Brutkey

Cybersecurity & cyberwarfare
@cybersecurity@poliverso.org
Cybersecurity & cyberwarfare
@cybersecurity@poliverso.org

Remembering James Lovell: the Man Who Cheated Death in Space

Many people have looked Death in the eye sockets and survived to tell others about it, but few situations speak as much to the imagination as situations where there’s absolutely zero prospect of rescuers swooping in. Top among these is the harrowing tale of the Apollo 13 moon mission and its crew – commanded by James “Jim” Lovell – as they found themselves stranded in space far away from Earth in a crippled spacecraft, facing near-certain doom.

Lovell and his crew came away from that experience in one piece, with millions tuning into the live broadcast on April 17 of 1970 as the capsule managed to land safely back on Earth, defying all odds. Like so many NASA astronauts, Lovell was a test pilot. He graduated from the US Naval Academy in Maryland, serving in the US Navy as a mechanical engineer, flight instructor and more, before being selected as NASA astronaut.

On August 7, 2025, Lovell died at the age of 97 at his home in Illinois, after a dizzying career that saw a Moon walk swapped for an in-space rescue mission like never seen before.
Joining The Navy


The USS
Shangri-La underway in 1970. (Credit: US Navy)
James Arthur Lovell Jr. was born in Cleveland, Ohio, on March 25, 1928. He was the sole child, with his father dying in a car accident when he was five years old. After this he and his mother lived with a relative in Indiana, before moving to Wisconsin where Lovell attended Juneau High School. He attained the Boy Scouts’ highest rank of Eagle Scout, while also displaying an avid interest in rocketry including the building of flying models.

After graduating from high school, Lovell studied engineering under the US Navy’s
Flying Midshipman program from 1946 to 1948, which focused on training new naval aviators. This was a sponsored program by the US Navy, with the student required to enlist as Apprentice Seaman and to serve in the Navy for five years, including one year of active duty.

As this program was being rolled back in the wake of the end of WW2, Lovell saw himself and others like him pressured to transfer out, with Lovell applying at the US Naval Academy in Annapolis, Maryland. Here he would continue his engineering studies, graduating with a Bachelor of Science degree in the Spring of 1952.

After graduation he was commissioned as an ensign in the US Navy, got selected for naval aviation training and was later assigned to the
Essex-class aircraft carrier USS Shangri-La during the 1950s where he flew many missions, racking up a reported total of 107 carrier landings. Once back ashore he became a flight instructor for Navy pilots.
To Space And Beyond



With NASA selecting its future astronauts from the military’s test pilots for a variety of reasons, it was only a matter of time before Lovell would be in the running for the first group of astronauts considering his performance in the Navy. Although he got put on the list of potential astronauts for Project Mercury, he narrowly missed joining the
Mercury Seven. After applying for the second group, however, he ended up being selected for Mercury’s successor project: Project Gemini.
The Pacific Ocean as seen from the Gemini 7 capsule on 8 December 1965 by astronauts Borman and Lovell. (Credit
NASA)
Lovell would fly on two Gemini missions,
Gemini 7 and Gemini 12, with the latter seeing Lovell being joined by Edwin “Buzz” Aldrin as the pilot. Before embarking on Gemini 7, Lovell and his fellow astronaut Frank F. Borman were given the advice by Pete Conrad – who had previously spent eight days on Gemini 5 – to take books along for the ride. Considering that Gemini 7 was an endurance mission lasting nearly two weeks, this turned out to be very good advice, indeed.
Edwin “Buzz” Aldrin performing an EVA during the first day of the 4-day Gemini 12 mission. (Credit:
NASA, James Lovell)
The four-day Gemini 12 mission would be the last mission in the project, taking place during November of 1966. During this mission Aldrin demonstrated a number of extra-vehicular activities (EVAs), showing that humans could perform activities outside of the spacecraft, thus clearing the way for Project Apollo.
Lucky Apollo 13



Although Lovell is generally associated with Apollo 13, his third spaceflight was on
Apollo 8 which launched on December 21st of 1968. This was the first manned Apollo mission to make it to the Moon following Apollo 7 which stayed in Earth’s orbit. During Apollo 8 the crew of three – Borman, Lovell and Anders – completed ten orbits around Earth’s companion, making it the first time that humans had laid eyes on the far side of the Moon and were able to observe an Earthrise.
The famous ‘Earthrise’ photo by William Anders taken during Apollo 8. (Source:
NASA)
With the Apollo program in constant flux, Apollo 8’s mission profile was changed from a more conservative Earth orbit-bound test with the – much delayed lunar module (LM) – to the very ambitious orbiting of the Moon. This put the Apollo program back on track, however, as it skipped a few intermediate steps. After Apollo 9 demonstrated the full lunar EVA suit in space as well as docking with the LM in Earth orbit, Apollo 10 was the wet dress rehearsal for the first true Moon landing with Neil Armstrong and Buzz Aldrin taking the honors.

After Apollo 12 delivered its second batch of astronauts to the lunar surface, it was finally time for Lovell as the commander and Fred Haise as the LM pilot to add their footprints to the lunar regolith as part of the
Apollo 13 mission. After two successful Moon landings, when Apollo 13 took off from the landing pad on April 11, 1970, it seemed that this was going to be mostly a routine mission.

After making it about 330,000 km from Earth, the Apollo 13 crew was going through their well-practiced schedule, with only one active issue bothering them and ground control in Houston. This issue involved the pressure sensor in one of the service module (SM) oxygen tanks. Ground control requested that the crew try activating the stirring fans in the oxygen tanks to see whether de-stratifying the contents of the affected oxygen tank might fix the odd readings.

Ninety-five seconds after Command Module (CM) pilot John Swigert activated these fans the three astronauts heard a loud bang, accompanied by electrical power fluctuations and the attitude control thrusters automatically engaging. After briefly losing communications with Earth, Swigert called back to Houston with the now famous “Houston, we have had a problem.” phrase.

youtube.com/embed/MdvoA-sjs0A?…

As indicated by the resulting investigations, one of the oxygen tanks (Oxygen Tank 2) that fed the fuel cells for power generation had turned into a bomb owing to manufacturing and handling defects years prior. The resulting explosion also caused the loss of Oxygen Tank 1 and ultimately putting all of the CM’s fuel cells out of commission. With the CM’s batteries rapidly draining, the Apollo 13 astronauts only had minutes to put a plan together with Houston, to use the LM as their lifeboat and to devise a way to plan a course back to Earth after a fly-by of the Moon.

As these immediate concerns were addressed and Apollo 13 found itself on a course that should take it safely back to Earth, two new issues cropped up. The first was that of potable water, as normally the CM’s fuel cells would create all the water that they’d need during the mission. With the CM and its fuel cells out of commission, they had to strictly ration their limited supply, all the way down to 200 mL per person per day.
The adapted carbon dioxide scrubber on Apollo 13. (Credit:
NASA)
The other issue concerned the carbon dioxide levels. Although the LM carried sufficient oxygen, CO2 scrubbers were required to keep the levels of this gas at healthy levels, even as the crew kept adding to it with their breathing. The lithium hydroxide pellet-based scrubbers in the CM and LM were up to their individual tasks, but the LM was equipped only for the 45 hours that two astronauts would spend on the lunar surface, not keep three astronauts alive for the time that it’d take to travel back to Earth.

Annoyingly, the CM and LM scrubber canisters had different dimensions that prevented the astronauts from simply availing themselves of the CM scrubbers. This was fortunately nothing that some solid arts and crafts experience can’t fix, and the CM canisters were made to work using plastic manual covers, duct tape and whatever else was needed to bridge the gaps.

With all the essentials dealt with as well as possible considering the circumstances, the three astronauts set in for a very long and very cold wait. As most systems were shut down to preserve every bit of energy there was little any of them could do against the cold of space itself seeping into the LM even as moisture condensed on all surfaces.

Before nearing Earth, Lovell and his crew were tasked with configuring the LM’s navigation computer in preparation for final approach, as well as starting the CM up from its cold shutdown. With every step of this re-entry and required separation of the SM, CM and ultimately the LM being completely unlike the normal procedure that they had trained for, there existed significant uncertainty about how well it all would work.

Fortunately everything went off relatively without any issues and on April 17 of 1970 all three Apollo 13 astronauts made a soft splash back on Earth. This would also be Lovell’s fourth and final spaceflight.
Retirement


Apollo 13’s capsule splashing down on April 17 1970. (Credit:
NASA)
Lovell would retire from the Navy and the space program on March 1, 1973. For decades afterwards he’d serve as CEO, president and similar roles for a range of companies before retiring in 1991, only staying on the board of directors for a number of corporations including the Astronautics Corporation of America. With the fame that Apollo 13 had brought him and his two fellow astronauts none of them ever fully left the public eye.

A number of films and documentaries were made about the Apollo 13 mission, which was termed a ‘successful failure’. Lovell would make a number of cameos, with the 1995 film
Apollo 13 based on Lovell’s book Lost Moon being one of the most notable examples.

With Lovell’s death,
Fred Haise is now the last remaining member of Apollo 13 to still be alive, after Jack Swigert died from cancer in 1982.

Although a lot has been said already about Apollo 13 nearly ending in tragedy, including its auspicious number in many Western cultures, it’s impossible to deny that this mission’s crew were among the luckiest imaginable. In the dark and cold of Space, trapped between Earth and the Moon, they found themselves among the best friends imaginable to together solve a puzzle, even as their own lives were on the line.

If the oxygen tank had exploded on the return trip from the Moon, all astronauts would have likely perished. Similarly, if any of the other events during the mission had played out slightly differently, or if another emergency had occurred on top of the existing ones, things might have turned out very differently.

If there’s anything to be learned from Lovell’s life, it is probably that ‘luck’ is relative, and that team work goes a very long way.

hackaday.com/2025/08/12/rememb…

Cybersecurity & cyberwarfare
@cybersecurity@poliverso.org
Redhotcyber
@redhotcyber@mastodon.bida.im

Come previsto, il bug di WinRAR è diventato un’arma devastante per i cyber criminali

📌📌 Link all'articolo : https://www.redhotcyber.com/post/come-previsto-il-bug-di-winrar-e-diventato-unarma-devastante-per-i-cyber-criminali/

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy

Cybersecurity & cyberwarfare
@cybersecurity@poliverso.org

Come previsto, il bug di WinRAR è diventato un’arma devastante per i cyber criminali

Come era prevedibile, il famigerato bug scoperto su WinRar, viene ora sfruttato attivamente dai malintenzionati su larga scala, vista la diffusione e la popolarità del software.

Gli esperti di ESET hanno segnalato che la
vulnerabilità di WinRAR (CVE-2025-8088) recentemente risolta è stata utilizzata come 0-day negli attacchi di phishing ed è stata utilizzata per installare il malware RomCom.

La
vulnerabilità era correlata al directory traversal ed è stata risolta a fine luglio con il rilascio di WinRAR versione 7.13. Il problema consentiva l’utilizzo di archivi appositamente preparati e la decompressione dei file lungo un percorso specificato dagli aggressori.

“Durante la decompressione di un file, le versioni precedenti di WinRAR, le versioni Windows di RAR, UnRAR, il codice sorgente di UnRAR portatile e la libreria UnRAR.dll potevano utilizzare il percorso di un archivio appositamente preparato anziché quello specificato dall’utente”, hanno spiegato gli sviluppatori dell’archiviatore . “Le versioni Unix di RAR, UnRAR, il codice sorgente di UnRAR portatile e la libreria UnRAR, così come RAR per Android, non erano vulnerabili.
Pertanto, sfruttando questo bug, gli aggressori potrebbero creare archivi che decomprimono file eseguibili dannosi nella cartella di avvio di Windows situata in:
%APPDATA%\Microsoft\Windows\Start Menu\Programmi\Esecuzione automatica (locale per l’utente);
%ProgramData%\Microsoft\Windows\Start Menu\Programmi\Esecuzione automatica (per tutti gli utenti).

Dopo il successivo accesso, tale file viene eseguito automaticamente, consentendo all’aggressore di
eseguire codice sull’host remoto.

Questo problema è stato scoperto dagli esperti ESET nel luglio 2025 e ora
segnalano che, anche prima del rilascio della patch, CVE-2025-8088 è stato utilizzato negli attacchi come vulnerabilità zero-day.

Secondo i ricercatori, la vulnerabilità è stata sfruttata in
attacchi di phishing mirati volti a diffondere malware del gruppo di hacker RomCom (noto anche come Storm-0978, Tropical Scorpius e UNC2596), tra cui varianti di SnipBot, RustyClaw e Mythic.

Secondo quanto riferito, la campagna aveva come obiettivo
aziende finanziarie, manifatturiere, della difesa e della logistica in Canada e in Europa.

Il gruppo
RomCom è stato precedentemente collegato ad attacchi ransomware, furto di dati a scopo di riscatto e campagne di furto di credenziali. RomCom è noto per lo sfruttamento di vulnerabilità zero-day e l’utilizzo di malware personalizzati per rubare dati e persistere nei sistemi.

ESET sottolinea che la stessa vulnerabilità è stata recentemente sfruttata da un altro aggressore ed è stata scoperta in modo indipendente dalla società russa BI.ZONE. Inoltre, il secondo aggressore ha iniziato a sfruttare la vulnerabilità
CVE-2025-8088 pochi giorni dopo il RomCom.

L'articolo
Come previsto, il bug di WinRAR è diventato un’arma devastante per i cyber criminali proviene da il blog della sicurezza informatica.

Cybersecurity & cyberwarfare
@cybersecurity@poliverso.org
Cybersecurity & cyberwarfare
@cybersecurity@poliverso.org
Cybersecurity & cyberwarfare
@cybersecurity@poliverso.org
Cybersecurity & cyberwarfare
@cybersecurity@poliverso.org

When a Badge Misses the Mark: WHY 2025

The largest European hacker camp this year was in the Netherlands — What Hackers Yearn (WHY) 2025 is the latest in the long-running series of four-yearly events from that country, and 2025 saw a move from the Flevoland site used by SHA2017 and MCH2021, back to just north of Alkmaar in Noord-Holland, where the OHM2013 event took place. WHY has found itself making the news in the Dutch technical media for all the wrong reasons over the last few days,
after serious concerns were raised about the fire safety of its badge.
This is the cell supplied with the WHY badge, complete with manufacturer’s warning.
The concerns were raised from the RevSpace hackerspace in Leidschendam, and centre around the design of the battery power traces on the PCB between the battery holders and the power supply circuitry. Because the 18650 cells supplied with that badge lack any protection circuitry, bridging the power traces could be a fire risk.

In short: their report names the cell holders as having tags too large for their pads on the PCB, a too-tight gap between positive and negative battery traces, protected only by soldermask, and the inadequacy of the badge’s short circuit protection. In the event that metal shorted these battery tags, or wore through the soldermask, the batteries would be effectively shorted, and traces or components could get dangerously hot.

The WHY organizers have responded with a printed disclaimer leaflet warning against misuse of the cells, and added a last-minute epoxy coating to the boards to offer additional protection. Some people are 3D-printing cases, which should also help reduce the risk of short-circuiting due to foreign metal objects. A powerbank with short-circuit protection would solve the problem as well. Meanwhile a group of hackers collecting aid for Ukraine are accepting the batteries as donations.

It’s understood that sometimes bugs find their way into any project, and in that an event badge is no exception. In this particular case, the original Dutch badge team resigned en masse at the start of the year following a disagreement with the WHY2025 organizers, so this badge has been a particularly hurried production. (Editor’s note: the group that brought the 18650 concerns to light has some overlap with the group that left the WHY2025 badge project.) Either way, we are fortunate that the issue was spotted before any regrettable incidents occurred.

hackaday.com/2025/08/12/when-a…

Cybersecurity & cyberwarfare
@cybersecurity@poliverso.org

BreachForums sequestrato e trasformato in un honeypot dalle forze dell'ordine


Il famigerato mercato di criminalità informatica e fuga di dati,
#BreachForums , è stato compromesso e ora opera presumibilmente come un honeypot controllato dalle forze dell'ordine internazionali. L'annuncio sorprendente è arrivato dal noto autore di minacce ShinyHunters tramite un messaggio firmato PGP pubblicato su Telegram. Secondo il messaggio, le forze dell'ordine francesi, in coordinamento con il Dipartimento di Giustizia degli Stati Uniti (DOJ) e l'FBI (Federal Bureau of Investigation), hanno preso il controllo della piattaforma, della sua infrastruttura e della sua chiave PGP ufficiale. Poco dopo la diffusione di questo avviso, il forum è andato offline, dando ulteriore peso alle affermazioni

dailydarkweb.net/breachforums-…

@informatica@feddit.it

Grazie a
Michele Pinassi per la segnalazione

Cybersecurity & cyberwarfare
@cybersecurity@poliverso.org

Basta Dazi per 90 Giorni! Cina e USA raggiungono un accordo economico temporaneo

Il Governo della Repubblica Popolare Cinese (“Cina”) e il Governo degli Stati Uniti d’America (“USA”), secondo quanto riportato da l’agenzia di stampa
Xinhua di Pechino del 12 agosto e sulla base della dichiarazione congiunta Cina-Stati Uniti sui colloqui economici e commerciali di Ginevra raggiunta il 12 maggio 2025, si sono accordati a sospendere l’applicazione della tariffa del 24% sui dazi per 90 giorni a partire dal 12 agosto 2025,

Le due parti hanno ricordato i loro impegni assunti nell’ambito della Dichiarazione congiunta di Ginevra e hanno concordato di adottare le seguenti misure dal 12 agosto 2025:

1. Gli Stati Uniti continueranno a modificare l’attuazione delle tariffe ad valorem aggiuntive sui beni cinesi (
inclusi i beni provenienti dalla Regione amministrativa speciale di Hong Kong e dalla Regione amministrativa speciale di Macao) come stabilito nell’Ordine esecutivo n. 14257 del 2 aprile 2025 e sospenderanno nuovamente l’applicazione della tariffa del 24% per 90 giorni a partire dal 12 agosto 2025, mantenendo al contempo la restante tariffa del 10% imposta su tali beni come stabilito nell’Ordine esecutivo.

2. La Cina continuerà a (i) modificare l’attuazione delle tariffe ad valorem sui beni statunitensi come previsto dall’annuncio della Commissione fiscale n. 4 del 2025, sospendendo la tariffa del 24% per altri 90 giorni a partire dal 12 agosto 2025, mantenendo al contempo la restante tariffa del 10% su tali beni; e (ii) adottare o mantenere le misure necessarie per sospendere o annullare le contromisure non tariffarie contro gli Stati Uniti, come concordato nella Dichiarazione congiunta di Ginevra.

Questa dichiarazione congiunta si basa sugli incontri svolti durante i Colloqui economici e commerciali di Stoccolma tra Cina e Stati Uniti.

I colloqui si sono svolti nell’ambito della Dichiarazione congiunta di Ginevra. Il rappresentante cinese era il Vice Primo Ministro He Lifeng, mentre i rappresentanti statunitensi erano il Segretario al Tesoro Scott Besant e il Rappresentante per il Commercio degli Stati Uniti Jamison Greer.

L'articolo
Basta Dazi per 90 Giorni! Cina e USA raggiungono un accordo economico temporaneo proviene da il blog della sicurezza informatica.

Cybersecurity & cyberwarfare
@cybersecurity@poliverso.org

Verso Skynet: la Johns Hopkins University migliora le simulazioni di guerra con l’intelligenza artificiale

La Johns Hopkins University nel Maryland si sta preparando ad aggiornare i
suoi strumenti di wargame basati sull’intelligenza artificiale per aiutare il Pentagono a identificare i punti deboli degli avversari nei conflitti reali. Il lavoro, condotto presso l’ Applied Physics Laboratory (APL) dell’università , prevede l’aggiornamento di due sistemi, Generative Wargaming (GenWar) e Strategic AI Gaming Engine (SAGE), utilizzando dati proprietari per i programmi del Dipartimento della Difesa.

Il wargaming, utilizzato per mettere in pratica le decisioni in ambienti complessi e incerti, rimane uno strumento chiave per analizzare il comportamento umano in contesti complessi e incerti attraverso l’apprendimento esperienziale. Tuttavia, il wargaming tradizionale richiede facilitatori esperti e una progettazione complessa, il che riduce la velocità e la scalabilità del processo.

GenWar combina
intelligenza artificiale generativa, modellazione, simulazione e competenze umane per creare ed eseguire scenari in pochi giorni anziché mesi, analizzare decine di futuri alternativi e concentrare gli esperti umani sugli scenari più significativi.

Secondo Andrew Mara, direttore del National Security Analysis Office dell’APL,
il Pentagono è alla ricerca di soluzioni come questa da oltre un decennio. Ora, secondo lui, necessità e tecnologia si sono incontrate, e la combinazione di tecnologie all’avanguardia e un team esperto potrebbe cambiare la natura stessa del war gaming.

SAGE
, attualmente in fase di beta testing con ex alti funzionari del Pentagono, fa un ulteriore passo avanti utilizzando l’intelligenza artificiale generativa per sostituire i giocatori umani. Questo gli consente di simulare più scenari, trovare risultati inaspettati e identificare schemi ricorrenti che potrebbero sfuggire all’attenzione umana.

James Miller, vicedirettore per le politiche e l’analisi dell’APL, ha osservato che
il valore dell’intelligenza artificiale nel wargame sta nell’ampliare l’orizzonte delle possibili soluzioni, comprese quelle che gli esseri umani potrebbero non prendere in considerazione. Gli esperti possono quindi concentrarsi sui risultati chiave.

GenWar integra l’intelligenza artificiale non solo nel ciclo di gioco, ma anche nei processi di simulazione,
consentendo agli utenti non tecnici di lavorare tramite un’interfaccia di chat. Analisti, pianificatori e operatori possono generare e valutare rapidamente decine di possibili linee d’azione, e il sistema fornisce una verifica fisica delle decisioni, ha spiegato APL.

APL ritiene che l’introduzione dell’intelligenza artificiale nei wargame consentirà a una più ampia gamma di specialisti di accedere a sofisticati strumenti analitici e di accelerare la preparazione a potenziali scenari di conflitto.

L'articolo
Verso Skynet: la Johns Hopkins University migliora le simulazioni di guerra con l’intelligenza artificiale proviene da il blog della sicurezza informatica.