How to Install OpenClaw on an Android Phone and Control It via WhatsApp
In this post I’ll show you the exact steps I use to run OpenClaw on Android by installing Ubuntu inside Termux (no root), then launching the OpenClaw Gateway and chatting with it from WhatsApp, Telegram, or Discord. What is OpenClaw? OpenClaw is a self‑hosted agent framework with a Gateway that connects large language models to
Le fughe di dati biometrici tendono ad avere conseguenze gravi tanto per le aziende che ne sono vittime quanto per le persone che le subiscono. Proteggere questo tipo di dati è possibile
Microsoft releases Windows 11 26H1 for select and upcoming CPUs
Microsoft has announced Windows 11 26H1, but it's not for existing PCs. Instead, it will ship on devices with Snapdragon X2 processors and possibly other rumored ARM chips.w
Microsoft Patch Tuesday for February 2026 — Snort rules and prominent vulnerabilities
Microsoft has released its monthly security update for February 2026, which includes 55 vulnerabilities affecting a range of products, including one (CVE-2025-59498) that Microsoft marked as “Critical”.
New threat actor, UAT-9921, leverages VoidLink framework in campaigns
Cisco Talos recently discovered a new threat actor, UAT-9221, leveraging VoidLink in campaigns. Their activities may go as far back as 2019, even without VoidLink.
New Linux botnet SSHStalker uses old-school IRC for C2 comms
A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations.
North Korean hackers use new macOS malware in crypto-theft attacks
North Korean hackers are running tailored campaigns using AI-generated video and the ClickFix technique to deliver malware for macOS and Windows to targets in the cryptocurrency sector.
Microsoft today released updates to fix more than 50 security holes in its Windows operating systems and other software, including patches for a whopping six "zero-day" vulnerabilities that attackers are already exploiting in the wild.
Google sent personal and financial information of student journalist to ICE
The tech giant handed over the personal information of a journalist and student who attended a pro-Palestinian protest in 2024. This is the latest example of ICE using its controversial subpoena powers to target people critical of the Trump administration.
Microsoft releases Windows 10 KB5075912 extended security update
Microsoft has released the Windows 10 KB5075912 extended security update to fix February 2026 Patch Tuesday vulnerabilities, including six zero-days, and continue rolling out replacements for expiring Secure Boot certificates.
Malicious 7-Zip site distributes installer laced with proxy tool
A fake 7-Zip website is distributing a trojanized installer of the popular archiving tool that turns the user's computer into a residential proxy node.
Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws
Today is Microsoft's February 2026 Patch Tuesday with security updates for 58 flaws, including 6 actively exploited and three publicly disclosed zero-day vulnerabilities.
Windows 11 KB5077181 & KB5075941 cumulative updates released
Microsoft has released Windows 11 KB5077181 and KB5075941 cumulative updates for versions 25H2/24H2 and 23H2 to fix security vulnerabilities, bugs, and add new features.
La guerra informatica sta diventando parte dell’arsenale del Pentagono
Armi informatiche in mano al Pentagono sono state testate ad inizio anno dagli Stati Uniti in Venezuela, così come lo scorso anno in Iran durante gli attacchi agli impianti nucleari. Ora pare rafforzarsi l’intenzione di integrare le operazioni in campo con attacchi virtuali
Veicoli spaziali spia russi intercettano i satelliti europei: dati non crittografati
I satelliti Luch-1 e Luch-2 da anni effettuano manovre sospette in orbita, avvicinandosi ripetutamente ad alcuni importanti satelliti geostazionari europei. Ecco quale rischio di spionaggio corrono i satelliti europei, dal momento che la crittografia non protegge i dati sensibili
Shadow IT: se i dipendenti usano WeTransfer, il problema è la governance
Portare alla luce lo Shadow IT permette di trasformare un rischio incontrollato in rischio gestito. Spesso si scopre che interi processi critici poggiano su macro Excel fatte in casa o su servizi SaaS gratuiti che potrebbero chiudere domani mattina. Riportare questi processi sotto il cappello della governance IT garantisce la continuità operativa del business stesso
Microsoft rolls out new Secure Boot certificates before June expiration
Microsoft has begun rolling out updated Secure Boot certificates through monthly Windows updates to replace the original 2011 certificates that will expire in late June 2026.
Volvo Group North America customer data exposed in Conduent hack
Volvo Group North America disclosed that it suffered an indirect data breach stemming from the compromise of IT systems at American business services giant Conduent, of which Volvo is a customer.
Come detto in questo post su LinkedIn dedico qualche articolo (e video) al mio HomeLab con lo scopo di pubblicare i dettagli tecnici della struttura che ho scelto e renderlo replicabile per chiunqu…
Microsoft 365 outage takes down admin center in North America
Microsoft is investigating an outage that blocks some administrators with business or enterprise subscriptions from accessing the Microsoft 365 admin center.
Analisi approfondita del CVE-2026-24061 telnetd exploit. Scopri come una mancata sanificazione in GNU InetUtils permetta l'ottenimento di privilegi root...
How to Automate AWS Incident Investigation with Tines and AI
Cloud incidents drag on when analysts have to leave cases to hunt through AWS consoles and CLIs. Tines shows how automated agents pull AWS CLI data directly into cases, reducing MTTR and manual investigation work.