Il Blog di Michele Pinassi – Telegram
Il Blog di Michele Pinassi
312 subscribers
365 photos
16 videos
118 files
8.18K links
Parliamo di tecnologia, politica e cybersecurity.

Post automatici e rassegna personale.
Download Telegram
F5 BIG-IP 请求走私导致远程命令执行(CVE-2023-46747)
F5 BIG-IP 请求走私导致远程命令执行(CVE-2023-46747)

by SeeBug - http://www.seebug.org/vuldb/ssvid-99776
Le nuove opportunità dell’AI: sfruttare GPT 3.5 per la deoffuscazione del codice
Usare l'IA per ricostruire il codice originale dal codice deoffuscato è senz'altro un ramo di ricerca da esplorare. Questo esperimento con GPT 3.5 ha mostrato risultati incoraggianti, anche se lontani dall'essere utili in applicazioni pratiche.

by CERT-AgID - https://cert-agid.gov.it/news/le-nuove-opportunita-dellai-sfruttare-gpt-3-5-per-la-deoffuscazione-del-codice/
Israeli Gaza conflict - The cyber perspective.pdf
1.8 MB
Un interessante report sul conflitto Israelo-Palestinese in ambito cyber
Prova Scapy direttamente nel browser!

https://scapy.net/?try=1
Rilevata vulnerabilità in prodotti Atlassian
(AL01/231031/CSIRT-ITA)

Aggiornamenti di sicurezza sanano una vulnerabilità con gravità “critica” presente in Atlassian Confluence Data Center and Server.

by CSIRT - https://www.csirt.gov.it/contenuti/rilevata-vulnerabilita-in-prodotti-atlassian-al01-231031-csirt-ita
Ever wondered what living under AI surveillance in Europe would feel like?

Don’t Spy EU allows you to scan the faces of European lawmakers through a face recognition algorithm.
They’re the ones in charge of finalizing the AI Act, so let’s make sure they fully understand the risks of biometric surveillance.

https://dontspy.eu/
Have you ever thinked about hacking your Roomba vacuum cleaner?

https://hackingroomba.com/
Analysis by the firm found that printer-related security risks are still largely overlooked by many SMBs, with one-third revealing they have no security measures in place at all to protect them.

https://www.itpro.com/security/the-humble-printer-is-still-a-leading-cause-of-cyber-attacks
Ho sempre pensato che lo smart working sia, per certi ruoli, una forma di lavoro vantaggiosa per entrambi: per il datore di lavoro, che può risparmiare sui costi di gestione dei locali e delle infrastrutture degli uffici. Per il lavoratore, che può finalmente organizzarsi a progetti, secondo i suoi tempi ed esigenze, con flessibilità.

https://www.wired.it/article/smart-working-lavoro-futuro-imprese/
federprivacy.org violato da Alpha Team?
This year, Google has seen an increase in the number of vulnerabilities impacting central processing units (CPU) across hardware systems. Two of the most notable of these vulnerabilities were disclosed in August, when Google researchers discovered Downfall (CVE-2022-40982) and Zenbleed (CVE-2023-20593), affecting Intel and AMD CPUs, respectively.

https://cloud.google.com/blog/products/identity-security/google-researchers-discover-reptar-a-new-cpu-vulnerability
"The Dragon Touch tablet also came with a very outdated version of the KIDOZ app pre-installed. This app touts being “COPPA Certified” and “turns phones & tablets into kids friendly devices for playing and learning with the best kids’ apps, videos and online content.” This version operates as kind of like a mini operating system where you can download games, apps, and configure parental controls within the app."

https://www.eff.org/deeplinks/2023/11/low-budget-should-not-mean-high-risk-kids-tablet-came-preloaded-sketchyware
Securely configuring the potentially thousands of cloud identities, workloads, and other resources needed to support the high pace of modern software development is difficult—but also critical to prevent attackers from breaching these systems, where security gaps too often go unnoticed.

https://www.datadoghq.com/state-of-cloud-security/