Riccardo Coluccini

@ORARiccardo
100 Followers
269 Following
310 Posts
Freelance Journalist covering hacking & surveillance | Signal +393519702612 | Wire: boter | Wickr: orariccardo | Keybase: riccardocoluccin 🔑 https://boter.eu
Pronounshe/him
website & secure contactshttps://boter.eu/
su Wired ricostruiamo invece chi fa parte del team di Esperia e analizziamo la rapida scalata avuta dalla pagina: tra apparizioni in programmi TV e ricondivisioni da parte di profili ufficiali di partiti politici, fino ad approdare ad Atreju. https://www.wired.it/article/esperia-italia-instagram-profilo-destra-societa/
Esperia Italia, se siete incappati in un loro post ci sono un po’ di cose che dovreste sapere

Dietro l’ascesa della nuova voce della destra su Instagram e TikTok c’è la mano di professionisti della comunicazione e legami che arrivano fino a uno dei più stretti collaboratori di Giorgia Meloni

Wired Italia
Esperia, un progetto di informazione online, dichiarava: "Perché oggi l’informazione sembra propaganda. Non vogliono informare, ma dire cosa pensare". I legami delle società che ci sono dietro portano però fino alla compagna di Tommaso Longobardi, guida della strategia digitale di Meloni https://irpimedia.irpi.eu/influencer-italiani-destra-sovranista-meloni/
Chi c’è dietro gli "influencer indipendenti" della destra sovranista

La compagna di Tommaso Longobardi, social media manager di Meloni, e l’ex capo ufficio stampa di Luigi Di Maio, Pietro Dettori, sono due dei soci dell’azienda proprietaria di Esperia Italia, media esploso in rete in pochi mesi

IrpiMedia
New: meet ELITE, the Palantir app ICE is using to find neighborhoods to raid. Map interface; officers search for immigrants; click person to bring up individual dossier. This is clearest link between what Palantir is building and ICE's activities on the ground yet https://www.404media.co/elite-the-palantir-app-ice-uses-to-find-neighborhoods-to-raid/
‘ELITE’: The Palantir App ICE Uses to Find Neighborhoods to Raid

Internal ICE material and testimony from an official obtained by 404 Media provides the clearest link yet between the technological infrastructure Palantir is building for ICE and the agency’s activities on the ground.

404 Media
#Cloudflare defies #Italy’s #PiracyShield, won’t block websites on 1.1.1.1 DNS - https://arstechnica.com/tech-policy/2026/01/cloudflare-may-pull-servers-out-of-italy-over-order-that-it-block-pirate-sites/ " Italy fines Cloudflare 14M euros for not blocking pirate sites on 1.1.1.1 DNS service. "
Cloudflare defies Italy’s Piracy Shield, won’t block websites on 1.1.1.1 DNS

Italy fines Cloudflare 14M euros for not blocking pirate sites on 1.1.1.1 DNS service.

Ars Technica

Are you a security researcher or journalist? We want to hear from you — please take this survey!

@PogoWasRight at DataBreaches, and yours truly at ~ this week in security ~ are running this survey to better understand the state of legal demands and criminal threats in cybersecurity.

https://forms.gle/yAiNNq2gTqE6ctWU8

Survey about legal and criminal threats experienced by journalists and security researchers

Researchers who try to responsibly disclose leaks, vulnerabilities, and other security breaches or mishaps may face legal threats or lawsuits. Similarly, journalists may find themselves threatened with lawsuits or other legal consequences if they report on leaks or breaches. Both researchers and journalists also face threats by criminals ("threat actors") if they report on them in ways the threat actors find unflattering or harmful. In our many years of reporting on leaks, breaches, and criminal gangs, DataBreaches.net and Zack Whittaker have often exchanged "war stories" about what threats we have received or had to contend with. After one particularly tiring week, we wanted to conduct a survey of researchers and journalists to ask about their experience with threats. We are using a broad definition of "researcher" to include self-defining or volunteer researchers (and not just academic or vendor-based researchers), as well as a broad definition of "journalist," to include bloggers and anyone who regularly reports on news and research, including commentary sites. Here are our questions, and we hope you will respond. Responses can be anonymous, but it will be helpful if you provide a real name or moniker and contact information, so we can follow up if we have questions. (Responses are encrypted in transmission and at-rest in line with Google's privacy policies. We plan to close this survey by end of day January 18, 2026.) Thank you for taking the time to complete this survey. (To report a survey bug, please reach out.)

Google Docs
Leakvent 18: Team Cymru – marx.wtf

Journalists: We've updated our digital security checklist for 2026. Check it out. https://freedom.press/digisec/blog/journalists-digital-security-checklist/
The 2026 journalist’s digital security checklist

Our digital security training team's checklist to help journalists secure their digital life.

Freedom of the Press

New court document in Peter Williams case reveals the former Trenchant exec continued to sell stolen code to Russian zero-day broker even after realizing that code he'd written and previously sold to Russian buyer was being "utilized" by a South Korean broker, indicating wide distribution of the code. The new doc also reveals that Williams was contracted to earn $4 million from the code he stole and sold between April 2022 and Aug 2025, though prosecutors don't say how much he actually collected on the contracts; they only say that he received $1.3 million in cryptocurrency for "upfront" payments (the contracts specified upfront payments as well as additional payments for customer support to keep the exploits working after the sale). Also, in an interview Williams did with the FBI in July 2025 while agents were still trying to determine who stole the code from Trenchant, Williams told agents that the theft of just two of the trade secrets from Trenchant amounted to about a $35 million loss for his company. Here's my story about the information in the new document:

https://www.zetter-zeroday.com/former-trenchant-exec-sold-stolen-code-to-russian-buyer-even-after-learning-that-other-code-he-sold-was-being-utilized-by-different-broker-in-south-korea/

Former Trenchant Exec Sold Stolen Code to Russian Buyer Even After Learning that Other Code He Sold Was Being "Utilized" by Different Broker in South Korea

The former executive of Trenchant who pleaded guilty this week to selling his company's software hacking tools to a zero-day broker in Russia, sold at least one of these tools to the Russian firm even after learning that a previous tool he sold the broker was being used by a

ZERO DAY
il settore della sorveglianza parla di indagini e di intelligence. #SurveillanceSecrets ci mette di nuovo di fronte ad abusi contro giornalisti, violazioni della vita privata di normali cittadini, attività investigative tra privati fuori controllo https://www.lighthousereports.com/investigation/surveillance-secrets/
Surveillance Secrets

Trove of surveillance data challenges what we thought we knew about location tracking tools, who they target and how far they have spread

Lighthouse Reports

RE: https://mastodon.social/@ORARiccardo/115373747844212786

questi esempi si aggiungono a quelli raccontati ieri, come il caso della sorveglianza ai danni del giornalista Gianluigi Nuzzi nel 2012 mentre da mesi il Vaticano era alla ricerca delle fonti dietro le sue inchieste