Salta al contenuto principale


LA GUERRA: ALCUNE DEFINIZIONI E CARATTERISTICHE (PRIMA PARTE)

@Informatica (Italy e non Italy 😁)

In questi ultimi anni la comunicazione, scritta e verbale, ci ha subissato di informazioni inerenti alle guerre, seppur concentrandosi sulle due principali.
L'articolo LA GUERRA: ALCUNE DEFINIZIONI E CARATTERISTICHE (PRIMA PARTE) proviene da GIANO NEWS.
#DIFESA


Cybersecurity & cyberwarfare ha ricondiviso questo.


Burnout: un allarme di sistema nell’IT e nella Cyber Security aziendale

📌 Link all'articolo : redhotcyber.com/post/burnout-u…

#redhotcyber #news #cybersecurity #burnout #stresslavorativo #salutelavorativa #sicurezzainformatica


Cybersecurity & cyberwarfare ha ricondiviso questo.


196 – L’AI è ovunque, ma il lavoro no. Cosa fare, adesso camisanicalzolari.it/196-lai-e…
in reply to Marco Camisani Calzolari

🤖 Tracking strings detected and removed!

🔗 Clean URL(s):
camisanicalzolari.it/196-lai-e…

❌ Removed parts:
?utm_source=dlvr.it&utm_medium=mastodon



The Intel 8087 and Conditional Microcode Tests


Continuing his reverse-engineering of the Intel 8087, [Ken Shirriff] covers the conditional tests that are implemented in the microcode of this floating point processing unit (FPU). This microcode contains the details on how to perform the many types of specialized instructions, like cos and arctan, all of which decode into many microcode ops. These micro ops are executed by the microcode engine, which [Ken] will cover in more detail in an upcoming article, but which is effectively its own CPU.

Conditional instructions are implemented in hardware, integrating the states of various functional blocks across the die, ranging from the instruction decoder to a register. Here, the evaluation is performed as close as possible to the source of said parameter to save on wiring.

Implementing this circuitry are multiplexers, with an example shown in the top die shot image. Depending on the local conditions, any of four pass transistors is energized, passing through that input. Not shown in the die shot image are the inverters or buffers that are required with the use of pass transistors to amplify the signal, since pass transistors do not provide that feature.

Despite how firmly obsolete the 8087 is today, it still provides an amazing learning opportunity for anyone interested in ASIC design, which is why it’s so great that [Ken] and his fellow reverse-engineering enthusiasts keep plugging away at recovering all this knowledge.


hackaday.com/2026/01/11/the-in…



The SCSI Film Scanner Resurrection


[Ronan] likes 35mm film photography, but the world, of course, has gone digital. He picked up an Epson FilmScan 200 for about €10. This wonder device from 1997 promised to convert 35mm film to digital at 1200 DPI resolution. But there was a catch: it connects via SCSI. Worse, the drivers were forever locked to Windows 95/98 and Mac System 7/8.

In a surprise twist, though, [Ronan] recently resurrected a Mac SE/30 with the requisite SCSI port and the System 7 OS. Problem solved? Not quite. The official software is a plugin for Photoshop. So the obvious answer is to write new software to interact with the device.

First, of course, you have to figure out how the device works. A service manual provided clues that, as far as the SCSI bus knew, the device wasn’t a scanner at all, but a processor. The processor, though, used SCSI as a simple pipe to handle Epson’s standard “ESC/I” protocol.

Armed with that information and a knowledge of the Mac’s SCSI Manager API, the rest is just coding. Well, that is until [Ronan] tried to scan the other five negatives in the six-negative film carrier. He was frustrated until he found an old patched SANE driver for the scanner from 2002. By looking at how it worked, he was able to figure out how to switch to the other negatives.

Color scanning also took a little coaxing. The scanner returns three monochrome images, one for each color channel. Some assembly, then, is required. In the end, though, the project was a complete success. Can’t find a FilmScan 200? Don’t have a SCSI port? There’s always the roll-your-own approach.


hackaday.com/2026/01/11/the-sc…



A Much Faster Mac On A Microcontroller


Emulating older computers on microcontrollers has been a staple of retrocomputing for many years now, with most 8-bit and some 16-bit machines available on Atmel, ARM, or ESP32 platforms. But there’s always been a horsepower limit, a point beyond which a microcontroller is no longer enough, and a “proper” computer is needed. One of those barriers now appears to have been broken, as microcontroller-based emulation moves into the 32-bit era. [Amcchord] has the Basilisk II emulator ported to the ESP32-P4 platform, providing a 68040 Mac able to run OS8.1. This early-1990s-spec machine might not seem like much in 2026, but it represents a major step forward.

The hardware it uses is the M5Stack Tab5, and it provides an emulated Mac with up to 16 MB of memory. Remember, in 1992 this would have been a high-spec machine. It manages a 15 frames per second refresh rate, which is adequate for productivity applications. The emulator uses the Tab5’s touchscreen to emulate the Mac mouse alongside support for USB input devices. To 1990 hackers, it’s almost the Mac tablet you didn’t know you would want in the future.

We like this project, both because it’s advancing the art of emulation on microcontrollers, and also because it delivers a computer that’s useful for some of the things you might have done with a Mac in 1992 and could even do today. Pulling this out on the train back then would have blown people’s minds. There’s even a chance that MacOS on something like this would turn a few heads in 2026. It’s certainly not the first emulated Mac we’ve seen though.


hackaday.com/2026/01/11/a-much…



Reverse-Engineering the Tamagotchi IR Connection


The Tamagotchi Connection is a series of Tamagotchi toys that took the original portable pet concept and mixed things up with a wireless connection, which allowed you to interact with the pets of other proud Tamagotchi owners. This wireless connection is implemented using an infrared transceiver, somewhat like IrDA, but as [Zach Resmer] discovered while reverse-engineering this connection, it’s actually what is called ‘Nearly NEC’ by [Natalie Silvanovich], who has a GitHub repository full of related Tamagotchi hacking tools and ROM dumps.

With the protocol figured out, creating a transceiver for low-bitrate infrared communication isn’t particularly hard. In this case, it was implemented using an RP2040 MCU and an appropriate IR LED and receiver pair. This Tamagometer project was also implemented as an app for the Flipper Zero, and a custom PCB called the Pico TamaBadge by [Daniel Weidman].

There’s a web application associated with [Zach]’s project using a Web Serial-enabled browser (i.e. Chrome). The serial protocol is somewhat documented in the patent for the device’s connection feature, which makes it relatively easy to implement yourself.


hackaday.com/2026/01/10/revers…



ESP with EEG — No, Not That ESP!


While EEG research might help you figure out extrasensory perception, we won’t be betting on it. However, if you want to read EEG data and use an ESP32, [Cerelog-ESP-EEG] might be the right project for you. The commercial project is an 8-channel biosensing board suitable for EEG, EMG, ECG, and brain-computer interface studies. However, the company says, “We love the hacker community! We explicitly grant permission for Personal & Educational Use.” We love you too.

They do require you to agree not to sell boards you are building, and they give you schematics, but no PC board layout. That’s understandable, although we’d guess that achieving good results will require understanding how to lay out highly sensitive circuits.

What you do get is the schematic and the firmware source. They note that you may have to modify the firmware if you want to switch modes, change gain, or enable haptic feedback, among other things. At the application layer, the device is compatible with Lab Streaming Layer, and there is a fork of OpenBCI (brain control interface) that understands how to talk to the board.

Even if you don’t want to directly clone the device, there’s a ton of information here if you are interested in EEG or any other small signal acquisition. We’ve seen a number of interfaces like this, but we are still waiting to see a killer application.


hackaday.com/2026/01/10/esp-wi…



A 1990s VNA Gets An LCD


A Vector Network Analyser, or VNA, is the ultimate multi-tool of RF test equipment. They can now be had in not very capable form for almost pocket money prices, but the professional-grade ones cost eye-watering sums. Enough to make an older VNA for a few hundred on eBay a steal, and [W3AXL] has just such a device in an HP 8714C. It’s the height of 1990s tech with a floppy drive and a green-screen CRT, but he’s homing right in on the VGA monitor port on the back. Time for a colour LCD upgrade!

There are two videos below the break, posted a year apart, because as we’re sure many of you will know, events have a habit of getting in the way of projects. In the first, we see the removal of the CRT module and safe extraction of its electronics, followed by the crafting of a display bezel for the LCD. Meanwhile, the second video deals with the VNA itself, extracting the VGA signal and routing it forward to the new module.

We’re struck not for the first time by the high quality of the construction in this piece of test equipment; it’s not only substantial but well designed for maintenance and disassembly. [W3AXL] sensibly leaves the RF part alone, but both CRT and mainboard modules slide out with minimal screw removals and few problems in reassembly.

He goes the extra mile with a second iteration of the display mount and a curved print to fit the CRT shape in the front panel. The result is a colour display on the instrument, and we’re guessing, a much lighter device, too.

If VNAs are new to you, then you might wish to learn a little about them,

youtube.com/embed/AuNkZtfcmqU?…

youtube.com/embed/vi5H66_kYRc?…


hackaday.com/2026/01/10/a-1990…



Simplifying the SmartKnob


A man's hands are shown holding a black device. A white knob is in the center of the device, and above the knob in a central protrusion from the rest of the device is a small, circular LCD device.

A knob can make a surprisingly versatile interface, particularly if it’s the SmartKnob, which builds a knob around a BLDC motor for programmable haptic response. It can rotate freely or with a set resistance, spring back to a fixed point when released, stick at detent points, and completely change its behavior as the interface demands. For people inexperienced in electronic assembly, though, smartknobs can be difficult to assemble. That’s why [Kokensha Tech] designed a simpler version, while at the same time letting it use a wider range of BLDC motors.

In addition to a motor, the original design used a magnetic encoder to detect position and a strain gauge to detect pressure on the knob. A circular LCD on the knob itself provided visual feedback, but it also required the motor to have a hollow center shaft. The LCD control wires running through the shaft proved tricky to assemble. [Kokensha Tech] moved the display out of the knob and onto a separate breakout board, which plugs into the controller board. This greatly broadens the range of compatible motors, since they no longer need a hollow shaft.

The motor now fits on a separate carrier board, which makes it easier to swap out different motors. The carrier board has mounting holes sized for a wide variety of motors, and four different types of motor connectors. [Kokensha Tech] also redesigned the rest of the PCB for easier soldering, while avoiding components with narrow pin spacing whenever possible. The original design used a LILYGO T-micro32 Plus MCU. The ESP32 is both cheaper and easier to solder, so it was a no-brainer to swap it in.

We’ve covered the original SmartKnob before, including a more in-depth look at its design. We’ve also seen another project use BLDCs and field-oriented control to make haptic knobs.

youtube.com/embed/7kSSMUdl7_k?…


hackaday.com/2026/01/10/simpli…


Cybersecurity & cyberwarfare ha ricondiviso questo.


APT28, noto come Fancy Bear, lancia attacco di credential harvesting in Europa e Asia

📌 Link all'articolo : redhotcyber.com/post/apt28-not…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #apt28 #fancybear #credentialharvesting


Cybersecurity & cyberwarfare ha ricondiviso questo.


Quando il segnale muore, il potere vince: il blackout digitale dell’Iran

📌 Link all'articolo : redhotcyber.com/post/quando-il…

A volte le cose importanti non arrivano in conferenza stampa. Arrivano come un grafico che smette di respirare: la linea della connettività che crolla, l’OSINT che si inaridisce, il rumore che cresce perché il segnale sparisce.

In Iran, la crisi interna e la dimensione cyber stanno entrando nella stessa stanza. E quando succede, la domanda non è più solo «che cosa sta accadendo?», ma «chi sta controllando la prova di ciò che accade?».

A cura di Roberto Villani

#redhotcyber #news #iran #crisipolitica #crisidigitale #censurainternet #connessionelimitate #governocontrollo #percezionecontrollo #protesteonline #repressionedigitale #libertadiparola #dirittiumani #cibernetica

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Microsoft investe nei cavi sottomarini: nuova rete globale tra America, Europa e Asia

📌 Link all'articolo : redhotcyber.com/post/microsoft…

#redhotcyber #news #caviSottomarini #infrastrutturaGlobale #reteInformatica #microsoft #dataCenter


Cybersecurity & cyberwarfare ha ricondiviso questo.


Vulnerabilità critica in ServiceNow: i rischi sono lo spoofing dell’identità

📌 Link all'articolo : redhotcyber.com/post/vulnerabi…

#redhotcyber #news #cybersecurity #hacking #servicenow #vulnerabilita #sicurezzainformatica #bug


Cybersecurity & cyberwarfare ha ricondiviso questo.


Il vero rischio dell’AI non è che sbagli, ma che funzioni troppo bene

📌 Link all'articolo : redhotcyber.com/post/il-vero-r…

#redhotcyber #news #intelligenzaartificiale #sicurezzacibernetica #risichias #cybersecurity #malware #hacking



Avventure domotiche con Zigbee


@Informatica (Italy e non Italy 😁)
TL;DR Una serie di chiacchierate tra colleghi sulla domotica domestica mi ha stimolato a scrivere un articolo per aiutare chi sta affacciandosi al mondo dell'automazione domestica.
Source

L'articolo proviene dal blog #ZeroZone di zerozone.it/arduino-esp-e-iot/…


Cybersecurity & cyberwarfare ha ricondiviso questo.


U.S. #CISA adds a flaw in #Gogs to its Known Exploited Vulnerabilities catalog
securityaffairs.com/186837/hac…
#securityaffairs #hacking

in reply to Cat 🐈🥗 (D.Burch) ⁠

@catsalad
actual door to door at my home this week:

me, answering door: "what are you selling?"

sales critter: "i'm not selling anything. i work for an advertising firm that would like to use your yard for marketing purposes."

narrator: "sure sounds like selling something..."



Cybersecurity & cyberwarfare ha ricondiviso questo.


Avvelenare l’Intelligenza Artificiale dall’interno: nasce il progetto Poison Fountain

📌 Link all'articolo : redhotcyber.com/post/avvelenar…

#redhotcyber #news #intelligenzaartificiale #vulnerabilitainformatica #cybersecurity #hacking #malware


Cybersecurity & cyberwarfare ha ricondiviso questo.


NEW: Betterment said hackers gained access to some customers' "names, email addresses and postal addresses, phone numbers, and dates of birth," and then used that info to send a crypto-related phishing attack.

The hackers reportedly made a few thousand dollars.

techcrunch.com/2026/01/12/fint…

in reply to Lorenzo Franceschi-Bicchierai

yes, I got one of the phishing emails although I haven't used betterment in about 6 years

Cybersecurity & cyberwarfare ha ricondiviso questo.


La funzionalità porno deepfake di X violano i TOS degli store: ma Tim Cook e Sundar Pichai sono dei codardi

!Da quando Grok spoglia donne e bambini, ho atteso quello che davo per scontato fosse inevitabile: la rimozione di X dagli app store di Apple e Google. Il fatto che ciò non sia ancora accaduto mi dice qualcosa di serio sulla leadership della Silicon Valley: Tim Cook e Sundar Pichai sono codardi senza spina dorsale terrorizzati da Elon Musk.!

theverge.com/policy/859902/app…

@eticadigitale

in reply to Phelipe

@mrphelz non si parla di porno, ma di Deep fake su foto di Minori. È una forma di pedopornografia

Etica Digitale (Feddit) reshared this.

in reply to informapirata ⁂

so esattamente cos'è, ma i TOS degli Store non sono specifici, quantomeno quello di App Store che parla genericamente di contenuti offensivi (almeno dando per buono quello che dice l'articolo).
A ogni modo quanto ho affermato resta valido: se quelle regole fossero effettivamente applicate dovrebbero saltare dagli store sia i social che i Browser, quindi dire che Apple e Google temono musk è un po' una forzatura

Etica Digitale (Feddit) reshared this.



Raccolta dati e AI, come informare correttamente gli interessati: le raccomandazioni


@Informatica (Italy e non Italy 😁)
La CNIL chiarisce come informare gli utenti/interessati quando si utilizzano sistemi di intelligenza artificiale, rendendo note delle linee guida molto operative e altrettanto dettagliate circa gli obblighi di trasparenza quando si raccolgono



Cos’è la guerra cognitiva e qual è la posizione della NATO


@Informatica (Italy e non Italy 😁)
Il paradigma della sicurezza globale è al centro di un cambiamento sostanziale. La NATO ha formalizzato la guerra cognitiva come nuova frontiera per la superiorità strategica. Cosa è la guerra cognitiva e quali sono i rischi che la caratterizzano
L'articolo Cos’è la guerra cognitiva e qual è la posizione della NATO



Il caso OVH, quando il Canada sfida la sovranità digitale UE: i rischi per i nostri dati


@Informatica (Italy e non Italy 😁)
Un tribunale canadese ha ordinato a OVHcloud di consegnare dati di clienti archiviati in Europa, creando un conflitto con il diritto francese e mettendo alla prova la sovranità digitale europea. Un caso in cui non è la geografia dei

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Quando parliamo di infrastrutture critiche, sovranità digitale e resilienza del Paese, ricordiamoci sempre di lui:

#redhotcyber #meme4cyber #meme #comico #cyber #hacking #hacker #infosec #infosecurity #quotes #meme


Cybersecurity & cyberwarfare ha ricondiviso questo.


154 miliardi di dollari sporchi in crypto: gli Stati ora usano l’infrastruttura criminale

📌 Link all'articolo : redhotcyber.com/post/154-milia…

#redhotcyber #news #criptovalute #mercatocrypto #attivitailegali #sanzionicrypto #restrizioniblockchain


Cybersecurity & cyberwarfare ha ricondiviso questo.


195 – Se utilizzi l’AI in azienda, devi fare queste cose subito camisanicalzolari.it/195-se-ut…

Cybersecurity & cyberwarfare ha ricondiviso questo.


Truffe su abbonamento: il nuovo volto industriale del “pig butchering”

📌 Link all'articolo : redhotcyber.com/post/truffe-su…

#redhotcyber #news #truffeonline #pigbutchering #cybersecurity #hacking #malware #phishing


Cybersecurity & cyberwarfare ha ricondiviso questo.


Europol and Spanish Police arrest 34 in crackdown on #Black #Axe criminal network
securityaffairs.com/186819/sec…
#securityaffairs #hacking

Cybersecurity & cyberwarfare ha ricondiviso questo.


Scorza: “Il 2026 sulle barricate per difendere regole e democrazia”

La rivolta anti-regolazione del 2025 punta a far dettare le “regole” dalla tecnologia. Le norme restano lo scudo dei diritti: innovazione vera è distribuire i benefici a tutti

agendadigitale.eu/cultura-digi…

@eticadigitale


Cybersecurity & cyberwarfare ha ricondiviso questo.


🔴 Benvenuta in Red Hot Cyber Cyber Angels 🔴

📩 Chi fosse interessata a partecipare alle RHC Cyber Angels può inviare la sua candidatura a
👉 redazione@redhotcyber.com

#redhotcyber #rhccyberangels #hacking #benesseredigitale #cti #ai #online #it #cybercrime #cybersecurity


Cybersecurity & cyberwarfare ha ricondiviso questo.


Il rientro in ufficio: quando la vera sbornia è quella cyber

📌 Link all'articolo : redhotcyber.com/post/il-rientr…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #dataleak #sicurezzainformatica #minaccecyber


Cybersecurity & cyberwarfare ha ricondiviso questo.


Apache Struts 2: un nuovo bug di sicurezza mette a rischio le applicazioni aziendali

📌 Link all'articolo : redhotcyber.com/post/apache-st…

#redhotcyber #news #cybersecurity #hacking #vulnerabilita #apache #struts2 #frameworkjava #sicurezzainformatica


Cybersecurity & cyberwarfare ha ricondiviso questo.


Credential-harvesting attacks by #APT28 hit Turkish, European, and Central Asian organizations
securityaffairs.com/186801/apt…
#securityaffairs #hacking

Cybersecurity & cyberwarfare ha ricondiviso questo.


La battaglia per la libertà cognitiva nell'era dell'intelligenza artificiale aziendale

La libertà di pensiero non è solo uno scudo contro le intrusioni, è il terreno su cui costruiamo tutto il resto: il diritto di esprimersi, dissentire, credere, imparare, amare. Richiede sia libertà negative (da manipolazione, sorveglianza, coercizione) sia positive (di immaginare alternative, di cercare la verità, di plasmare le nostre opinioni e preferenze).

techpolicy.press/the-battle-fo…

@aitech


Cybersecurity & cyberwarfare ha ricondiviso questo.


🚀 APERTE LE ISCRIZIONI ALLA PRIMA LIVE CLASS DEL CORSO "CYBER OFFENSIVE FUNDAMENTALS" – LIVELLO BASE 🚀

Per info e iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com

✅ Scopri il programma completo : redhotcyber.com/linksSk2L/cybe…

#redhotcyber #formazione #pentesting #pentest #formazioneonline #ethicalhacking #hacking #cybersecurity #penetrationtesting #cti #cybercrime #infosec #corsi #liveclass #hackerhood #pentesting


Cybersecurity & cyberwarfare ha ricondiviso questo.


Al via CyberAngels: il volto umano e tutto al femminile di Red Hot Cyber

📌 Link all'articolo : redhotcyber.com/post/al-via-cy…

#redhotcyber #news #cyberangels #rhccyberangels #sicurezzainformatica #minacceinformatiche


Cybersecurity & cyberwarfare ha ricondiviso questo.


Domini italiani esposti su forum underground. C’è anche un ospedale

📌 Link all'articolo : redhotcyber.com/post/domini-it…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #sicurezzainformatica #violazioneconti #ftp

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


🚀 RHC CONFERENCE 2026 (V EDIZIONE) - LOADING …

📍 Pagina dell'evento: redhotcyber.com/red-hot-cyber-…

Le sponsorizzazioni termineranno il 28 Febbraio. Per info sponsor@redhotcyber.com.

#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection