Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-04-24

Cybersecurity News230IN STACK · 5d ago

Arcane Door Reopened: The Cisco Firepower Backdoor That Only a Hard Reboot Can Kill

The post Arcane Door Reopened: The Cisco Firepower Backdoor That Only a Hard Reboot Can Kill appeared first on Daily CyberSecurity . Related posts: CRITICAL Cisco Zero-Day (CVE-2025-20333, CVSS 9.9) Under Active Attack: VPN Flaw Allows Root RCE Rapid7 Details Cisco ASA Zero-Day Exploit Chain (CVE-2025-20362 & CVE-2025-20333) New “PowMix” Botnet Preys on Czech Workforce with Lure of Compliance
VentureBeat145 · 4d ago

CVSS scored these two Palo Alto CVEs as manageable. Chained, they gave attackers root access to 13,000 devices.

During Operation Lunar Peek in November 2024 , attackers gained unauthenticated remote admin access — and eventual root — across more than 13,000 exposed Palo Alto Networks management interfaces . Palo Alto Networks scored CVE-2024-0012 at 9.3 and CVE-2024-9474 at 6.9 under CVSS v4.0. NVD scored the same pair 9.8 and 7.2 under CVSS v3.1 . Two scoring systems. Two different answers for the same vulnerabilities. The 6.9 fell below patch thresholds. Admin access appeared required. The 9.3 sat qu...
Simon Willison57 · 5d ago

An update on recent Claude Code quality reports

An update on recent Claude Code quality reports It turns out the high volume of complaints that Claude Code was providing worse quality results over the past two months was grounded in real problems. The models themselves were not to blame, but three separate issues in the Claude Code harness caused complex but material problems which directly affected users. Anthropic's postmortem describes these in detail. This one in particular stood out to me: On March 26, we shipped a change to clear Cla...
Simon Willison45 · 4d ago

llm 0.31

Release: llm 0.31 New GPT-5.5 OpenAI model: llm -m gpt-5.5 . #1418 New option to set the text verbosity level for GPT-5+ OpenAI models: -o verbosity low . Values are low , medium , high . New option for setting the image detail level used for image attachments to OpenAI models: -o image_detail low - values are low , high and auto , and GPT-5.4 and 5.5 also accept original . Models listed in extra-openai-models.yaml are now also registered as asynchronous. #1395 Tags: gpt , openai , llm
Simon Willison45 · 5d ago

Millisecond Converter

Tool: Millisecond Converter LLM reports prompt durations in milliseconds and I got fed up of having to think about how to convert those to seconds and minutes. Tags: tools
Rapid7 Blog40 · 5d ago

3 Reasons to Attend our Global Cybersecurity Summit if you’re Focused on AI, Threats, and CTEM

Security teams are dealing with a different kind of pressure now. It is not just the volume of alerts or the pace of attacks, but also the gap between what teams can see and what they can act on with confidence. That gap shows up in different ways. Threats move across identity and cloud in ways that are difficult to track, exposure data exists but often sits disconnected from response, and AI is being introduced into workflows without a clear role in decision-making. This year’s Rapid7 Global...
Palo Alto Unit 4238 · 4d ago

The npm Threat Landscape: Attack Surface and Mitigations

Unit 42 analyzes npm supply chain evolution post-Shai Hulud. Discover wormable malware, CI/CD persistence, multi-stage attacks and more. The post The npm Threat Landscape: Attack Surface and Mitigations appeared first on Unit 42 .
Rapid7 Blog35 · 4d ago

Metasploit Wrap-Up 04/25/2026

Check Method Visibility Metasploit has supported check methods for many years now. It’s not always desirable to jump straight into exploiting a vulnerability but instead to determine if the target is vulnerable. Metasploit tries to be very conservative with classifying a target as “vulnerable” unless the vulnerability is leveraged as part of the check method, reserving the “appears” status for version checks. The different check codes a module is capable of returning and the logic to select a...
The Verge32 · 4d ago

The person who allegedly leaked Paramount’s new Avatar movie has been arrested

Following Paramount Skydance's move to launch an investigation into how its upcoming Avatar Aang: The Last Airbender animated feature leaked onto the internet, a suspect has been taken into custody by police. The Straits Times reports Singaporean police have arrested a 26-year-old man who is alleged to have uploaded the new Avatar movie (previously titled […]
Security Boulevard32 · 4d ago

Benchmarking OpenAI’s Privacy Filter: What it gets right, and where PII detection still needs real data

A deep dive into OpenAI’s Privacy Filter, benchmarking its PII detection performance against Tonic Textual on real-world datasets. We explore where the model succeeds, where it struggles, and how fine-tuning with labeled data impacts accuracy across domains like healthcare, legal, and web data. The post Benchmarking OpenAI’s Privacy Filter: What it gets right, and where PII detection still needs real data appeared first on Security Boulevard .
The Hacker News28 · 5d ago

LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure

A high-severity security flaw in LMDeploy, an open-source toolkit for compressing, deploying, and serving LLMs, has come under active exploitation in the wild less than 13 hours after its public disclosure. The vulnerability, tracked as CVE-2026-33626 (CVSS score: 7.5), relates to a Server-Side Request Forgery (SSRF) vulnerability that could be exploited to access sensitive data. "A server-side
The Hacker News25 · 5d ago

NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software

The Office of Inspector General (OIG) of the U.S. National Aeronautics and Space Administration (NASA) has revealed how a Chinese national posed as a U.S. researcher as part of a spear-phishing campaign to obtain sensitive information from the space agency, as well as from government entities, universities, and private companies, in violation of export control laws. "For years, NASA employees
The Hacker News25 · 5d ago

26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases

Cybersecurity researchers have discovered a set of malicious apps on the Apple App Store that impersonate popular cryptocurrency wallets in an attempt to steal recovery phrases and private keys since at least fall 2025. "Once launched, these apps redirect users to browser pages designed to look similar to the App Store and distribute trojanized versions of legitimate wallets," Kaspersky
Simon Willison25 · 5d ago

Serving the For You feed

Serving the For You feed One of Bluesky's most interesting features is that anyone can run their own custom "feed" implementation and make it available to other users - effectively enabling custom algorithms that can use any mechanism they like to recommend posts. spacecowboy runs the For You Feed , used by around 72,000 people. This guest post on the AT Protocol blog explains how it works. The architecture is fascinating . The feed is served by a single Go process using SQLite on a "gaming" ...
Hacker News Frontpage22 · 4d ago

LLM research on Hacker News is drying up

Article URL: https://dylancastillo.co/til/llm-research-on-hacker-news-is-dying.html Comments URL: https://news.ycombinator.com/item?id=47893860 Points: 7 # Comments: 0
Latest stories for ZDNET in Security20 · 4d ago

Get Spotify's student discount and Hulu for just $6 a month - here's how

If you're a college student, Spotify has an exclusive bundle that can save you cash on music and streaming. Here's how to get it.
Latest stories for ZDNET in Security20 · 4d ago

How I used Claude AI to plan an entire hiking trip to the Adirondacks in 30 minutes - for free

Using Claude's interactive connections to third-party services such as TripAdvisor and AllTrails, I mapped a summer hiking trip, including trails, hotels, tours, and even a playlist to accompany us.
The Register (Security)20 · 4d ago

US clarifies mobile hotspots part of foreign router ban despite rarity of American made consumer kit

Silicon often from US, but the kit from APAC and elsewhere America's telco regulator has clarified its ban on foreign-made routers also includes mobile hotspots and domestic routers that use a 5G cellular connection to the internet.…
Latest stories for ZDNET in Security20 · 5d ago

I tried ChatGPT Images 2.0: A fun, huge leap - and surprisingly useful for real work

My ChatGPT Images 2.0 results were impressive, but occassionally wrong. Here's how it handles branding, text, and infographics.
The Register (Security)20 · 5d ago

Intel bets the farm on AI inference to drag CPU back to the top table

Chipzilla hopes agents, robots, and edge devices make CPUs cool again... now it has to build the chips Intel is betting on AI to reverse its fortunes, wagering that inference and agentic workloads will restore the CPU to the center of compute - even as its chip manufacturing struggles persist.…
Latest stories for ZDNET in Security20 · 5d ago

I've earned nearly $700 just by using Rakuten - here's how I did it

Have you added something to an online cart recently? Don't check out until you read this.
Payatu20 · 5d ago

How a Double-Encoded Null Byte Turns a ZIP File into an XSS Vector – CVE-2026-2790

MIME type confusion, content sniffing abuse, and a sneaky bypass of a previous Firefox patch This bug is a bypass. It doesn’t introduce any new primitive on its own; it sidesteps a fix Mozilla shipped for CVE-2025-1936 without realising the sanitization was only half-done. To understand why it works, you need to dig into how […] The post How a Double-Encoded Null Byte Turns a ZIP File into an XSS Vector – CVE-2026-2790 appeared first on Payatu .
HackerNoon20 · 5d ago

Stop Calling Everything 'SRE'. Here's What It Actually Means.

Confused about the buzzword 'SRE'? Learn the true definition of Site Reliability Engineering and how it impacts modern businesses. Discover the key responsibilities and goals of SRE teams in this informative guide.
HackerNoon20 · 5d ago

How I Cut Our Cloud Bill by 40% Without Touching a Single Data Model

Azure costs often come from poor data lake hygiene. Fixing small files, snapshots, and streaming intervals can cut costs and improve performance
Latest stories for ZDNET in Security20 · 5d ago

How indirect prompt injection attacks on AI work - and 6 ways to shut them down

Cybercriminals are tricking AI into leaking your data, executing code, and sending you to malicious sites. Here's how.
Security on TechRepublic17 · 4d ago

Health Records of 500,000 UK Biobank Volunteers Listed Online in China

Health data from 500,000 UK Biobank participants was found listed for sale online in China, raising concerns over research access misuse and data security. The post Health Records of 500,000 UK Biobank Volunteers Listed Online in China appeared first on TechRepublic .
The Register (Security)17 · 5d ago

ShinyHunters claim they have cruise giant Carnival's booty as 7.5M emails surface

Leak-site bragging meets breach hunters as Have I Been Pwned flags millions of records Carnival Corporation, the world's largest cruise company, is dealing with choppy waters after Have I Been Pwned flagged what it claimed were 7.5 million unique email addresses all allegedly tied to one of its subsidiaries. …
Security Boulevard17 · 5d ago

[un]prompted 2026 – Building Secure Agentic Systems: Lessons From Daily-Driver Agents

Author, Creator & Presenter: Brooks McMillin, AI Security Researcher & Security Engineer, Dropbox Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations' YouTube Channel . Permalink The post [un]prompted 2026 – Building Secure Agentic Systems: Lessons From Daily-Driver Agents appeared first on Security Boulevard .
The Register (Security)17 · 5d ago

Governments on high alert after CISA snuffs out Firestarter backdoor on fed network

Latest in long-running pwning of Cisco kit found in mystery Fed agency A US federal agency was successfully targeted by a previously unknown backdoor malware called Firestarter, according to CISA cybersnoops and their UK counterparts – neither of which disclosed the agency's name.…
BleepingComputer17 · 5d ago

DORA and operational resilience: Credential management as a financial risk control

Article 9 of DORA makes authentication and access control a legal obligation for EU financial entities. Here is what the regulation requires, and what a breach looks like when those controls are missing. [...]
The Register (Security)17 · 5d ago

Microsoft beefs up Remote Desktop security with ... hard-to-read messages

Ailing scaling blamed by Windows-maker for unreadable missives Microsoft's update to harden Remote Desktop against phishing attacks has arrived. When users open a Remote Desktop (.rdp) file, they should now see a warning listing all requested connection settings - or they would if it was displaying correctly.…
The Register (Security)17 · 5d ago

It's a myth that you need Mythos to find bugs: Open source models can do it just as well

OpenAI's first security hire, Ari Herbert-Voss, thinks more automated bug finding will improve security without costing jobs Black Hat Asia   Open source models can find bugs as effectively as Anthropic's Mythos, according to Ari Herbert-Voss, CEO of AI-powered security startup RunSybil and OpenAI's first security hire.…
Securelist17 · 5d ago

PhantomRPC: A new privilege escalation technique in Windows RPC

Kaspersky researcher discovered a vulnerability in RPC architecture that enables an attacker to create a fake RPC server and escalate their privileges.
Security Boulevard17 · 5d ago

When Research Becomes a Crime: The New Risk Landscape for OSINT and Dark Web Intelligence

For decades, the "gray area" of undercover research was governed by internal policies. The SPLC indictment suggests that internal oversight is no longer a shield. The post When Research Becomes a Crime: The New Risk Landscape for OSINT and Dark Web Intelligence appeared first on Security Boulevard .
The Register – Security17 · 5d ago

Researchers find cyber-sabotage malware that may predate Stuxnet by five years

FAST16 could be the first cyberweapon, and its effects could be with us today Black Hat Asia   Infosec outfit SentinelOne found malware that tries to induce errors in engineering and physics simulation software and therefore represents an attempt at sabotage, and suggests it was created years before the Stuxnet worm that aimed to destroy Iran’s uranium enrichment centrifuges.…
The Register (Security)17 · 5d ago

Weak security means attackers could disable all of a city's public EV chargers

Demonstrated in China, probably applicable elsewhere Black Hat Asia   Developers of rented internet of things infrastructure – stuff like public EV chargers and shared e-bikes – are prioritizing user convenience over security, and leaving themselves exposed to wide-scale denial of service attacks on their services.…
Cyber Kendra17 · 5d ago

Vercel Hacked: Breach Is Bigger Than First Disclosed — Customer Data Stolen Before the Attack Even Started

What began as a contained supply chain incident has quietly expanded into something far more serious. Vercel has updated its April 2026 security bulletin , confirming that some customer data was stolen before the breach the company originally disclosed — and that the threat actor behind this attack was already hunting for developer credentials across the broader internet well before the Context.ai compromise that initially triggered the investigation. Vercel's security team sifted through nea...
Discord Developer Blog17 · 5d ago

Measure Less to Learn More: Using Fewer, Higher-quality Metrics to Capture What Matters

Too many experiment metrics can make meaningful changes harder to detect. Learn how Discord used simulations and Principal Component Analysis to maximize signal and reduce noise.
Hacker News Frontpage15 · 4d ago

Tariffs Raised Consumers' Prices, but the Refunds Go Only to Businesses

Article URL: https://www.nytimes.com/2026/04/24/us/politics/companies-consumers-tariff-refunds.html Comments URL: https://news.ycombinator.com/item?id=47893060 Points: 24 # Comments: 8
Hacker News Frontpage15 · 4d ago

Tesla (TSLA) discloses $2B AI hardware company acquisition buried

Article URL: https://electrek.co/2026/04/23/tesla-tsla-quietly-discloses-2-billion-ai-hardware-acquisition-10q/ Comments URL: https://news.ycombinator.com/item?id=47892765 Points: 5 # Comments: 2
Hacker News Frontpage15 · 4d ago

Redesigning the Recurse Center application to inspire curious programmers

Article URL: https://www.recurse.com/blog/192-redesigning-the-recurse-center-application Comments URL: https://news.ycombinator.com/item?id=47892660 Points: 5 # Comments: 1
Hacker News Frontpage15 · 4d ago

Which one is more important: more parameters or more computation? (2021)

Article URL: https://parl.ai/projects/params_vs_compute/ Comments URL: https://news.ycombinator.com/item?id=47892655 Points: 11 # Comments: 0
Hacker News Frontpage15 · 4d ago

Diatec, known for its mechanical keyboard brand FILCO, has ceased operations

Article URL: https://gigazine.net/gsc_news/en/20260424-filco-diatec/ Comments URL: https://news.ycombinator.com/item?id=47892236 Points: 10 # Comments: 1
Hacker News Frontpage15 · 4d ago

I Cancelled Claude: Token Issues, Declining Quality, and Poor Support

Article URL: https://nickyreinert.de/en/2026/2026-04-24-claude-critics/ Comments URL: https://news.ycombinator.com/item?id=47892019 Points: 57 # Comments: 10
The Verge15 · 5d ago

Tesla’s Cybercab goes into production — so why is Musk tapping the brakes?

Tesla's Cybercab is now in production at the company's Gigafactory in Austin, Texas, but Elon Musk is sounding unusually cautious about the rollout. The robotaxi's start of production was announced Thursday on X, with Tesla posting a video shot from inside a steering wheel-less Cybercab as it drove out of the factory with the caption, […]
SecurityWeek15 · 5d ago

Pre-Stuxnet Sabotage Malware ‘Fast16’ Linked to US-Iran Cyber Tensions

It targeted high-precision calculation software to tamper with results and packed a self-propagation mechanism. The post Pre-Stuxnet Sabotage Malware ‘Fast16’ Linked to US-Iran Cyber Tensions appeared first on SecurityWeek .
Hacker News Frontpage15 · 5d ago

Norway Set to Become Latest Country to Ban Social Media for Under 16s

Article URL: https://www.bloomberg.com/news/articles/2026-04-24/norway-wants-kids-to-be-kids-with-social-media-ban-for-under-16s Comments URL: https://news.ycombinator.com/item?id=47891019 Points: 4 # Comments: 0
Hacker News Frontpage15 · 5d ago

Different Language Models Learn Similar Number Representations

Article URL: https://arxiv.org/abs/2604.20817 Comments URL: https://news.ycombinator.com/item?id=47890873 Points: 11 # Comments: 0
SecurityWeek15 · 5d ago

In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device

Other noteworthy stories that might have slipped under the radar: Supreme Court hacker sentenced, Lovable exposed user data, Google expands enterprise security.  The post In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device appeared first on SecurityWeek .
Hacker News Frontpage15 · 5d ago

Machine Learning Reveals Unknown Transient Phenomena in Historic Images

Article URL: https://arxiv.org/abs/2604.18799 Comments URL: https://news.ycombinator.com/item?id=47890456 Points: 6 # Comments: 1
SecurityWeek15 · 5d ago

Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents

From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. The post Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents appeared first on SecurityWeek .
SecurityWeek15 · 5d ago

Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World’s Biggest Exercise

Locked Shields has grown significantly over the past 16 years, with only four nations participating in the first edition. The post Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World’s Biggest Exercise appeared first on SecurityWeek .
Hacker News Frontpage15 · 5d ago

Show HN: Atomic – Local-first, AI-augmented personal knowledge base

Article URL: https://atomicapp.ai/ Comments URL: https://news.ycombinator.com/item?id=47889110 Points: 11 # Comments: 2
SecurityWeek15 · 5d ago

US Federal Agency’s Cisco Firewall Infected With ‘Firestarter’ Backdoor

The malware provides remote access and control of infected devices and maintains post-patching persistence. The post US Federal Agency’s Cisco Firewall Infected With ‘Firestarter’ Backdoor appeared first on SecurityWeek .
SecurityWeek15 · 5d ago

Trump Administration Vows Crackdown on Chinese Companies ‘Exploiting’ AI Models Made in US

The Trump administration is vowing to crack down on foreign tech companies’ exploitation of U.S. artificial intelligence models. The post Trump Administration Vows Crackdown on Chinese Companies ‘Exploiting’ AI Models Made in US appeared first on SecurityWeek .
Hacker News Frontpage15 · 5d ago

Show HN: leaf – a terminal Markdown previewer with a GUI-like experience

Article URL: https://github.com/RivoLink/leaf Comments URL: https://news.ycombinator.com/item?id=47888423 Points: 11 # Comments: 2
Hacker News Frontpage15 · 5d ago

How to be anti-social – a guide to incoherent and isolating social experiences

Article URL: https://nate.leaflet.pub/3mk4xkaxobc2p Comments URL: https://news.ycombinator.com/item?id=47888372 Points: 136 # Comments: 125
Hacker News Frontpage15 · 5d ago

South Korea police arrest man for posting AI photo of runaway wolf

Article URL: https://www.bbc.com/news/articles/c4gx1n0dl9no Comments URL: https://news.ycombinator.com/item?id=47887683 Points: 190 # Comments: 112
SecurityWeek15 · 5d ago

Copperhelm Raises $7 Million for Agentic Cloud Security Platform

The Israel-based company, which just emerged from stealth mode, was founded by cloud and security experts from RSA, McAfee, and Unity. The post Copperhelm Raises $7 Million for Agentic Cloud Security Platform appeared first on SecurityWeek .
Hacker News Frontpage15 · 5d ago

Show HN: How LLMs Work – Interactive visual guide based on Karpathy's lecture

All content is based on Andrej Karpathy's "Intro to Large Language Models" lecture (youtube.com/watch?v=7xTGNNLPyMI). I downloaded the transcript and used Claude Code to generate the entire interactive site from it — single HTML file. I find it useful to revisit this content time to time. Comments URL: https://news.ycombinator.com/item?id=47886517 Points: 10 # Comments: 1
36氪15 · 5d ago

特斯拉:赛博无人驾驶电动车Cybercab在北美投产

36氪获悉,据特斯拉官方微博消息,赛博无人驾驶电动车Cybercab在北美正式投产。
36氪15 · 5d ago

融了2000万美金,这家2000万美金ARR的AI公司,推出“视频版Photoshop”「Buzzy」

文|周鑫雨 编辑|杨轩 一句话介绍 Buzzy(https://www.buzzy.now/)是AI内容创作公司“感知阶跃”旗下的视频编辑Agent平台,主要面向C端内容创作者和中小型商家。 好比“视频版的PhotoShop”,用户只需下达自然语言指令,就能驱动Agent对视频进行背景去除、光线修正、产品替换、背景/视角更改等编辑操作。 团队介绍 “感知阶跃”创始人兼CEO Ella Zhang(张诗莹),曾在苹果、Oculus VR、Google负责核心产品。 在苹果期间,她曾为AirPods产品线创始团队核心成员,负责产品的系统集成和全周期设计落地,包括音频产品的架构设计、元器件选型、原理图绘制、版图设计、验证以及大规模生产。 此后,张诗莹又在Google担任AR产品的系统架构师,负责Glass、Reflector等产品的算法和架构研发。 “感知阶跃”其余核心成员,来自Adobe、小米、商汤等公司。 融资进展 近期,“感知阶跃”完成了新一轮融资, 金额超过2000万美元,领投方为Redpoint(红点创投)。 深渡资本担任本轮独家财务顾问。 产品及业务 在张诗莹看来,随着视频...
Hacker News Frontpage15 · 5d ago

Familiarity is the enemy: On why Enterprise systems have failed for 60 years

Article URL: https://felixbarbalet.com/familiarity-is-the-enemy/ Comments URL: https://news.ycombinator.com/item?id=47885668 Points: 3 # Comments: 0
Hacker News Frontpage15 · 5d ago

Habitual coffee intake shapes the microbiome, modifies physiology and cognition

Article URL: https://www.nature.com/articles/s41467-026-71264-8 Comments URL: https://news.ycombinator.com/item?id=47885377 Points: 20 # Comments: 0
Hacker News Frontpage15 · 5d ago

DeepSeek-V4: Towards Highly Efficient Million-Token Context Intelligence

Article URL: https://huggingface.co/deepseek-ai/DeepSeek-V4-Pro Comments URL: https://news.ycombinator.com/item?id=47885014 Points: 43 # Comments: 3
SANS ISC15 · 5d ago

ISC Stormcast For Friday, April 24th, 2026 https://isc.sans.edu/podcastdetail/9906, (Fri, Apr 24th)

ISC Stormcast For Friday, April 24th, 2026 https://isc.sans.edu/podcastdetail/9906, (Fri, Apr 24th)
Dark Reading15 · 5d ago

Tropic Trooper APT Takes Aim at Home Routers, Japanese Targets

The Chinese state-sponsored cyber threat is known for moving fast and trying odd attack vectors; now it's branching out in tools, victimology, and TTPs.
Deeplinks14 · 4d ago

Act Now to Stop California’s Paternalistic and Privacy-Destroying Social Media Ban

California lawmakers are fast-tracking A.B. 1709—a sweeping bill that would ban anyone under 16 from using social media and force every user, regardless of age, to verify their identity before accessing social platforms. That means that under this bill, all Californians would be required to submit highly sensitive government-issued ID or biometric information to private companies simply to participate in the modern public square. In the name of “safety,” this bill would destroy online anonymi...
Phoronix (Linux)13 · 4d ago

Farewell ISDN, Ham Radio & Old Network Drivers: Linus Torvalds Merges 138k L.O.C. Removal

Linus Torvalds did it! He merged the pull request to rid the Linux kernel of the old Integrated Services Digital Network (ISDN) subsystem and various other old network drivers largely for PCMCIA era network adapters. This was the code suggested for removal given the recent influx of AI/LLM-generated bug reports against this dated code that likely has no active upstream users remaining...
Phoronix (Linux)13 · 5d ago

Fwupd 2.1.2 Brings Support For Firmware Updates On More Hardware

Fwupd 2.1.2 is out today as the latest update to this open-source firmware updating utility that allows for updating system firmware and device/peripheral firmware under Linux...
The Hacker News13 · 5d ago

Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine

The AI Agent Authority Gap - From Ungoverned to Delegation As discussed in our previous article, AI agents are exposing a structural gap in enterprise security, but the problem is often framed too narrowly. The issue is not simply that agents are new actors. It is that agents are delegated actors. They do not emerge with independent authority. They are triggered, invoked, provisioned, or
Phoronix (Linux)13 · 5d ago

Pull Request For Linux To Remove Old Network Drivers, ISDN Subsystem Due To AI/LLM Noise

It was just days ago we reported on a proposal to drop old network drivers due to AI-driven bug reports becoming a burden on upstream kernel developers. Last night that culminated with an initial pull request to clear out some old, unused networking drivers plus also clearing out the entire ISDN subsystem and more...
The Hacker News13 · 5d ago

Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

Chinese-speaking individuals are the target of a new campaign that uses a trojanized version of SumatraPDF reader to deploy the AdaptixC2 Beacon post-exploitation agent and ultimately facilitate the abuse of Microsoft Visual Studio Code (VS Code) tunnels for remote access. Zscaler ThreatLabz, which discovered the campaign last month, has attributed it with high confidence to Tropic Trooper (aka
Phoronix (Linux)13 · 5d ago

HDMI FRL Support Achieved With Open-Source Nouveau For NVIDIA GPUs

While the AMDGPU open-source driver has struggled with HDMI 2.1 support due to the HDMI Forum blocking open-source implementations, HDMI Fixed Rate Link (FRL) as a feature of the HDMI 2.1 specification is enjoying success now with the open-source Nouveau graphics driver on Linux for NVIDIA GPUs...
BleepingComputer12 · 4d ago

ADT confirms data breach after ShinyHunters leak threat

Home security giant ADT has confirmed a data breach after the ShinyHunters extortion group threatened to leak stolen data unless a ransom is paid. [...]
Unit 4212 · 4d ago

TGR-STA-1030: New Activity in Central and South America

Unit 42 research reports that TGR-STA-1030 remains an active threat, particularly in Central and South America. The post TGR-STA-1030: New Activity in Central and South America appeared first on Unit 42 .
The Record from Recorded Future News12 · 4d ago

ADT says customer data stolen in cyber intrusion

The home security company ADT said cybercriminals breached company systems on Monday and stole a “limited set” of customer and prospective customer information.
BleepingComputer12 · 4d ago

New ‘Pack2TheRoot’ flaw gives hackers root Linux access

A new vulnerability dubbed Pack2TheRoot could be exploited in the PackageKit daemon to allow local Linux users to install or remove system packages and gain root permissions. [...]
Ars Technica12 · 4d ago

Meet the 19-meter Cretaceous kraken that swam with mosasaurs

Layer by layer, researchers revealed the jaws of an ancient predator.
Dwarkesh Patel12 · 4d ago

Blog prize for the big questions about AI

The not-so-secret point of this whole contest is so that I can hire a researcher
The Register (Security)12 · 5d ago

More ancient Linux device support faces the chop

One way to deal with bug hunting LLMs: ditch the old drivers One tactic to deal with LLM-powered vulnerability detection is simple – just speed up the removal of old code. If it's gone, it no longer matters if it's buggy.…
BleepingComputer12 · 5d ago

Over 10,000 Zimbra servers vulnerable to ongoing XSS attacks

Over 10,000 Zimbra Collaboration Suite (ZCS) instances exposed online are vulnerable to ongoing attacks exploiting a cross-site scripting (XSS) security flaw. [...]
CISA Alerts12 · 5d ago

CISA Adds Four Known Exploited Vulnerabilities to Catalog

CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2024-7399  Samsung MagicINFO 9 Server Path Traversal Vulnerability CVE-2024-57726  SimpleHelp Missing Authorization Vulnerability CVE-2024-57728  SimpleHelp Path Traversal Vulnerability CVE-2025-29635  D-Link DIR-823X Command Injection Vulnerability  These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significan...
Emergent Minds | paddo.dev12 · 5d ago

Vibing the Tool with the Tool

Anthropic's April 23 postmortem confirms three Claude Code regressions, including one where Opus 4.7 caught a bug Opus 4.6 shipped past human and automated review. What happens when the reviewer is a version of the product being reviewed?
Security Boulevard12 · 5d ago

Runtime Analytics Cuts Millions of Alerts to What Matters

TL;DR Research from Contrast Security's Software Under Siege 2025 report reveals that applications face an average of 81 viable attacks per month that reach actual vulnerabilities, while perimeter-based detection tools generate overwhelming alert volumes with minimal correlation to real-world exploits. Runtime analytics powered by the Contrast Graph detects attacks during code execution and correlates exploitation attempts with application architecture and business context to deliver verified...
Dark Reading12 · 5d ago

Chinese APT Abuses Multiple Cloud Tools to Spy on Mongolia

The threat actor gave itself plenty of options to support command and control, tapping Microsoft Outlook, Slack, Discord, and file.io for online espionage.
Deeplinks11 · 4d ago

California Coastal Community Must Reject CBP's AI-Powered Surveillance Tower

Customs and Border Protection (CBP) is seeking permission from the California city of San Clemente to install an Anduril Industries surveillance tower on a cliff that would allow for constant monitoring of entire coastal neighborhoods.  The proposed tower is Anduril's Sentry, part of the Autonomous Surveillance Tower (AST) program. While CBP says it will primarily monitor the coastline for boats carrying migrants, it will actually be installed 1.5 miles inland, overlooking the bulk of the 62,...
IT Security Guru 11 · 5d ago

NCSC chief warns of ‘perfect storm’ as cyber threats intensify at CyberUK

At this week’s CyberUK conference in Glasgow, National Cyber Security Centre (NCSC) CEO Richard Horne delivered a stark assessment of the evolving cyber threat landscape, warning that organisations are facing a “perfect storm” driven by rapid advances in artificial intelligence and rising geopolitical tensions. In his keynote, Horne highlighted how emerging technologies are fundamentally reshaping […] The post NCSC chief warns of ‘perfect storm’ as cyber threats intensify at CyberUK appeared ...
Hayden James11 · 5d ago

Why VRAM Can Ruin Your Linux Desktop Experience on Thin and Light Laptops

If the Linux desktop and applications on your thin and light laptop or low-end PC feel sluggish under a busy session, the usual suspects are slow storage R/W, not enough RAM, or occasionally a CPU bottleneck. But on machines with integrated graphics, there is a fourth bottleneck most people never check: VRAM. Continue reading...
Infosecurity11 · 5d ago

UK Biobank Data Breach: Health Data of 500,000 Listed for Sale in China

UK government Minister confirms that breached health records of UK Biobank volunteers were up for sale on Chinese ecommerce platforms before being removed
shkspr.mobi11 · 5d ago

Does Mythos mean you need to shut down your Open Source repositories?

Much Sturm und Drang in the world of Open Source with the announcement that the "Mythos" AI is now the ultimate hacker and is poised to unleash havoc on every code base. So should you close all your Open Source projects to make them safe? No. Firstly, all your Open Source code has already been slurped up. It was all ingested for "training purposes" years ago. If it was moderately interesting…
Infosecurity11 · 5d ago

Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation

Malicious npm packages spread via worm-like propagation and steal developer credentials
Cyber Kendra11 · 5d ago

Your TLS Certificates Are About to Silently Break — And You Won't Know Until It's Too Late

A quiet but consequential change is coming to internet security infrastructure — and unlike most breaking changes, this one won't announce itself until it's already caused an outage. Starting May 2026 , major public Certificate Authorities, including Let's Encrypt, DigiCert, Sectigo, and GlobalSign, will stop embedding the Client Authentication Extended Key Usage (EKU) flag in their publicly issued TLS certificates.  The CA/Browser Forum — the governing body that sets browser and CA policy — ...
Hacker News Frontpage10 · 4d ago

Databases Were Not Designed for This

Article URL: https://arpitbhayani.me/blogs/defensive-databases/ Comments URL: https://news.ycombinator.com/item?id=47897140 Points: 22 # Comments: 9
Hacker News Frontpage10 · 4d ago

My audio interface has SSH enabled by default

Article URL: https://hhh.hn/rodecaster-duo-fw/ Comments URL: https://news.ycombinator.com/item?id=47894747 Points: 217 # Comments: 72
Hacker News Frontpage10 · 4d ago

The Classic American Diner

Article URL: https://blogs.loc.gov/picturethis/2026/04/the-classic-american-diner/ Comments URL: https://news.ycombinator.com/item?id=47894435 Points: 202 # Comments: 122
Hacker News Frontpage10 · 4d ago

The Nintendo Switch Switch (2019)

Article URL: https://blog.cynthia.re/post/nintendo-switch-ethernet-switch Comments URL: https://news.ycombinator.com/item?id=47894124 Points: 49 # Comments: 5
Hacker News Frontpage10 · 4d ago

SFO Quiet Airport (2025)

Article URL: https://viewfromthewing.com/san-francisco-airport-removed-90-minutes-of-daily-noise-travelers-say-it-changed-everything/ Comments URL: https://news.ycombinator.com/item?id=47894081 Points: 13 # Comments: 2
Hacker News Frontpage10 · 4d ago

Mine, a Coalton and Common Lisp IDE

Article URL: https://coalton-lang.github.io/20260424-mine/ Comments URL: https://news.ycombinator.com/item?id=47894014 Points: 68 # Comments: 3
Hacker News Frontpage10 · 4d ago

OpenAI releases GPT-5.5 and GPT-5.5 Pro in the API

Article URL: https://developers.openai.com/api/docs/changelog Comments URL: https://news.ycombinator.com/item?id=47894000 Points: 13 # Comments: 1
Hacker News Frontpage10 · 4d ago

There Will Be a Scientific Theory of Deep Learning

Article URL: https://arxiv.org/abs/2604.21691 Comments URL: https://news.ycombinator.com/item?id=47893779 Points: 203 # Comments: 79
Hacker News Frontpage10 · 4d ago

CC-Canary: Detect early signs of regressions in Claude Code

Article URL: https://github.com/delta-hq/cc-canary Comments URL: https://news.ycombinator.com/item?id=47893620 Points: 4 # Comments: 0
Hacker News Frontpage10 · 4d ago

Microsoft OpenClaw

Article URL: https://github.com/microsoft/openclaw Comments URL: https://news.ycombinator.com/item?id=47893541 Points: 7 # Comments: 4
Hacker News Frontpage10 · 4d ago

CSS as a Query Language

Article URL: https://evdc.me/blog/css-query Comments URL: https://news.ycombinator.com/item?id=47893427 Points: 3 # Comments: 0
The Hacker News10 · 4d ago

FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed that an unnamed federal civilian agency's Cisco Firepower device running Adaptive Security Appliance (ASA) software was compromised in September 2025 with a new malware called FIRESTARTER. FIRESTARTER, per CISA and the U.K.'s National Cyber Security Centre (NCSC), is assessed to be a backdoor designed for remote access
[DRAGNET]10 · 4d ago

CISA puts US government agencies on two-week deadline to patch Microsoft Defender BlueHammer zero-day exploit

CISA puts US government agencies on two-week deadline to patch Microsoft Defender BlueHammer zero-day exploit    TechRadar
Hacker News Frontpage10 · 4d ago

SDL Now Supports DOS

Article URL: https://github.com/libsdl-org/SDL/pull/15377 Comments URL: https://news.ycombinator.com/item?id=47892291 Points: 9 # Comments: 0
Hacker News Frontpage10 · 4d ago

Google plans to invest up to $40B in Anthropic

Article URL: https://www.bloomberg.com/news/articles/2026-04-24/google-plans-to-invest-up-to-40-billion-in-anthropic Comments URL: https://news.ycombinator.com/item?id=47892074 Points: 516 # Comments: 505
Hacker News Frontpage10 · 4d ago

Refuse to let your doctor record you

Article URL: https://buttondown.com/maiht3k/archive/why-you-should-refuse-to-let-your-doctor-record/ Comments URL: https://news.ycombinator.com/item?id=47891872 Points: 13 # Comments: 2
Hacker News Frontpage10 · 4d ago

Why I'm Done Making Desktop Applications

Article URL: https://www.kalzumeus.com/2009/09/05/desktop-aps-versus-web-apps/ Comments URL: https://news.ycombinator.com/item?id=47891801 Points: 11 # Comments: 2
Hacker News Frontpage10 · 5d ago

AI as a Fascist Artifact

Article URL: https://tante.cc/2026/04/21/ai-as-a-fascist-artifact/ Comments URL: https://news.ycombinator.com/item?id=47891260 Points: 10 # Comments: 1
黑海洋10 · 5d ago

马斯克称特斯拉开始生产Cybercab

.encrypted-content { background: linear-gradient(135deg, #fdfeff, #f3f9ff); padding: 20px; ...
Hacker News Frontpage10 · 5d ago

Linux 7.1 Removes Drivers for Bus Mouse Support

Article URL: https://www.phoronix.com/news/Linux-7.1-Input Comments URL: https://news.ycombinator.com/item?id=47890365 Points: 16 # Comments: 5
Hacker News Frontpage10 · 5d ago

The operating cost of adult and gambling startups

Article URL: https://orchidfiles.com/stigma-is-a-tax-on-every-operational-decision/ Comments URL: https://news.ycombinator.com/item?id=47889279 Points: 57 # Comments: 84
Hacker News Frontpage10 · 5d ago

Aspartame is not that bad? (2022)

Article URL: https://dynomight.net/aspartame/ Comments URL: https://news.ycombinator.com/item?id=47889030 Points: 87 # Comments: 164
Hacker News Frontpage10 · 5d ago

8087 Emulation on 8086 Systems

Article URL: https://www.os2museum.com/wp/learn-something-old-every-day-part-xx-8087-emulation-on-8086-systems/ Comments URL: https://news.ycombinator.com/item?id=47888694 Points: 25 # Comments: 11
Hacker News Frontpage10 · 5d ago

Hear your agent suffer through your code

Article URL: https://github.com/AndrewVos/endless-toil Comments URL: https://news.ycombinator.com/item?id=47888465 Points: 78 # Comments: 24
Hacker News Frontpage10 · 5d ago

nowhere: an entire website encoded in a URL

Article URL: https://hostednowhere.com/ Comments URL: https://news.ycombinator.com/item?id=47888337 Points: 85 # Comments: 58
Hacker News Frontpage10 · 5d ago

Mounting tar archives as a filesystem in WebAssembly

Article URL: https://jeroen.github.io/notes/webassembly-tar/ Comments URL: https://news.ycombinator.com/item?id=47888124 Points: 55 # Comments: 16
SecurityWeek10 · 5d ago

Vulnerabilities Patched in CrowdStrike, Tenable Products

CrowdStrike has fixed a critical LogScale vulnerability, while Tenable addressed a high-severity Nessus flaw. The post Vulnerabilities Patched in CrowdStrike, Tenable Products appeared first on SecurityWeek .
paper - Last paper10 · 5d ago

Google DeepMind:AI 智能体陷阱

作者:Matija Franklin, Nenad Tomašev等 译者:知道创宇404实验室翻译组 原文链接:https://blog.qiaomu.ai/api/images/document/2026/04/603f0cae8cd8ab94-ai-agent-trap.pdf 摘要 自主AI智能体日益在网络中自主行动,它们面临一种全新挑战:信息环境本身。由此产生了一个关键安全漏洞,我们称之...
Hacker News Frontpage10 · 5d ago

Spinel: Ruby AOT Native Compiler

Article URL: https://github.com/matz/spinel Comments URL: https://news.ycombinator.com/item?id=47887334 Points: 5 # Comments: 0
SecurityWeek10 · 5d ago

Bitwarden NPM Package Hit in Supply Chain Attack

Tied to a fresh Checkmarx supply chain attack claimed by TeamPCP, the incident references the Shai-Hulud worm. The post Bitwarden NPM Package Hit in Supply Chain Attack appeared first on SecurityWeek .
Hacker News Frontpage10 · 5d ago

Composition Shouldn't be this Hard

Article URL: https://www.cambra.dev/blog/announcement/ Comments URL: https://news.ycombinator.com/item?id=47886773 Points: 30 # Comments: 14
Hacker News Frontpage10 · 5d ago

Show HN: Gova – The declarative GUI framework for Go

Article URL: https://github.com/NV404/gova Comments URL: https://news.ycombinator.com/item?id=47886272 Points: 11 # Comments: 1
Hacker News Frontpage10 · 5d ago

My .config Ship of Theseus

Article URL: https://shift1w.com/blog/config-of-theseus/ Comments URL: https://news.ycombinator.com/item?id=47886157 Points: 6 # Comments: 0
Hacker News Frontpage10 · 5d ago

Why Not Venus?

Article URL: https://mceglowski.substack.com/p/why-not-venus Comments URL: https://news.ycombinator.com/item?id=47885739 Points: 18 # Comments: 2
Hacker News Frontpage10 · 5d ago

Ubuntu 26.04 LTS Released

Article URL: https://lwn.net/Articles/1069399/ Comments URL: https://news.ycombinator.com/item?id=47885596 Points: 3 # Comments: 0
Hacker News Frontpage10 · 5d ago

Mahjong: A Visual Guide

Article URL: https://themahjong.guide/ Comments URL: https://news.ycombinator.com/item?id=47885239 Points: 6 # Comments: 1
Hacker News Frontpage10 · 5d ago

A quick look at Mythos run on Firefox: too much hype?

Article URL: https://xark.es/b/mythos-firefox-150 Comments URL: https://news.ycombinator.com/item?id=47885042 Points: 4 # Comments: 0
Hacker News Frontpage10 · 5d ago

DeepSeek v4

Article URL: https://api-docs.deepseek.com/ Comments URL: https://news.ycombinator.com/item?id=47884971 Points: 13 # Comments: 0
Hacker News Frontpage10 · 5d ago

DeepSeek v4

https://api-docs.deepseek.com/ https://huggingface.co/deepseek-ai/DeepSeek-V4-Pro/blob/main... Comments URL: https://news.ycombinator.com/item?id=47884971 Points: 1878 # Comments: 1459
Hacker News Frontpage10 · 5d ago

2026 Ruby on Rails Community Survey

Article URL: https://railsdeveloper.com/survey/ Comments URL: https://news.ycombinator.com/item?id=47884967 Points: 8 # Comments: 0
Hacker News Frontpage10 · 5d ago

Why I Write (1946)

Article URL: https://www.orwellfoundation.com/the-orwell-foundation/orwell/essays-and-other-works/why-i-write/ Comments URL: https://news.ycombinator.com/item?id=47884768 Points: 50 # Comments: 8
Hacker News Frontpage10 · 5d ago

The George Business, by Roger Zelazny (1980)

Article URL: https://www.eternal-flame.org/library/oldlibrary/georgebusiness.html Comments URL: https://news.ycombinator.com/item?id=47884662 Points: 13 # Comments: 0
Hacker News Frontpage10 · 5d ago

How Hard Is It to Open a File?

Article URL: https://blog.sebastianwick.net/posts/how-hard-is-it-to-open-a-file/ Comments URL: https://news.ycombinator.com/item?id=47884625 Points: 68 # Comments: 11
Dark Reading8 · 4d ago

Helping Romance Scam Victims Requires a Proactive, Empathic Approach

People targeted by confidence schemes find getting help is a lonely road. Experts want law enforcement, financial, and government institutions to work together and protect them.
先知安全技术社区8 · 4d ago

AI代码审计工作流实现-从想法到实现自动化日入CVE50+、CNVD若干

AI代码审计工作流实现-从想法到实现自动化日入CVE50+、CNVD若干
Phoronix (Linux)8 · 4d ago

GCC Establishes Working Group To Decide On AI/LLM Policy

The GNU Compiler Collection (GCC) now has a working group established by their steering committee to study the use of AI and large language models (LLMs) within the context of GCC compiler development...
Dark Reading8 · 4d ago

US Busts Myanmar Ring Targeting US Citizens in Financial Fraud

Some 29 people were charged, including a Cambodian senator, and authorities seized more than 500 Web domains tied to fake investment sites.
SitePoint8 · 4d ago

The Model Handshake: How to Chain AI Agents for Complex Refactors

Single AI queries are dead ends for large-scale code changes. Here's how to build multi-step AI pipelines where each model specializes — and hands off cleanly to the next. Continue reading The Model Handshake: How to Chain AI Agents for Complex Refactors on SitePoint .
Phoronix (Linux)8 · 5d ago

Linux 7.1 Is Performing Well Overall In Early Benchmarks

With the Linux 7.1 merge window winding down ahead of the planned Linux 7.1-rc1 release on Sunday, I have begun testing out the Linux 7.1 Git state on various systems in my lab. So far Linux 7.1 appears to be looking good in the performance department with seeing a number of performance improvements in different areas but also a few possible regressions.
SitePoint8 · 5d ago

Next.js AI Streaming: Building Real-Time Apps with Vercel AI SDK

Comprehensive guide covering Next.js AI Streaming: Building Real-Time Apps with Vercel AI SDK with practical implementation details. Continue reading Next.js AI Streaming: Building Real-Time Apps with Vercel AI SDK on SitePoint .
Phoronix (Linux)8 · 5d ago

Many Intel & AMD Laptop Improvements Merged For Linux 7.1

As usual in recent years, there were many x86 platform driver changes merged this cycle for benefiting modern AMD Ryzen and Intel Core (Ultra) laptops. A variety of new features and laptop hardware support additions were merged for Linux 7.1...
Phoronix (Linux)8 · 5d ago

AMD SBI Driver Preps For EPYC Venice With Linux 7.1

The Linux kernel continues getting ready for AMD's upcoming Zen 6 processors...
先知安全技术社区8 · 5d ago

【漏洞分析】Node-tar Hardlink边界绕过问题深度分析

以 Node-tar 的 CVE-2026-24842 为例,分析 hardlink path traversal 是如何绕过提取目录边界的,以及在常见业务场景下,如何一步步演变成任意文件读取、文件覆盖,甚至进一步的代码执行风险
MIT Technology Review8 · 5d ago

Health-care AI is here. We don’t know if it actually helps patients.

I don’t need to tell you that AI is everywhere. Or that it is being used, increasingly, in hospitals. Doctors are using AI to help them with note-taking. AI-based tools are trawling through patient records, flagging people who may require certain support or treatments. They are also used to interpret medical exam results and x-rays. A…
The Akamai Blog (https://blogs.akamai.com/feeds.html)8 · 5d ago

The Industrialization of Exploitation: Why Defensive AI Must Outpace Offensive AI

Today, vulnerabilities can be discovered, connected, and operationalized at a speed that traditional security processes were never designed to match. Learn more.
SentinelOne6 · 4d ago

The Good, the Bad and the Ugly in Cybersecurity – Week 17

BlackCat insider faces 20 years, China-linked actors hide attacks via hijacked home routers, and ShadowBrokers leak links to pre-Stuxnet sabotage framework.
We Live Security » Languages » English6 · 5d ago

The calm before the ransom: What you see is not all there is

A breach claims the systems as well as the confidence that was, in retrospect, a major vulnerability
Security on TechRepublic6 · 5d ago

The Top 8 Enterprise VPN Solutions

Enterprise VPN solutions are critical for connecting remote workers to company resources via reliable and secure links to foster communication and productivity. Read about seven viable choices for businesses. The post The Top 8 Enterprise VPN Solutions appeared first on TechRepublic .
[DRAGNET]5 · 4d ago

Ransomware, AI and privacy litigation drive shifting cyber claims picture

Ransomware, AI and privacy litigation drive shifting cyber claims picture    theinsurer.com
[DRAGNET]5 · 4d ago

Ransomware groups are using "post-quantum" hype to intimidate victims

Ransomware groups are using "post-quantum" hype to intimidate victims    TechSpot
[DRAGNET]5 · 4d ago

Rogue Ransomware Negotiator Rattles Trust in Outside Data-Breach Responders

Rogue Ransomware Negotiator Rattles Trust in Outside Data-Breach Responders    WSJ
[DRAGNET]5 · 4d ago

Suffolk investigates attempted ransomware attack after possible data t...

Suffolk investigates attempted ransomware attack after possible data t...    The Suffolk News-Herald
[DRAGNET]5 · 5d ago

Threat actors ditch ‘spray and pray’ attacks in shift to targeted exploitation

Threat actors ditch ‘spray and pray’ attacks in shift to targeted exploitation    IT Pro
[DRAGNET]5 · 5d ago

Trigona ransomware attackers use novel tool for data exfiltration

Trigona ransomware attackers use novel tool for data exfiltration    SC Media
[DRAGNET]5 · 5d ago

The calm before the ransomware storm: What you see is not all there is

The calm before the ransomware storm: What you see is not all there is    WeLiveSecurity
[DRAGNET]5 · 5d ago

OCR Fines Four Regulated Entities for HIPAA Violations That Led to Ransomware Attacks

OCR Fines Four Regulated Entities for HIPAA Violations That Led to Ransomware Attacks    The HIPAA Journal
[DRAGNET]5 · 5d ago

Bitwarden CLI tool compromised: hundreds of developers pull credential-stealing malware

Bitwarden CLI tool compromised: hundreds of developers pull credential-stealing malware    Cybernews
[DRAGNET]5 · 5d ago

Aptica LLC Launches SMB Cybersecurity Guide As AI & Ransomware Attacks Surge

Aptica LLC Launches SMB Cybersecurity Guide As AI & Ransomware Attacks Surge    markets.businessinsider.com
[DRAGNET]5 · 5d ago

Ransomware Hackers Develop Custom Exfiltration Tool to Steal Sensitive Data

Ransomware Hackers Develop Custom Exfiltration Tool to Steal Sensitive Data    CyberSecurityNews
[DRAGNET]0 · 5d ago

Ransomware supply chain untangled by RAMP forum leak

Ransomware supply chain untangled by RAMP forum leak    SC Media
[DRAGNET]0 · 5d ago

CISA: Malware attack compromises US agency via Cisco exploit

CISA: Malware attack compromises US agency via Cisco exploit    SC Media
[DRAGNET]0 · 5d ago

Hackers Deploy New Exfiltration Tool In Ransomware Attacks

Hackers Deploy New Exfiltration Tool In Ransomware Attacks    cyberpress.org
[DRAGNET]0 · 5d ago

Ransomware Gang Unveils Custom Data-Theft Tool

Ransomware Gang Unveils Custom Data-Theft Tool    GBHackers News
[DRAGNET]0 · 5d ago

The turncoat: how a ransomware negotiator joined the enemy

The turncoat: how a ransomware negotiator joined the enemy    Escudo Digital
[DRAGNET]0 · 5d ago

Qilin Ransomware Strikes B to B Visions

Qilin Ransomware Strikes B to B Visions    DeXpose
[DRAGNET]-45 · 5d ago

Alisa Esage Throws Mythos Under Zero Day Bus

Alisa Esage Throws Mythos Under Zero Day Bus    www.flyingpenguin.com