LA GUERRA: ALCUNE DEFINIZIONI E CARATTERISTICHE (PRIMA PARTE)
@Informatica (Italy e non Italy 😁)
In questi ultimi anni la comunicazione, scritta e verbale, ci ha subissato di informazioni inerenti alle guerre, seppur concentrandosi sulle due principali.
L'articolo LA GUERRA: ALCUNE DEFINIZIONI E CARATTERISTICHE (PRIMA PARTE) proviene da GIANO NEWS.
#DIFESA
Informatica (Italy e non Italy) reshared this.
Burnout: un allarme di sistema nell’IT e nella Cyber Security aziendale
📌 Link all'articolo : redhotcyber.com/post/burnout-u…
#redhotcyber #news #cybersecurity #burnout #stresslavorativo #salutelavorativa #sicurezzainformatica
Burnout: un allarme di sistema nell'IT e nella Cyber Security aziendale
Il burnout nella cybersecurity: come lo stress lavorativo cronico può incidere sulla sicurezza informatica e sul benessere dei professionisti del settore.Paloma Donadi (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
196 - L’AI è ovunque, ma il lavoro no. Cosa fare, adesso - Marco Camisani Calzolari
L’AI è ovunque, ma il lavoro no. Cosa fare, adesso Stiamo entrando in un mercato del lavoro in cui il problema non è l’AI che ruba posti, ma le persone che restano ferme mentre il lavoro cambia.Web Staff MCC (Marco Camisani Calzolari)
Cybersecurity & cyberwarfare reshared this.
The Intel 8087 and Conditional Microcode Tests
Continuing his reverse-engineering of the Intel 8087, [Ken Shirriff] covers the conditional tests that are implemented in the microcode of this floating point processing unit (FPU). This microcode contains the details on how to perform the many types of specialized instructions, like cos and arctan, all of which decode into many microcode ops. These micro ops are executed by the microcode engine, which [Ken] will cover in more detail in an upcoming article, but which is effectively its own CPU.
Conditional instructions are implemented in hardware, integrating the states of various functional blocks across the die, ranging from the instruction decoder to a register. Here, the evaluation is performed as close as possible to the source of said parameter to save on wiring.
Implementing this circuitry are multiplexers, with an example shown in the top die shot image. Depending on the local conditions, any of four pass transistors is energized, passing through that input. Not shown in the die shot image are the inverters or buffers that are required with the use of pass transistors to amplify the signal, since pass transistors do not provide that feature.
Despite how firmly obsolete the 8087 is today, it still provides an amazing learning opportunity for anyone interested in ASIC design, which is why it’s so great that [Ken] and his fellow reverse-engineering enthusiasts keep plugging away at recovering all this knowledge.
The SCSI Film Scanner Resurrection
[Ronan] likes 35mm film photography, but the world, of course, has gone digital. He picked up an Epson FilmScan 200 for about €10. This wonder device from 1997 promised to convert 35mm film to digital at 1200 DPI resolution. But there was a catch: it connects via SCSI. Worse, the drivers were forever locked to Windows 95/98 and Mac System 7/8.
In a surprise twist, though, [Ronan] recently resurrected a Mac SE/30 with the requisite SCSI port and the System 7 OS. Problem solved? Not quite. The official software is a plugin for Photoshop. So the obvious answer is to write new software to interact with the device.
First, of course, you have to figure out how the device works. A service manual provided clues that, as far as the SCSI bus knew, the device wasn’t a scanner at all, but a processor. The processor, though, used SCSI as a simple pipe to handle Epson’s standard “ESC/I” protocol.
Armed with that information and a knowledge of the Mac’s SCSI Manager API, the rest is just coding. Well, that is until [Ronan] tried to scan the other five negatives in the six-negative film carrier. He was frustrated until he found an old patched SANE driver for the scanner from 2002. By looking at how it worked, he was able to figure out how to switch to the other negatives.
Color scanning also took a little coaxing. The scanner returns three monochrome images, one for each color channel. Some assembly, then, is required. In the end, though, the project was a complete success. Can’t find a FilmScan 200? Don’t have a SCSI port? There’s always the roll-your-own approach.
A Much Faster Mac On A Microcontroller
Emulating older computers on microcontrollers has been a staple of retrocomputing for many years now, with most 8-bit and some 16-bit machines available on Atmel, ARM, or ESP32 platforms. But there’s always been a horsepower limit, a point beyond which a microcontroller is no longer enough, and a “proper” computer is needed. One of those barriers now appears to have been broken, as microcontroller-based emulation moves into the 32-bit era. [Amcchord] has the Basilisk II emulator ported to the ESP32-P4 platform, providing a 68040 Mac able to run OS8.1. This early-1990s-spec machine might not seem like much in 2026, but it represents a major step forward.
The hardware it uses is the M5Stack Tab5, and it provides an emulated Mac with up to 16 MB of memory. Remember, in 1992 this would have been a high-spec machine. It manages a 15 frames per second refresh rate, which is adequate for productivity applications. The emulator uses the Tab5’s touchscreen to emulate the Mac mouse alongside support for USB input devices. To 1990 hackers, it’s almost the Mac tablet you didn’t know you would want in the future.
We like this project, both because it’s advancing the art of emulation on microcontrollers, and also because it delivers a computer that’s useful for some of the things you might have done with a Mac in 1992 and could even do today. Pulling this out on the train back then would have blown people’s minds. There’s even a chance that MacOS on something like this would turn a few heads in 2026. It’s certainly not the first emulated Mac we’ve seen though.
Reverse-Engineering the Tamagotchi IR Connection
The Tamagotchi Connection is a series of Tamagotchi toys that took the original portable pet concept and mixed things up with a wireless connection, which allowed you to interact with the pets of other proud Tamagotchi owners. This wireless connection is implemented using an infrared transceiver, somewhat like IrDA, but as [Zach Resmer] discovered while reverse-engineering this connection, it’s actually what is called ‘Nearly NEC’ by [Natalie Silvanovich], who has a GitHub repository full of related Tamagotchi hacking tools and ROM dumps.
With the protocol figured out, creating a transceiver for low-bitrate infrared communication isn’t particularly hard. In this case, it was implemented using an RP2040 MCU and an appropriate IR LED and receiver pair. This Tamagometer project was also implemented as an app for the Flipper Zero, and a custom PCB called the Pico TamaBadge by [Daniel Weidman].
There’s a web application associated with [Zach]’s project using a Web Serial-enabled browser (i.e. Chrome). The serial protocol is somewhat documented in the patent for the device’s connection feature, which makes it relatively easy to implement yourself.
ESP with EEG — No, Not That ESP!
While EEG research might help you figure out extrasensory perception, we won’t be betting on it. However, if you want to read EEG data and use an ESP32, [Cerelog-ESP-EEG] might be the right project for you. The commercial project is an 8-channel biosensing board suitable for EEG, EMG, ECG, and brain-computer interface studies. However, the company says, “We love the hacker community! We explicitly grant permission for Personal & Educational Use.” We love you too.
They do require you to agree not to sell boards you are building, and they give you schematics, but no PC board layout. That’s understandable, although we’d guess that achieving good results will require understanding how to lay out highly sensitive circuits.
What you do get is the schematic and the firmware source. They note that you may have to modify the firmware if you want to switch modes, change gain, or enable haptic feedback, among other things. At the application layer, the device is compatible with Lab Streaming Layer, and there is a fork of OpenBCI (brain control interface) that understands how to talk to the board.
Even if you don’t want to directly clone the device, there’s a ton of information here if you are interested in EEG or any other small signal acquisition. We’ve seen a number of interfaces like this, but we are still waiting to see a killer application.
A 1990s VNA Gets An LCD
A Vector Network Analyser, or VNA, is the ultimate multi-tool of RF test equipment. They can now be had in not very capable form for almost pocket money prices, but the professional-grade ones cost eye-watering sums. Enough to make an older VNA for a few hundred on eBay a steal, and [W3AXL] has just such a device in an HP 8714C. It’s the height of 1990s tech with a floppy drive and a green-screen CRT, but he’s homing right in on the VGA monitor port on the back. Time for a colour LCD upgrade!
There are two videos below the break, posted a year apart, because as we’re sure many of you will know, events have a habit of getting in the way of projects. In the first, we see the removal of the CRT module and safe extraction of its electronics, followed by the crafting of a display bezel for the LCD. Meanwhile, the second video deals with the VNA itself, extracting the VGA signal and routing it forward to the new module.
We’re struck not for the first time by the high quality of the construction in this piece of test equipment; it’s not only substantial but well designed for maintenance and disassembly. [W3AXL] sensibly leaves the RF part alone, but both CRT and mainboard modules slide out with minimal screw removals and few problems in reassembly.
He goes the extra mile with a second iteration of the display mount and a curved print to fit the CRT shape in the front panel. The result is a colour display on the instrument, and we’re guessing, a much lighter device, too.
If VNAs are new to you, then you might wish to learn a little about them,
youtube.com/embed/AuNkZtfcmqU?…
youtube.com/embed/vi5H66_kYRc?…
Simplifying the SmartKnob
A knob can make a surprisingly versatile interface, particularly if it’s the SmartKnob, which builds a knob around a BLDC motor for programmable haptic response. It can rotate freely or with a set resistance, spring back to a fixed point when released, stick at detent points, and completely change its behavior as the interface demands. For people inexperienced in electronic assembly, though, smartknobs can be difficult to assemble. That’s why [Kokensha Tech] designed a simpler version, while at the same time letting it use a wider range of BLDC motors.
In addition to a motor, the original design used a magnetic encoder to detect position and a strain gauge to detect pressure on the knob. A circular LCD on the knob itself provided visual feedback, but it also required the motor to have a hollow center shaft. The LCD control wires running through the shaft proved tricky to assemble. [Kokensha Tech] moved the display out of the knob and onto a separate breakout board, which plugs into the controller board. This greatly broadens the range of compatible motors, since they no longer need a hollow shaft.
The motor now fits on a separate carrier board, which makes it easier to swap out different motors. The carrier board has mounting holes sized for a wide variety of motors, and four different types of motor connectors. [Kokensha Tech] also redesigned the rest of the PCB for easier soldering, while avoiding components with narrow pin spacing whenever possible. The original design used a LILYGO T-micro32 Plus MCU. The ESP32 is both cheaper and easier to solder, so it was a no-brainer to swap it in.
We’ve covered the original SmartKnob before, including a more in-depth look at its design. We’ve also seen another project use BLDCs and field-oriented control to make haptic knobs.
youtube.com/embed/7kSSMUdl7_k?…
APT28, noto come Fancy Bear, lancia attacco di credential harvesting in Europa e Asia
📌 Link all'articolo : redhotcyber.com/post/apt28-not…
#redhotcyber #news #cybersecurity #hacking #malware #ransomware #apt28 #fancybear #credentialharvesting
APT28, noto come Fancy Bear, lancia attacco di credential harvesting in Europa e Asia
Il gruppo APT28, noto anche come Fancy Bear, utilizza tecniche di phishing avanzato per rubare credenziali di accesso a enti di ricerca e agenzie governative. Scopri di più sulle loro tattiche e come difendersi.Loranzo Nardi (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Quando il segnale muore, il potere vince: il blackout digitale dell’Iran
📌 Link all'articolo : redhotcyber.com/post/quando-il…
A volte le cose importanti non arrivano in conferenza stampa. Arrivano come un grafico che smette di respirare: la linea della connettività che crolla, l’OSINT che si inaridisce, il rumore che cresce perché il segnale sparisce.
In Iran, la crisi interna e la dimensione cyber stanno entrando nella stessa stanza. E quando succede, la domanda non è più solo «che cosa sta accadendo?», ma «chi sta controllando la prova di ciò che accade?».
A cura di Roberto Villani
#redhotcyber #news #iran #crisipolitica #crisidigitale #censurainternet #connessionelimitate #governocontrollo #percezionecontrollo #protesteonline #repressionedigitale #libertadiparola #dirittiumani #cibernetica
reshared this
Microsoft investe nei cavi sottomarini: nuova rete globale tra America, Europa e Asia
📌 Link all'articolo : redhotcyber.com/post/microsoft…
#redhotcyber #news #caviSottomarini #infrastrutturaGlobale #reteInformatica #microsoft #dataCenter
Microsoft investe nei cavi sottomarini: nuova rete globale tra America, Europa e Asia
Microsoft annuncia accordi per nuovi cavi sottomarini in fibra ottica per migliorare la connessione tra data center e potenziare i servizi cloud come Azure e Office 365.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Vulnerabilità critica in ServiceNow: i rischi sono lo spoofing dell’identità
📌 Link all'articolo : redhotcyber.com/post/vulnerabi…
#redhotcyber #news #cybersecurity #hacking #servicenow #vulnerabilita #sicurezzainformatica #bug
Vulnerabilità critica in ServiceNow: i rischi sono lo spoofing dell'identità
Scoperta una vulnerabilità critica in ServiceNow che potrebbe consentire ad aggressori di impersonare utenti legittimi. Ecco cosa sapere.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Il vero rischio dell’AI non è che sbagli, ma che funzioni troppo bene
📌 Link all'articolo : redhotcyber.com/post/il-vero-r…
#redhotcyber #news #intelligenzaartificiale #sicurezzacibernetica #risichias #cybersecurity #malware #hacking
Il vero rischio dell’AI non è che sbagli, ma che funzioni troppo bene
L'intelligenza artificiale sta cambiando il modo in cui lavoriamo e interagiamo. Scopri come governare la relazione tra esseri umani e AI per evitare rischi e migliorare l'efficienza.Alessandro Rugolo (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Avventure domotiche con Zigbee
@Informatica (Italy e non Italy 😁)
TL;DR Una serie di chiacchierate tra colleghi sulla domotica domestica mi ha stimolato a scrivere un articolo per aiutare chi sta affacciandosi al mondo dell'automazione domestica.
Source
L'articolo proviene dal blog #ZeroZone di zerozone.it/arduino-esp-e-iot/…
Informatica (Italy e non Italy) reshared this.
securityaffairs.com/186837/hac…
#securityaffairs #hacking
U.S. CISA adds a flaw in Gogs to its Known Exploited Vulnerabilities catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw impacting Gogs to its Known Exploited Vulnerabilities catalog.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/186829/sec…
#securityaffairs #hacking
Meta fixes Instagram password reset flaw, denies data breach
Meta fixed an Instagram password reset flaw that let third parties send reset emails, while denying a data breach despite leak claims.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Avvelenare l’Intelligenza Artificiale dall’interno: nasce il progetto Poison Fountain
📌 Link all'articolo : redhotcyber.com/post/avvelenar…
#redhotcyber #news #intelligenzaartificiale #vulnerabilitainformatica #cybersecurity #hacking #malware
Avvelenare l’Intelligenza Artificiale dall’interno: nasce il progetto Poison Fountain
Un nuovo progetto, Poison Fountain, punta a indebolire i modelli di apprendimento automatico. Scopri come funziona e perchè è una minaccia.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
NEW: Betterment said hackers gained access to some customers' "names, email addresses and postal addresses, phone numbers, and dates of birth," and then used that info to send a crypto-related phishing attack.
The hackers reportedly made a few thousand dollars.
techcrunch.com/2026/01/12/fint…
Fintech firm Betterment confirms data breach after hackers send fake crypto scam notification to users | TechCrunch
Hackers gained access to some Betterment customers’ personal information through a social engineering attack, then targeted some of them with a crypto-related phishing message.Lorenzo Franceschi-Bicchierai (TechCrunch)
Cybersecurity & cyberwarfare reshared this.
La funzionalità porno deepfake di X violano i TOS degli store: ma Tim Cook e Sundar Pichai sono dei codardi
!Da quando Grok spoglia donne e bambini, ho atteso quello che davo per scontato fosse inevitabile: la rimozione di X dagli app store di Apple e Google. Il fatto che ciò non sia ancora accaduto mi dice qualcosa di serio sulla leadership della Silicon Valley: Tim Cook e Sundar Pichai sono codardi senza spina dorsale terrorizzati da Elon Musk.!
theverge.com/policy/859902/app…
Tim Cook and Sundar Pichai are cowards
Apple and Google have left X in their app stores, despite its AI-generated images that violate their own rules. There are no principles left in Silicon Valley.Elizabeth Lopatto (The Verge)
reshared this
Etica Digitale (Feddit) reshared this.
A ogni modo quanto ho affermato resta valido: se quelle regole fossero effettivamente applicate dovrebbero saltare dagli store sia i social che i Browser, quindi dire che Apple e Google temono musk è un po' una forzatura
Etica Digitale (Feddit) reshared this.
Raccolta dati e AI, come informare correttamente gli interessati: le raccomandazioni
@Informatica (Italy e non Italy 😁)
La CNIL chiarisce come informare gli utenti/interessati quando si utilizzano sistemi di intelligenza artificiale, rendendo note delle linee guida molto operative e altrettanto dettagliate circa gli obblighi di trasparenza quando si raccolgono
Informatica (Italy e non Italy) reshared this.
Cos’è la guerra cognitiva e qual è la posizione della NATO
@Informatica (Italy e non Italy 😁)
Il paradigma della sicurezza globale è al centro di un cambiamento sostanziale. La NATO ha formalizzato la guerra cognitiva come nuova frontiera per la superiorità strategica. Cosa è la guerra cognitiva e quali sono i rischi che la caratterizzano
L'articolo Cos’è la guerra cognitiva e qual è la posizione della NATO
Informatica (Italy e non Italy) reshared this.
Il caso OVH, quando il Canada sfida la sovranità digitale UE: i rischi per i nostri dati
@Informatica (Italy e non Italy 😁)
Un tribunale canadese ha ordinato a OVHcloud di consegnare dati di clienti archiviati in Europa, creando un conflitto con il diritto francese e mettendo alla prova la sovranità digitale europea. Un caso in cui non è la geografia dei
reshared this
Quando parliamo di infrastrutture critiche, sovranità digitale e resilienza del Paese, ricordiamoci sempre di lui:
#redhotcyber #meme4cyber #meme #comico #cyber #hacking #hacker #infosec #infosecurity #quotes #meme
Cybersecurity & cyberwarfare reshared this.
154 miliardi di dollari sporchi in crypto: gli Stati ora usano l’infrastruttura criminale
📌 Link all'articolo : redhotcyber.com/post/154-milia…
#redhotcyber #news #criptovalute #mercatocrypto #attivitailegali #sanzionicrypto #restrizioniblockchain
154 miliardi di dollari sporchi in crypto: gli Stati ora usano l’infrastruttura criminale
Il rapporto Chainalysis 2025 rivela un aumento dei crimini legati alle criptovalute, con 154 miliardi di dollari trasferiti verso attività illegali.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
195 - Se utilizzi l’AI in azienda, devi fare queste cose subito - Marco Camisani Calzolari
Se utilizzi l’intelligenza artificiale in azienda, devi fare queste cose subito, o rischi multe enormi. Se utilizzi l’intelligenza artificiale in azienda, devi fare alcune cose subito per essere conforme all’AI Act. Subito, non tra mesi.Web Staff MCC (Marco Camisani Calzolari)
Cybersecurity & cyberwarfare reshared this.
Truffe su abbonamento: il nuovo volto industriale del “pig butchering”
📌 Link all'articolo : redhotcyber.com/post/truffe-su…
#redhotcyber #news #truffeonline #pigbutchering #cybersecurity #hacking #malware #phishing
Truffe su abbonamento: il nuovo volto industriale del "pig butchering"
Le truffe online 'pig butchering' si evolvono in un modello di servizio facile da usare e scalabile, rendendo più semplice per i criminali eseguire frodi su larga scala.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/186819/sec…
#securityaffairs #hacking
Europol and Spanish Police arrest 34 in crackdown on Black Axe criminal network
Europol announced the arrest of 34 suspected Black Axe members in Spain during a joint operation with Spanish and European law enforcement.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Scorza: “Il 2026 sulle barricate per difendere regole e democrazia”
La rivolta anti-regolazione del 2025 punta a far dettare le “regole” dalla tecnologia. Le norme restano lo scudo dei diritti: innovazione vera è distribuire i benefici a tutti
reshared this
🔴 Benvenuta in Red Hot Cyber Cyber Angels 🔴
📩 Chi fosse interessata a partecipare alle RHC Cyber Angels può inviare la sua candidatura a
👉 redazione@redhotcyber.com
#redhotcyber #rhccyberangels #hacking #benesseredigitale #cti #ai #online #it #cybercrime #cybersecurity
Cybersecurity & cyberwarfare reshared this.
Il rientro in ufficio: quando la vera sbornia è quella cyber
📌 Link all'articolo : redhotcyber.com/post/il-rientr…
#redhotcyber #news #cybersecurity #hacking #malware #ransomware #dataleak #sicurezzainformatica #minaccecyber
Il rientro in ufficio: quando la vera sbornia è quella cyber
Il rientro in ufficio dopo le festività non è mai immediato. Caselle email intasate, progetti lasciati “in pausa” a dicembre e un’infrastruttura IT che nel frattempo non è rimasta ferma, nonostante le nostre buone intenzioni.Ambra Santoro (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Apache Struts 2: un nuovo bug di sicurezza mette a rischio le applicazioni aziendali
📌 Link all'articolo : redhotcyber.com/post/apache-st…
#redhotcyber #news #cybersecurity #hacking #vulnerabilita #apache #struts2 #frameworkjava #sicurezzainformatica
Apache Struts 2: un nuovo bug di sicurezza mette a rischio le applicazioni aziendali
Scoperta una falla di sicurezza in Apache Struts 2 che potrebbe consentire agli aggressori di rubare dati sensibili o lanciare attacchi Denial-of-Service debilitanti.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/186801/apt…
#securityaffairs #hacking
Credential-harvesting attacks by APT28 hit Turkish, European, and Central Asian organizations
APT28 targets energy, nuclear, and policy staff in Turkey, Europe, North Macedonia, and Uzbekistan with credential-harvesting attacks.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
La battaglia per la libertà cognitiva nell'era dell'intelligenza artificiale aziendale
La libertà di pensiero non è solo uno scudo contro le intrusioni, è il terreno su cui costruiamo tutto il resto: il diritto di esprimersi, dissentire, credere, imparare, amare. Richiede sia libertà negative (da manipolazione, sorveglianza, coercizione) sia positive (di immaginare alternative, di cercare la verità, di plasmare le nostre opinioni e preferenze).
techpolicy.press/the-battle-fo…
The Battle for Cognitive Liberty in the Age of Corporate AI
AI systems monetize attention, shape emotion, and blur the line between suggestion and control, writes Courtney C. Radsch.Courtney C. Radsch (Tech Policy Press)
reshared this
🚀 APERTE LE ISCRIZIONI ALLA PRIMA LIVE CLASS DEL CORSO "CYBER OFFENSIVE FUNDAMENTALS" – LIVELLO BASE 🚀
Per info e iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com
✅ Scopri il programma completo : redhotcyber.com/linksSk2L/cybe…
#redhotcyber #formazione #pentesting #pentest #formazioneonline #ethicalhacking #hacking #cybersecurity #penetrationtesting #cti #cybercrime #infosec #corsi #liveclass #hackerhood #pentesting
Cyber Offensive Fundamentals - Corso ethical hacking, penetration test
Corso in Live Class di Cyber Offensive Fundamentals: scopri penetration testing, vulnerabilità e strumenti pratici per la sicurezza informatica offensiva.Red Hot Cyber
Cybersecurity & cyberwarfare reshared this.
Al via CyberAngels: il volto umano e tutto al femminile di Red Hot Cyber
📌 Link all'articolo : redhotcyber.com/post/al-via-cy…
#redhotcyber #news #cyberangels #rhccyberangels #sicurezzainformatica #minacceinformatiche
Al via CyberAngels: il volto umano e tutto al femminile di Red Hot Cyber
Per troppo tempo abbiamo interpretato la sicurezza informatica esclusivamente come una fredda barriera di firewall e algoritmi. Abbiamo dimenticato che dietro ogni schermo, ogni attacco e ogni innovazione, batte un cuore umano.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Domini italiani esposti su forum underground. C’è anche un ospedale
📌 Link all'articolo : redhotcyber.com/post/domini-it…
#redhotcyber #news #cybersecurity #hacking #malware #ransomware #sicurezzainformatica #violazioneconti #ftp
Leak di credenziali FTP su Umbra.by: decine di domini italiani esposti
Un thread su Umbra.by pubblica un leak massivo di credenziali FTP con numerosi domini italiani coinvolti, inclusa una struttura sanitaria. Analisi CTI e implicazioni di sicurezza.Luca Stivali (Red Hot Cyber)
reshared this
🚀 RHC CONFERENCE 2026 (V EDIZIONE) - LOADING …
📍 Pagina dell'evento: redhotcyber.com/red-hot-cyber-…
Le sponsorizzazioni termineranno il 28 Febbraio. Per info sponsor@redhotcyber.com.
#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection
RHC Conference 2026
Red Hot Cyber è lieta di annunciare la prossima RHC Conference 2026. In questa pagina potete trovare tutte le informazioni relative all'evento.Red Hot Cyber
Cybersecurity & cyberwarfare reshared this.
Tracking Token Disrespector
in reply to Marco Camisani Calzolari • • •🤖 Tracking strings detected and removed!
🔗 Clean URL(s):
camisanicalzolari.it/196-lai-e…
❌ Removed parts:
?utm_source=dlvr.it&utm_medium=mastodon
196 - L’AI è ovunque, ma il lavoro no. Cosa fare, adesso - Marco Camisani Calzolari
Web Staff MCC (Marco Camisani Calzolari)