rakhim.exotext.com203IN STACK · 2026-03-12 00:00
Windows 11 after two decades of macOS: okay, but also awful
Recently my partner's trusty old 5K iMac died after 8.5 years of service (Radeon gpu is fried). At first I thought it was finally time to get one of those cool little M4 Mac Minis, but then decided to conduct an experiment. I gave up my Mac Studio M2 Max (64 Gb unified memory and 1 Tb storage) and tried to use my Windows PC as the main machine. I originally purchased it to learn Unreal Engine and to play games. Let's try to use it for everything else: programming (Rust, TypeScript, Node), mus...
Check Point Research47 · 2026-03-12 17:21
“Handala Hack” – Unveiling Group’s Modus Operandi
Key Findings Introduction Handala Hack, also tracked by Check Point Research as Void Manticore, is an Iranian threat actor that is known for multiple destructive wiping attacks combined with “hack and leak” operations. The threat actor operates several online personas, with the most prominent among them being Homeland Justice, maintained from mid-2022 specifically for multiple attacks […] The post “Handala Hack” – Unveiling Group’s Modus Operandi appeared first on Check Point Research .
Huntress Blog40 · 2026-03-12 14:00
Data Exfiltration and Threat Actor Infrastructure Exposed
Threat actors are people, too, and like everyone else, make mistakes. These mistakes can reveal insights into the threat actor, or even expose access to their infrastructure.
Mandiant | Transform Your Cybersecurity17 · 2026-03-12 03:00
Threat Hunting with Google Threat Intelligence - Episode 6 (APAC Timezone)
In this new episode of Threat Hunting with Google Threat Intelligence, we go beyond basic detection to explore how to proactively unmask sophisticated phishing operations. We will demonstrate advanced techniques to identify phishing infrastructure targeting specific brands. Furthermore, we will dive into the analysis of phishing kits, showing you how to hunt their components to start tracking new phishing websites and kits as they are uploaded to GTI. Join us to learn how to: - Track adversar...
evanhahn.com15 · 2026-03-12 00:00
How I use generative AI on this blog
Inspired by others, I’m publishing how I use generative AI to write this little blog. General feelings on generative AI Generative AI, like any technology, has tradeoffs. I think the cons far outweigh the pros. In other words, the world would be better off without generative AI. Despite this belief, I use it. I’m effectively forced at work, but I also use LLMs to help write this personal blog. I think they can produce better writing if used correctly. Also: I want to be critical of this techn...
lcamtuf (Michal Zalewski)6 · 2026-03-12 01:13
How much of HN is AI?
I have a complicated relationship with Hacker News. The site is the most important aggregator of geek news and a major source of traffic to this blog. At the same time, it has a fair number of toxic commenters, making it a dependable source of insults hurled in my general direction; if you want a taste,