Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-04-23

Docker208IN STACKIoCs DETECTED · 6d ago

Trivy, KICS, and the shape of supply chain attacks so far in 2026

Catching the KICS push: what happened, and the case for open, fast collaboration In the past few weeks we've worked through two supply chain compromises on Docker Hub with a similar shape: first Trivy, now Checkmarx KICS. In both cases, stolen publisher credentials were used to push malicious images through legitimate publishing flows. In both...
Trail of Bits57 · 6d ago

Trailmark turns code into graphs

We’re open-sourcing Trailmark , a library that parses source code into a queryable call graph of functions, classes, call relationships, and semantic metadata, then exposes that graph through a Python API that Claude skills can call directly. Install it now: uv pip install trailmark “Defenders think in lists. Attackers think in graphs. As long as this is true, attackers win.” John Lambert’s widely cited observation about network security applies just as well to AI-assisted software analysis. ...
OpenAI Blog48 · 6d ago

Introducing GPT-5.5

Introducing GPT-5.5, our smartest model yet—faster, more capable, and built for complex tasks like coding, research, and data analysis across tools.
CISA Alerts46 · 6d ago

FIRESTARTER Backdoor

Malware Analysis Report at a Glance Malware Name FIRESTARTER Original Publication April 23, 2026 Executive Summary The Cybersecurity and Infrastructure Security Agency (CISA) analyzed a sample of FIRESTARTER malware obtained from a forensic investigation. CISA and the United Kingdom National Cyber Security Centre (NCSC) assess advanced persistent threat (APT) actors are using FIRESTARTER malware for persistence, specifically targeting publicly accessible Cisco Firepower and Secure Firewall de...
Simon Willison45 · 5d ago

llm-openai-via-codex 0.1a0

Release: llm-openai-via-codex 0.1a0 Hijacks your Codex CLI credentials to make API calls with LLM, as described in my post about GPT-5.5 . Tags: openai , llm , codex-cli
Palo Alto Unit 4243 · 6d ago

Can AI Attack the Cloud? Lessons From Building an Autonomous Cloud Offensive Multi-Agent System

Unit 42 reveals how multi-agent AI systems can autonomously attack cloud environments. Learn critical insights and vital lessons for proactive security. The post Can AI Attack the Cloud? Lessons From Building an Autonomous Cloud Offensive Multi-Agent System appeared first on Unit 42 .
Google Online Security Blog41 · 5d ago

AI threats in the wild: The current state of prompt injections on the web

AI threats in the wild: The current state of prompt injections on the web
Huntress Blog34 · 6d ago

Cyber Hygiene Best Practices: Essential Security Checklist

Learn cyber hygiene best practices with Huntress: from strong passwords and MFA to patching and security training.
HackerNoon32 · 6d ago

Inside Airbnb’s Mussel v2: Rebuilding a Petabyte-Scale Key-Value Store

A technical deep dive into Airbnb's Mussel v2 - how they rearchitected their key-value store and migrated 1PB of data with zero downtime.
[DRAGNET]29 · 5d ago

OCR settles four HIPAA investigations, prioritizes risk analysis

OCR settles four HIPAA investigations, prioritizes risk analysis    TechTarget
The Record from Recorded Future News29 · 5d ago

Surveillance companies exploiting telecom system to spy on targets’ locations, research shows

The campaigns exploited a weakness in telecom infrastructure to allow the unnamed vendors to secretly pose as real cellular providers and pinpoint victims’ locations.
The Record from Recorded Future News29 · 5d ago

China-linked hackers targeted Mongolian government using Slack, Discord for covert communications

The group, which researchers at cybersecurity firm ESET named GopherWhisper, has been active since at least November 2023 and was discovered in January 2025 after investigators found a previously unknown backdoor on the network of a Mongolian government institution.
The Register (Security)29 · 6d ago

Hybrid clouds have two attack surfaces and you’re not paying enough attention to either

Windows Admin Center flaws mean on-prem can attack cloud, and vice-versa Black Hat Asia   Israeli researchers found a series of flaws in Microsoft's Windows Admin Center (WAC) and suggest this shows hybrid cloud management tools are a two-way attack surface that users don't spend enough time worrying about.…
Hacker News Frontpage27 · 6d ago

Surveillance vendors caught abusing access to telcos to track people's locations

Article URL: https://techcrunch.com/2026/04/23/surveillance-vendors-caught-abusing-access-to-telcos-to-track-peoples-phone-locations-researchers-say/ Comments URL: https://news.ycombinator.com/item?id=47874814 Points: 6 # Comments: 0
unSafe.sh - 不安全27 · 6d ago

What forensic/recovery program outputs "filename.ext-slack" ?

What forensic/recovery program outputs "filename.ext-slack" ?
Schneier on Security27 · 6d ago

FBI Extracts Deleted Signal Messages from iPhone Notification Database

404 Media reports (alternate site ): The FBI was able to forensically extract copies of incoming Signal messages from a defendant’s iPhone, even after the app was deleted, because copies of the content were saved in the device’s push notification database…. The news shows how forensic extraction—­when someone has physical access to a device and is able to run specialized software on it—­can yield sensitive data derived from secure messaging apps in unexpected places. Signal already has a sett...
OpenAI Blog27 · 6d ago

GPT-5.5 System Card

GPT-5.5 System Card
SecurityWeek27 · 6d ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

Palo Alto Networks has developed Zealot, a multi-agent penetration testing PoC capable of reconnaissance, exploitation, and exfiltration.  The post AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers  appeared first on SecurityWeek .
ElcomSoft blog27 · 6d ago

Recovering Windows Credentials with Elcomsoft System Recovery

In traditional forensic workflows, gaining access to a Windows system was a straightforward exercise: extract the NT hashes from a local database and run a fast (very fast!) offline attack. Today, Windows authentication is moving away from those essentially insecure NTLM hashes toward more resilient mechanisms. Microsoft is actively steering users away from local Windows […]
unSafe.sh - 不安全27 · 6d ago

Need respondants for my thesis on Dark Web and Digital Forensics

Need respondants for my thesis on Dark Web and Digital Forensics
OpenAI Blog27 · 6d ago

GPT-5.5 Bio Bug Bounty

Explore the GPT-5.5 Bio Bug Bounty: a red-teaming challenge to find universal jailbreaks for bio safety risks, with rewards up to $25,000.
The Hacker News25 · 6d ago

Vercel Finds More Compromised Accounts in Context.ai-Linked Breach

Vercel on Wednesday revealed that it has identified an additional set of customer accounts that were compromised as part of a security incident that enabled unauthorized access to its internal systems. The company said it made the discovery after expanding its investigation to include an extra set of compromise indicators, alongside a review of requests to the Vercel network and environment
The Akamai Blog (https://blogs.akamai.com/feeds.html)25 · 6d ago

A Shortcut to Coercion: Incomplete Patch of APT28's Zero-Day Leads to CVE-2026-32202

A Shortcut to Coercion: Incomplete Patch of APT28's Zero-Day Leads to CVE-2026-32202
Mandiant | Transform Your Cybersecurity24 · 5d ago

M-Trends 2026: By the Numbers

Distilling insights from over 500k hours of Mandiant incident investigations in 2025, and Google Threat Intelligence Group (GTIG) research, the M-Trends 2026 Report reveals the critical shifts defining today's threat landscape. Based on our frontline data from January 1 to December 31, 2025, this report helps organizations understand the exact tactics adversaries used last year, equipping security leaders with detailed, actionable strategies needed to disrupt them. Join our expert threat anal...
BleepingComputer24 · 5d ago

New Checkmarx supply-chain breach affects KICS analysis tool

Hackers have compromised Docker images, VSCode and Open VSX extensions for the Checkmarx KICS analysis tool to harvest sensitive data from developer environments. [...]
Hacker News Frontpage22 · 5d ago

An update on recent Claude Code quality reports

Article URL: https://www.anthropic.com/engineering/april-23-postmortem Comments URL: https://news.ycombinator.com/item?id=47878905 Points: 32 # Comments: 9
BleepingComputer22 · 6d ago

CISA orders feds to patch BlueHammer flaw exploited as zero-day

CISA has ordered U.S. federal agencies to patch a Microsoft Defender privilege escalation flaw (dubbed BlueHammer) that has been exploited in zero-day attacks. [...]
Latest stories for ZDNET in Security20 · 6d ago

Sony WH-1000XM6 vs. Bowers & Wilkins Px8 S2: How I'd justify spending $300 more for headphones

Sony may be at the top of its game, but how well do the XM6 stack up against its more premium competitors? It comes down to how you use them.
Latest stories for ZDNET in Security20 · 6d ago

98% of IT leaders want digital sovereignty: Now SUSE is operationalizing it for companies everywhere

I've followed SUSE for decades. Here's how it's helping organizations control data and avoid lock-in.
The Register (Security)20 · 6d ago

Medical data of 500k Biobank volunteers listed for sale on Alibaba, UK minister reveals

World's largest biomedical dataset lifted and shifted on Chinese mega marketplace Updated   Details of volunteers of UK-based Biobank, which describes itself as the custodian of the world's most comprehensive biomedical dataset, are for sale on Chinese ecommerce site Alibaba.…
Help Net Security20 · 6d ago

Apple fixes iPhone bug that let FBI retrieve deleted Signal messages(CVE-2026-28950)

Apple has rolled out security updates for iPhones and iPads that fix CVE-2026-28950, a logging issue in Notification Services that made devices unexpectedly retain notifications marked for deletion. The vulnerability was patched following a recent report about the FBI accessing a suspect’s Signal message notification content on their iPhone, despite Signal being deleted from the device. As usual, Apple did not offer more details about the flaw; it just said that the issue was addressed … More...
zSecurity20 · 6d ago

How I Monitor the Dark-Web in my Sleep 👁️ Find Passwords + More!

Build a 24/7 Dark Web & Telegram Breach Monitor to catch leaked and breached passwords instantly In this video you’ll learn how to set up automations to monitor the clear web, dark web, and Telegram for exposed data with instant … The post How I Monitor the Dark-Web in my Sleep 👁️ Find Passwords + More! appeared first on zSecurity .
SecurityWeek20 · 6d ago

Recent Microsoft Defender Vulnerability Exploited as Zero-Day

The flaw allows attackers to access the SAM database, extract NTLM hashes, and gain System privileges. The post Recent Microsoft Defender Vulnerability Exploited as Zero-Day appeared first on SecurityWeek .
BleepingComputer17 · 5d ago

Hackers exploit file upload bug in Breeze Cache WordPress plugin

Hackers are actively exploiting a critical vulnerability in the Breeze Cache plugin for WordPress that allows uploading arbitrary files on the server without authentication. [...]
The Record from Recorded Future News17 · 5d ago

CISA: US agency breached through Cisco vulnerability, FIRESTARTER backdoor allowed access through March

CISA said the unnamed department was infected with malware called “FIRESTARTER” that allowed the hackers to return to the Cisco device in March without re-exploiting the original vulnerabilities.
BleepingComputer17 · 5d ago

Trigona ransomware attacks use custom exfiltration tool to steal data

Recently observed Trigona ransomware attacks are using a custom, command-line tool to steal data from compromised environments faster and more efficiently. [...]
Cyber Kendra17 · 6d ago

Bitwarden CLI Hijacked to Steal Your AWS, GitHub, and SSH Secrets

If you installed Bitwarden's command-line password manager this month, your developer credentials — including cloud keys, SSH material, and GitHub tokens — may already be in an attacker's hands. Security researchers at Socket and JFrog have confirmed that @bitwarden/cli version 2026.4.0 , published to npm, was backdoored as part of the same sprawling Checkmarx supply chain campaign that previously poisoned official KICS Docker images and VS Code extensions.  The attack vector was a compromise...
BleepingComputer17 · 6d ago

Cosmetics giant Rituals discloses data breach affecting customers

Dutch cosmetics giant Rituals disclosed a data breach after attackers stole the personal information of an undisclosed number of customers from its "My Rituals" membership database. [...]
404 Media17 · 6d ago

Researchers Simulated a Delusional User to Test Chatbot Safety

Grok and Gemini encouraged delusions and isolated users, while the newer ChatGPT model and Claude hit the emotional brakes.
The Decoder17 · 6d ago

Researchers warn US politics is repeating its ChatGPT mistake with world models

The next phase of AI development is moving beyond text and into the physical world. Researchers warn that US policymakers don't yet grasp the scale of what's coming, while China is already pulling ahead in robotics. The article Researchers warn US politics is repeating its ChatGPT mistake with world models appeared first on The Decoder .
The Record from Recorded Future News17 · 6d ago

House Republicans unveil data privacy law that would override state protections

The bill, known as the SECURE Data Act, is backed by top Republicans on the House Energy and Commerce and Financial Services committees.
The Register (Security)17 · 6d ago

American farms have a new steward for their safety net, disaster programs... Palantir

Wins $300M deal over Salesforce, IBM because of 'integration with existing USDA systems,' among other things Palantir has won a $300 million contract from the US Department of Agriculture (USDA) to support the National Farm Security Action Plan (NFSAP) and modernize how USDA delivers services to America's farmers.…
Help Net Security17 · 6d ago

Aqua Compass MCP server enables real-time investigation and containment of runtime threats

Aqua Security has announced Aqua Compass, a Model Context Protocol (MCP) server that enables agentic investigation, containment and remediation of runtime incidents, and new runtime risk dashboards. These capabilities help security teams move beyond identifying risk and focus on containing threats in running applications. The announcement builds on Aqua’s Secure AI capabilities, extending the company’s AI innovation from protecting AI applications to applying AI directly to runtime security o...
BleepingComputer17 · 6d ago

UK warns of Chinese hackers using proxy networks to evade detection

The United Kingdom's National Cyber Security Centre (NCSC-UK) and international partners warned that China-nexus hackers are increasingly using large-scale proxy networks of hijacked consumer devices to evade detection and disguise their malicious activity. [...]
SecurityWeek RSS Feed17 · 6d ago

The Behavioral Shift: Why Trusted Relationships Are the Newest Attack Surface

New analysis from Abnormal AI reveals how attackers have abandoned technical exploits to weaponize routine workflows and internal trust. The post The Behavioral Shift: Why Trusted Relationships Are the Newest Attack Surface appeared first on SecurityWeek .
HackerNoon17 · 6d ago

The 'Moat' is a Config File: Analysis of Leaked System Prompts from OpenAI, Anthropic, Google & More

The viral GitHub repository CL4R1T4S has crowdsourced and leaked the raw, hidden system prompts defining the behavior of every major AI product, from ChatGPT and Claude to Devin and Cursor. This massive leak fundamentally proves that while the underlying LLMs are becoming commoditized, the system prompt is the actual product, serving as the load-bearing configuration layer that dictates personality, ethical constraints, business logic, and tool invocation pathways. side-by-side analysis of ke...
The Register (Security)17 · 6d ago

If malware via monitor cables is a matter of national security, this might be the gadget for you

Orgs can now buy UK cyber agency engineered commercial gadget, but details are slim GCHQ's cyber arm has entered the hardware game with its first device designed to prevent cyberattacks on display devices.…
Infosecurity17 · 6d ago

Researchers Uncover 10 In-the-Wild Prompt Injection Payloads Targeting AI Agents

Forcepoint has found 10 new indirect prompt injection attacks targeting AI agents
Help Net Security17 · 6d ago

GopherWhisper APT group hides command and control traffic in Slack and Discord

Attackers continue to lean on everyday collaboration platforms to hide command and control traffic inside normal enterprise noise. A newly identified China-aligned APT group pushes that trend further, running its operations through Slack workspaces, Discord servers, Outlook drafts, and the file.io sharing service. GopherWhisper toolset overview ESET researchers have named the group GopherWhisper and tied it to an intrusion at a Mongolian governmental entity. The name draws on two elements: mo...
Security Boulevard17 · 6d ago

They Say Gartner is Dead. Clearly, They Haven’t Checked Their LLM Sources.

We are in the Age of the Self-Fulfilling Prophecies and Why you should Stop using LLMs for Market Research The post They Say Gartner is Dead. Clearly, They Haven’t Checked Their LLM Sources. appeared first on Security Boulevard .
The Hacker News17 · 6d ago

Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case

Apple has rolled out a software fix for iOS and iPadOS to address a Notification Services flaw that stored notifications marked for deletion on the device. The vulnerability, tracked as CVE-2026-28950 (CVSS score: N/A), has been described as a logging issue that has been addressed with improved data redaction. "Notifications marked for deletion could be unexpectedly retained on the device,"
unSafe.sh - 不安全17 · 6d ago

WaTF Bank Walkthrough (Part 2): Exploiting Android App Security Flaws

WaTF Bank Walkthrough (Part 2): Exploiting Android App Security Flaws
HackerNoon17 · 6d ago

Yield Bearing Stablecoins: Market Segment Analysis and Regulatory Approaches

This article analyzes the market dynamics of yield-bearing stablecoins, spotlighting leading products such as Sky’s sUSDS, Ethena’s sUSDe, and USDY.
unSafe.sh - 不安全17 · 6d ago

Yield Bearing Stablecoins: Market Segment Analysis and Regulatory Approaches

好的,用户希望我用中文总结一篇文章的内容,控制在100字以内,并且不需要特定的开头。首先,我需要理解文章的主要内容。 从提供的信息来看,这篇文章似乎涉及区块链、加密货币以及稳定币的讨论。作者Olayimika Oyebanji是一位资深的区块链记者和法律咨询师,专注于塑造加密叙事和处理监管问题。文章可能探讨了稳定币的不同类型,如算法稳定币和与法币挂钩的稳定币,以及它们在支付和DeFi中的应用。 接下来,我需要提取关键点:区块链、加密货币、稳定币类型(算法和法币挂钩)、支付、DeFi收益协议。然后将这些点简洁地整合成一段话,确保不超过100字,并且直接描述内容,不使用“这篇文章”等开头。 最后,检查语言是否流畅自然,是否符合用户的要求。 文章探讨了区块链与加密货币领域的发展趋势,特别是稳定币的类型及其在支付与DeFi中的应用。
HackerNoon17 · 6d ago

Bitcoin's Quantum Migration Playbook — Every Proposal Compared

Google's March 2026 research slashed the qubit threshold for breaking Bitcoin's encryption by 20x, putting ~6.9 million BTC at risk. Seven proposals are now competing to quantum-proof Bitcoin: BIP-360 (new quantum-safe address type, already on testnet), QRAMP (mandatory migration with a coin-burn deadline), QSAVE (escrow custody for vulnerable coins), OP_CAT + Lamport signatures (a fast opt-in bridge fix), Blockstream's SHRINCS hash-based signatures (testing on Liquid), Winternitz Vaults (lay...
Intigriti17 · 6d ago

Vulnpocalypse Now? How AI is changing vulnerability discovery

What you will learn  How vulnerability research and security testing may evolve in the future, based on expert insights and reflections from Intigriti COO Ed Parsons.  How AI is reshaping vulnerability discovery, including the major trends and developments security teams should understand today.  The ‘vulnpocalypse’, and what it signals about the future of AI-assisted hacking.  The risks, opportunities, and practical impact of AI-supported hackers.  Contextualizing AI’s impact   Intigriti i…
The Hacker News16 · 6d ago

Project Glasswing Proved AI Can Find the Bugs. Who's Going to Fix Them?

Last week, Anthropic announced Project Glasswing, an AI model so effective at discovering software vulnerabilities that they took the extraordinary step of postponing its public release. Instead, the company has given access to Apple, Microsoft, Google, Amazon, and a coalition of others to find and patch bugs before adversaries can. Mythos Preview, the model that led to Project Glasswing, found
Hacker News Frontpage15 · 5d ago

US special forces soldier arrested after allegedly winning $400k on Maduro raid

https://www.justice.gov/usao-sdny/pr/us-soldier-charged-usin... Comments URL: https://news.ycombinator.com/item?id=47882645 Points: 36 # Comments: 123
Security Boulevard15 · 5d ago

Bitwarden CLI Compromise Linked to Ongoing Checkmarx Supply Chain Campaign

A compromise of the popular Bitwarden password manager is linked to the ongoing Checkmarx supply chain campaign, with bad actor injecting malicious code in a version of its CLI. However, while there are some overlaps in such areas a tools that suggest TeamPCP was behind the attack, there are differences in operation that make attribution difficult. The post Bitwarden CLI Compromise Linked to Ongoing Checkmarx Supply Chain Campaign appeared first on Security Boulevard .
IEEE Spectrum15 · 5d ago

GPU Renters Are Playing a Silicon Lottery

Think one GPU is very much like another? Think again. It turns out that there’s surprising variability in the performance delivered by chips of the same model. That can make getting your money’s worth by renting time on a GPU from a cloud provider a real roll of the dice, according to research from the College of William & Mary, Jefferson Lab, and Silicon Data . “It’s called the silicon lottery,” says Carmen Li, founder and CEO of Silicon Data, which tracks GPU rental prices and benchmarks cl...
Hacker News Frontpage15 · 5d ago

Palantir Employees Are Starting to Wonder If They're the Bad Guys

Article URL: https://www.wired.com/story/palantir-employees-are-starting-to-wonder-if-theyre-the-bad-guys/ Comments URL: https://news.ycombinator.com/item?id=47878633 Points: 10 # Comments: 4
Hacker News Frontpage15 · 5d ago

'Hairdryer used to trick weather sensor' to win $34,000 Polymarket bet

Article URL: https://www.telegraph.co.uk/business/2026/04/23/hairdryer-used-trick-weather-sensor-34000-polymarket-bet/ Comments URL: https://news.ycombinator.com/item?id=47878208 Points: 11 # Comments: 2
Hacker News Frontpage15 · 5d ago

MeshCore development team splits over trademark dispute and AI-generated code

Article URL: https://blog.meshcore.io/2026/04/23/the-split Comments URL: https://news.ycombinator.com/item?id=47878117 Points: 4 # Comments: 0
Hacker News Frontpage15 · 5d ago

X is shutting down Communities because of low usage and lots of spam

Article URL: https://techcrunch.com/2026/04/23/x-is-shutting-down-communities-because-of-low-usage-and-lots-of-spam/ Comments URL: https://news.ycombinator.com/item?id=47877897 Points: 5 # Comments: 0
Hacker News Frontpage15 · 5d ago

France confirms data breach at government agency that manages citizens' IDs

Article URL: https://techcrunch.com/2026/04/22/france-confirms-data-breach-at-government-agency-that-manages-citizens-ids/ Comments URL: https://news.ycombinator.com/item?id=47877366 Points: 66 # Comments: 13
Hacker News Frontpage15 · 6d ago

Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

Article URL: https://socket.dev/blog/bitwarden-cli-compromised Comments URL: https://news.ycombinator.com/item?id=47876043 Points: 239 # Comments: 123
Raymond Chen15 · 6d ago

Another crash caused by uninstaller code injection into Explorer

Inadvertently destroying a staircase while standing on it. The post Another crash caused by uninstaller code injection into Explorer appeared first on The Old New Thing .
SecurityWeek15 · 6d ago

Chinese Cybersecurity Firm’s AI Hacking Claims Draw Comparisons to Claude Mythos

360 Digital Security Group claims to have uncovered 1,000 vulnerabilities using AI, including at the Tianfu Cup hacking contest. The post Chinese Cybersecurity Firm’s AI Hacking Claims Draw Comparisons to Claude Mythos appeared first on SecurityWeek .
The Verge15 · 6d ago

Govee’s new colorful outdoor lights are its first with solar power

Govee announced its first solar-powered lights today. They include a 6W panel with an integrated 4,800mAh battery that can be recharged with a single full day of sunlight (though if the weather's looking a little overcast, you can still charge it over USB-C). The Govee Outdoor Solar String Lights are available now through the company's […]
CISA Alerts15 · 6d ago

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-39987 Marimo Remote Code Execution Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common...
Hacker News Frontpage15 · 6d ago

Show HN: Honker – Postgres NOTIFY/LISTEN Semantics for SQLite

Article URL: https://github.com/russellromney/honker Comments URL: https://news.ycombinator.com/item?id=47874647 Points: 8 # Comments: 0
SecurityWeek15 · 6d ago

Rilian Raises $17.5 Million for AI-Native Security Orchestration

The company will hire new talent and expand operations across the US and other allied countries. The post Rilian Raises $17.5 Million for AI-Native Security Orchestration appeared first on SecurityWeek .
Hacker News Frontpage15 · 6d ago

Show HN: Built a daily game where you sort historical events chronologically

Article URL: https://hisorty.app/ Comments URL: https://news.ycombinator.com/item?id=47873966 Points: 4 # Comments: 3
HackerNoon15 · 6d ago

As Mythos Expands What Detection Can’t See, Daylight Launches Managed Agentic Threat Hunting

Detection-based security can’t keep up with modern threats. Daylight’s new managed service uses agentic AI to run continuous, hypothesis-driven threat hunting at scale—surfacing hidden risks traditional tools miss. By combining expert methodology with autonomous execution, it closes the gap between what security tools detect and what attackers actually exploit.
代码审计星球15 · 6d ago

原域名已变更且将在2024年彻底废弃,请访问 https://govuln.com/news/ 查看新的RSS订阅

原域名已变更且将在2024年彻底废弃,请访问 https://govuln.com/news/ 查看新的RSS订阅
Hacker News Frontpage15 · 6d ago

A Boy That Cried Mythos: Verification Is Collapsing Trust in Anthropic

Article URL: https://www.flyingpenguin.com/the-boy-that-cried-mythos-verification-is-collapsing-trust-in-anthropic/ Comments URL: https://news.ycombinator.com/item?id=47872200 Points: 9 # Comments: 1
Eli Bendersky15 · 6d ago

Debugging WASM in Chrome DevTools

When I was working on the WASM backend for my Scheme compiler , I ran into several tricky situations with debugging generated WASM code. It turned out that Chrome has a very capable WASM debugger in its DevTools, so in this brief post I want to share how it can be …
SANS ISC15 · 6d ago

ISC Stormcast For Thursday, April 23rd, 2026 https://isc.sans.edu/podcastdetail/9904, (Thu, Apr 23rd)

ISC Stormcast For Thursday, April 23rd, 2026 https://isc.sans.edu/podcastdetail/9904, (Thu, Apr 23rd)
Hacker News Frontpage15 · 6d ago

Tempest vs. Tempest: The Making and Remaking of Atari's Iconic Video Game

Article URL: https://tempest.homemade.systems Comments URL: https://news.ycombinator.com/item?id=47871195 Points: 43 # Comments: 14
Rapid7 Blog14 · 6d ago

AI is Changing Vulnerability Discovery and your Software Supply Chain Strategy has to Change with it

Wade Woolwine is Senior Director, Product Security at Rapid7. The headlines around Glasswing have focused on how quickly AI can surface vulnerabilities, which has naturally caught the attention of security leaders. In my conversations with teams and customers, the more useful discussion has been about what that speed means in practice for business protection, especially across open source risk, dependency choices, and software supply chain resilience. The deeper issue for security leaders sit...
miguelgrinberg.com14 · 6d ago

SQLAlchemy 2 In Practice - Chapter 6: A Page Analytics Solution

This is the sixth chapter of my SQLAlchemy 2 in Practice book. If you'd like to support my work, I encourage you to buy this book, either directly from my store or on Amazon . Thank you! The goal of this chapter is to use the concepts you have learned to build a web traffic analytics solution. This will serve as reinforcement of the techniques demonstrated in previous chapters as well as an example of a more complex and realistic database design.
Phoronix (Linux)13 · 5d ago

Linux 7.1 Removes Some Obsolete PCMCIA Drivers That Likely Haven't Been Used In Years

In addition to some network drivers on the chopping block due to AI bug reports for obsolete hardware/drivers and Linux 7.1 dropping various drivers for Russia's Baikal CPUs, the Linux 7.1 kernel as of today also dropped some obsolete PCMCIA host controller drivers...
The Hacker News13 · 5d ago

UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware

A previously undocumented threat activity cluster known as UNC6692 has been observed leveraging social engineering tactics via Microsoft Teams to deploy a custom malware suite on compromised hosts. "As with many other intrusions in recent years, UNC6692 relied heavily on impersonating IT helpdesk employees, convincing their victim to accept a Microsoft Teams chat invitation from an account
Phoronix (Linux)13 · 5d ago

Godot 4.7 Will Finally Have HDR Output, Including On Linux With Wayland

The upcoming Godor 4.7 open-source, cross-platform game engine release is rolling out support for high dynamic range (HDR)...
The Hacker News13 · 6d ago

Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

Bitwarden CLI has been compromised as part of the newly discovered and ongoing Checkmarx supply chain campaign, according to new findings from JFrog and Socket. "The affected package version appears to be @bitwarden/cli@2026.4.0, and the malicious code was published in 'bw1.js,' a file included in the package contents," the application security company said. "The attack appears to have leveraged
The Hacker News13 · 6d ago

ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories

You scroll past one incident and see another that feels familiar, like it should have been fixed years ago, but it still works with small changes. Same bugs. Same mistakes. The supply chain is messy. Packages you did not check are stealing data, adding backdoors, and spreading. Attacking the systems behind apps is easier than breaking the apps themselves. The exploits are simple but still work
The Hacker News13 · 6d ago

[Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed

Imagine a world where hackers don't sleep, don't take breaks, and find weak spots in your systems instantly. Well, that world is already here. Thanks to AI, attackers are now launching automated, large-scale exploits faster than ever before. The time you have to fix a vulnerability before it gets attacked is shrinking to zero. We call this the Collapsing Exploit Window, and it means your
Phoronix (Linux)13 · 6d ago

Linux 7.1 Lands The Apple SMC Power Driver For Reporting Battery Metrics On MacBooks

The Linux Multi-Function Device "MFD" subsystem changes were merged this week for Linux 7.1 ahead of the merge window closing on Sunday...
The Hacker News13 · 6d ago

China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors

Mongolian governmental institutions have emerged as the target of a previously undocumented China-aligned advanced persistent threat (APT) group tracked as GopherWhisper. "The group wields a wide array of tools mostly written in Go, using injectors and loaders to deploy and execute various backdoors in its arsenal," Slovakian cybersecurity company ESET said in a report shared with The Hacker
Phoronix (Linux)13 · 6d ago

Linux 7.1 Adds Support For 12 New SoCs, Other ARM & RISC-V Hardware

All of the SoC updates were recently merged for the ongoing Linux 7.1 kernel cycle. Most of the activity as usual is on the Arm side but also with some RISC-V additions too for the Linux 7.1 kernel...
Security Boulevard12 · 5d ago

@bitwarden/cli – GitGuardian Views on helloworm00

GitGuardian analysis of the @bitwarden/cli compromise: GitHub used as C2, new Cloudflare exfiltration domain found, linked to April 22 Checkmarx KICS compromise via Dependabot. The post @bitwarden/cli – GitGuardian Views on helloworm00 appeared first on Security Boulevard .
Security Boulevard12 · 5d ago

Quantum Networking Breakthrough Points to Key Security Gains

Cybersecurity professionals have long had high hopes for a quantum Internet, given that any attempt to intercept data alters it, which exposes the intrusion. This basic principle of physics positions quantum networking as a potential structural shift in cybersecurity. New research from New York University, in collaboration with Qunnect and Cisco, brings that concept closer.. The post Quantum Networking Breakthrough Points to Key Security Gains appeared first on Security Boulevard .
Rational Security12 · 5d ago

The “Sun-kissed to Death” Edition

This week, Scott sat down with his Lawfare colleagues Eric Columbus, Molly Roberts, and Loren Voss to talk through a few of the week’s big news stories, including: •“Meet Joe Flack.” The Justice Department’s ongoing investigation into the alleged “grand conspiracy” against President Trump in relation to the 2016 elections and their aftermath has entered a new phase this week with the appointment of Joseph diGenova, a former Reagan-era U.S. Attorney and political commentator, as counselor to t...
Security Boulevard12 · 6d ago

[un]prompted 2026 – LLMs Winning At Pwn2Own

center>Author, Creator & Presenter: Georgi G, Director Of Research At Interrupt Labs Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations' YouTube Channel . Permalink The post [un]prompted 2026 – LLMs Winning At Pwn2Own appeared first on Security Boulevard .
BleepingComputer12 · 6d ago

Regular Password Resets Aren’t as Safe as You Think

Password resets are one of the easiest ways for attackers to bypass security controls. Specops Software shows how helpdesk social engineering turns a seemingly legitimate reset request into full account compromise. [...]
Hacker News Frontpage12 · 6d ago

UK Biobank health data keeps ending up on GitHub

I'm a researcher studying privacy, and I started tracking the DMCA notices that UK Biobank sends to GitHub. I tracked 110 notices filed so far, targeting 197 code repositories by 170 developers across the world. The exposure of Biobank data on GitHub is the latest in a long series of governance challenges for UK Biobank. (My colleague and I have an editorial in the BMJ about this: http://bmj.com/cgi/content/full/bmj.s660?ijkey=dEot4dJZGZGXe... ). The latest is today, with information of all h...
We Live Security » Languages » English12 · 6d ago

GopherWhisper: A burrow full of malware

ESET Research has discovered a new China-aligned APT group that we’ve named GopherWhisper, which targets Mongolian governmental institutions
The Register (Security)12 · 6d ago

Pass the key, passwords have passed their sell-by date

NCSC passes judgment: passkeys pass muster, passwords fail The UK's National Cyber Security Centre (NCSC) has officially endorsed passkeys as the default authentication standard, marking the first time the agency has told consumers to move away from passwords entirely.…
Help Net Security12 · 6d ago

GDPR works, but only where someone enforces it

A new measurement study of web tracking across ten countries offers a reality check for anyone working on privacy compliance. Researchers crawled the same set of globally popular websites from virtual machines located in Australia, Brazil, Canada, Germany, India, Singapore, South Africa, South Korea, Spain, and California. The results show that European privacy law does reduce tracking, and that most of the reduction happens in the two jurisdictions where regulators bring cases. The headline ...
The Register (Security)11 · 5d ago

Chinese attackers are pwning your infrastructure to use in attacks, 10 countries warn

All the Typhoons, everywhere, all at once A majority of China-linked threat actors are using compromised routers and IoT devices worldwide, turning this gear into proxy networks to carry out further intrusions, steal sensitive data, and disrupt victim organizations’ operations, according to a joint 10-country advisory.…
Help Net Security11 · 6d ago

Hacker with a special interest in breaching sports institutions ends behind bars

French police have arrested a suspected hacker linked to a series of data breaches affecting organizations in the country. Citing authorities, Le Parisien reported that the suspect, a 20-year-old man using the alias ‘HexDex,’ was taken into custody on April 22, 2026, in the Vendée region, western France. The suspect admitted to using the alias ‘HexDex,’ which he used to claim the leaks online and repost the data on forums such as BreachForum and Darkforum, … More → The post Hacker with a spec...
Help Net Security11 · 6d ago

If cyber espionage via HDMI worries you, NCSC built a device to stop it

A new cybersecurity device developed by the National Cyber Security Centre (NCSC) should be a helpful solution for protecting governments and businesses from malicious activity carried through display connections. Called SilentGlass, the plug-and-play tool is designed to protect HDMI and DisplayPort links from potential cyberattacks. The NCSC warns that monitors are an attractive target for cyber attackers as they can process and store sensitive data, and are highly likely to be exploited to ...
Malwarebytes Unpacked11IoCs DETECTED · 6d ago

Apple fixes iOS bug that kept deleted notifications, including chat previews

A vulnerability in iPhones and iPads allowed law enforcement to recover deleted notifications, including Signal message previews.
Broadcom Software Blogs11 · 6d ago

Trigona Affiliates Deploy Custom Exfiltration Tool to Streamline Data Theft

Use of custom malware remains relatively rare in pre-ransomware activity.
Help Net Security11 · 6d ago

OpenAI tackles a bad habit people have when interacting with AI

Since people tend to paste personal data into AI tools such as ChatGPT, OpenAI has released Privacy Filter, an open-weight model designed to detect and redact personally identifiable information (PII) in text. The model is available under the Apache 2.0 license on Hugging Face and GitHub. “This release is part of our broader effort to support a more resilient software ecosystem by providing developers with practical infrastructure for building with AI safely, including tools and … More → The ...
Security Boulevard10 · 5d ago

When Mythos Finds Thousands of Zero-Days, EU Regulators Won’t Wait for Your SOC to Catch Up

Can your SOC triage thousands of Mythos findings in 24 hours? NIS2, CRA, and DORA are all waiting. Miss one clock and the penalties begin. The post When Mythos Finds Thousands of Zero-Days, EU Regulators Won’t Wait for Your SOC to Catch Up appeared first on D3 Security . The post When Mythos Finds Thousands of Zero-Days, EU Regulators Won’t Wait for Your SOC to Catch Up appeared first on Security Boulevard .
Hacker News Frontpage10 · 5d ago

TorchTPU: Running PyTorch Natively on TPUs at Google Scale

Article URL: https://developers.googleblog.com/torchtpu-running-pytorch-natively-on-tpus-at-google-scale/ Comments URL: https://news.ycombinator.com/item?id=47881786 Points: 81 # Comments: 3
Hacker News Frontpage10 · 5d ago

Using the internet like it's 1999

Article URL: https://joshblais.com/blog/using-the-internet-like-its-1999/ Comments URL: https://news.ycombinator.com/item?id=47881198 Points: 109 # Comments: 69
Hacker News Frontpage10 · 5d ago

Girl, 10, finds rare Mexican axolotl under Welsh bridge

Article URL: https://www.bbc.com/news/articles/c9d4zgnqpqeo Comments URL: https://news.ycombinator.com/item?id=47880189 Points: 190 # Comments: 156
Hacker News Frontpage10 · 5d ago

Meta tells staff it will cut 10% of jobs

https://techcrunch.com/2026/04/23/meta-job-cuts-10-percent-8... Comments URL: https://news.ycombinator.com/item?id=47879986 Points: 443 # Comments: 418
Hacker News Frontpage10 · 5d ago

Middle Eastern News Sites Are U.S. Government Propaganda Ops

Article URL: https://theintercept.com/2026/04/20/pentagon-middle-eastern-news-propaganda-iran/ Comments URL: https://news.ycombinator.com/item?id=47879386 Points: 11 # Comments: 0
Hacker News Frontpage10 · 5d ago

Astronomers find the edge of the Milky Way

Article URL: https://skyandtelescope.org/astronomy-news/astronomers-find-the-edge-of-the-milky-way/ Comments URL: https://news.ycombinator.com/item?id=47879239 Points: 93 # Comments: 15
Hacker News Frontpage10 · 5d ago

Introducing GPT-5.5

Article URL: https://openai.com/index/introducing-gpt-5-5/ Comments URL: https://news.ycombinator.com/item?id=47879092 Points: 22 # Comments: 0
Hacker News Frontpage10 · 5d ago

People Do Not Yearn for Automation

Article URL: https://www.theverge.com/podcast/917029/software-brain-ai-backlash-databases-automation Comments URL: https://news.ycombinator.com/item?id=47878737 Points: 11 # Comments: 5
Hacker News Frontpage10 · 5d ago

My phone replaced a brass plug

Article URL: https://drobinin.com/posts/my-phone-replaced-a-brass-plug/ Comments URL: https://news.ycombinator.com/item?id=47877715 Points: 95 # Comments: 16
Hacker News Frontpage10 · 5d ago

Incident with Multple GitHub Services

Article URL: https://www.githubstatus.com/incidents/myrbk7jvvs6p Comments URL: https://news.ycombinator.com/item?id=47877644 Points: 51 # Comments: 28
Tenable Blog10 · 5d ago

Five steps to become Mythos ready

AI is uncovering vulnerabilities at a scale that will overwhelm legacy defenses. Here is how to build a security organization that is Mythos ready. Key takeaways While frontier AI models like Claude Mythos boost cyber defenses, they also empower attackers to discover and weaponize vulnerabilities at unprecedented machine speed. To avoid getting buried by an avalanche of AI-discovered vulnerabilities, organizations must prioritize ruthlessly by shifting from legacy scoring to a risk-based filt...
Security Boulevard10 · 5d ago

Five steps to become Mythos ready

AI is uncovering vulnerabilities at a scale that will overwhelm legacy defenses. Here is how to build a security organization that is Mythos ready. Key takeaways While frontier AI models like Claude Mythos boost cyber defenses, they also empower attackers to discover and weaponize vulnerabilities at unprecedented machine speed. To avoid getting buried by an avalanche of AI-discovered vulnerabilities, organizations must prioritize ruthlessly by shifting from legacy scoring to a risk-based filt...
Hacker News Frontpage10 · 5d ago

If America's So Rich, How'd It Get So Sad?

Article URL: https://www.derekthompson.org/p/if-americas-so-rich-howd-it-get-so Comments URL: https://news.ycombinator.com/item?id=47877429 Points: 45 # Comments: 44
Hacker News Frontpage10 · 6d ago

To Protect and Swerve: NYPD Cop Has 547 Speeding Tickets

Article URL: https://nyc.streetsblog.org/2026/04/23/to-protect-and-swerve-nypd-cop-has-527-speeding-tickets-yet-remains-on-the-force Comments URL: https://news.ycombinator.com/item?id=47876647 Points: 60 # Comments: 44
SecurityWeek10 · 6d ago

Cloudsmith Raises $72 Million in Series C Funding

The company will use the investment to accelerate product development and grow go-to-market efforts. The post Cloudsmith Raises $72 Million in Series C Funding appeared first on SecurityWeek .
Hacker News Frontpage10 · 6d ago

The end of responsive images

Article URL: https://piccalil.li/blog/the-end-of-responsive-images/ Comments URL: https://news.ycombinator.com/item?id=47875420 Points: 17 # Comments: 12
Hacker News Frontpage10 · 6d ago

I spent years trying to make CSS states predictable

Article URL: https://tenphi.me/blog/why-i-spent-years-trying-to-make-css-states-predictable/ Comments URL: https://news.ycombinator.com/item?id=47875025 Points: 53 # Comments: 19
Hacker News Frontpage10 · 6d ago

Raylib v6.0

Article URL: https://github.com/raysan5/raylib/releases/tag/6.0 Comments URL: https://news.ycombinator.com/item?id=47874854 Points: 125 # Comments: 12
Hacker News Frontpage10 · 6d ago

Jiga (YC W21) Is Hiring

Article URL: https://jiga.io/about-us/ Comments URL: https://news.ycombinator.com/item?id=47874734 Points: 0 # Comments: 0
Hacker News Frontpage10 · 6d ago

Sneaky spam in conversational replies to blog posts

Article URL: https://shkspr.mobi/blog/2026/04/sneaky-spam-in-conversational-replies-to-blog-posts/ Comments URL: https://news.ycombinator.com/item?id=47874631 Points: 9 # Comments: 0
Hacker News Frontpage10 · 6d ago

Commenting and Approving Pull Requests

Article URL: https://www.jakeworth.com/posts/on-commenting-and-approving-pull-requests/ Comments URL: https://news.ycombinator.com/item?id=47874613 Points: 20 # Comments: 13
[DRAGNET]10 · 6d ago

CISA orders feds to patch BlueHammer flaw exploited as zero-day

CISA orders feds to patch BlueHammer flaw exploited as zero-day    BleepingComputer
SecurityWeek10 · 6d ago

Luxury Cosmetics Giant Rituals Discloses Data Breach

The company is notifying My Rituals members that hackers downloaded part of their data, including names and addresses. The post Luxury Cosmetics Giant Rituals Discloses Data Breach appeared first on SecurityWeek .
Hacker News Frontpage10 · 6d ago

Do you want the US to "win" AI?

Article URL: https://geohot.github.io//blog/jekyll/update/2026/04/23/us-win-ai.html Comments URL: https://news.ycombinator.com/item?id=47873796 Points: 23 # Comments: 32
Hacker News Frontpage10 · 6d ago

Writing a C Compiler, in Zig

Article URL: https://ar-ms.me/thoughts/c-compiler-1-zig/ Comments URL: https://news.ycombinator.com/item?id=47873694 Points: 9 # Comments: 2
[DRAGNET]10 · 6d ago

AI has led to a zero-day bug discovery crisis, and it's getting worse

AI has led to a zero-day bug discovery crisis, and it's getting worse    Mashable
Hacker News Frontpage10 · 6d ago

Email could have been X.400 times better

Article URL: https://buttondown.com/blog/x400-vs-smtp-email Comments URL: https://news.ycombinator.com/item?id=47873323 Points: 15 # Comments: 6
[DRAGNET]10 · 6d ago

Recent Microsoft Defender Vulnerability Exploited as Zero-Day

Recent Microsoft Defender Vulnerability Exploited as Zero-Day    SecurityWeek
[DRAGNET]10 · 6d ago

Recent Microsoft Defender Vulnerability Exploited as Zero-Day

Recent Microsoft Defender Vulnerability Exploited as Zero-Day    SecurityWeek
[DRAGNET]10 · 6d ago

Claude Mythos AI Model Uncovers 271 Zero-Day Vulnerabilities in Firefox

Claude Mythos AI Model Uncovers 271 Zero-Day Vulnerabilities in Firefox    cyberpress.org
阿小信的博客10 · 6d ago

AI人物海报怎么做?ChatGPT vs Kimi 实测结果分享

我用同样的提示词分别让ChatGPT和Kimi帮我生成了我自己的人物海报内容,ChatGPT直接给了我图片,而Kimi先给了我文字整理,再把文字做成了HTML网页。 使用的提示词: 请访问以下链接获取阿小信相关的真实信息: https://axiaoxin.com https://blog.axiaoxin.com https://x.com/axiaoxin https://github.com/axiaoxin https://weibo.com/u/1739356367 根据这些信息,做一份「阿小信」的人物海报。 需要包含: 1. 头部:姓名 + slogan + 金句 + 肖像 2. 基本信息:出生/教育/关键节点 3. 职业履历时间轴 4. 核心理念(4条) 5. 代表作品(6个) 6. 金句与演讲(3条) 7. 管理/个人风格(4个关键词) 8. 未来方向(4个) 9. 底部总结 + 金句横幅 真实资料优先,虚构部分标注。 以下是由ChatGPT和Kimi基于「阿小信」的真实公开信息整理的人物海报内容概览: 「阿小信」人物海报——By ChatGPT Image-2 ...
Hacker News Frontpage10 · 6d ago

Ars Technica: Our newsroom AI policy

Article URL: https://arstechnica.com/staff/2026/04/our-newsroom-ai-policy/ Comments URL: https://news.ycombinator.com/item?id=47872452 Points: 5 # Comments: 1
Hacker News Frontpage10 · 6d ago

A disabled kea parrot is the alpha male of his circus

Article URL: https://www.cell.com/current-biology/fulltext/S0960-9822(26)00259-9 Comments URL: https://news.ycombinator.com/item?id=47872418 Points: 27 # Comments: 8
Hacker News Frontpage10 · 6d ago

I am building a cloud

Article URL: https://crawshaw.io/blog/building-a-cloud Comments URL: https://news.ycombinator.com/item?id=47872324 Points: 8 # Comments: 2
Hacker News Frontpage10 · 6d ago

MacBook Neo and How the iPad Should Be

Article URL: https://craigmod.com/essays/ipad_neo/ Comments URL: https://news.ycombinator.com/item?id=47872306 Points: 38 # Comments: 17
36氪10 · 6d ago

36氪官方AI专属社群,正式开放招募!

36氪AI测评官方社群现已正式开放, 从入门认知到实战应用,从工具使用到项目落地。 36氪AI测评正式开放三大垂直社群:AI启航群、AI实战群、OPC超级个体群。面向不同阶段、不同目标的用户,帮助你更高效地理解AI、使用AI,并推动真实成长与结果落地。   为什么要做三大专属社群? AI 已经从“了解一下”走向“真正使用”。不同用户所处阶段不同,关注的问题也不同。有人需要从零开始建立基础认知,有人希望提升日常实操能力,也有人更关注如何借助 AI 推动项目落地、个人增长与资源连接。 基于此, 36氪AI测评围绕用户的不同阶段与需求,帮助每一类用户都能找到更适合自己的交流空间与成长路径。   三大社群,覆盖AI学习与应用全阶段 AI启航群 面向 AI 入门用户的启蒙型社群,适合零基础新手、学生群体以及刚开始接触AI的用户。 群内将围绕 AI 基础概念科普、入门教程、工具避坑指南、基础指令教学与常见问题答疑等内容持续展开,帮助用户从 0 到 1 建立对 AI 的基础认知与使用习惯。 适合从不会用AI,到开始上手AI的人。 👉入群链接: https://36aidianping.com/...
Hacker News Frontpage10 · 6d ago

Borrow-checking without type-checking

Article URL: https://www.scattered-thoughts.net/writing/borrow-checking-without-type-checking/ Comments URL: https://news.ycombinator.com/item?id=47871817 Points: 27 # Comments: 0
Hacker News Frontpage10 · 6d ago

Flow Map Learning via Nongradient Vector Flow [pdf]

Article URL: https://openreview.net/pdf?id=C1bkDPqvDW Comments URL: https://news.ycombinator.com/item?id=47871800 Points: 13 # Comments: 0
Hacker News Frontpage10 · 6d ago

Arch Linux Now Has a Bit-for-Bit Reproducible Docker Image

Article URL: https://antiz.fr/blog/archlinux-now-has-a-reproducible-docker-image/ Comments URL: https://news.ycombinator.com/item?id=47871519 Points: 56 # Comments: 12
Hacker News Frontpage10 · 6d ago

Fundamental Theorem of Calculus

Article URL: https://david.alvarezrosa.com/posts/fundamental-theorem-of-calculus/ Comments URL: https://news.ycombinator.com/item?id=47871246 Points: 30 # Comments: 22
Hacker News Frontpage10 · 6d ago

OpenAI's response to the Axios developer tool compromise

Article URL: https://openai.com/index/axios-developer-tool-compromise/ Comments URL: https://news.ycombinator.com/item?id=47871077 Points: 50 # Comments: 17
Security on TechRepublic9 · 6d ago

Apple Fixes iPhone Bug After FBI Retrieved Signal Messages

Apple patched an iPhone notification bug that let deleted messages linger in system storage, closing a privacy gap exposed by an FBI Signal case. The post Apple Fixes iPhone Bug After FBI Retrieved Signal Messages appeared first on TechRepublic .
CISA Alerts9 · 6d ago

Hangzhou Xiongmai Technology Co., Ltd XM530 IP Camera

View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to bypass authentication and have remote access to sensitive information on the device. The following versions of Hangzhou Xiongmai Technology Co., Ltd XM530 IP Camera are affected: IP Camera XM530V200_X6-WEQ_8M firmware V5.00.R02.000807D8.10010.346624.S.ONVIF_21.06 (CVE-2025-65856) CVSS Vendor Equipment Vulnerabilities v3 9.8 Hangzhou Xiongmai Technology Co., Ltd Hangzhou Xiongmai Technology Co., Ltd XM53...
Deeplinks8 · 5d ago

EFF to 9th Circuit (Again): App Stores Shouldn’t Be Liable for Processing Payments for User Content

EFF filed an amicus brief for the second time in the U.S. Court of Appeals for the Ninth Circuit, arguing that allowing cases against the Apple, Google, and Facebook app stores to proceed could lead to greater censorship of users’ online speech. Our brief argues that the app stores should not lose Section 230 immunity for hosting “social casino” apps just because they process payments for virtual chips within those apps. Otherwise, all platforms that facilitate financial transactions for onli...
Phoronix (Linux)8 · 5d ago

Opera GX Browser Gets Flatpak'ed & Snap'ed On Linux

Last month Opera released the Opera GX gaming-focused web browser for Linux. It rolled out in RPM and Debian package format support while now for those interested is also available via Flatpak and Snap sandboxed app formats...
Security on TechRepublic8 · 5d ago

White House Says China-Linked Actors Tried to ‘Steal American AI’

The White House says China-linked actors are using industrial-scale distillation to extract American AI breakthroughs, with US action planned. The post White House Says China-Linked Actors Tried to ‘Steal American AI’ appeared first on TechRepublic .
Phoronix (Linux)8 · 5d ago

Ubuntu 26.04 LTS Now Available & Powered By Linux 7.0

The official release ISOs of Ubuntu 26.04 LTS, Ubuntu Server 26.04 LTS, and the various other Ubuntu flavors are now available for download...

Microsoft Vibing — capturing screenshots and voice samples without governance

Microsoft Vibing — capturing screenshots and voice samples without governance
IEEE Spectrum8 · 6d ago

What Anthropic’s Mythos Means for the Future of Cybersecurity

Two weeks ago, Anthropic announced that its new model, Claude Mythos Preview, can autonomously find and weaponize software vulnerabilities, turning them into working exploits without expert guidance. These were vulnerabilities in key software like operating systems and internet infrastructure that thousands of software developers working on those systems failed to find. This capability will have major security implications, compromising the devices and services we use every day. As a result, ...
IEEE Spectrum8 · 6d ago

This Roboticist-Turned-Teacher Built a Life-Size Replica of ENIAC

Tom Burick has always considered himself a builder. Over the years he’s designed robots, constructed a vintage teardrop trailer , and most recently, led a group of students in building a full-scale replica of a pivotal 1940s computer. Burick is a technology instructor at PS Academy in Gilbert, Ariz., a middle and high school for students with autism and other specialized learning needs. At the start of the 2025–26 school year, he began a project with his students to build a full-scale replica...
Help Net Security8 · 6d ago

Google brings instant email verification to Android, no OTP needed

Google has introduced cryptographically verified email credentials for Android through the Credential Manager API. This API aligns with the W3C Digital Credential API standard. It provides a unified way for apps to request and retrieve user credentials for authentication and authorization. “By integrating the new verified email via the Credential Manager API, you can reduce onboarding friction and provide a more streamlined and secure authentication flow. This reflects a shift toward a future...
Phoronix (Linux)8 · 6d ago

Many USB Improvements & New Hardware Merged For Linux 7.1

Ready to go ahead of the Linux 7.1 merge window closing at week's end are numerous new USB device support additions and other USB subsystem enhancements...
Google AI Blog8 · 6d ago

Elevating Austria: Google invests in its first data center in the Alps.

Google has been a proud part of Austria’s landscape for years, and today, we’re announcing our first data center in Kronstorf, generating 100 direct jobs. This facility …
Fidelis Security8 · 6d ago

Securing Hybrid Cloud Environments with Zero Trust Principles

Secure hybrid cloud environments with zero trust principles to reduce breach risk improve visibility and stop lateral movement across cloud and on premises. The post Securing Hybrid Cloud Environments with Zero Trust Principles appeared first on Fidelis Security .
Help Net Security8 · 6d ago

Scenario: Open-source framework for automated AI app red-teaming

Enterprises running customer service bots, data analytics agents, and other AI-driven applications in production handle sensitive records and connect to core business systems every day. LangWatch has released Scenario, an open-source framework that runs automated red-team exercises against AI agents using multi-turn attack techniques that mirror how adversaries operate in the wild. Multi-turn attacks replace single-shot testing Single-prompt penetration tests have long been the standard appro...
Dark Reading6 · 5d ago

China-Backed Hackers Are Industrializing Botnets

China's state-backed groups are now using covert networks of compromised devices to execute attacks in a low-cost, low-risk, and deniable way.
CISA Alerts6 · 6d ago

Milesight Cameras

View CSAF Summary Successful exploitation of these vulnerabilities could crash the device being accessed or allow remote code execution. The following versions of Milesight Cameras are affected: MS-Cxx63-PD MS-Cxx64-xPD MS-Cxx73-xPD MS-Cxx75-xxPD MS-Cxx83-xPD MS-Cxx74-PA MS-C8477-HPG1 MS-C8477-PC MS-C5321-FPE MS-Cxx72-xxxPE MS-Cxx62-xxxPE MS-Cxx52-xxxPE MS-Cxx66-xxxPE MS-Cxx66-xxxGPE MS-Cxx61-xxxPE MS-Cxx67-xxxPE MS-Cxx71-xxxPE MS-Cxx41-xxxPE MS-Cxx76-PE MS-Cxx65-PE MS-Cxx66-xxxG1 MS-Cxx62-xx...
[DRAGNET]5 · 5d ago

In a first, a ransomware family is confirmed to be quantum-safe

In a first, a ransomware family is confirmed to be quantum-safe    Ars Technica
[DRAGNET]5 · 5d ago

Asking around: When does ransomware threat intelligence become noise?

Asking around: When does ransomware threat intelligence become noise?    IT Brew
[DRAGNET]5 · 5d ago

Trigona ransomware attacks use custom exfiltration tool to steal data

Trigona ransomware attacks use custom exfiltration tool to steal data    BleepingComputer
[DRAGNET]5 · 5d ago

Ransomware Negotiator Pleads Guilty to Aiding Hackers Targeting His Own Clients

Ransomware Negotiator Pleads Guilty to Aiding Hackers Targeting His Own Clients    FEDagent
[DRAGNET]5 · 6d ago

UK ransomware attacks shift to targeted methods, small businesses most affected

UK ransomware attacks shift to targeted methods, small businesses most affected    SC Media
[DRAGNET]5 · 6d ago

Shai-Hulud: The Third Coming — Bitwarden CLI Backdoored in Latest Supply Chain Campaign

Shai-Hulud: The Third Coming — Bitwarden CLI Backdoored in Latest Supply Chain Campaign    OX Security
[DRAGNET]5 · 6d ago

Kyber ransomware targets Windows and ESXi with post-quantum encryption claims

Kyber ransomware targets Windows and ESXi with post-quantum encryption claims    SC Media
[DRAGNET]5 · 6d ago

Barracuda Managed XDR Endpoint Security’s standout capability: Custom EDR detection rules

Barracuda Managed XDR Endpoint Security’s standout capability: Custom EDR detection rules    Barracuda Networks Blog
[DRAGNET]5 · 6d ago

Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign    The Hacker News
[DRAGNET]5 · 6d ago

Citizens Bank Faces Federal Lawsuits Following Everest Ransomware Attack

Citizens Bank Faces Federal Lawsuits Following Everest Ransomware Attack    Koran Manado
[DRAGNET]5 · 6d ago

Checkmarx suffers second massive supply chain attack, infecting developers with malware

Checkmarx suffers second massive supply chain attack, infecting developers with malware    Cybernews
[DRAGNET]5 · 6d ago

Trigona Affiliates Deploy Custom Exfiltration Tool to Streamline Data Theft

Trigona Affiliates Deploy Custom Exfiltration Tool to Streamline Data Theft    SECURITY.COM
[DRAGNET]5 · 6d ago

The Rising Risk Landscape for Critical National Infrastructure

The Rising Risk Landscape for Critical National Infrastructure    Infosecurity Magazine
[DRAGNET]5 · 6d ago

Rubrik and Google Cloud Enable Ransomware-Resistant Database Protection at Scale

Rubrik and Google Cloud Enable Ransomware-Resistant Database Protection at Scale    TechAfrica News
[DRAGNET]5 · 6d ago

The zero-day market: discover, sell and keep quiet

The zero-day market: discover, sell and keep quiet    ForkLog
[DRAGNET]5 · 6d ago

Claude Mythos Exposes 271 Zero-Day Security Flaws in Firefox

Claude Mythos Exposes 271 Zero-Day Security Flaws in Firefox    gbhackers.com
[DRAGNET]5 · 6d ago

Third BlackCat Insider Pleads Guilty as DOJ Signals Crackdown on Ransomware Response Firms

Third BlackCat Insider Pleads Guilty as DOJ Signals Crackdown on Ransomware Response Firms    SOFX
[DRAGNET]5 · 6d ago

Ransomware, fraud, and lawsuits drive cyber insurance claims to new peaks

Ransomware, fraud, and lawsuits drive cyber insurance claims to new peaks    Help Net Security
[DRAGNET]5 · 6d ago

Elevated Ransomware Activity in Q1 2026 Underscores Demand for ZeroFox Cybersecurity Services

Elevated Ransomware Activity in Q1 2026 Underscores Demand for ZeroFox Cybersecurity Services    TipRanks
[DRAGNET]0 · 5d ago

Winona County Systems Restored After Ransomware Attack

Winona County Systems Restored After Ransomware Attack    news8000.com
[DRAGNET]0 · 5d ago

Winona County systems restored after ransomware attack

Winona County systems restored after ransomware attack    news8000.com
[DRAGNET]0 · 6d ago

Chinese APT Abuses Multiple Cloud Tools to Spy on Mongolia

Chinese APT Abuses Multiple Cloud Tools to Spy on Mongolia    Dark Reading
[DRAGNET]0 · 6d ago

Florida man pleads guilty to being ransomware negotiator

Florida man pleads guilty to being ransomware negotiator    Homeland Preparedness News
[DRAGNET]0 · 6d ago

RAMP Uncovered: Anatomy of Russia’s Ransomware Marketplace

RAMP Uncovered: Anatomy of Russia’s Ransomware Marketplace    Security Affairs
[DRAGNET]-35 · 6d ago

Cyber attacks on universities rise 63% around the world

Cyber attacks on universities rise 63% around the world    SecurityBrief UK
[DRAGNET]-40 · 6d ago

ShinyHunters exposes data on Mytheresa, Zara, Carnival, 7-Eleven – over 40 organizations tied up in new data trove which will stay up 'indefinitely'

ShinyHunters exposes data on Mytheresa, Zara, Carnival, 7-Eleven – over 40 organizations tied up in new data trove which will stay up 'indefinitely'    TechRadar
[DRAGNET]-40 · 6d ago

Tropic Trooper Deploys Custom Beacon and VS Code Tunnels in Fresh APT Assault

Tropic Trooper Deploys Custom Beacon and VS Code Tunnels in Fresh APT Assault    cyberpress.org
[DRAGNET]-45 · 6d ago

EvilAI: From Fake App to Full C2

EvilAI: From Fake App to Full C2    Halcyon
[DRAGNET]-80 · 5d ago

Weekly Intelligence Report – 24 April 2026

Weekly Intelligence Report – 24 April 2026    cyfirma