Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-04-22

Security on TechRepublic205IN STACK · 6d ago

Microsoft: Most Windows 11 Users Don’t Need Third-Party Antivirus

Microsoft says Windows 11’s built-in security is strong enough for most users, though power users and enterprises may still want third-party protection. The post Microsoft: Most Windows 11 Users Don’t Need Third-Party Antivirus appeared first on TechRepublic .
Hexacorn200IN STACK · 7d ago

Some unintelligent fun with ms-notepad protocol

In my previous post I have provided a list of ‘new’ protocols I noticed in the latest Windows 11 build. One that immediately caught my attention was “ms-notepad://”. You can use it to launch Notepad via “ms-notepad:// ” links and it … Continue reading →
OpenAI Blog56 · 7d ago

Speeding up agentic workflows with WebSockets in the Responses API

A deep dive into the Codex agent loop, showing how WebSockets and connection-scoped caching reduced API overhead and improved model latency.
unSafe.sh - 不安全56 · 7d ago

Deep dive into NCR APTRA & SDC Bus: Moving from Ploutus-D analysis to Black Box & E2E bypass research

Deep dive into NCR APTRA & SDC Bus: Moving from Ploutus-D analysis to Black Box & E2E bypass research
The DFIR Report55 · 7d ago

Bissa Scanner Exposed: AI-Assisted Mass Exploitation and Credential Harvesting

Key Takeaways We identified an exposed server that provided unusual visibility into a large-scale, multi-victim exploitation and collection operation. Artifacts on the host showed that Claude Code and OpenClaw were embedded in the operator’s day-to-day workflow, supporting troubleshooting, orchestration, and refinement of the collection pipeline. This AI-assisted workflow resulted in the modular platform Bissa scanner […] The post Bissa Scanner Exposed: AI-Assisted Mass Exploitation and Crede...
Palo Alto Unit 4255 · 7d ago

When Wi-Fi Encryption Fails: Protecting Your Enterprise from AirSnitch Attacks

Unit 42 research reveals AirSnitch attacks bypass WPA2/3 Wi-Fi encryption and client isolation, exposing critical infrastructure vulnerabilities. The post When Wi-Fi Encryption Fails: Protecting Your Enterprise from AirSnitch Attacks appeared first on Unit 42 .
Qualys Threat Research50 · 6d ago

Don’t Wait for a Patch. Mitigate RedSun Zero-Day Risk in Microsoft Defender Today

Key Takeaways RedSun is a zero-day local privilege escalation (LPE) vulnerability in Microsoft Defender. It allows a low-privileged user to gain full SYSTEM-level access on Windows without any kernel exploit or administrator interaction.  What makes RedSun especially dangerous is that it weaponizes a trusted, always-on security component. Most enterprise environments have Defender running continuously, making the attack surface universal across […]
Huntress Blog46 · 7d ago

Untangling a Linux Incident With an OpenAI Twist (Part 2)

A developer used OpenAI’s Codex to handle suspicious activity, leading to unexpected outcomes found by Huntress SOC analysts during an investigation.
SentinelOne Labs41 · 6d ago

LABScon25 Replay | Are Your Chinese Cameras Spying For You Or On You?

Marc Rogers and Silas Cutler expose how cheap smart home devices conceal a shadow supply chain of shell companies, firmware flaws, and foreign data routing.
Hacker News Frontpage37 · 7d ago

The eighth-generation TPU: An architecture deep dive

Article URL: https://cloud.google.com/blog/products/compute/tpu-8t-and-tpu-8i-technical-deep-dive Comments URL: https://news.ycombinator.com/item?id=47862608 Points: 27 # Comments: 2
OpenAI Blog36 · 7d ago

Making ChatGPT better for clinicians

OpenAI makes ChatGPT for Clinicians free for verified U.S. physicians, nurse practitioners, and pharmacists, supporting clinical care, documentation, and research.
The Hacker News35 · 7d ago

Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles

Cybersecurity researchers have discovered a new variant of a known malware called LOTUSLITE that's distributed via a theme related to India's banking sector. "The backdoor communicates with a dynamic DNS-based command-and-control server over HTTPS and supports remote shell access, file operations, and session management, indicating a continued espionage-focused capability set rather than
Microsoft Security Blog32 · 6d ago

AI-powered defense for an AI-accelerated threat landscape

Read how Microsoft is partnering with Anthropic and broader industry to use leading models, paired with our platforms and expertise, to turn AI-driven discovery into protection at scale. The post AI-powered defense for an AI-accelerated threat landscape appeared first on Microsoft Security Blog .
The Register (Security)29 · 6d ago

Anthropic's super-scary bug hunting model Mythos is shaping up to be a nothingburger

Hackpocalypse deferred Anthropic's Mythos model is purportedly so good at finding vulnerabilities that the Claude-maker is afraid to make it available to the general public for fear that criminals will take advantage. But early analysis shows that Mythos may not be as dangerous as some would have you believe.…
The Record from Recorded Future News29 · 6d ago

North Korean hackers siphon more than $12 million from crypto users in sprawling campaign

Researchers said the group stole up to $12 million in cryptocurrency in the first three months of 2026 through malware attacks on personal devices.
Cyber Kendra29 · 6d ago

Lovable Admits It Broke Its Own Security Fix — Exposed User Projects for 76 Days

Lovable has published a formal incident report admitting that a backend regression it introduced in February 2026 re-exposed the chat histories and source code of public projects to any authenticated user, undoing security protections the company had deliberately built throughout 2025. The exposure window ran from February 3 to April 20, 2026 — 76 days. The incident came to light after security researcher @weezerOSINT published a thread on April 20 demonstrating that five API calls from a fre...
HackerNoon27 · 6d ago

What Happens When AI Can Write Code But Not Explain It?

AI coding agents ship features faster than ever, but the humans inheriting that code can't explain how it works. Addy Osmani calls it "comprehension debt." The data backs it up: pull requests up 20%, incidents up 23.5%, maintenance costs at 4x by year two, and 45% of AI-generated code carrying known security vulnerabilities. 36 quotes from Karpathy, Willison, Osmani, Hightower, Fowler, MIT researchers, and others on what happens when code generation outpaces code understanding.
HackerNoon27 · 7d ago

Lessons Learned Hacking Infra For 30 Years With Jon Brookes

This startup technical lead is a seasoned "jack of all trades" who transitioned from early micro-computers and hardware repair to building large-scale e-commerce infrastructure. Currently focused on digital sovereignty, he develops open-source tools via headshed.dev to help users own their data and infrastructure outside of "Big Tech" walled gardens. He views AI as a powerful productivity multiplier for coding, values meritocratic platforms like HackerNoon, and advocates for a "blue" utopia d...
Qualys Threat Research27 · 7d ago

Oracle Critical Patch Update, April 2026 Security Update Review

Oracle released its second quarterly edition of this year’s Critical Patch Update. The update received patches for 481 security vulnerabilities. Some of the vulnerabilities addressed in this update impact more than one product. These patches address vulnerabilities in various product families, including third-party components in Oracle products. In this quarterly Oracle Critical Patch Update, Oracle Communications received the highest number of […]
SecurityWeek27 · 7d ago

Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM Data

Researcher says the missing piece is a governance-driven intelligence layer that turns SBOM and VEX data into explainable security decisions. The post Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM Data appeared first on SecurityWeek .
OpenAI Blog27 · 7d ago

Workspace agents

Learn how to build, use, and scale workspace agents in ChatGPT to automate repeatable workflows, connect tools, and streamline team operations.
SecurityWeek27 · 7d ago

Google Antigravity in Crosshairs of Security Researchers, Cybercriminals

Researchers discovered a remote code execution vulnerability and cybercriminals are using its reputation to deliver malware. The post Google Antigravity in Crosshairs of Security Researchers, Cybercriminals appeared first on SecurityWeek .
The Hacker News25 · 6d ago

Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain

Cybersecurity researchers have warned of malicious images pushed to the official "checkmarx/kics" Docker Hub repository. In an alert published today, software supply chain security company Socket revealed that unknown threat actors managed to have overwritten existing tags, including v2.1.20 and alpine, while also introducing a new v2.1.21 tag that does not correspond to an official release. The
The Hacker News25 · 6d ago

Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens

Cybersecurity researchers have flagged a fresh set of packages that have been compromised by bad actors to deliver a self-propagating worm that spreads through stolen developer npm tokens. The supply chain worm has been detected by both Socket and StepSecurity, with the companies tracking the activity under the name CanisterSprawl owing to the use of an ICP canister to exfiltrate the stolen data
Help Net Security25 · 7d ago

Progress Software fixes sneaky WAF bypass vulnerability (CVE-2026-21876)

Progress Software has fixed a slew of high-severity vulnerabilities in MOVEit WAF and LoadMaster, including a flaw (CVE-2026-21876) that may allow attackers to bypass firewall detection. MOVEit WAF (web application firewall) is designed to protect Progress’s managed file transfer platform MOVEit Transfer from web-based attacks. (A zero-day vulnerability in MOVEit Transfer was infamously exploited in 2023 by the Cl0p cyber extortion gang to grab data from hundreds of organizations.) LoadMaster...
The Hacker News25 · 7d ago

Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack

Cybersecurity researchers have discovered a previously undocumented data wiper that has been used in attacks targeting Venezuela at the end of last year and the start of 2026. Dubbed Lotus Wiper, the novel file wiper has been used in a destructive campaign targeting the energy and utilities sector in Venezuela, per findings from Kaspersky. "Two batch scripts are responsible for initiating the
The Hacker News25 · 7d ago

Toxic Combinations: When Cross-App Permissions Stack into Risk

On January 31, 2026, researchers disclosed that Moltbook, a social network built for AI agents, had left its database wide open, exposing 35,000 email addresses and 1.5 million agent API tokens across 770,000 active agents. The more worrying part sat inside the private messages. Some of those conversations held plaintext third-party credentials, including OpenAI API keys shared between agents,
OpenAI Blog24 · 7d ago

Introducing workspace agents in ChatGPT

Workspace agents in ChatGPT are Codex-powered agents that automate complex workflows, run in the cloud, and help teams scale work across tools securely.
OpenAI Blog24 · 7d ago

Introducing OpenAI Privacy Filter

OpenAI Privacy Filter is an open-weight model for detecting and redacting personally identifiable information (PII) in text with state-of-the-art accuracy
SecurityWeek22 · 7d ago

Claude Mythos Finds 271 Firefox Vulnerabilities

All the flaws could have also been found by an elite human researcher, according to Mozilla. The post Claude Mythos Finds 271 Firefox Vulnerabilities appeared first on SecurityWeek .
The Hacker News22 · 7d ago

Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug

Microsoft has released out-of-band updates to address a security vulnerability in ASP.NET Core that could allow an attacker to escalate privileges. The vulnerability, tracked as CVE-2026-40372, carries a CVSS score of 9.1 out of 10.0. It's rated Important in severity. An anonymous researcher has been credited with discovering and reporting the flaw. "Improper verification of cryptographic
BleepingComputer22 · 7d ago

Over 1,300 Microsoft SharePoint servers vulnerable to spoofing attacks

Over 1,300 Microsoft SharePoint servers exposed online remain unpatched against a spoofing vulnerability that was exploited as a zero-day and is still being abused in ongoing attacks. [...]
Ars Technica20 · 6d ago

You want your Moon landings in HD? So does NASA—here's how it's happening.

"You just push this button, and in three hours, you're counting photons."
Latest stories for ZDNET in Security20 · 7d ago

This Moto G Stylus phone deal includes a free smartwatch and more - here's how it works

Buy the Moto G Stylus directly from Motorola and get a pair of Moto Buds Loop earbuds, a Moto Watch, and Moto Tag for free.
Atomic Object20 · 7d ago

Using AI to Launch a Product: From Wireframes to a Working Prototype (Without Writing Production Code)

In a previous post, I wrote about the idea of “launching a product in one day.” Today, let’s talk about how I took the initial idea and turned it into a working prototype. In the first phase of building my puzzle game, I wasn’t thinking about deployment or databases. I was thinking about mechanics, and […] The post Using AI to Launch a Product: From Wireframes to a Working Prototype (Without Writing Production Code) appeared first on Atomic Spin .
Security Boulevard20 · 7d ago

Sendmarc Review: Features, User Experiences, Pros & Cons (2026)

Is Sendmarc worth it in 2026? Discover its features, limitations, user reviews, and how it compares to PowerDMARC for email security. The post Sendmarc Review: Features, User Experiences, Pros & Cons (2026) appeared first on Security Boulevard .
深信服千里目安全实验室20 · 7d ago

【漏洞通告】FortiClientEMS绕过认证漏洞(CVE-2026-35616)

2026年4月21日,FortiClient-Enterprise-Management-Server组件披露绕过认证漏洞,漏洞编号:CVE-2026-35616,漏洞威胁等级:高危。
Ebay20 · 7d ago

How is eBay Essential to the Circular Economy and Advancing Environmental Stewardship?

We’re proud to highlight the progress we’ve made toward a more sustainable future.
Telekom Security20 · 7d ago

Pack2TheRoot (CVE-2026-41651): Cross-Distro Local Privilege Escalation Vulnerability

Pack2TheRoot (CVE-2026-41651): Cross-Distro Local Privilege Escalation Vulnerability
The Register (Security)17 · 6d ago

Another npm supply chain worm is tearing through dev environments

Plus, the payload references 'TeamPCP/LiteLLM method' Yet another npm supply-chain attack is worming its way through compromised packages, stealing secrets and sensitive data as it moves through developers' environments, and it shares significant overlap with the open source infections attributed to TeamPCP last month.…
Security Boulevard17 · 6d ago

Tropic Trooper Pivots to AdaptixC2 and Custom Beacon Listener

IntroductionOn March 12, 2026, Zscaler ThreatLabz discovered a malicious ZIP archive containing military-themed document lures targeting Chinese-speaking individuals. Our analysis of this sample uncovered a campaign leveraging a multi-stage attack chain where a trojanized SumatraPDF reader deploys an AdaptixC2 Beacon agent, ultimately leading to the download and abuse of Visual Studio (VS) Code tunnels for remote access. During our analysis, we observed that the threat actor likely targeted C...
The Record from Recorded Future News17 · 6d ago

Hackers deployed wiper malware in destructive attacks on Venezuela’s energy sector

Hackers deployed a previously unknown wiper malware against Venezuela’s energy and utilities sector in an attack that appears to have been designed to destroy systems.
Security Boulevard17 · 6d ago

[un]prompted 2026 – macOS Vulnerability Research: Augmenting Apple’s Source Code And OS Logs With AI Agents

Author, Creator & Presenter: Olivia Gallucci, Security Engineer, Datadog Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations' YouTube Channel . Permalink The post [un]prompted 2026 – macOS Vulnerability Research: Augmenting Apple’s Source Code And OS Logs With AI Agents appeared first on Security Boulevard .
BleepingComputer17 · 6d ago

Kyber ransomware gang toys with post-quantum encryption on Windows

A new Kyber ransomware operation is targeting Windows systems and VMware ESXi endpoints in recent attacks, with one variant implementing Kyber1024 post-quantum encryption. [...]
The Decoder17 · 6d ago

Ex-OpenAI researcher Jerry Tworek launches Core Automation to build the most automated AI lab in the world

New AI lab, familiar face: former OpenAI researcher Jerry Tworek wants to push past the limits of today's AI architectures with a small team and new learning methods. The article Ex-OpenAI researcher Jerry Tworek launches Core Automation to build the most automated AI lab in the world appeared first on The Decoder .
Security Boulevard17 · 6d ago

You’re Not Watching MCPs. Anthropic’s Vulnerability Shows Why You Should Be.

Last week, researchers at OX Security published findings that should stop every security leader in their tracks. They discovered a critical vulnerability baked directly into Anthropic's Model Context Protocol SDK, affecting every supported language: Python, TypeScript, Java, and Rust. The result: remote code execution on any system running a vulnerable MCP implementation, with direct access to sensitive user data, internal databases, API keys, and chat histories. Over 7,000 publicly accessibl...
Cyber Kendra17 · 6d ago

Hackers Poisoned Official Checkmarx KICS Docker Images to Steal Infrastructure Secrets

Security researchers have uncovered a significant supply chain attack targeting Checkmarx's KICS (Keeping Infrastructure as Code Secure) — a widely used open-source tool for scanning infrastructure-as-code (IaC) files — after attackers pushed malicious images directly into its official Docker Hub repository and potentially compromised related VS Code extensions. The discovery began when Docker's internal monitoring flagged suspicious activity on the checkmarx/kics repository and alerted Socke...
The Decoder17 · 6d ago

Google's new AI tools put film scouting in Street View and promise to cut weeks of satellite analysis to minutes

At Cloud Next, Google unveiled three new AI imaging tools. Creatives can drop AI-generated images into real Street View locations, Google says city planners will be able to analyze satellite imagery in minutes instead of weeks, and developers get new models that can identify objects like bridges and power lines. The article Google's new AI tools put film scouting in Street View and promise to cut weeks of satellite analysis to minutes appeared first on The Decoder .
The Record from Recorded Future News17 · 7d ago

French police arrest suspected hacker behind dozens of data breaches

French authorities have arrested a suspected hacker believed to be behind dozens of data breaches targeting public institutions, sports federations and private organizations across the country.
SitePoint17 · 7d ago

Hybrid Cloud-Local LLM: The Complete Architecture Guide (2026)

Architecture guide covering routing logic, gateway setup, cost-benefit analysis, and production deployment patterns for hybrid LLM systems Continue reading Hybrid Cloud-Local LLM: The Complete Architecture Guide (2026) on SitePoint .
The Record from Recorded Future News17 · 7d ago

China’s cyber capabilities now equal to the US, warns Dutch intelligence

Dutch intelligence says the threat from Beijing is now largely going unmet and is so sophisticated its operations are regularly missed by intelligence agencies and cybersecurity defenders.
Help Net Security17 · 7d ago

New Mirai variants target routers and DVRs in parallel campaigns

Hidden inside newly discovered botnet malware is an unusual message from its creator: “AI.NEEDS.TO.DIE”. Dubbed “tuxnokill” by researchers at Akamai, the malware is one of two fresh Mirai botnet variants documented this month by major cybersecurity firms and, judging by the aforementioned hard-coded string, this particular variant might have been coded the old-fashioned way. “Tuxnokill” and “Nexcorium” Based on hits on the company’s global network of honeypots, Akamai found that tuxnokill is ...
BleepingComputer17 · 7d ago

New npm supply-chain attack self-spreads to steal auth tokens

A new supply chain attack targeting the Node Package Manager (npm) ecosystem is stealing developer credentials and attempting to spread through packages published from compromised accounts. [...]
The Record from Recorded Future News17 · 7d ago

UK cyber agency handling four major incidents a week as nation-state attacks surge

Britain's cybersecurity chief warned Tuesday that the country is handling four nationally significant cyber incidents every week, with the majority now traced back to hostile foreign governments rather than criminal hackers.
The Register (Security)17 · 7d ago

Google unleashes even more AI security agents to fight the baddies

Along with a bunch of new services to make sure those same agents don't cause chaos Google Cloud chief operating officer Francis deSouza has summed up his company's security strategy du jour as follows: "You need to use AI to fight AI."…
unSafe.sh - 不安全17 · 7d ago

Researcher claims Claude Desktop installs “spyware” on macOS

嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要特定的开头。首先,我需要理解文章的内容。文章讲的是安全研究员Alexander Hanff发现Claude Desktop在安装时会悄悄在多个Chromium浏览器配置文件中添加一个Native Messaging主机清单,这可能被滥用作为后门,扩大攻击面。Anthropic公司没有对此作出回应。 接下来,我要把重点提炼出来:Claude Desktop的行为、潜在风险、Anthropic的回应情况。然后用简洁的语言表达出来,确保不超过一百个字。 可能会遇到的问题是如何在有限的字数内涵盖所有关键点。可能需要舍弃一些细节,比如具体的技术术语或研究员的名字,但要保留核心信息。 最后,检查一下是否符合用户的要求:中文、简洁、直接描述内容。 安全研究员发现Claude Desktop在安装时会在多个Chromium浏览器配置文件中添加一个Native Messaging主机清单,这可能被滥用作为后门,扩大攻击面。Anthropic尚未对此作出回应。
Malwarebytes Unpacked17 · 7d ago

Researcher claims Claude Desktop installs “spyware” on macOS

A security researcher claims Claude Desktop installed spyware on his Mac. We examine the findings.
The Register (Security)17 · 7d ago

France's 'Secure' ID agency probes breach as crooks claim 19M records

Gov admits 'incident' as forum sellers boast of fresh haul covering up to a third of the population France's National Agency for "Secure" Documents is explaining a potential data spill just as crooks online claim they've nicked a third of the country's ID information.…
BleepingComputer17 · 7d ago

New GoGra malware for Linux uses Microsoft Graph API for comms

A Linux variant of the GoGra backdoor uses legitimate Microsoft infrastructure, relying on an Outlook inbox for stealthy payload delivery. [...]
Infosecurity17 · 7d ago

Researchers Uncover ProxySmart Software Powering 90+ SIM Farms

Infrawatch says ProxySmart platform enables SIM farm activity at “industrial scale”
The Register (Security)17 · 7d ago

Oil crisis? What oil crisis? IT spending de-coupled from wider war shock

Gartner sees accelerating growth in IT spending, powered by cloud and AI infrastructure investment A day after the International Energy Agency (IEA) said the US/Israel/Iran war was creating the worst energy crisis ever faced by the ‌world, Gartner increased its growth forecasts for global IT spending by nearly three percentage points.…
Help Net Security17 · 7d ago

PentAGI: Open-source autonomous AI penetration testing system

Penetration testers have long relied on collections of specialized tools, manual coordination, and documented runbooks to work through a target assessment. PentAGI, an open-source project from VXControl, attempts to automate that entire workflow using a multi-agent AI system that plans, researches, and executes penetration tests with minimal human direction. How the agent system works PentAGI organizes work into a hierarchy of flows, tasks, subtasks, and actions. An orchestrator agent receive...
The Register (Security)17 · 7d ago

Mythos found 271 Firefox flaws – but none a human couldn’t spot

Mozilla CTO says AI means developers finally have a chance to get on top of security The Mozilla Foundation has revealed it tested Anthropic’s bug-finding “Mythos” AI model and feels the results it experienced represent a watershed moment for software defenders.…
Help Net Security17 · 7d ago

Apple Intelligence flaw kept stolen tokens reusable on another device

Apple claims that Apple Intelligence, a GenAI service provided on its operating systems, is designed with an extra focus on user security and privacy through a two-stage authentication and authorization system using anonymous access tokens. However, researchers from The Ohio State University have identified vulnerabilities in this design, demonstrated on macOS 26.0 (Tahoe), that allow attackers to steal and reuse these tokens. Service infrastructure The system offloads complex requests to clo...
Hacker News Frontpage15 · 6d ago

The Illuminated Man: an unconventional portrait of JG Ballard

Article URL: https://www.theguardian.com/books/2026/apr/20/the-illuminated-man-by-christopher-priest-and-nina-allan-review-an-unconventional-portrait-of-jg-ballard Comments URL: https://news.ycombinator.com/item?id=47868832 Points: 53 # Comments: 17
Hacker News Frontpage15 · 6d ago

We found a stable Firefox identifier linking all your private Tor identities

Article URL: https://fingerprint.com/blog/firefox-tor-indexeddb-privacy-vulnerability/ Comments URL: https://news.ycombinator.com/item?id=47866697 Points: 13 # Comments: 0
Hacker News Frontpage15 · 6d ago

Startups Brag They Spend More Money on AI Than Human Employees

Article URL: https://www.404media.co/startups-brag-they-spend-more-money-on-ai-than-human-employees/ Comments URL: https://news.ycombinator.com/item?id=47865923 Points: 17 # Comments: 10
Hacker News Frontpage15 · 6d ago

Sam Altman's Creepy Eyeball-Scanning Company Gets in Bed with Zoom and Tinder

Article URL: https://gizmodo.com/sam-altmans-creepy-eyeball-scanning-company-gets-in-bed-with-zoom-and-tinder-2000748013 Comments URL: https://news.ycombinator.com/item?id=47865523 Points: 13 # Comments: 1
先知安全技术社区15 · 6d ago

SGLang GGUF 投毒致 RCE 漏洞(CVE-2026-5760)

该漏洞存在于大模型推理引擎 SGLang 中(影响 v0.5.9 及以下版本)。其核心逻辑非常直接:SGLang 在处理 /v1/rerank 请求时,会读取 GGUF 模型文件中的 tokenizer.chat_template 字段,并将其放入一个无沙箱限制的 Jinja2 环境中进行渲染。
Hacker News Frontpage15 · 7d ago

DuckDB 1.5.2 – SQL database that runs on laptop, server, in the browser

Article URL: https://duckdb.org/2026/04/13/announcing-duckdb-152 Comments URL: https://news.ycombinator.com/item?id=47864454 Points: 22 # Comments: 2
Hacker News Frontpage15 · 7d ago

Treetops glowing during storms captured on film for first time

Article URL: https://www.psu.edu/news/earth-and-mineral-sciences/story/treetops-glowing-during-storms-captured-film-first-time Comments URL: https://news.ycombinator.com/item?id=47863324 Points: 57 # Comments: 6
SecurityWeek15 · 7d ago

Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief Says

British businesses need to prepare themselves to defend against cyberattacks because the U.K. could be targeted “at scale,” if it became involved in an international conflict. The post Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief Says appeared first on SecurityWeek .
SecurityWeek15 · 7d ago

New Wiper Malware Targeted Venezuelan Energy Sector Prior to US Intervention

Dubbed Lotus Wiper, the malware targets recovery mechanisms, overwrites drives, and systematically deletes files. The post New Wiper Malware Targeted Venezuelan Energy Sector Prior to US Intervention  appeared first on SecurityWeek .
Hacker News Frontpage15 · 7d ago

Iran claims US exploited networking equipment backdoors during strikes

Article URL: https://www.tomshardware.com/tech-industry/cyber-security/iran-claims-us-exploited-networking-equipment-backdoors-during-strikes Comments URL: https://news.ycombinator.com/item?id=47861881 Points: 10 # Comments: 6
Hacker News Frontpage15 · 7d ago

CATL's new LFP battery can charge from 10 to 98% in less than 7 minutes

Article URL: https://arstechnica.com/cars/2026/04/catls-new-lfp-battery-can-charge-from-10-to-98-in-less-than-7-minutes/ Comments URL: https://news.ycombinator.com/item?id=47861703 Points: 9 # Comments: 0
SecurityWeek15 · 7d ago

North Korean Hackers Use AppleScript, ClickFix in Fresh macOS Attacks

The campaigns focus on financial organizations, including cryptocurrency, venture capital, and blockchain entities. The post North Korean Hackers Use AppleScript, ClickFix in Fresh macOS Attacks appeared first on SecurityWeek .
先知安全技术社区15 · 7d ago

结合代码分析CVE-2026-33439 OpenAM 反序列化漏洞

结合代码分析CVE-2026-33439 OpenAM 反序列化漏洞
Hacker News Frontpage15 · 7d ago

Meta employees are up in arms over a mandatory program to train AI on their

Article URL: https://www.businessinsider.com/meta-new-ai-tool-tracks-staff-activity-sparks-concern-2026-4 Comments URL: https://news.ycombinator.com/item?id=47860961 Points: 12 # Comments: 4
Hacker News Frontpage15 · 7d ago

Irony as Meta staff unhappy about running surveillance software on work PCs

Article URL: https://www.theregister.com/2026/04/22/meta_employee_surveillance_software/ Comments URL: https://news.ycombinator.com/item?id=47860742 Points: 104 # Comments: 59
Hacker News Frontpage15 · 7d ago

XOR'ing a register with itself is the idiom for zeroing it out. Why not sub?

Article URL: https://devblogs.microsoft.com/oldnewthing/20260421-00/?p=112247 Comments URL: https://news.ycombinator.com/item?id=47859861 Points: 56 # Comments: 58
Hacker News Frontpage15 · 7d ago

FBI looks into dead or missing scientists tied to NASA, Blue Origin, SpaceX

Article URL: https://fortune.com/2026/04/21/scientists-disappear-die-nasa-space-blue-origin-spacex/ Comments URL: https://news.ycombinator.com/item?id=47858246 Points: 141 # Comments: 58
SANS ISC15 · 7d ago

ISC Stormcast For Wednesday, April 22nd, 2026 https://isc.sans.edu/podcastdetail/9902, (Wed, Apr 22nd)

ISC Stormcast For Wednesday, April 22nd, 2026 https://isc.sans.edu/podcastdetail/9902, (Wed, Apr 22nd)
exp库-打造中文最大exploit库15 · 7d ago

Throttlestop Kernel Driver - Kernel Out-of-Bounds Write Privilege Escalation

# Exploit Title: Throttlestop Kernel Driver - Kernel Out-of-Bounds Write Privilege Escalation # Exploit Details: https://xavibel.com/2025/12/22/using-vulnerable-drivers-in-red-team-exercises/ # Date: 8/12/2025 # Exploit Author: Xavi Beltran # Ve......
Phoronix (Linux)13 · 6d ago

Ubuntu Rust Coreutils Audit Revealed 113 Issues, Ubuntu 26.10 Aims For "100% Rust Coreutils"

Ahead of tomorrow's Ubuntu 26.04 LTS release, Canonical published a blog post today outlining the state of Rust Coreutils for its premiere in this long-term support (LTS) version. Canonical also commissioned a security audit recently of Rust Coreutils that turned up 44 CVEs and 113 issues in total...
The Hacker News13 · 7d ago

Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API

The threat actor known as Harvester has been attributed to a new Linux version of its GoGra backdoor deployed as part of attacks likely targeting entities in South Asia. "The malware uses the legitimate Microsoft Graph API and Outlook mailboxes as a covert command-and-control (C2) channel, allowing it to bypass traditional perimeter network defenses," the Symantec and Carbon Black Threat Hunter
Phoronix (Linux)13 · 7d ago

KMSCON Continues Improving For VT Terminal Emulator In User-Space

KMSCON 9.3.4 is out today for this virtual terminal (VT) emulator in user-space that runs atop the Linux DRM/KMS APIs for those wanting to enjoy a CONFIG_VT=n Linux kernel experience...
Phoronix (Linux)13 · 7d ago

Intel LLM-Scaler vllm-0.14.0-b8.2 Released With Official Arc Pro B70 Support

As part of Intel's LLM-Scaler initiative for AI inferencing on Intel Arc hardware, out today is their vllm-0.14.0-b8.2 update that includes officially supporting the Arc Pro B70 graphics card...
Phoronix (Linux)13 · 7d ago

QEMU 11.0 Released With CET Virtualization Support, Native Nitro Enclaves

The QEMU 11.0 emulator is now available for this important piece of the open-source Linux virtualization stack...
The Hacker News13 · 7d ago

Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape

A critical security vulnerability has been disclosed in a Python-based sandbox called Terrarium that could result in arbitrary code execution. The vulnerability, tracked as CVE-2026-5752, is rated 9.3 on the CVSS scoring system. "Sandbox escape vulnerability in Terrarium allows arbitrary code execution with root privileges on a host process via JavaScript prototype chain traversal," according to
BleepingComputer12 · 6d ago

Apple fixes iOS bug that retained deleted notification data

Apple has released out-of-band security updates for iPhone and iPad devices to fix a Notification Services flaw that could allow notifications marked for deletion to remain stored on the device. [...]
Dark Reading12 · 6d ago

'The Gentlemen' Rapidly Rises to Ransomware Prominence

Not nearly as polite as the name suggests, the ransomware gang has impressed researchers with its speed in scaling up operations — and its sophistication.
BleepingComputer12 · 6d ago

New Mirai campaign exploits RCE flaw in EoL D-Link routers

A new Mirai-based malware campaign is actively exploiting CVE-2025-29635, a high-severity command-injection vulnerability affecting D-Link DIR-823X routers, to enlist devices into the botnet. [...]
Microsoft Azure Blog12 · 6d ago

Microsoft Discovery: Advancing agentic R&D at scale

Expanded preview access for Microsoft Discovery brings new enterprise-grade, agentic AI capabilities for research and development teams. The post Microsoft Discovery: Advancing agentic R&D at scale appeared first on Microsoft Azure Blog .
Palo Alto Networks Blog12 · 7d ago

Palo Alto Networks Joins DNS-OARC as a Platinum Member

Palo Alto Networks joining DNS-OARC as a Platinum Member to collaborate on DNS research and security and improve internet resilience. The post Palo Alto Networks Joins DNS-OARC as a Platinum Member appeared first on Palo Alto Networks Blog .
CISA Alerts12 · 7d ago

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-33825 Microsoft Defender Insufficient Granularity of Access Control Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog...
unSafe.sh - 不安全12 · 7d ago

好奇号在火星上发现新有机分子

嗯,用户让我帮忙总结一篇文章的内容,控制在一百个字以内,而且不需要特定的开头。首先,我得仔细阅读文章内容,抓住主要信息。 文章提到科学家在《Nature Communications》上发表的研究,好奇号在火星盖尔陨石坑发现了20多种有机分子,其中一种含氮分子结构类似DNA化合物。这支持了火星曾有适宜生命环境的观点,但不能证明确实存在过生命。有机分子可能来自非生物过程或陨石,比如苯并噻吩常与陨石相关。科学家用Sample Analysis at Mars仪器和TMAH分解大分子进行研究。 现在需要把这些信息浓缩到100字以内。重点包括:好奇号发现有机分子,含氮结构类似DNA,支持适宜环境但未证实生命存在,有机分子可能来源及研究方法。 组合起来的话,可以这样写:“好奇号在火星盖尔陨石坑发现20多种有机分子,其中一种含氮分子结构类似DNA化合物。这支持了火星曾有适宜生命环境的观点,但无法证明曾有生命。有机分子可能来自非生物过程或陨石。” 这样刚好控制在100字左右,并且涵盖了关键点。 好奇号在火星盖尔陨石坑发现20多种有机分子,其中一种含氮分子结构类似DNA化合物。这支持了火星曾有适...
奇客Solidot–传递最新科技情报12 · 7d ago

好奇号在火星上发现新有机分子

根据发表在《Nature Communications》期刊上的一项研究,科学家从好奇号在火星盖尔陨石坑采集的岩石样本中发现了 20 多种有机分子,其中一种含氮分子的结构与形成 DNA 的化合物相似,此前从未在火星上探测到。最新研究成果支持了火星可能曾经拥有适宜生命存在环境的观点,但还无法证明火星曾有过生命。有机分子被认为是生命的关键成分,但它们也可通过非生物过程形成,或通过陨石到达星球。其中一种识别的有机分子苯并噻吩(benzothiophene)通常就与太空陨石相关。科学家是利用好奇号搭载的 Sample Analysis at Mars 仪器,使用化合物 TMAH 分解大有机分子进行研究。
Graham Cluley11 · 6d ago

Smashing Security podcast #464: Rockstar got hacked. The data was junk. The secrets it revealed were not

A company that ran anonymous tip lines for 35,000 American schools - handling reports of bullying, weapons, and self-harm - boasted on its website that it had suffered zero security breaches in over 20 years. A hacker called Internet Yiff Machine thought that sounded like a challenge, with predictable results... Meanwhile, Rockstar Games gets hacked again - and the stolen data turns out to be less embarrassing than the financial secrets it accidentally revealed. GTA Online is still making hal...
Infosecurity11 · 7d ago

Former Ransomware Negotiator Pleads Guilty to Working For BlackCat Cyber Gang

A former ransomware negotiator has pleaded guilty to abusing his position by working with noted cybercrime group BlackCat
Broadcom Software Blogs11 · 7d ago

Harvester: APT Group Expands Toolset With New GoGra Linux Backdoor

Campaign appears to have been targeted at India and Afghanistan.
Infosecurity11 · 7d ago

UK Faces a Cyber ‘Perfect Storm’ Driven by Tech Advances and Nation State Threats, NCSC Warns

The convergence of global tensions and rapid technological change is driving a new era of cyber risk, the NCSC warns
rtl-sdr.com11 · 7d ago

Build a Cubesat Reviews a Discovery Drive Prototype and Sets up SatNOGS

Over on YouTube Manuel from the 'Build a Cubesat' channel has uploaded a video testing a prototype version of our Discovery Drive antenna rotator. If you are unaware, Discovery Drive is our new antenna rotator product for applications like satellite tracking and general antenna positioning that is currently being crowd-funded over on Crowd Supply. There […]
SANS ISC11 · 7d ago

[Guest Diary] Beyond Cryptojacking: Telegram tdata as a Credential Harvesting Vector, Lessons from a Honeypot Incident, (Wed, Apr 22nd)

&#;x26;#;x5b;This is a Guest Diary by L. Carty, an ISC intern as part of the SANS.edu Bachelor&#;x26;#;39;s Degree in Applied Cybersecurity (BACS) program &#;x26;#;x5b;1].]
Hacker News Frontpage10 · 6d ago

Approximating Hyperbolic Tangent

Article URL: https://jtomschroeder.com/blog/approximating-tanh/ Comments URL: https://news.ycombinator.com/item?id=47870709 Points: 36 # Comments: 4
[DRAGNET]10 · 6d ago

Anthropic’s AI security tool found 271 zero-day vulnerabilities in Firefox and the industry should pay close attention

Anthropic’s AI security tool found 271 zero-day vulnerabilities in Firefox and the industry should pay close attention    Startup Fortune
Hacker News Frontpage10 · 6d ago

Bring your own Agent to MS Teams

Article URL: https://microsoft.github.io/teams-sdk/blog/bring-your-agent-to-teams/ Comments URL: https://news.ycombinator.com/item?id=47870108 Points: 39 # Comments: 21
Hacker News Frontpage10 · 6d ago

The Neon King of New Orleans

Article URL: https://gardenandgun.com/new-orleans-neon-king Comments URL: https://news.ycombinator.com/item?id=47869496 Points: 46 # Comments: 7
Security on TechRepublic10 · 6d ago

Microsoft Patch Still Leaves 1,300 SharePoint Servers Exposed

More than 1,300 internet-exposed SharePoint servers remain unpatched against CVE-2026-32201, a spoofing flaw Microsoft says was exploited as a zero-day. The post Microsoft Patch Still Leaves 1,300 SharePoint Servers Exposed appeared first on TechRepublic .
The Verge10 · 6d ago

X is going to let Grok curate your timeline

X is putting its AI chatbot, Grok, in charge of your timeline. In an announcement on Wednesday, X product head Nikita Bier says Premium subscribers on iOS can get early access to a feature that allows users to pin specific topics to their home tab, which Grok will then use to curate the posts you […]
Hacker News Frontpage10 · 6d ago

OpenAI: Workspace Agents for Business

Article URL: https://openai.com/business/workspace-agents/ Comments URL: https://news.ycombinator.com/item?id=47867085 Points: 29 # Comments: 5
Hacker News Frontpage10 · 6d ago

Website streamed live directly from a model

https://x.com/zan2434/status/2046982383430496444 ( https://xcancel.com/zan2434/status/2046982383430496444 ) Comments URL: https://news.ycombinator.com/item?id=47867048 Points: 210 # Comments: 64
Hacker News Frontpage10 · 6d ago

Coding Models Are Doing Too Much

Article URL: https://nrehiew.github.io/blog/minimal_editing/ Comments URL: https://news.ycombinator.com/item?id=47866913 Points: 103 # Comments: 46
Hacker News Frontpage10 · 6d ago

Workspace Agents in ChatGPT

Article URL: https://openai.com/index/introducing-workspace-agents-in-chatgpt/ Comments URL: https://news.ycombinator.com/item?id=47866860 Points: 28 # Comments: 8
[DRAGNET]10 · 6d ago

Firefox Maker Mozilla Says AI Could End the Era of Zero-Day Vulnerabilities

Firefox Maker Mozilla Says AI Could End the Era of Zero-Day Vulnerabilities    HotHardware
Hacker News Frontpage10 · 6d ago

Parallel Agents in Zed

Article URL: https://zed.dev/blog/parallel-agents Comments URL: https://news.ycombinator.com/item?id=47866750 Points: 56 # Comments: 22
Hacker News Frontpage10 · 6d ago

Surveillance Pricing: Exploiting Information Asymmetries

Article URL: https://lpeproject.org/blog/surveillance-pricing-exploiting-information-asymmetries/ Comments URL: https://news.ycombinator.com/item?id=47866395 Points: 28 # Comments: 7
Hacker News Frontpage10 · 6d ago

Anker made its own chip to bring AI to all its products

Article URL: https://www.theverge.com/tech/916463/anker-thus-chip-announcement Comments URL: https://news.ycombinator.com/item?id=47866368 Points: 38 # Comments: 22
[DRAGNET]10 · 6d ago

Claude Mythos AI Model Uncovers 271 Zero-Day Vulnerabilities in Firefox

Claude Mythos AI Model Uncovers 271 Zero-Day Vulnerabilities in Firefox    CyberSecurityNews
SentinelOne10 · 6d ago

Hypersonic Supply Chain Attacks: One Solution That Didn’t Need to Know the Payload

Learn how SentinelOne has stopped three recent zero-day supply chain attacks with AI-driven defense built for machine-speed threats.
Hacker News Frontpage10 · 6d ago

Alberta Startup Sells No-Tech Tractors for Half Price

Article URL: https://wheelfront.com/this-alberta-startup-sells-no-tech-tractors-for-half-price/ Comments URL: https://news.ycombinator.com/item?id=47865868 Points: 13 # Comments: 1
Hacker News Frontpage10 · 6d ago

The Tech Oligarch's Republic

Article URL: https://www.forever-wars.com/the-tech-oligarchs-republic/ Comments URL: https://news.ycombinator.com/item?id=47865838 Points: 4 # Comments: 0
Hacker News Frontpage10 · 6d ago

Martin Fowler: Technical, Cognitive, and Intent Debt

Article URL: https://martinfowler.com/fragments/2026-04-14.html Comments URL: https://news.ycombinator.com/item?id=47865661 Points: 19 # Comments: 1
Hacker News Frontpage10 · 6d ago

Technical, cognitive, and intent debt

Article URL: https://martinfowler.com/fragments/2026-04-02.html Comments URL: https://news.ycombinator.com/item?id=47865661 Points: 235 # Comments: 61
Hacker News Frontpage10 · 6d ago

Youth Suicides Declined After Creation of National Hotline

Article URL: https://www.nytimes.com/2026/04/22/science/988-youth-suicides-decline.html Comments URL: https://news.ycombinator.com/item?id=47865622 Points: 15 # Comments: 1
Hacker News Frontpage10 · 6d ago

Windows 9x Subsystem for Linux

Article URL: https://codeberg.org/hails/wsl9x Comments URL: https://news.ycombinator.com/item?id=47865432 Points: 4 # Comments: 1
Hacker News Frontpage10 · 7d ago

Top MAGA influencer revealed to be AI

Article URL: https://nypost.com/2026/04/21/us-news/top-maga-influencer-emily-hart-revealed-to-be-ai-created-by-a-guy-in-india/ Comments URL: https://news.ycombinator.com/item?id=47864808 Points: 8 # Comments: 4
Hacker News Frontpage10 · 7d ago

Ping-pong robot beats top-level human players

Article URL: https://www.reuters.com/sports/ping-pong-robot-ace-makes-history-by-beating-top-level-human-players-2026-04-22/ Comments URL: https://news.ycombinator.com/item?id=47864785 Points: 98 # Comments: 100
Hacker News Frontpage10 · 7d ago

The best time to post on Hacker News

Article URL: https://blog.alcazarsec.com/tech/posts/best-time-to-post-on-hacker-news Comments URL: https://news.ycombinator.com/item?id=47864566 Points: 4 # Comments: 0
Hacker News Frontpage10 · 7d ago

Show HN submissions tripled and are now mostly vibe-coded

Article URL: https://www.adriankrebs.ch/blog/design-slop/ Comments URL: https://news.ycombinator.com/item?id=47864393 Points: 31 # Comments: 12
Help Net Security10 · 7d ago

Claude Mythos finds 271 Firefox flaws, Mozilla believes zero-days are numbered

The Mozilla Foundation tested Claude Mythos, an Anthropic AI model that has stirred debate in the cybersecurity community. Before granting access to Mythos, Mozilla scanned Firefox using Opus 4.6, which led to fixes for 22 security-sensitive bugs in Firefox 148. For instance, Mythos identified 271 vulnerabilities in Firefox 150. Firefox CTO Bobby Holley said other teams are beginning to experience the same “vertigo” that Mozilla felt when the findings first came into focus. “For a … More → Th...
SecurityWeek10 · 7d ago

After Bluesky, Mastodon Targeted in DDoS Attack

The DDoS attack caused a major outage, but Mastodon mitigated it within a few hours. The post After Bluesky, Mastodon Targeted in DDoS Attack appeared first on SecurityWeek .
Hacker News Frontpage10 · 7d ago

The handmade beauty of Machine Age data visualizations

Article URL: https://resobscura.substack.com/p/the-handmade-beauty-of-machine-age Comments URL: https://news.ycombinator.com/item?id=47864011 Points: 20 # Comments: 1
Hacker News Frontpage10 · 7d ago

Books Are Not Remotely Too Expensive

Article URL: https://www.millersbookreview.com/p/no-books-are-not-remotely-too-expensive Comments URL: https://news.ycombinator.com/item?id=47863248 Points: 5 # Comments: 0
Hacker News Frontpage10 · 7d ago

Qwen3.6-27B: Flagship-Level Coding in a 27B Dense Model

Article URL: https://qwen.ai/blog?id=qwen3.6-27b Comments URL: https://news.ycombinator.com/item?id=47863217 Points: 28 # Comments: 7
Hacker News Frontpage10 · 7d ago

Columnar Storage Is Normalization

Article URL: https://buttondown.com/jaffray/archive/columnar-storage-is-normalization/ Comments URL: https://news.ycombinator.com/item?id=47862626 Points: 5 # Comments: 1
Hacker News Frontpage10 · 7d ago

Our eighth generation TPUs: two chips for the agentic era

Article URL: https://blog.google/innovation-and-ai/infrastructure-and-cloud/google-cloud/eighth-generation-tpu-agentic-era/ Comments URL: https://news.ycombinator.com/item?id=47862497 Points: 13 # Comments: 5
Hacker News Frontpage10 · 7d ago

3.4M Solar Panels

Article URL: https://tech.marksblogg.com/american-solar-farms-v2.html Comments URL: https://news.ycombinator.com/item?id=47862386 Points: 17 # Comments: 0
Hacker News Frontpage10 · 7d ago

GitHub CLI now collects pseudoanonymous telemetry

Article URL: https://cli.github.com/telemetry Comments URL: https://news.ycombinator.com/item?id=47862331 Points: 16 # Comments: 2
Hacker News Frontpage10 · 7d ago

Kernel code removals driven by LLM-created security reports

Article URL: https://lwn.net/Articles/1068928/ Comments URL: https://news.ycombinator.com/item?id=47862230 Points: 9 # Comments: 1
SecurityWeek10 · 7d ago

Mirai Botnet Targets Flaw in Discontinued D-Link Routers

The exploitation of the command injection vulnerability started one year after public disclosure and PoC exploit code publication. The post Mirai Botnet Targets Flaw in Discontinued D-Link Routers appeared first on SecurityWeek .
Hacker News Frontpage10 · 7d ago

Nobody Got Fired for Uber's $8M Ledger Mistake?

Article URL: https://news.alvaroduran.com/p/nobody-got-fired-for-ubers-8-million Comments URL: https://news.ycombinator.com/item?id=47861731 Points: 8 # Comments: 0
Hacker News Frontpage10 · 7d ago

Windows 9x Subsystem for Linux

Article URL: https://social.hails.org/@hailey/116446826733136456 Comments URL: https://news.ycombinator.com/item?id=47861270 Points: 42 # Comments: 4
Checkmarx.com10 · 7d ago

Checkmarx Security Update: April 22

For All Related Updates: Date Post Link 27-Apr-26 Checkmarx Security Update: April 27 https://checkmarx.com/blog/supply-chain-security-incident-update/ 26-Apr-26 Checkmarx Security Update: April 26 https://checkmarx.com/blog/checkmarx-security-update-april-26/ 22-Apr-26 Checkmarx Security Update: April 22 https://checkmarx.com/blog/checkmarx-security-update-april-22/ 23-Mar-26 Checkmarx Security Update: March 23 https://checkmarx.com/blog/checkmarx-security-update/ What Happened On April 22, ...
Hacker News Frontpage10 · 7d ago

How the Heck Does GPS Work?

Article URL: https://perthirtysix.com/how-the-heck-does-gps-work Comments URL: https://news.ycombinator.com/item?id=47861087 Points: 38 # Comments: 10
The Daily WTF10 · 7d ago

Representative Line: Comment Overflow

Today, we look at a representative comment, sent to us by Nona . This particular comment was in a pile of code delivered by an offshore team. // https://stackoverflow.com/questions/46744740/lodash-mongoose-object-id-difference/46745169 "Wait," you say, "what's the WTF about a comment pointing to a Stack Overflow page. I do that all the time?" In this case, it's because this particular comment wasn't given any further explanation. It also wasn't in a block of code that was doing anything with ...
Hacker News Frontpage10 · 7d ago

What Async Promised and What It Delivered

Article URL: https://causality.blog/essays/what-async-promised/ Comments URL: https://news.ycombinator.com/item?id=47859442 Points: 11 # Comments: 1
Hacker News Frontpage10 · 7d ago

Kuri – Zig based agent-browser alternative

Article URL: https://github.com/justrach/kuri Comments URL: https://news.ycombinator.com/item?id=47857964 Points: 23 # Comments: 3
exp库-打造中文最大exploit库10 · 7d ago

WordPress Plugin 5.2.0 - Broken Access Control

# Exploit Title: WordPress Plugin 5.2.0 - Broken Access Control # Date: 2025-09-20 # Exploit Author: Zeeshan Haider # Vendor Homepage: https://wordpress.org/plugins/ # Software Link: https://wordpress.org/plugins/highlight-and-share/ # Version: ......
exp库-打造中文最大exploit库10 · 7d ago

AVAST Antivirus 25.11 - Unquoted Service Path

# Exploit Title: AVAST Antivirus 25.11 - Unquoted Service Path # Exploit Author: Milad Karimi (Ex3ptionaL) # Contact: miladgrayhat@gmail.com # Date: 2025-12-17 # Vendor Homepage:https://www.avast.com/ # Software Link : https://www.avast.com/es-m......
TechCrunch9 · 6d ago

Apple fixes bug that cops used to extract deleted chat messages from iPhones

The iPhone and iPad bug allowed law enforcement using forensic tools to read messages that had long been deleted by the Signal app.
Security on TechRepublic8 · 6d ago

Fake Google Antigravity Installer Can Steal Accounts in Minutes

Fake Antigravity downloads are enabling fast account takeovers using hidden malware and stolen session cookies. The post Fake Google Antigravity Installer Can Steal Accounts in Minutes appeared first on TechRepublic .
Deeplinks8 · 6d ago

EFF Sues DHS and ICE For Records on Subpoenas Seeking to Unmask Online Critics

Agencies Ignored EFF’s Public-Records Requests Regarding Unlawful Efforts to Locate People Who Criticized the Government or Attended Protests. SAN FRANCISCO – The Electronic Frontier Foundation (EFF) sued the Department of Homeland Security (DHS) and Immigration and Customs Enforcement (ICE) today demanding public records about their use of administrative subpoenas to try to identify their online critics. Court records and news reports show that in the past year, DHS has used administrative s...
Security on TechRepublic8 · 6d ago

Malicious TikTok Downloader Extensions Quietly Compromised 130K Users

Malicious browser extensions disguised as TikTok downloaders compromised 130,000 users, exposing a growing blind spot in enterprise security. The post Malicious TikTok Downloader Extensions Quietly Compromised 130K Users appeared first on TechRepublic .
Phoronix (Linux)8 · 7d ago

Many Great Networking Improvements Arrive In Linux 7.1

Merged recently to Linux Git were the big set of networking changes for the Linux 7.1 kernel...
Phoronix (Linux)8 · 7d ago

Ubuntu Looks Toward More Snap-Based Devpacks Moving Forward

Canonical is out with a new blog post today outlining toolchain changes to Ubuntu Linux from Ubuntu 24.04 LTS to Ubuntu 26.04 LTS due for release tomorrow. While those changes over the past two years aren't too news worthy if you have been following the interim Ubuntu releases, what's interesting is their road ahead on the Ubuntu toolchain front for developers...
SitePoint8 · 7d ago

Claude Code 2.1: The Complete xHigh and Auto-Verification Guide (2026)

Deep-dive tutorial covering xhigh effort configuration, auto-verification workflows, cost optimization, and production patterns Continue reading Claude Code 2.1: The Complete xHigh and Auto-Verification Guide (2026) on SitePoint .
Cloudflare8 · 7d ago

Making Rust Workers reliable: panic and abort recovery in wasm‑bindgen

Panics in Rust Workers were historically fatal, poisoning the entire instance. By collaborating upstream on the wasm‑bindgen project, Rust Workers now support resilient critical error recovery, including panic unwinding using WebAssembly Exception Handling.
Malwarebytes Unpacked8IoCs DETECTED · 7d ago

Malicious trading website drops malware that hands your browser to attackers

A fake TradingView AI agent site leads to malware that can take over your browser, steal your accounts and financial data, and open the door to further attacks.
Phoronix (Linux)8 · 7d ago

Intel Media Driver 2026Q1 Continues Nova Lake S Enablement

Intel today published their official quarterly feature release to their open-source Media Driver providing Video Acceleration API (VA-API) support on Linux...
Freek Van der Herten8 · 7d ago

How Will LLMs Transform Us? AI as a Tool in the Future of Development

This article frames AI as a tool to support, not replace, developers, emphasizing the importance of staying in control of how and when it’s used. It encourages a thoughtful approach where developers leverage AI for efficiency while maintaining ownership of decisions and outcomes. Read more
IT Security Guru 8 · 7d ago

CyberSmart Partners with Renaissance to Deliver Complete Cyber Confidence for SMEs

Irish reseller Renaissance has announced a strategic partnership with CyberSmart, a UK-based cybersecurity provider focused on delivering continuous protection, compliance, and cyber risk management for small and medium-sized enterprises (SMEs). This collaboration brings CyberSmart’s cybersecurity solutions to a wider market, spanning real-time threat detection, vulnerability management, compliance assurance, and cybersecurity awareness training. Designed for simplicity […] The post CyberSmar...
Phoronix (Linux)8 · 7d ago

F2FS, EXT4 & XFS Focus On Fixes For Linux 7.1

The Flash Friendly File-System (F2FS) updates have been merged for the ongoing Linux 7.1 merge window that will wrap up on Sunday. This follows earlier merges for the XFS and EXT4 drivers too...
Exploit-DB.com RSS Feed8 · 7d ago

[local] Throttlestop Kernel Driver - Kernel Out-of-Bounds Write Privilege Escalation

Throttlestop Kernel Driver - Kernel Out-of-Bounds Write Privilege Escalation
garymarcus.substack.com6 · 6d ago

ChatGPT doesn’t know its whisk from its elbow

Medical illustrators can rest easy
SitePoint6 · 7d ago

10GB VRAM Local LLM: The Complete Setup Guide (2026)

Hardware-matched tutorial covering model selection, quantization levels, and performance optimization for 10GB VRAM systems Continue reading 10GB VRAM Local LLM: The Complete Setup Guide (2026) on SitePoint .
[DRAGNET]5 · 6d ago

Ex-ransomware negotiator admits involvement in multi-million dollar extortion scheme

Ex-ransomware negotiator admits involvement in multi-million dollar extortion scheme    SC Media
[DRAGNET]5 · 6d ago

Extensive Citizens Financial Group, Frost Bank breaches claimed by Everest ransomware

Extensive Citizens Financial Group, Frost Bank breaches claimed by Everest ransomware    SC Media
[DRAGNET]5 · 6d ago

Former FBI cyber leader urges felony homicide charges for ransomware attacks on hospitals

Former FBI cyber leader urges felony homicide charges for ransomware attacks on hospitals    SC Media
[DRAGNET]5 · 6d ago

Hackers are turning on each other as one ransomware group threatens another

Hackers are turning on each other as one ransomware group threatens another    TechRadar
[DRAGNET]5 · 6d ago

Ransomware negotiator recruited by BlackCat ransomware gang pleads guilty to 2023 attacks, faces 20 years in prison

Ransomware negotiator recruited by BlackCat ransomware gang pleads guilty to 2023 attacks, faces 20 years in prison    TechRadar
[DRAGNET]5 · 6d ago

Kyber ransomware gang toys with post-quantum encryption on Windows

Kyber ransomware gang toys with post-quantum encryption on Windows    BleepingComputer
[DRAGNET]5 · 6d ago

Pasco County Ransomware Negotiator Switched Sides, Now Faces 20 Years For Cyber Extortion

Pasco County Ransomware Negotiator Switched Sides, Now Faces 20 Years For Cyber Extortion    AOL.com
[DRAGNET]5 · 6d ago

Latest shot on Anthropic’s Mythos—China’s cybersecurity giant Qihoo 360 finds 1,000 software vulnerabiliti

Latest shot on Anthropic’s Mythos—China’s cybersecurity giant Qihoo 360 finds 1,000 software vulnerabiliti    The Economic Times
[DRAGNET]5 · 6d ago

Former ransomware negotiator pleads guilty to BlackCat conspiracy

Former ransomware negotiator pleads guilty to BlackCat conspiracy    TechTarget
[DRAGNET]5 · 6d ago

ZeroFox Highlights Elevated Q1 2026 Ransomware Activity and Sector Risk

ZeroFox Highlights Elevated Q1 2026 Ransomware Activity and Sector Risk    TipRanks
[DRAGNET]5 · 6d ago

Adaptavist Group investigates security breach amidst ransomware claims

Adaptavist Group investigates security breach amidst ransomware claims    SC Media
[DRAGNET]5 · 6d ago

UK ransomware attacks fall sharply as hackers move to targeted 'big game' breaches

UK ransomware attacks fall sharply as hackers move to targeted 'big game' breaches    BetaNews
[DRAGNET]5 · 6d ago

ZeroFox data shows ransomware stabilizing at scale, with manufacturing absorbing nearly one in five attacks

ZeroFox data shows ransomware stabilizing at scale, with manufacturing absorbing nearly one in five attacks    Industrial Cyber
[DRAGNET]5 · 6d ago

Ransomware falls but victims rise as targeting intensifies says SonicWall

Ransomware falls but victims rise as targeting intensifies says SonicWall    IT Europa
[DRAGNET]5 · 6d ago

Ransomware falls but UK breaches rise as targeting rises says SonicWall

Ransomware falls but UK breaches rise as targeting rises says SonicWall    IT Europa
[DRAGNET]5 · 7d ago

North Korean hackers built “shiny new” macOS malware — and got hacked for it

North Korean hackers built “shiny new” macOS malware — and got hacked for it    Cybernews
[DRAGNET]5 · 7d ago

'Hacktivist attacks at scale’: UK could face hacktivist threats akin to some of the biggest ransomware incidents but with 'no option to pay a ransom to help recover'

'Hacktivist attacks at scale’: UK could face hacktivist threats akin to some of the biggest ransomware incidents but with 'no option to pay a ransom to help recover'    TechRadar
[DRAGNET]5 · 7d ago

'Felony murder law does not require that a defendant pull the trigger': Ex-FBI chief calls for ransomware attackers to face homicide charges if attacks lead to deaths

'Felony murder law does not require that a defendant pull the trigger': Ex-FBI chief calls for ransomware attackers to face homicide charges if attacks lead to deaths    TechRadar
[DRAGNET]5 · 7d ago

‘Big Game Hunters’: UK ransomware volume drops significantly 'but the reality is more alarming' – big orgs are being hit harder and with greater success

‘Big Game Hunters’: UK ransomware volume drops significantly 'but the reality is more alarming' – big orgs are being hit harder and with greater success    TechRadar
[DRAGNET]5 · 7d ago

Ransomware negotiator pleads guilty after leaking victims' insurance details to 'BlackCat' hackers — perp gave attackers a precise picture of exactly how much each target could afford to pay

Ransomware negotiator pleads guilty after leaking victims' insurance details to 'BlackCat' hackers — perp gave attackers a precise picture of exactly how much each target could afford to pay    Tom's Hardware
[DRAGNET]5 · 7d ago

1 in 3 Ransomware Claims Started with SonicWall in 2025 as VPN Attacks Nearly Double in Two Years

1 in 3 Ransomware Claims Started with SonicWall in 2025 as VPN Attacks Nearly Double in Two Years    Bluefield Daily Telegraph
[DRAGNET]5 · 7d ago

1 in 3 Ransomware Claims Started with SonicWall in 2025 as VPN Attacks Nearly Double in Two Years

1 in 3 Ransomware Claims Started with SonicWall in 2025 as VPN Attacks Nearly Double in Two Years    News-Press NOW
[DRAGNET]5 · 7d ago

Ransomware is shifting towards infrastructure-led exploitation, At-Bay reports

Ransomware is shifting towards infrastructure-led exploitation, At-Bay reports    Reinsurance News
[DRAGNET]5 · 7d ago

1 in 3 Ransomware Claims Started with SonicWall in 2025 as VPN Attacks Nearly Double in Two Years

1 in 3 Ransomware Claims Started with SonicWall in 2025 as VPN Attacks Nearly Double in Two Years    Business Wire
[DRAGNET]5 · 7d ago

1 in 3 Ransomware Claims Started with SonicWall in 2025 as VPN Attacks Nearly Double in Two Years

1 in 3 Ransomware Claims Started with SonicWall in 2025 as VPN Attacks Nearly Double in Two Years    Morningstar
[DRAGNET]5 · 7d ago

UK ransomware volumes fall as ‘Big Game Hunters’ focus on high-damage targets

UK ransomware volumes fall as ‘Big Game Hunters’ focus on high-damage targets    digit.fyi
[DRAGNET]5 · 7d ago

$10 Million in Assets Seized as Florida Ransomware Negotiator Pleads Guilty in Cyber Extortion Scheme

$10 Million in Assets Seized as Florida Ransomware Negotiator Pleads Guilty in Cyber Extortion Scheme    Homeland Security Today
[DRAGNET]5 · 7d ago

Compromised Namastex npm Packages Deliver TeamPCP-Style CanisterWorm Malware

Compromised Namastex npm Packages Deliver TeamPCP-Style CanisterWorm Malware    CyberSecurityNews
[DRAGNET]5 · 7d ago

Claude Mythos finds 271 zero-day vulnerabilities in Firefox

Claude Mythos finds 271 zero-day vulnerabilities in Firefox    Yahoo Tech
[DRAGNET]5 · 7d ago

Ransomware Attack on Hospital Caribbean Medical Center Affects 92,000 Individuals

Ransomware Attack on Hospital Caribbean Medical Center Affects 92,000 Individuals    The HIPAA Journal
[DRAGNET]5 · 7d ago

UK ransomware volumes fall as ‘Big Game Hunters’ focus on high-damage targets

UK ransomware volumes fall as ‘Big Game Hunters’ focus on high-damage targets    Intelligent CISO
[DRAGNET]5 · 7d ago

A Ransomware Negotiator Pleads Guilty to Being a Double Agent

A Ransomware Negotiator Pleads Guilty to Being a Double Agent    Gizmodo
[DRAGNET]5 · 7d ago

Ex-FBI Cyber Official Proposes Terrorism Designations for Hospital Ransomware Attacks

Ex-FBI Cyber Official Proposes Terrorism Designations for Hospital Ransomware Attacks    Homeland Security Today
[DRAGNET]5 · 7d ago

Yamaichi Electronics Probes Ransomware Attack at Philippine Subsidiary

Yamaichi Electronics Probes Ransomware Attack at Philippine Subsidiary    TipRanks
[DRAGNET]5 · 7d ago

CanisterSprawl: pgserve Compromised on npm: Malicious Versions Harvest Credentials and Exfiltrate to a Decentralized ICP Canister

CanisterSprawl: pgserve Compromised on npm: Malicious Versions Harvest Credentials and Exfiltrate to a Decentralized ICP Canister    StepSecurity
[DRAGNET]5 · 7d ago

Treat Ransomware Criminals Like Terrorists, House Subcommittees Advised (Apr 21, 2026)

Treat Ransomware Criminals Like Terrorists, House Subcommittees Advised (Apr 21, 2026)    VitalLaw.com
[DRAGNET]5 · 7d ago

Ex-FBI Cyber Official Proposes Terrorism Designations for Hospital Ransomware Attacks

Ex-FBI Cyber Official Proposes Terrorism Designations for Hospital Ransomware Attacks    MeriTalk
[DRAGNET]5 · 7d ago

Anubis Ransomware Targets Samuel I. White, PC in Major Cyberattack

Anubis Ransomware Targets Samuel I. White, PC in Major Cyberattack    DeXpose
[DRAGNET]5 · 7d ago

Qilin Ransomware Strikes Lithuanian Educational Entity City’Pro

Qilin Ransomware Strikes Lithuanian Educational Entity City’Pro    DeXpose
[DRAGNET]0 · 6d ago

'The Gentlemen' Rapidly Rises to Ransomware Prominence

'The Gentlemen' Rapidly Rises to Ransomware Prominence    Dark Reading
[DRAGNET]0 · 7d ago

2026 Threat Landscape: Ransomware, Breaches & Exploits

2026 Threat Landscape: Ransomware, Breaches & Exploits    The Cyber Express
[DRAGNET]0 · 7d ago

Data: Ransomware evolving into Big Game Hunting

Data: Ransomware evolving into Big Game Hunting    Advanced Television
[DRAGNET]0 · 7d ago

Akira Ransomware Targets Bioscience Firm Salimetrics

Akira Ransomware Targets Bioscience Firm Salimetrics    DeXpose
[DRAGNET]-30 · 7d ago

Former FBI official calls for terrorism designations for ransomware groups that target hospitals

Former FBI official calls for terrorism designations for ransomware groups that target hospitals    Risky Business Newsletters
[DRAGNET]-40 · 7d ago

The ‘groundbreaking’ case of the cyber experts who allegedly broke bad and worked with criminals

The ‘groundbreaking’ case of the cyber experts who allegedly broke bad and worked with criminals    CNN
[DRAGNET]-40 · 7d ago

Gentlemen RaaS Adds C-Based ESXi Locker To Cross-Platform Attacks

Gentlemen RaaS Adds C-Based ESXi Locker To Cross-Platform Attacks    cyberpress.org