedure using a similar approach to implanting cochlear devices.Researchers pursued a number of promoter sequences to ensure the gene was only expressed with the correct cells. Credit: research paper
An early trial provided DB-OTO treatment to twelve patients, ranging in age from ten months to sixteen years. eleven out of twelve patients developed improved hearing within weeks of treatment with DB-OTO. Nine patients were able to achieve improvements to the point of no longer requiring cochlear implants and having viable natural hearing.
Six trial participants could perceive soft speech, and three could hear whispers, indicating a normal level of hearing sensitivity. Notably, hearing improvements were persistent and there were some signs of speech development in three patients in the study. The company behind the work, Regeneron, is also eager to take the learnings from its development and potentially apply it to other kinds of hearing loss from genetic causes.
DB-OTO remains an experimental treatment for now, but regulatory approvals are being pursued for its further use. It could yet prove to be a viable and effective treatment for a wide range of patients affected by this genetic issue. It’s just one of a number of emerging treatments that use viruses to deliver helpful genetic material when a patient’s own genes don’t quite function as desired.
ESP32-P4 Powers Retro Handheld after a Transplant
The ESP32-P4 is the new hotness on the microcontroller market. With RISC-V architecture and two cores running 400 MHz, to ears of a certain vintage it sounds more like the heart of a Unix workstation than a traditional MCU. Time’s a funny thing like that. [DynaMight] was looking for an excuse to play with this powerful new system on a chip, so put together what he calls the GB300-P4: a commercial handheld game console with an Expressif brain transplant.
Older ESP32 chips weren’t quite up to 16-bit emulation, but that hadn’t stopped people trying; the RetroGo project by [ducalex] already has an SNES and Genesis/Mega Drive emulation mode, along with all the 8-bit you could ask for. But the higher-tech consoles can run a bit slow in emulation on other ESP32 chips. [DynaMight] wanted to see if the P4 performed better, and to no ones surprise, it did.
If the build quality on this handheld looks suspiciously professional, that’s because it is: [DynaMight] started with a GB300, a commercial emulator platform. Since the ESP32-P4 is replacing a MIPS chip clocked at 914 MHz in the original — which sounds even more like the heart of a Unix workstation, come to think of it — the machine probably doesn’t have better performance than it did from factory unless its code was terribly un-optimized. In this case, performance was not the point. The point was to have a handheld running RetroGo on this specific chip, which the project has evidently accomplished with flying colours. If you’ve got a GB300 you’d rather put an “Expressif Inside” sticker on, the project is on github. Otherwise you can check out the demo video below. (DOOM starts at 1:29, because of course it runs DOOM.)
The last P4 project we featured was a Quadra emulator; we expect to see a lot of projects with this chip in the new year, and they’re not all going to be retrocomputer-related, we’re sure. If you’re cooking up something using the new ESP32, or know someone who is, you know what to do.
youtube.com/embed/FW7MTuJyUNA?…
Clone Wars: IBM Edition
If you search the Internet for “Clone Wars,” you’ll get a lot of Star Wars-related pages. But the original Clone Wars took place a long time ago in a galaxy much nearer to ours, and it has a lot to do with the computer you are probably using right now to read this. (Well, unless it is a Mac, something ARM-based, or an old retro-rig. I did say probably!)
IBM is a name that, for many years, was synonymous with computers, especially big mainframe computers. However, it didn’t start out that way. IBM originally made mechanical calculators and tabulating machines. That changed in 1952 with the IBM 701, IBM’s first computer that you’d recognize as a computer.
If you weren’t there, it is hard to understand how IBM dominated the computer market in the 1960s and 1970s. Sure, there were others like Univac, Honeywell, and Burroughs. But especially in the United States, IBM was the biggest fish in the pond. At one point, the computer market’s estimated worth was a bit more than $11 billion, and IBM’s five biggest competitors accounted for about $2 billion, with almost all of the rest going to IBM.
So it was somewhat surprising that IBM didn’t roll out the personal computer first, or at least very early. Even companies that made “small” computers for the day, like Digital Equipment Corporation or Data General, weren’t really expecting the truly personal computer. That push came from companies no one had heard of at the time, like MITS, SWTP, IMSAI, and Commodore.
The IBM PC
The story — and this is another story — goes that IBM spun up a team to make the IBM PC, expecting it to sell very little and use up some old keyboards previously earmarked for a failed word processor project. Instead, when the IBM PC showed up in 1981, it was a surprise hit. By 1983, there was the “XT” which was a PC with some extras, including a hard drive. In 1984, the “AT” showed up with a (gasp!) 16-bit 80286.
The personal computer market had been healthy but small. Now the PC was selling huge volumes, perhaps thanks to commercials like the one below, and decimating other companies in the market. Naturally, others wanted a piece of the pie.
youtube.com/embed/VslekgnIXDo?…
Send in the Clones
Anyone could make a PC-like computer, because IBM had used off-the-shelf parts for nearly everything. There were two things that really set the PC/XT/AT family apart. First, there was a bus for plugging in cards with video outputs, serial ports, memory, and other peripherals. You could start a fine business just making add-on cards, and IBM gave you all the details. This wasn’t unlike the S-100 bus created by the Altair, but the volume of PC-class machines far outstripped the S-100 market very quickly.
In reality, there were really two buses. The PC/XT had an 8-bit bus, later named the ISA bus. The AT added an extra connector for the extra bits. You could plug an 8-bit card into part of a 16-bit slot. You probably couldn’t plug a 16-bit card into an 8-bit slot, though, unless it was made to work that way.
The other thing you needed to create a working PC was the BIOS — a ROM chip that handled starting the system with all the I/O devices set up and loading an operating system: MS-DOS, CP/M-86, or, later, OS/2.
Protection
An ad for a Columbia PC clone.
IBM didn’t think the PC would amount to much so they didn’t do anything to hide or protect the bus, in contrast to Apple, which had patents on key parts of its computer. They did, however, have a copyright on the BIOS. In theory, creating a clone IBM PC would require the design of an Intel-CPU motherboard with memory and I/O devices at the right addresses, a compatible bus, and a compatible BIOS chip.
But IBM gave the world enough documentation to write software for the machine and to make plug-in cards. So, figuring out the other side of it wasn’t particularly difficult. Probably the first clone maker was Columbia Data Products in 1982, although they were perceived to have compatibility and quality issues. (They are still around as a software company.)
Eagle Computer was another early player that originally made CP/M computers. Their computers were not exact clones, but they were the first to use a true 16-bit CPU and the first to have hard drives. There were some compatibility issues with Eagle versus a “true” PC. You can hear their unusual story in the video below.
youtube.com/embed/0wdunM5XZwo?…The PC Reference manual had schematics and helpfully commented BIOS source code
One of the first companies to find real success cloning the PC was Compaq Computers, formed by some former Texas Instruments employees who were, at first, going to open Mexican restaurants, but decided computers would be better. Unlike some future clone makers, Compaq was dedicated to building better computers, not cheaper.
Compaq’s first entry into the market was a “luggable” (think of a laptop with a real CRT in a suitcase that only ran when plugged into the wall; see the video below). They reportedly spent $1,000,000 to duplicate the IBM BIOS without peeking inside (which would have caused legal problems). However, it is possible that some clone makers simply copied the IBM BIOS directly or indirectly. This was particularly easy because IBM included the BIOS source code in an appendix of the PC’s technical reference manual.
Between 1982 and 1983, Compaq, Columbia Data Products, Eagle Computers, Leading Edge, and Kaypro all threw their hats into the ring. Part of what made this sustainable over the long term was Phoenix Technologies.
youtube.com/embed/fwvLu9aSkmQ?…
Rise of the Phoenix
Phoenix was a software producer that realized the value of having a non-IBM BIOS. They put together a team to study the BIOS using only public documentation. They produced a specification and handed it to another programmer. That programmer then produced a “clean room” piece of code that did the same things as the BIOS.An Eagle ad from 1983
This was important because, inevitably, IBM sued Phoenix but lost, as they were able to provide credible documentation that they didn’t copy IBM’s code. They were ready to license their BIOS in 1984, and companies like Hewlett-Packard, Tandy, and AT&T were happy to pay the $290,000 license fee. That fee also included insurance from The Hartford to indemnify against any copyright-infringement lawsuits.
Clones were attractive because they were often far cheaper than a “real” PC. They would also often feature innovations. For example, almost all clones had a “turbo” mode to increase the clock speed a little. Many had ports or other features as standard that a PC had to pay extra for (and consume card slots). Compaq, Columbia, and Kaypro made luggable PCs. In addition, supply didn’t always match demand. Dealers often could sell more PCs than they could get in stock, and the clones offered them a way to close more business.
Issues
Not all clone makers got everything right. It wasn’t odd for a strange machine to have different interrupt handling than an IBM machine or different timers. Another favorite place to err involved AT/PC compatibility.
In a base-model IBM PC, the address bus only went from A0 to A19. So if you hit address (hex) FFFFF+1, it would wrap around to 00000. Memory being at a premium, apparently, some programs depended on that behavior.
With the AT, there were more address lines. Rather than breaking backward compatibility, those machines have an “A20 gate.” By default, the A20 line is disabled; you must enable it to use it. However, there were several variations in how that worked.
Intel, for example, had the InBoard/386 that let you plug a 386 into a PC or AT to upgrade it. However, the InBoard A20 gating differed from that of a real AT. Most people never noticed. Software that used the BIOS still worked because the InBoard’s BIOS knew the correct procedure. Most software didn’t care either way. But there was always that one program that would need a fix.
The original PC used some extra logic in the keyboard controller to handle the gate. When CPUs started using cache, the A20 gating was moved into the CPU for many generations. However, around 2013, most CPUs finally gave up on gating A20.
The point is that there were many subtle features on a real IBM computer, and the clone makers didn’t always get it right. If you read ads from those days, they often tout how compatible they are.
Total War!
IBM started a series of legal battles against… well… everybody. Compaq, Corona Data Systems, Handwell, Phoenix, AMD, and anyone who managed to put anything on the market that competed with “big blue” (one of IBM’s nicknames).
IBM didn’t win anything significant, although most companies settled out of court. Then they just used the Phoenix BIOS, which was provably “clean.” So IBM decided to take a different approach.
In 1987, IBM decided they should have paid more attention to the PC design, so they redid it as the PS/2. IBM spent a lot of money telling people how much better the PS/2 was. They had really thought about it this time. So scrap those awful PCs and buy a PS/2 instead.
Of course, the PS/2 wasn’t compatible with anything. It was made to run OS/2. It used the MCA bus, which was incompatible with the ISA bus, and didn’t have many cards available. All of it, of course, was expensive. This time, clone makers had to pay a license fee to IBM to use the new bus, so no more cheap cards, either.
You probably don’t need a business degree to predict how that turned out. The market yawned and continued buying PC “clones” which were now the only game in town if you wanted a PC/XT/AT-style machine, especially since Compaq beat IBM to market with an 80386 PC by about a year.
Not all software was compatible with all clones. But most software would run on anything and, as clones got more prevalent, software got smarter about what to expect. At about the same time, people were thinking more about buying applications and less about the computer they ran on, a trend that had started even earlier, but was continuing to grow. Ordinary people didn’t care what was in the computer as long as it ran their spreadsheet, or accounting program, or whatever it was they were using.
Dozens of companies made something that resembled a PC, including big names like Olivetti, Zenith, Hewlett-Packard, Texas Instruments, Digital Equipment Corporation, and Tandy. Then there were the companies you might remember for other reasons, like Sanyo or TeleVideo. There were also many that simply came and went with little name recognition. Michael Dell started PC Limited in 1984 in his college dorm room, and by 1985, he was selling an $800 turbo PC. A few years later, the name changed to Dell, and now it is a giant in the industry.
Looking Back
It is interesting to play “what if” with this time in history. If IBM had not opened their architecture, they might have made more money. Or, they might have sold 1,000 PCs and lost interest. Then we’d all be using something different. Microsoft retaining the right to sell MS-DOS to other people was also a key enabler.
IBM stayed in the laptop business (ThinkPad) until they sold to Lenovo in 2005. They would also sell them their server business in 2014.
Things have changed, of course. There hasn’t been an ISA card slot on a motherboard in ages. Boot processes are more complex, and there are many BIOS options. Don’t even get us started on EMS and XMS. But at the core, your PC-compatible computer still wakes up and follows the same steps as an old school PC to get started. Like the Ship of Theseus, is it still an “IBM-compatible PC?” If it matters, we think the answer is yes.
If you want to relive those days, we recently saw some new machines sporting 8088s and 80386s. Or, there’s always emulation.
DK 10x17 - AGCOM vs CloudFlare
Una legge, specie una discutibile come il Piracy Shield, si può discutere e modificare, ma intanto la si rispetta. E il CEO di CloudFlare può attaccarsi.
spreaker.com/episode/dk-10x17-…
Porto di Ancona: data breach
@Informatica (Italy e non Italy 😁)
Il 14 gennaio 2026 il collettivo Anubis ha pubblicato alcuni documenti che dimostrerebbero un data breach ai danni del Porto di Ancona. Il porto di Ancona fa parte dell’Autorità del […]
L'articolo Porto di Ancona: data breach proviene da Edoardo Limone.
L'articolo proviene edoardolimone.com/2026/01/15/p…
Informatica (Italy e non Italy) reshared this.
Digital omnibus: articolo per articolo, come le Big Tech hanno plasmato il ridimensionamento dei diritti digitali da parte dell'UE
Corporate Europe Observatory e LobbyControl tracciano le impronte digitali delle Big Tech sulle proposte del #DigitalOmnibus, un'importante deregolamentazione delle leggi digitali dell'UE, tra cui il GDPR e l'AI Act. In questo tentativo, le Big Tech sono supportate dall'amministrazione Trump e dall'estrema destra europea.
corporateeurope.org/en/2026/01…
Article by article, how Big Tech shaped the EU’s roll-back of digital rights | Corporate Europe Observatory
In a new analysis we trace Big Tech's fingerprints on the Digital Omnibus proposals - a major deregulation of EU digital laws including the GDPR and the AI Act. They are helped in this attempt by the Trump administration and the European far right.Corporate Europe Observatory
reshared this
L'FBI perquisisce la casa di un giornalista del Washington Post in un'indagine su una fuga di notizie
È estremamente raro che gli agenti federali perquisiscano l'abitazione di un giornalista, anche nelle indagini sulla divulgazione non autorizzata di informazioni riservate.
reshared this
Un hacker di 24 anni si è intrufolato 25 volte nella Corte Suprema degli Stati Uniti
📌 Link all'articolo : redhotcyber.com/post/un-hacker…
#redhotcyber #news #cybersecurity #hacking #sicurezzainformatica #violazioneidatipersonali #datipersonali
Un hacker di 24 anni si è intrufolato 25 volte nella Corte Suprema degli Stati Uniti
Un uomo del Tennessee, Nicholas Moore, si dichiara colpevole per aver violato il sistema elettronico di archiviazione dei casi della Corte Suprema degli Stati Uniti per 25 volte.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/186910/int…
#securityaffairs #hacking #Ukraine #Russia
CERT-UA reports PLUGGYAPE cyberattacks on defense forces
CERT-UA reported PLUGGYAPE malware attacks on Ukraine’s defense forces, linked with medium confidence to Russia’s Void Blizzard group.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
“La tua tessera sanitaria è in scadenza”, ma è phishing: come difendersi
@Informatica (Italy e non Italy 😁)
Il CERT-AgID ha identificato una nuova campagna di phishing che sfrutta indebitamente il nome e l’immagine del Ministero della Salute per indurre i cittadini a rinnovare la tessera sanitaria. Ecco come funziona la truffa e i consigli per tenere al sicuro i
Informatica (Italy e non Italy) reshared this.
L'Iran ha paralizzato Starlink: il servizio, diventato sinonimo di connettività a prova di censura, ha appena scoperto che questa assunzione è sbagliata
L’obiettivo non è colpire tutto, ma colpire nel punto giusto: frequenze, tempi, sequenze di aggancio. Non si spara nel buio. Si ascolta, si analizza, si interviene. È il metodo che trasforma un blackout in un’operazione tecnica.
reshared this
Microsoft smantella RedVDS: sotto i fari la convergenza tra cloud abusato, GenAI e crimine
@Informatica (Italy e non Italy 😁)
Microsoft ha annunciato lo smantellamento di un servizio di abbonamento globale dedicato alla criminalità informatica responsabile di frodi per 40 milioni di dollari in un anno solo negli Usa. Ecco cosa significa
Informatica (Italy e non Italy) reshared this.
Patch Tuesday di gennaio 2026: Microsoft corregge due zero-day, di cui una già sfruttata
@Informatica (Italy e non Italy 😁)
Nel Patch Tuesday di gennaio 2026 Microsoft ha rilasciato gli aggiornamenti per 112 vulnerabilità, tra cui anche due zero-day di cui una già sfruttata. Aggiornamenti critici per Windows, Secure Boot e componenti chiave, con impatti
Informatica (Italy e non Italy) reshared this.
I've just updated my Homebrew Tap of musl-cross-make: musl libc GCC Linux cross-compilers.
brew install filosottile/musl-cross/musl-cross
is all you need to get amd64, arm64, and arm macOS-to-Linux cross-compilers.
Now with GCC 14 and optional riscv64 support.
github.com/FiloSottile/homebre…
GitHub - FiloSottile/homebrew-musl-cross: Homebrew Formula for static-friendly musl-based GCC macOS-to-Linux cross-compilers
Homebrew Formula for static-friendly musl-based GCC macOS-to-Linux cross-compilers - FiloSottile/homebrew-musl-crossGitHub
Cybersecurity & cyberwarfare reshared this.
Le BigTech USA si alleano con i fascisti europei per smantellare le regole dell'UE in materia di intelligenza artificiale e protezione dei dati.
Secondo un nuovo rapporto pubblicato mercoledì, importanti aziende tecnologiche statunitensi hanno fatto leva sull'estrema destra europea per fare pressione sulla Commissione europea affinché adotti misure meno rigorose in materia di normative per il settore.
brusselstimes.com/belgium/1916…
US tech giants allying with European far-right to strip back EU rules
Amid rising EU-US tensions, a new report has accused Big Tech of courting far-right MEPs to weaken the EU's regulatory power on AI and data.www.brusselstimes.com
like this
reshared this
Just released Sunlight v0.7.0!
The client now supports reading local and archived (github.com/geomys/ct-archive/b…) logs.
The CT log now turns expired shards read-only automatically (groups.google.com/a/chromium.o…) and exposes more metadata in log.v3.json.
github.com/FiloSottile/sunligh…
ct-archive/README.md at main · geomys/ct-archive
A directory of archived Certificate Transparency (CT) logs and tools to archive RFC 6962 and Static CT logs. - geomys/ct-archiveGitHub
Cybersecurity & cyberwarfare reshared this.
funnily enough, today I was debugging an issue with ReadTileLeaf when reading data tiles from an archived log. I refreshed my tab on the doc to find that ReadTileLeafMaybeArchive was added in v0.7.0. Problem solved.
Thanks for your work on this. It's invaluable.
securityaffairs.com/186902/unc…
#securityaffairs #hacking
Fortinet fixed two critical flaws in FortiFone and FortiSIEM
Fortinet fixed six security flaws, including two critical bugs in FortiFone and FortiSIEM that attackers could exploit without authenticationPierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Microsoft risolve 114 vulnerabilità con l’aggiornamento di gennaio
📌 Link all'articolo : redhotcyber.com/post/microsoft…
#redhotcyber #news #microsoft #aggiornamentodisicurezza #vulnerabilità #sicurezzainformatica #cybersecurity
Microsoft risolve 114 vulnerabilità con l'aggiornamento di gennaio
Microsoft risolve 114 vulnerabilità con l'aggiornamento di gennaio, incluse 3 vulnerabilità zero-day. Scopri di più sulle falle critiche.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
🎺🎸🥁 Dedicato a tutti i dipartimenti IT dove la cybersecurity è una side quest.
Un incidente informatico ha questo strano potere:
trasformare in pochi minuti ciò che “non serviva” in ciò che “dovevamo fare da anni”.
Cybersecurity & cyberwarfare reshared this.
Fuori dal Metaverso! Meta taglia 1000 posti di lavoro in Reality Labs
📌 Link all'articolo : redhotcyber.com/post/fuori-dal…
#redhotcyber #news #meta #realitylabs #taglidipostidilavoro #intelligenzaartificiale #dispositiviindossabili
Fuori dal Metaverso! Meta taglia 1000 posti di lavoro in Reality Labs
Meta riorganizza Reality Labs con oltre 1000 tagli di lavoro, concentrandosi sugli occhiali intelligenti e l'intelligenza artificiale.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Buon Compleanno Wikipedia: 25 anni di sapere umano condiviso!
In un quarto di secolo, Wikipedia è diventata l'enciclopedia online più grande al mondo, grazie a una comunità di volontari che lavora senza sosta con l'obiettivo di diffondere una conoscenza
vivere.it/2026/01/14/buon-comp…
Buon Compleanno Wikipedia: 25 anni di sapere umano condiviso!
In un quarto di secolo, Wikipedia è diventata l'enciclopedia online più grande al mondo, grazie a una comunità di volontari che lavora senza sosta con l'obiettivo di diffondere una conoscenza libera, accessibile e condivisa.www.vivere.it
reshared this
@dingo non è un'altra campana, ma una provocazione antiwikipediana che si richiama palesemente al tecnoligarca Elon Musk.
I fondi di Wikipedia esistono solo grazie ai suoi pop-up e per mantenere un gigante della conoscenza come Wikipedia non possono smettere di esistere.
Ti ricordo anch che se non vi fosse almeno una minoranza di donatori, la tua istanza Mastodon chiuderebbe i battenti tra tre o sei mesi
reshared this
Cyber Security Act Ue, scazzo tra Stati su Huawei e Zte
@Informatica (Italy e non Italy 😁)
La Commissione europea ha rinviato la presentazione del Cyber Security Act, il pacchetto di proposte atteso per rafforzare la cybersicurezza nell’Ue. Le tensioni fra gli Stati su Huawei, Zte e non solo
L'articolo proviene dalla sezione #Cybersecurity di #StartMag la testata diretta da Michele
Informatica (Italy e non Italy) reshared this.
Cybersecurity & cyberwarfare likes this.
reshared this
securityaffairs.com/186898/hac…
#securityaffairs #hacking
U.S. CISA adds a flaw in Microsoft Windows to its Known Exploited Vulnerabilities catalog
The U.S. CISA adds a vulnerability impacting Microsoft Windows to its Known Exploited Vulnerabilities catalog.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Ora sappiamo chi siete: i dati personali di migliaia di agenti della Border Patrol e dell'ICE sarebbero trapelati in un'enorme violazione dei dati
Un whistleblower del Dipartimento della Sicurezza Nazionale avrebbe diffuso informazioni sensibili su circa 4.500 dipendenti dell'ICE e della Border Patrol, tra cui quasi 2.000 agenti impegnati nelle attività di controllo in prima linea, in seguito alla sparatoria mortale di Renee Nicole Good.
thedailybeast.com/personal-det…
Personal Details of Thousands of Border Patrol and ICE Goons Allegedly Leaked in Huge Data Breach
A DHS whistleblower appears to have exposed data on federal immigration workers after the shooting of Renee Good.Tom Latchem (The Daily Beast)
SnowSNAC likes this.
reshared this
Ragazzi, devo dire la questione dell'ICE non mi ha fatto sfuggire per niente, nonostante mio padre se ne frega poco della situazione in USA.
Invece bisogna davvero imparare tante cose per quello che sta succedendo, non solo per la morte di Renee Good, perché con la ICE l'america è diventata pericolosa da passare il tempo.
Questo leak renderà l'ICE più difficile.
Pirati Europei reshared this.
Finanza, Il G7 Cyber Expert Group traccia la rotta verso la crittografia post-quantistica. Il documento
@Informatica (Italy e non Italy 😁)
G7 Cyber, la roadmap per la transizione del settore finanziario verso la crittografia post-quantistica Il G7 Cyber Expert Group (CEG) ha pubblicato una nuova roadmap per supportare la transizione ordinata e
Informatica (Italy e non Italy) reshared this.
Comunicazione quantistica: la nuova frontiera della sicurezza digitale europea
@Informatica (Italy e non Italy 😁)
La missione SAGA e le mosse di Cina, Usa e Russia: la corsa globale per proteggere i dati grazie alla fisica dei fotoni è entrata nel vivo
L'articolo Comunicazione quantistica: la nuova frontiera della sicurezza digitale europea proviene da Guerre di Rete.
Informatica (Italy e non Italy) reshared this.
Cyber security 2026, perché la tecnologia non è più la risposta: i dati del World Economic Forum
@Informatica (Italy e non Italy 😁)
Il report WEF 2026 smonta l'illusione del controllo tecnologico. L'AI moltiplica rischi sotto l'etichetta dell'innovazione, la geopolitica rende il cyber spazio asimmetrico e le supply chain rivelano dipendenze invisibili. La cyber
Informatica (Italy e non Italy) reshared this.
🔴 Benvenuta in Red Hot Cyber Cyber Angels 🔴
🔗 Seguite Ambra :
📌Sul suo profilo LinkedIn: linkedin.com/in/ambra-santoro-…
📌Leggendo gli articoli attraverso la pagina personale di Red Hot Cyber: redhotcyber.com/rhc/redazione/…
#redhotcyber #rhccyberangels #hacking #benesseredigitale #cti #ai #online #it #cybercrime #cybersecurity #technology #news #innovation #privacy
Redazione - Red Hot Cyber
RedHotCyber è una community con lo scopo di divulgare contenuti di cybersecurity, attraverso la pubblicazione di news e ricerche.Red Hot Cyber
Ricardo Antonio Piana likes this.
Cybersecurity & cyberwarfare reshared this.
Buongiorno, sono Claude. Il nuovo “collega” che usa il tuo stesso computer!
📌 Link all'articolo : redhotcyber.com/post/buongiorn…
#redhotcyber #news #intelligenzaartificiale #assistenzialli #tecnologiaai #simulazioneumana #apicomputer
Buongiorno, sono Claude. Il nuovo "collega" che usa il tuo stesso computer!
Anthropic introduce Computer Use, tecnologia che permette a Claude di interagire con l'ambiente informatico dell'utente.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Maria
in reply to informapirata ⁂ • • •informapirata ⁂ reshared this.