Ma no! Non è così che funziona!
Ma no! Non è così che funziona!
Magnus Carlsen batte ChatGPT a scacchi senza perdere un pezzo!
Link all'articolo : https://www.redhotcyber.com/post/magnus-carlsen-batte-chatgpt-a-scacchi-senza-perdere-un-pezzo-la-risposta-di-chatgpt/
Amazon Warns 220 Million Customers Of Prime Account Attacks
Scammers are sending fake emails claiming your Amazon Prime subscription will automatically renew at an unexpected price.
#amazon #amazonprime #scam #sammers #secuity #cybersecurity #infosec #hackers #hacking
DATE: July 18, 2025 at 08:36AM
SOURCE: HEALTHCARE INFO SECURITY
Direct article link at end of text block below.
What two #healthcare entities just reported #databreaches that combined affected more than 3.3 million patients? https://t.co/GDGCsaBd2r
Here are any URLs found in the article text:
Articles can be found by scrolling down the page at https://www.healthcareinfosecurity.com/ under the title "Latest"
-------------------------------------------------
Private, vetted email list for mental health professionals: https://www.clinicians-exchange.org
Healthcare security & privacy posts not related to IT or infosec are at @HIPAABot . Even so, they mix in some infosec with the legal & regulatory information.
-------------------------------------------------
#security #healthcare #doctors #itsecurity #hacking #doxxing #psychotherapy #securitynews #psychotherapist #mentalhealth #psychiatry #hospital #socialwork #datasecurity #webbeacons #cookies #HIPAA #privacy #datanalytics #healthcaresecurity #healthitsecurity #patientrecords @infosec #telehealth #netneutrality #socialengineering
VMware risolve 4 vulnerabilità critiche scoperte a Pwn2Own Berlin2025
Link all'articolo : https://www.redhotcyber.com/post/vmware-risolve-4-vulnerabilita-critiche-scoperte-a-pwn2own-berlin2025/
New Mobile Phone Forensics Tool
The Chinese have a new tool called Massistant.
Massistant is the presumed successor to Chinese forensics tool, “M... https://www.schneier.com/blog/archives/2025/07/new-mobile-phone-forensics-tool.html
#Anne #Arundel #Dermatology data breach impacts 1.9 million people
https://securityaffairs.com/180100/data-breach/anne-arundel-dermatology-data-breach-impacts-1-9-million-people.html
#securityaffairs #hacking #AAD
Un account di test dimenticato e un malware: dietro le quinte del data breach che ha colpito McDonald’s
Link all'articolo : https://www.redhotcyber.com/post/un-account-di-test-dimenticato-e-un-malware-dietro-le-quinte-del-data-breach-che-ha-colpito-mcdonalds/
LameHug: first #AI-Powered #malware linked to #Russia’s #APT28
https://securityaffairs.com/180092/hacking/lamehug-first-ai-powered-malware-linked-to-russias-apt28.html
#securityaffairs #hacking #Ukraine
Putin impone restrizioni ai software esteri che hanno “strangolato” la Russia
Link all'articolo : https://www.redhotcyber.com/post/putin-impone-restrizioni-ai-software-esteri-che-hanno-strangolato-la-russia/
5 Features Every AI-Powered #SOC Platform Needs in 2025
https://securityaffairs.com/180070/security/5-features-every-ai-powered-soc-platform-needs-in-2025.html
#securityaffairs #hacking
#Broadcom patches critical #VMware flaws exploited at #Pwn2Own #Berlin 2025
https://securityaffairs.com/180062/security/broadcom-patches-critical-vmware-flaws-exploited-at-pwn2own-berlin-2025.html
#securityaffairs #hacking
When Root Meets Immutable: OpenBSD chflags vs. Log Tampering https://www.undeadly.org/cgi?action=article;sid=20250718072438 #openbsd #immutable #chflags #logs #logtampering #security #hacking
VMware corrige falhas críticas exploradas no concurso de hacking Pwn2Own Berlin 2025 https://tugatech.com.pt/t69454-vmware-corrige-falhas-criticas-exploradas-no-concurso-de-hacking-pwn2own-berlin-2025
Criminals steal $27 million worth of cryptocurrency from crypto exchange
Crypto thefts expected to reach record levels in 2025. Hackers now steal tens of millions worth of digital currencies. The crypto exchange covers the losses.
Hack, Hacky, Hacker
A few days ago I wrote about the beauty of great documentation; this is the evil twin post.
The spectrum of meaning across the words hack, hacky, and hacker form a horseshoe when thinking about postures toward life. On either ends are the most difficult options. Being either a hack or a hacker requires dedication and both approaches narrow your world. Being hacky, taking imperfect shortcuts, in the world is immensely satisfying. It is play disguised as problem solving.
Fox by Arnold Peter Weisz Kubincan. Original public domain image from Web umeniaA successful hack takes tremendous effort and dedication just to pretend to be great at something. Humans are great at spotting and discarding hacks. It takes a true master to fool a large enough population and build financial columns under the smoke. Being a hack is constant desperation, there is no play. It is no way to live.
On the other end of the same horseshoe as the hack, is hacking. Here, you are actually achieving something difficult enough to require mastery. “Playfully doing something difficult, whether useful or not, that is hacking.” says Richard Stallman. Now, I’m all for the playful, the difficult, and the useful, but not the “or not”. At minimum hacking should be in service of a prank. Doing things just because is like felling a tree in a forest when no one is around. At least a jump scare is a sine qua non (the dictionary is working :P).
Most systems, especially computers are designed by people for people like you and me who are neither very bright nor very invested in the thing. We want to not have the problem. You can always walk away but that is neither fun, nor useful, and certainly not hard. My favored way is to take the Nakatomi Tunnel through problems. Be hacky. Try enough approaches, push buttons that may do the thing you want until the alignment is just so and you slip through. Effectiveness here = solving many real-world problems quickly while preserving playful momentum.
I want to draw a distinction here from the oversubscribed idea of jugaad. Jugaad was once framed as creative improvisation. It is not. I do not care for jugaad. To make something substandard and expect people to accept it is no way to be in the world. Build good stuff, be hacky route through the small issues.
A hacky mindset is a foxy mindset and not just in the Hendrix way. The Hedgehog and the Fox is a great essay by Isaiah Berlin where he talks about the two kinds of people in the world. Hedgehogs, are great at one big thing. Foxes are mediocre at many things. Foxes thrive on lateral moves and opportunistic shortcuts, you know, hackiness. The hacky, foxy approach to life is more my style.
Breadth, speed, and joy beat fakery and fixation every time
Come Funziona Davvero un LLM: Costi, Infrastruttura e Scelte Tecniche dietro ai Grandi Modelli di Linguaggio
Link all'articolo : https://www.redhotcyber.com/post/come-funziona-davvero-un-llm-costi-infrastruttura-e-scelte-tecniche-dietro-ai-grandi-modelli-di-linguaggio/
Coltivare la mente come difesa nella Cybersecurity: Il cervello sarà la prossima fortezza digitale?
Link all'articolo : https://www.redhotcyber.com/post/coltivare-la-mente-come-difesa-nella-cybersecurity-il-cervello-sara-la-prossima-fortezza-digitale/
Android: „Unsichtbare“ Apps kann Handys hacken. IT-Team deckt raffinierten Hacking-Trick bei Android-Smartphones auf. #Android #Handy #Smartphone #Hacking #Handyhack #IT #AndroidApp
https://www.scinexx.de/news/technik/android-unsichtbare-apps-koennen-handy-hacken/
3 bug da score 10 sono stati rilevati in Cisco ISE e ISE-PIC: aggiornamenti urgenti
Link all'articolo : https://www.redhotcyber.com/post/3-bug-da-score-10-sono-stati-rilevati-in-cisco-ise-e-ise-pic-aggiornamenti-urgenti/