Sam Altman: “L’AGI arriverà durante la presidenza Trump!”. Ma siamo davvero certi?
Link all'articolo : https://www.redhotcyber.com/post/sam-altman-lagi-arrivera-durante-la-presidenza-trump-ma-siamo-davvero-certi/

Sam Altman: “L’AGI arriverà durante la presidenza Trump!”. Ma siamo davvero certi?
Link all'articolo : https://www.redhotcyber.com/post/sam-altman-lagi-arrivera-durante-la-presidenza-trump-ma-siamo-davvero-certi/
Alla scoperta della Pseudonimizzazione: Tra definizione e valore giuridico
Link all'articolo : https://www.redhotcyber.com/post/alla-scoperta-della-pseudonimizzazione-tra-definizione-e-valore-giuridico/
Arriva RamiGPT: l’AI che automatizza la scoperta delle Privilege Escalation (PE)
Link all'articolo : https://www.redhotcyber.com/post/arriva-ramigpt-lai-che-automatizza-la-scoperta-delle-privilege-escalation-pe/
There once was a government bold
Spying on refugees, the story's told
Using spyware on the sly
To keep an eye on those who defy
Their actions, immoral and cold
#GuardianLimerick #Italy #Europe #WhatsApp #Hacking #Surveillance #Espionage #Refugees
Inside a Fake WiFi Repeater
Over the years we have seen a lot of fake electronics, ranging from fake power saving devices that you plug into an outlet, to fake car ECU optimizers that you …read more
#hacking #projects
https://hackaday.com/2025/03/27/inside-a-fake-wifi-repeater/
"More and more hackers are targeting regular people with the goal of breaking into their bank accounts, stealing their crypto, or simply stalking them. These types of attacks are still relatively rare, so there’s no need for alarm. But it’s important to know what you can do to protect yourself if you suspect someone accessed your email, social media account, chat apps, or any other major service and platform.
A few years ago, I wrote a guide to help people protect themselves, and understand that most of the companies you have an account with already offer you tools to take control of your accounts’ security, even before you contact them for help, which in some cases you still should do.
Here we break down what you can do on several different online services, including Gmail (and more broadly a Google account), Facebook, Apple ID, and more. And come back often because this is a regularly updated resource, both in terms of making sure the instructions for each individual service or platform are up to date, as well as to add new ones.
Just like in the previous guide, there’s an important caveat. You should know that these methods don’t guarantee that you haven’t been compromised."
#CyberSecurity #Privacy #Hacking #Gmail #Facebook #Apple
https://techcrunch.com/2025/03/25/how-to-tell-if-your-online-accounts-have-been-hacked/
New Open-Source Tool Spotlight
Velociraptor is an advanced DFIR (Digital Forensics and Incident Response) tool. It focuses on endpoint monitoring, hunting, and data collection using flexible artifact-based queries. Its scripting language, VQL, allows custom queries tailored for specific investigations. #DigitalForensics #CyberSecurity
Project link on #GitHub
https://github.com/Velocidex/velociraptor
#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity
— P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking
Website hijack campaign now impacting 150,000 sites https://www.developer-tech.com/news/website-hijack-campaign-now-impacting-150000-sites/ #web #developers #html #javascript #security #infosec #hacking #tech #news #technology
Spyware di Stato: Il Governo Italiano Ammette la Sorveglianza attraverso lo spyware Graphite
Link all'articolo : https://www.redhotcyber.com/post/spyware-di-stato-il-governo-italiano-ammette-la-sorveglianza-attraverso-lo-spyware-graphite/
DeepSeek o DeepScam? Quando Google ti fa scaricare un virus con un click!
Link all'articolo : https://www.redhotcyber.com/post/deepseek-o-deepfake-quando-google-ti-fa-scaricare-un-virus-con-un-click/
Nuovo Attacco Alla Supply Chain! Un Malware Invisibile Infetta Le Librerie Attendibili di NPM
Link all'articolo : https://www.redhotcyber.com/post/nuovo-attacco-alla-supply-chain-un-malware-invisibile-infetta-le-librerie-attendibili-di-npm/
Chase Light SAO Shouldn’t Have Used a 555, and Didn’t
Around these parts, projects needlessly using a microcontroller where a simpler design would do are often derided with the catch-all “Should have used a 555,” even if the venerable timer …read more
#hacking #projects
https://hackaday.com/2025/03/27/chase-light-sao-shouldnt-have-used-a-555-and-didnt/
»Auto gehackt - Sicherheitsrisiko Auto-App – wenn Hacker den Tesla kapern:
Sicherheitsexperten konnten mithilfe geleakter Daten Autos öffnen, starten und wegfahren. Einfallstor waren Auto-Apps.«
Hach ja, dass Cybersecurity auch schon lange Autofahrer betrifft, wollen anscheinend viele noch nicht wahrhaben. Apps sind öfters zur Aushorchung entwickelt und nicht für moderne Sicherheit.
The best-known member of the team of technologists in Elon Musk's U.S. DOGE Service once provided support to a cybercrime gang that bragged about trafficking in stolen data and cyberstalking an FBI agent, records show. https://www.japantimes.co.jp/news/2025/03/27/world/politics/doge-staffer-cybercrime-ring/?utm_medium=Social&utm_source=mastodon #worldnews #politics #doge #us #republicans #donaldtrump #elonmusk #hacking #personalinformation #privacy
Splunk a Rischio: Scoperta Vulnerabilità RCE Critica in Splunk Enterprise e Cloud
Link all'articolo : https://www.redhotcyber.com/post/splunk-a-rischio-scoperta-vulnerabilita-rce-critica-in-splunk-enterprise-e-cloud/
Il Giallo dell’attacco ad Oracle Cloud continua tra CVE, handle sull’Internet Archive e Meme
Link all'articolo : https://www.redhotcyber.com/post/il-giallo-dellattacco-ad-oracle-cloud-continua/
Una configurazione errata di AWS S3, porta alla divulgazione di 86.000 operatori sanitari in 29 stati degli Stati Uniti
Link all'articolo : https://www.redhotcyber.com/post/una-configurazione-errata-di-aws-s3-porta-alla-divulgazione-di-86-000-operatori-sanitari-in-29-stati-degli-stati-uniti/
Oracle customers confirm threat actor's data samples as authentic after Oracle denied a breach of its Cloud servers. #OracleBreach #Cybersecurity #DataBreach #CloudSecurity #Infosec #Oracle #Hacking #ThreatActor #CyberThreats #SecurityNews #TechNews
New Open-Source Tool Spotlight
Rubeus is a post-exploitation tool for Kerberos-related tasks on Windows. It supports ticket extraction, pass-the-ticket attacks, ticket forging, and more. A powerful choice for understanding and simulating Kerberos security flaws.
#CyberSecurity #Kerberos #RedTeam
Project link on #GitHub
https://github.com/GhostPack/Rubeus
#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity
— P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking