Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-04-27

The Register (Security)202IN STACK · 2d ago

Microsoft updates the Windows Update Experience: You can hit pause now

Keep the patches away for as long as you like Microsoft has devised a solution to the problem of Windows Updates that break customer devices – users are now able to pause them for as long as they like.…
SANS ISC87 · 2d ago

TeamPCP Supply Chain Campaign: Update 008 - 26-Day Pause Ends with Three Concurrent Compromises (Checkmarx KICS, Bitwarden CLI Cascade, xinference PyPI), CanisterSprawl npm Worm Identified, and Tier 1 Coverage Returns, (Mon, Apr 27th)

This update succeeds&#;x26;#;xc2;&#;x26;#;xa0;TeamPCP Supply Chain Campaign Update 007, published April 8, 2026, which left the campaign in credential-monetization mode following the Cisco source code theft via Trivy-linked credentials, Google GTIG&#;x26;#;39;s formal designation of the operators as UNC6780 (with their credential stealer named SANDCLOCK), and the lapsed CISA KEV remediation deadline for CVE-2026-33634 with no standalone federal advisory. The Sportradar publication deadline fl...
The Record from Recorded Future News51 · 2d ago

Disinformation campaign targeted Tibetan parliament-in-exile elections

The operation, identified by the Digital Forensic Research Lab (DFRLab), was part of Spamouflage, a long-running influence network linked to Beijing.
Huntress Blog39 · 2d ago

Unified EDR + ITDR: Closing the Identity Gap Before Attacks Spread

See how Huntress EDR/ITDR Correlations stop infostealer-driven attacks before stolen credentials can be reused, linking endpoint compromise to cloud identities for one coordinated response.
HackerNoon32 · 1d ago

Challenges Facing the MCP in 2026: Critical Security, Architectual, and More

This deep dive analyzes the six most critical security, architectural, and cognitive challenges facing MCP today
Articles | InfoStealers32 · 2d ago

Inside the Coinbase Cartel: How Infostealer Credentials Fueled a 100+ Company Ransomware Spree

Inside the Coinbase Cartel: How Infostealer Credentials Fueled a 100+ Company Ransomware Spree Inside the Coinbase Cartel: How Infostealer Credentials Fueled a 100+ Company Ransomware Spree By Hudson Rock Research Team A rapidly expanding ransomware and extortion group known as Coinbase Cartel has officially claimed over 100 targets. The group, which first emerged in September […] The post Inside the Coinbase Cartel: How Infostealer Credentials Fueled a 100+ Company Ransomware Spree appeared ...
The Record from Recorded Future News29 · 2d ago

Hackers impersonate Microsoft Teams help desk to breach corporate networks

Hackers are impersonating Microsoft Teams help desk workers to trick victims into installing data-stealing malware, researchers found.
OpenAI Blog27 · 2d ago

OpenAI available at FedRAMP Moderate

OpenAI is available at FedRAMP Moderate authorization for ChatGPT Enterprise and the OpenAI API, enabling secure AI adoption for U.S. federal agencies.
OpenAI Blog27 · 2d ago

An open-source spec for orchestration: Symphony

Learn how Symphony, an open-source spec for Codex orchestration, turns issue trackers into always-on agent systems—boosting engineering output and reducing context switching.
OpenAI Blog27 · 2d ago

Choco automates food distribution with AI agents

How Choco used OpenAI APIs to streamline food distribution, boost productivity, and unlock growth—an in-depth customer story on real-world AI impact.
The Hacker News25 · 2d ago

Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack

Checkmarx has disclosed that its ongoing investigation tied to the supply chain security incident has revealed that a cybercriminal group published data related to the company on the dark web. "Based on current evidence, we believe this data originated from Checkmarx's GitHub repository, and that access to that repository was facilitated through the initial supply chain attack of March 23, 2026,
The Hacker News25 · 2d ago

Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware

Cybersecurity researchers have flagged dozens of Microsoft Visual Studio Code (VS Code) extensions on the Open VSX repository that are linked to a persistent information-stealing campaign dubbed GlassWorm. The cluster of 73 extensions has been identified as cloned versions of their legitimate counterparts. Of these, six have been confirmed to be malicious, with the remaining acting as seemingly
The Hacker News25 · 2d ago

Fake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto Fraud

Cybersecurity researchers have disclosed details of a telecommunications fraud campaign that uses fake CAPTCHA verification tricks to dupe unsuspecting users into sending international text messages that incur charges on their mobile bills, generating illicit revenue for the threat actors who lease the phone numbers. According to a new report published by Infoblox, the operation is believed to
HackerNoon24 · 1d ago

The Person You Know Online Probably Doesn’t Exist

Social media profiles are performances, not transcripts. This article breaks down how people engineer their digital identities - knowingly or not - and how security practitioners use behavioral timing, second-degree network reconstruction, and cross-platform analysis to see through managed surfaces. Based on eight years of formal OSINT research.
BleepingComputer24 · 2d ago

Webinar: Spotting cyberattacks before they begin

On Thursday, April 30 at 2:00 PM ET, BleepingComputer will host a live webinar with threat intelligence company Flare and threat intelligence researcher Tammy Harper, exploring how security teams can identify early warning signs of attacks before they escalate into incidents. [...]
The Register (Security)23 · 2d ago

Trump's Golden Dome gets $3.2B of contractors and an AI sprinkle

Space Force awards 11 firms prototype deals to build orbital interceptors The United States Space Force (USSF) has awarded eleven companies contracts to develop space-based interceptors for President Trump's Golden Dome program, in agreements worth up to $3.2 billion.…
Hacker News Frontpage22 · 2d ago

TurboQuant: A first-principles walkthrough

Article URL: https://arkaung.github.io/interactive-turboquant/ Comments URL: https://news.ycombinator.com/item?id=47916890 Points: 114 # Comments: 14
HackerNoon20IoCs DETECTED · 1d ago

Building Systems That Gracefully Fall Back from AI to Deterministic Logic

This article argues that AI systems should not operate in isolation due to their inherent uncertainty. Instead, it advocates for deliberate hybrid design, combining probabilistic AI models with deterministic rules and fallback mechanisms. By incorporating confidence scoring, layered decision logic, and human-in-the-loop processes, teams can build systems that are more reliable, explainable, and safe. The key takeaway is that robustness comes not from AI alone, but from how it is integrated in...
Latest stories for ZDNET in Security20 · 2d ago

Get a month of 5G Home Internet on T-Mobile and $300 cash back - here's how

If you're ready to switch your internet provider, consider this T-Mobile deal that comes with $300 cash back.
Latest stories for ZDNET in Security20 · 2d ago

I stress-tested this SSD enclosure with a bulldozer - here's how it held up

The Terramaster D1 SSD enclosure is built for speed, but it can also survive anything you (or Mother Nature) throw at it.
The Register (Security)17 · 1d ago

Ongoing supply-chain attack 'explicitly targeting' security, dev tools

Vendor confirms repo data exposure after Lapsus$ claims source code, secrets dump Software security testing outfit Checkmarx has become the latest organization caught up in an ongoing attack on security-tool providers. The biz said data posted online appears to have come from one of its GitHub repositories after the Lapsus$ extortion crew claimed to have dumped the company’s source code, secrets, and other sensitive data.…
BleepingComputer17 · 1d ago

Robinhood account creation flaw abused to send phishing emails

Online trading platform Robinhood's account creation process was exploited by threat actors to inject phishing messages into legitimate emails, tricking users into believing their accounts had suspicious activity. [...]
BleepingComputer17 · 1d ago

GlassWorm malware attacks return via 73 OpenVSX "sleeper" extensions

A new wave of the Glassworm campaign is targeting the OpenVSX ecosystem with 73 "sleeper" extensions that turn malicious after an update. [...]
The Record from Recorded Future News17 · 1d ago

Supreme Court signals location data searches should require a warrant

Privacy advocates had worried that the high court would rule that geofencing does not qualify as a constitutionally protected search, opening the door to much broader use of warrantless reverse searches of all types.
404 Media17IoCs DETECTED · 1d ago

Did a Time Traveling Superintelligent AI Try to Warn About White House Correspondents Dinner Shooting? An Investigation

Exploring the origins of an incredibly dumb, Magic Eye-themed WHCD conspiracy theory.
The Register (Security)17 · 1d ago

Medical and utility tech companies hacked by digital intruders

Itron, Medtronic disclose breaches in Friday filings Digital intruders recently broke into two major tech suppliers - utility-technology firm Itron and medical-device maker Medtronic - according to filings with federal regulators.…
HackerNoon17 · 1d ago

The Rise of App Bros and the Fall of Thoughtful Product Design

This article critiques the rise of AI-powered app builders and the growing trend of “App Bros” rapidly shipping templated products. While tools like Cursor and Claude Code reduce barriers to building, they also introduce design anchoring and homogenization. The core argument is that true product value comes from upstream thinking—user research, problem framing, and intentional decision-making—rather than iterating on AI-generated templates without understanding their underlying logic.
Dark Reading17 · 2d ago

Unpatched 'PhantomRPC' Flaw in Windows Enables Privilege Escalation

A researcher discovered five different exploit paths that stem from an architectural weakness in how Windows' Remote Procedure Call (RPC) mechanism handles connections to unavailable services.
BleepingComputer17 · 2d ago

Home security giant ADT data breach affects 5.5 million people

The ShinyHunters extortion group stole the personal information of 5.5 million individuals after breaching the systems of home security giant ADT earlier this month, according to data breach notification service Have I Been Pwned. [...]
Articles17 · 2d ago

Reframing the Conversation on Climate Intervention and Security

Two new reports exemplify how focusing on SRM through an extreme security lens alone can undermine productive research and governance.
BleepingComputer17 · 2d ago

Medtronic confirms breach after hackers claim 9 million records theft

Medical device giant Medtronic disclosed last week that hackers breached its network and accessed data in "certain corporate IT systems." [...]
BleepingComputer17 · 2d ago

Deepfake Voice Attacks are Outpacing Defenses: What Security Leaders Should Know

Three seconds of audio is all it takes to clone a voice for fraud. Adaptive Security shows how deepfake calls trick employees into sending real money—and why most defenses don't catch them. [...]
The Register (Security)17 · 2d ago

Cybersec is a thankless job: expanding workload and shrinking pay packet

Global recruitment giant says 71% of human firewalls saw wages stagnate last year as threats and responsibilities grew Cybersecurity professionals were the most overlooked workers in IT when it came to pay rises in 2025, according to new figures from recruiter Harvey Nash.…
The Register (Security)17 · 2d ago

Burglar alarm biz burgled: ADT confirms cyber intrusion after ShinyHunters extortion attempt

Security giant says attackers grabbed 'limited set' of data. Crooks claim 10 million records A home security biz getting digitally burgled is not a great look - but that's exactly where ADT finds itself. The company has confirmed a cyber intrusion following an extortion attempt by the ShinyHunters crew, which claims to have made off with more than 10 million records.…
IEEE Spectrum17 · 2d ago

Modeling and Simulation Approaches for Modern Power System Studies

This webinar covers power system modeling and simulation across multiple timescales, from quasi-static 8760 analysis through EMT studies, fault classification, and inverter-based resource grid integration. What Attendees will Learn Programmatic network construction and multi-fidelity modeling — Learn how to build power system networks programmatically from standard data formats, configure models for specific engineering objectives, and work across fidelity levels from quasi-static phasor simu...
The Register – Security17 · 2d ago

ICO chief John Edwards steps back as workplace probe quietly unfolds

UK’s data watchdog confirms its boss has been off the job since February while an HR investigation runs The UK's data watchdog is without its chief after John Edwards stepped aside from the Information Commissioner's Office while an independent workplace investigation examines unspecified HR matters.…
Infosecurity17 · 2d ago

Researchers Identify Fast16 Sabotage Malware That Pre-Dates Stuxnet

The “fast16” malware may have been used to target Iran’s nuclear program prior to Stuxnet
The Register (Security)17 · 2d ago

Anthropic's magic code-sniffer: More Swiss cheese than cheddar, for now

AI vuln-hunter finds what humans taught it to find. Funny that Opinion   In retrospect, calling it Mythos made it a hostage to fortune. Anthropic may have hoped that the name implied its AI code security model had mythical god-like powers, but there's an alternate reading. Another definition for Mythos is a set of beliefs of obscure origin which are incompatible with reality.…
Infosecurity17 · 2d ago

BlackFile Group Targets Retail and Hospitality with Vishing Attacks

Researchers uncover a new data theft and extortion group dubbed “BlackFile”
The Register (Security)17 · 2d ago

Google Cloud Next proves what we suspected: Everything is AI now

Join us for this week's Kettle as we dive into GCN and the latest not-so-alarming revelations about Mythos KETTLE   If you needed further evidence that AI comes first in pretty much everything nowadays, look no further than this year's Google Cloud Next show, which happened last week.…
Latest stories for ZDNET in Security15 · 1d ago

T-Mobile will give you $200 for switching to them - seriously

Get a $200 prepaid Mastercard when you bring your device and old number to T-Mobile. We break down the deal.
Hacker News Frontpage15 · 1d ago

Open-Source KiCad PCBs for Common Arduino, ESP32, RP2040 Boards

Article URL: https://github.com/Hanqaqa/Easyduino Comments URL: https://news.ycombinator.com/item?id=47924813 Points: 50 # Comments: 1
Hacker News Frontpage15 · 1d ago

Decoupled DiLoCo: Resilient, Distributed AI Training at Scale

Article URL: https://deepmind.google/blog/decoupled-diloco/ Comments URL: https://news.ycombinator.com/item?id=47924181 Points: 12 # Comments: 2
Hacker News Frontpage15 · 2d ago

US Supreme Court Reviews Police Use of Cell Location Data to Find Criminals

Article URL: https://www.nytimes.com/2026/04/27/us/politics/supreme-court-cell-data-geofence.html Comments URL: https://news.ycombinator.com/item?id=47922940 Points: 94 # Comments: 55
Hacker News Frontpage15 · 2d ago

Dutch central bank ditches AWS and chooses Lidl for European Cloud

Article URL: https://www.techzine.eu/news/infrastructure/140634/dutch-central-bank-chooses-lidl-for-european-cloud/ Comments URL: https://news.ycombinator.com/item?id=47922712 Points: 174 # Comments: 62
Hacker News Frontpage15 · 2d ago

Tendril – a self-extending agent that builds and registers its own tools

Article URL: https://github.com/serverless-dna/tendril Comments URL: https://news.ycombinator.com/item?id=47921377 Points: 8 # Comments: 2
Hacker News Frontpage15 · 2d ago

The next phase of the Microsoft OpenAI partnership – OpenAI

Article URL: https://openai.com/index/next-phase-of-microsoft-partnership/ Comments URL: https://news.ycombinator.com/item?id=47921262 Points: 15 # Comments: 8
Hacker News Frontpage15 · 2d ago

Microsoft to Stop Sharing Revenue with Main AI Partner OpenAI

Article URL: https://www.bloomberg.com/news/articles/2026-04-27/microsoft-to-stop-sharing-revenue-with-main-ai-partner-openai Comments URL: https://news.ycombinator.com/item?id=47921248 Points: 15 # Comments: 4
Hacker News Frontpage15 · 2d ago

Windows 11's second-chance setup dialogs hurt IT, drain productivity

Article URL: https://www.theregister.com/2026/04/26/windows_second_chance_setup/ Comments URL: https://news.ycombinator.com/item?id=47920973 Points: 51 # Comments: 25
Hacker News Frontpage15 · 2d ago

Show HN: OSS Agent I built topped the TerminalBench on Gemini-3-flash-preview

Scored 65.2% vs google's official 47.8%, and the existing top closed source model Junie CLI's 64.3%. Since there are a lot of reports of deliberate cheating on TerminalBench 2.0 lately ( https://debugml.github.io/cheating-agents/ ), I would like to also clarify a few things 1. Absolutely no {agents/skills}.md files were inserted at any point. No cheating mechanisms whatsoever 2. The cli agent was run in leaderboard compliant way (no modification of resources or timeouts) 3. The full terminal ...
SecurityWeek15 · 2d ago

OpenSSH Flaw Allowing Full Root Shell Access Lurked for 15 Years

A code reuse issue enabled comma characters in certificate principals to be interpreted as list separators. The post OpenSSH Flaw Allowing Full Root Shell Access Lurked for 15 Years appeared first on SecurityWeek .
SecurityWeek15 · 2d ago

Malicious AI Prompt Injection Attacks Increasing, but Sophistication Still Low: Google

The tech giant found that many indirect prompt injection attempts are harmless, but some malicious exploits have also been identified. The post Malicious AI Prompt Injection Attacks Increasing, but Sophistication Still Low: Google appeared first on SecurityWeek .
SecurityWeek15 · 2d ago

UNC6692 Uses Email Bombing, Social Engineering to Deploy ‘Snow’ Malware

The threat actor infected victims with the Snow malware family – Snowbelt, Snowglaze, and Snowbasin – for persistent access. The post UNC6692 Uses Email Bombing, Social Engineering to Deploy ‘Snow’ Malware appeared first on SecurityWeek .
Hacker News Frontpage15 · 2d ago

FDA Approves First-Ever Gene Therapy for Treatment of Genetic Hearing Loss

Article URL: https://www.fda.gov/news-events/press-announcements/fda-approves-first-ever-gene-therapy-treatment-genetic-hearing-loss-under-national-priority-voucher Comments URL: https://news.ycombinator.com/item?id=47919733 Points: 29 # Comments: 7
Hacker News Frontpage15 · 2d ago

France's Mistral Built a $14B AI Empire by Not Being American

Article URL: https://www.forbes.com/sites/iainmartin/2026/04/16/how-frances-mistral-built-a-14-billion-ai-empire-by-not-being-american/ Comments URL: https://news.ycombinator.com/item?id=47919725 Points: 59 # Comments: 21
SecurityWeek15 · 2d ago

Easily Exploitable ‘Pack2TheRoot’ Linux Vulnerability Leads to Root Access

A race condition in PackageKit allows unprivileged users to escalate privileges when installing packages. The post Easily Exploitable ‘Pack2TheRoot’ Linux Vulnerability Leads to Root Access appeared first on SecurityWeek .
Hacker News Frontpage15 · 2d ago

4TB of voice samples just stolen from 40k AI contractors at Mercor

Article URL: https://app.oravys.com/blog/mercor-breach-2026 Comments URL: https://news.ycombinator.com/item?id=47919630 Points: 41 # Comments: 10
SecurityWeek15 · 2d ago

US Launches Sweeping Crackdown on Southeast Asia Cyberscams and Sanctions Cambodian Senator

US conducts sweeping crackdown on Southeast Asian cyberscam operations as part of what officials say is a “new theater of war”. The post US Launches Sweeping Crackdown on Southeast Asia Cyberscams and Sanctions Cambodian Senator appeared first on SecurityWeek .
Hacker News Frontpage15 · 2d ago

The Mushroom That Makes People Have the Exact Same Hallucination

Article URL: https://www.vice.com/en/article/meet-the-mushroom-that-make-people-have-the-exact-same-hallucination/ Comments URL: https://news.ycombinator.com/item?id=47918657 Points: 13 # Comments: 3
Cybersecurity News15 · 2d ago

Carlson VASCO-B GNSS Receivers Left Open to Remote Hijack

The post Carlson VASCO-B GNSS Receivers Left Open to Remote Hijack appeared first on Daily CyberSecurity . Related posts: Critical 9.8 CVSS Flaw Exposes Intrado 911 Emergency Gateways CVE-2026-1603: Remote Unauthenticated Attacker Can Steal Ivanti EPM Secrets The Three-Year Shadow: Critical CVSS 10 Cisco SD-WAN Zero-Day Exploited by UAT-8616
36氪15 · 2d ago

前苹果工程师做了款体感游戏机,销量拳打Xbox,营收数亿美元

作者丨欧雪  编辑丨袁斯来 2025年黑五,美国游戏主机市场有些不同寻常。 根据追踪美国游戏主机与软件销售的Circana统计数据,在黑色星期五当周,PS5以47%的市场份额领跑,任天堂Switch2占据24%,而一款名为Nex Playground的体感游戏机,则以14%的市占率冲上第三名——将Xbox挤出了前三位置。 当游戏主机市场固化多年后,没人想到还会有年轻公司杀出重围。 更让人意外的是,这家公司诞生于香港。其创始人李景辉(David Lee)曾在苹果工作8年,2017年离职创立了NEX Team Inc.。 Nex成立最初几年并无太大声量,主要是做了一款篮球体感应用HomeCourt。2023年,他们推出了硬件产品Nex Playground,定价249美元。这是一台没有手柄、无需教学、站上去就能挥臂的游戏体感盒子,由创维数字合作生产,面向海外发行。 头一年,Nex Playground只卖出5000台,但第二年销量就飙升了30倍,到2025年已经达到60万台。  据华尔街日报消息称,Nex Playground预计2025年营收超过1.5亿美元。而根据硬氪了解,202...
Adam Shostack & friends15 · 2d ago

LLM Threat Modeling Is Fun

Exploring the fun in LLM threat modeling, and how it’s both an interface choice and a possibly ‘dark pattern’
VentureBeat14 · 1d ago

New AI framework autonomously optimizes training data, architectures and algorithms — outperforming human baselines

AI R&D runs on a cycle of hypothesis, experiment, and analysis — each step demanding substantial manual engineering effort. A new framework from researchers at SII-GAIR aims to close that bottleneck by automating the full optimization loop for training data, model architectures, and learning algorithms. A new framework called ASI-EVOLVE , developed by researchers at the Generative Artificial Intelligence Research Lab (SII-GAIR), aims to solve this bottleneck. Designed as an agentic system for...
Phoronix (Linux)13 · 2d ago

Intel Core Ultra 5 250K Plus Provides Exceptional Value For Linux Users

After looking at the new Intel Core Ultra 7 270K Plus processor earlier this month with its nice performance evolution for Arrow Lake on Linux, today we are looking at the other new Intel desktop CPU offering: the Core Ultra 5 250K Plus that retails for just $219 USD.
The Hacker News13 · 2d ago

Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren't Ready for the Remediation Side

Anthropic’s Claude Mythos Preview has dominated security discussions since its April 7 announcement. Early reporting describes a powerful cybersecurity-focused AI system capable of identifying vulnerabilities at scale and raising serious questions about how quickly organizations can validate, prioritize, and remediate what it finds. The debate that followed has mostly focused on the right
The Hacker News13 · 2d ago

PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks

A pro-Ukrainian hacktivist group called PhantomCore has been attributed to attacks actively targeting servers running TrueConf video conferencing software in Russia since September 2025. That's according to a report published by Positive Technologies, which found the threat actors to be leveraging an exploit chain comprising three vulnerabilities to execute commands remotely on susceptible
Phoronix (Linux)13 · 2d ago

Linux 7.1 Adds SoC Slider Support To x86_energy_perf_policy Utility

One of the last feature pulls merged by Linus Torvalds prior to tagging Linux 7.1-rc1 this weekend were some power utility updates for those tools living within the kernel source tree...
Phoronix (Linux)13 · 2d ago

Ubuntu Linux Will Begin Landing AI Features Throughout The Next Year

Now that Ubuntu 26.04 LTS has shipped, Canonical is opening up on their next major focus for Ubuntu development: lots of AI features...
HackerNoon12 · 1d ago

AI Coding Tip 017 - Ask for the Analyst, Not the Analysis

Ask the AI to write a program that analyzes your data instead of pasting all your data into the prompt.
Dark Reading12 · 1d ago

UNC6692 Combines Social Engineering, Malware, Cloud Abuse

A newly discovered threat actor is using Microsoft Teams, AWS S3 buckets, and custom "Snow" malware in a multipronged campaign.
404 Media12 · 2d ago

Study Finds A Third of New Websites are AI-Generated

Researchers found the internet is becoming aggressively positive as AI-generated text floods the web.
Dark Reading12 · 2d ago

20-Year-Old Malware Rewrites History of Cyber Sabotage

Researchers have uncovered a malware framework dubbed "fast16" that predates Stuxnet by 5 years.
Deeplinks11 · 1d ago

Congress Must Reject New Insufficient 702 Reauthorization Bill

Speaker Johnson has introduced a new fig leaf over the American surveillance state, the  Foreign Intelligence Accountability Act . Introduced with only days to go before Section 702 of the Foreign Intelligence Surveillance Act (FISA) expires and the U.S. government loses one of its most invasive surveillance programs, the bill does nothing to make  any of the substantial changes  privacy advocates have been asking for --- most notably, it fails to give us a real warrant requirement for the FB...
Ars Technica11 · 1d ago

Open source package with 1 million monthly downloads stole user credentials

If you're one of millions using element-data, it's time to check for compromise.
Tenable Blog11 · 2d ago

As the NVD scales back CVE enrichment, here’s what Tenable customers need to know

NIST’s shift toward selective CVE enrichment creates significant visibility gaps for teams relying solely on the National Vulnerability Database. As AI accelerates vulnerability disclosure rates, organizations need independent, high-fidelity intelligence to prioritize risks that the NVD may now overlook. Key takeaways NIST is pivoting to a prioritized enrichment model, focusing only on specific criteria like the CISA KEV catalog and federal software, which leaves a growing backlog of unenrich...
Hacker News Frontpage10 · 1d ago

Integrated by Design

Article URL: https://vivianvoss.net/blog/integrated-by-design-launch Comments URL: https://news.ycombinator.com/item?id=47928554 Points: 92 # Comments: 38
Hacker News Frontpage10 · 1d ago

Talkie: a 13B vintage language model from 1930

Article URL: https://talkie-lm.com/introducing-talkie Comments URL: https://news.ycombinator.com/item?id=47927903 Points: 300 # Comments: 95
Hacker News Frontpage10 · 1d ago

Three men are facing charges in Toronto SMS Blaster arrests

Article URL: https://www.tps.ca/media-centre/stories/unprecedented-sms-blaster-arrests/ Comments URL: https://news.ycombinator.com/item?id=47927070 Points: 146 # Comments: 66
Hacker News Frontpage10 · 1d ago

Is my blue your blue?

Article URL: https://ismy.blue/ Comments URL: https://news.ycombinator.com/item?id=47926861 Points: 477 # Comments: 321
Hacker News Frontpage10 · 1d ago

Our principles

Article URL: https://openai.com/index/our-principles/ Comments URL: https://news.ycombinator.com/item?id=47925679 Points: 11 # Comments: 8
Hacker News Frontpage10 · 1d ago

United Wizards of the Coast

Article URL: https://unitedwizardsofthecoast.com/news/announcing-united-wizards-coast-cwa Comments URL: https://news.ycombinator.com/item?id=47925425 Points: 40 # Comments: 3
Hacker News Frontpage10 · 1d ago

Super ZSNES – GPU Powered SNES Emulator

Article URL: https://zsnes.com/ Comments URL: https://news.ycombinator.com/item?id=47924877 Points: 50 # Comments: 11
Hacker News Frontpage10 · 1d ago

GitHub is having issues now

Article URL: https://www.githubstatus.com Comments URL: https://news.ycombinator.com/item?id=47924775 Points: 116 # Comments: 39
Hacker News Frontpage10 · 1d ago

Canada's first sovereign wealth fund

Article URL: https://www.cbc.ca/news/politics/sovereign-wealth-fund-carney-major-projects-9.7178238 Comments URL: https://news.ycombinator.com/item?id=47924188 Points: 61 # Comments: 27
Hacker News Frontpage10 · 1d ago

GitHub Copilot is moving to usage-based billing

Article URL: https://github.blog/news-insights/company-news/github-copilot-is-moving-to-usage-based-billing/ Comments URL: https://news.ycombinator.com/item?id=47923357 Points: 308 # Comments: 237
Hacker News Frontpage10 · 2d ago

Networking changes coming in macOS 27

Article URL: https://eclecticlight.co/2026/04/23/networking-changes-coming-in-macos-27/ Comments URL: https://news.ycombinator.com/item?id=47923010 Points: 87 # Comments: 72
Hacker News Frontpage10 · 2d ago

The woes of sanitizing SVGs

Article URL: https://muffin.ink/blog/scratch-svg-sanitization/ Comments URL: https://news.ycombinator.com/item?id=47922957 Points: 89 # Comments: 33
Hacker News Frontpage10 · 2d ago

"Why not just use Lean?"

Article URL: https://lawrencecpaulson.github.io//2026/04/23/Why_not_Lean.html Comments URL: https://news.ycombinator.com/item?id=47922079 Points: 154 # Comments: 76
Hacker News Frontpage10 · 2d ago

Tim Cook Is Leaving. Good

Article URL: https://routerjockey.com/tim-cook-is-leaving-good/ Comments URL: https://news.ycombinator.com/item?id=47921130 Points: 35 # Comments: 43
SecurityWeek10 · 2d ago

Incomplete Windows Patch Opens Door to Zero-Click Attacks

The initial vulnerability was exploited by Russia-linked APT28 in attacks against Ukraine and EU countries. The post Incomplete Windows Patch Opens Door to Zero-Click Attacks appeared first on SecurityWeek .
Hacker News Frontpage10 · 2d ago

Running Local LLMs Offline on a Ten-Hour Flight

Article URL: https://deploy.live/blog/running-local-llms-offline-on-a-ten-hour-flight/ Comments URL: https://news.ycombinator.com/item?id=47921064 Points: 4 # Comments: 0
[DRAGNET]10 · 2d ago

Discord sleuths breach Anthropic’s zero-day hunter in a wake-up call for contained AI security

Discord sleuths breach Anthropic’s zero-day hunter in a wake-up call for contained AI security    Startup Fortune
Hacker News Frontpage10 · 2d ago

China blocks Meta's acquisition of AI startup Manus

https://www.reuters.com/world/asia-pacific/china-blocks-fore... https://www.bbc.com/news/articles/cj0v0gr2yz7o Comments URL: https://news.ycombinator.com/item?id=47920315 Points: 9 # Comments: 1
Hacker News Frontpage10 · 2d ago

Men Who Stare at Walls

Article URL: https://www.alexselimov.com/posts/men_who_stare_at_walls/ Comments URL: https://news.ycombinator.com/item?id=47920074 Points: 4 # Comments: 1
Hacker News Frontpage10 · 2d ago

Pgbackrest is no longer being maintained

Article URL: https://github.com/pgbackrest/pgbackrest Comments URL: https://news.ycombinator.com/item?id=47919997 Points: 24 # Comments: 1
[DRAGNET]10 · 2d ago

A Zero-Day Hack Triggered a 13-Block Reorg on Litecoin: Are User Funds Actually Safe?

A Zero-Day Hack Triggered a 13-Block Reorg on Litecoin: Are User Funds Actually Safe?    Cryptonews
Hacker News Frontpage10 · 2d ago

Moleskine's AI Lord of the Rings collection can only mock

Article URL: https://cjleo.com/blog/moleskine-ai-lord-of-the-rings-collection-can-only-mock/ Comments URL: https://news.ycombinator.com/item?id=47919386 Points: 54 # Comments: 48
Hacker News Frontpage10 · 2d ago

Quarkdown – Markdown with Superpowers

Article URL: https://quarkdown.com/ Comments URL: https://news.ycombinator.com/item?id=47919240 Points: 25 # Comments: 5
SecurityWeek10 · 2d ago

Firefox Vulnerability Allows Tor User Fingerprinting

The vulnerability is tracked as CVE-2026-6770 and it has been patched with the release of Firefox 150 and Tor 15.0.10. The post Firefox Vulnerability Allows Tor User Fingerprinting appeared first on SecurityWeek .
Hacker News Frontpage10 · 2d ago

It's OK to abandon your side-project (2024)

Article URL: https://robbowen.digital/wrote-about/abandoned-side-projects/ Comments URL: https://news.ycombinator.com/item?id=47918961 Points: 94 # Comments: 42
Hacker News Frontpage10 · 2d ago

Can You Find the Comet?

Article URL: https://apod.nasa.gov/apod/ap260427.html Comments URL: https://news.ycombinator.com/item?id=47918891 Points: 33 # Comments: 9
Hacker News Frontpage10 · 2d ago

The Prompt API

Article URL: https://developer.chrome.com/docs/ai/prompt-api Comments URL: https://news.ycombinator.com/item?id=47917026 Points: 83 # Comments: 58
Hacker News Frontpage10 · 2d ago

EvanFlow – A TDD driven feedback loop for Claude Code

Article URL: https://github.com/evanklem/evanflow Comments URL: https://news.ycombinator.com/item?id=47916909 Points: 56 # Comments: 24
Ars Technica8 · 1d ago

With new patch design, the Crew-13 astronauts clearly aren't superstitious

Houston, we have another "13."
Technical Information Security Content & Discussion8 · 1d ago

Kaspersky recently disclosed PhantomRPC, a privilege escalation technique affecting all Windows versions (tested on Server 2022/2025)

Kaspersky recently disclosed PhantomRPC, a privilege escalation technique affecting all Windows versions (tested on Server 2022/2025)
先知安全技术社区8 · 2d ago

我做了一个用自然语言挖漏洞的 AI 渗透工具:VulnClaw

记得以前做渗透,信息收集要开一堆工具,漏洞利用要自己找 POC,报告写完一天没了。 最近写了一个 CLI 工具 VulnClaw,把这个流程串起来了: 自然语言输入 → AI 理解意图 → MCP 工具链 → 全自动渗透 → 自动出报告。 GitHub 开源,MIT 协议,欢迎试用。
爱范儿8 · 2d ago

GPT-Image-2 现在最火的玩法:给人看手相,AI 把我夸飘了

AI 的尽头是看相? #欢迎关注爱范儿官方微信公众号:爱范儿(微信号:ifanr),更多精彩内容第一时间为您奉上。
The Akamai Blog (https://blogs.akamai.com/feeds.html)8 · 2d ago

Winning the Ransomware Race: The New Segmentation Partner Playbook

Winning the Ransomware Race: The New Segmentation Partner Playbook
ProjectDiscovery.io | Blog6 · 1d ago

Benchmarking Neo's Black-Box DAST Capabilities

Since the launch of Neo, we've been steadily expanding what it can do. Neo has found 33+ real CVEs across open-source projects, performed well on white-box security testing where source code is available, and generally proven itself as a capable security engineer when it has context to work with. What we hadn't shared yet is how Neo does when it's operating purely as a black-box DAST agent no source code, no architecture context, just a URL. The prompt Neo gets is a minimal prompt with no guida
Dark Reading6 · 2d ago

Parsing Agentic Offensive Security's Existential Threat

Some fear frontier LLMs like Claude Mythos and OpenAI's GPT-5.5 will lead to cybersecurity annihilation. Ari Herbert-Voss notes this could be an opportunity.
[DRAGNET]5 · 1d ago

LTC Price Faces Zero Day Exploit as Pepeto Presale Crosses $9M With Binance Listing Approaching

LTC Price Faces Zero Day Exploit as Pepeto Presale Crosses $9M With Binance Listing Approaching    openPR.com
[DRAGNET]5 · 2d ago

Ransomware hackers are now targeting victims with an Infrastructure driven Approach

Ransomware hackers are now targeting victims with an Infrastructure driven Approach    Cybersecurity Insiders
[DRAGNET]5 · 2d ago

One ransomware crew now drives half of all cyber claims: At-Bay

One ransomware crew now drives half of all cyber claims: At-Bay    Insurance Business
[DRAGNET]5 · 2d ago

UNC6692 Hackers Exploit Microsoft Teams to Deploy SNOW Malware

UNC6692 Hackers Exploit Microsoft Teams to Deploy SNOW Malware    Hackread
[DRAGNET]5 · 2d ago

Former FBI Deputy Cyber Chief Calls for Terrorism Classification for Healthcare Ransomware Actors

Former FBI Deputy Cyber Chief Calls for Terrorism Classification for Healthcare Ransomware Actors    The HIPAA Journal
[DRAGNET]5 · 2d ago

Litecoin Network Hit by Zero-Day Bug: 13-Block Reorg Fixed

Litecoin Network Hit by Zero-Day Bug: 13-Block Reorg Fixed    The Cyber Express
[DRAGNET]5 · 2d ago

How to Prepare for GenAI-Driven Threats and Ransomware Attacks: A SANS-Aligned Guide for CISOs

How to Prepare for GenAI-Driven Threats and Ransomware Attacks: A SANS-Aligned Guide for CISOs    Cybersecurity Insiders
[DRAGNET]5 · 2d ago

Former Ransomware Negotiator Pleads Guilty to Aiding Attackers

Former Ransomware Negotiator Pleads Guilty to Aiding Attackers    Insurance Journal
[DRAGNET]5 · 2d ago

Bombay High Court Grants Urgent Relief To Adfactors PR Against Ransomware Threat

Bombay High Court Grants Urgent Relief To Adfactors PR Against Ransomware Threat    BW Legal World
[DRAGNET]5 · 2d ago

Qilin Ransomware Strikes Singaporean Education Leader Istarpal

Qilin Ransomware Strikes Singaporean Education Leader Istarpal    DeXpose
[DRAGNET]0 · 1d ago

Kent District Library blames ‘ransomware’ for closures

Kent District Library blames ‘ransomware’ for closures    WOODTV.com
[DRAGNET]0 · 1d ago

Asking around: the easiest ransomware attack signals to miss

Asking around: the easiest ransomware attack signals to miss    IT Brew
[DRAGNET]0 · 1d ago

Carnival Corp. Targeted in Ransomware Attack

Carnival Corp. Targeted in Ransomware Attack    Cruise Critic
[DRAGNET]0 · 2d ago

One ransomware crew now drives half of all cyber claims

One ransomware crew now drives half of all cyber claims    Insurance Business
[DRAGNET]0 · 2d ago

At-Bay Report Looks at VPN Ransomware Risks -

At-Bay Report Looks at VPN Ransomware Risks -    Insurance Edge
[DRAGNET]0 · 2d ago

Now a ransomware turns quantum computing safe in encryption

Now a ransomware turns quantum computing safe in encryption    Cybersecurity Insiders
[DRAGNET]0 · 2d ago

Medusa Ransomware Strikes Walman Optical

Medusa Ransomware Strikes Walman Optical    DeXpose
[DRAGNET]0 · 2d ago

TheGentlemen Target Lawson Software in Ransomware Attack

TheGentlemen Target Lawson Software in Ransomware Attack    DeXpose
[DRAGNET]0 · 2d ago

DragonForce Ransomware Attack on Mopec, Inc.

DragonForce Ransomware Attack on Mopec, Inc.    DeXpose
[DRAGNET]0 · 2d ago

LockBit 5.0 Ransomware Attack on Bladex

LockBit 5.0 Ransomware Attack on Bladex    DeXpose
[DRAGNET]0 · 2d ago

DragonForce Ransomware Attack on Avalon Flooring

DragonForce Ransomware Attack on Avalon Flooring    DeXpose
[DRAGNET]0 · 2d ago

Qilin Ransomware Attack on Longwood Engineering Company

Qilin Ransomware Attack on Longwood Engineering Company    DeXpose
[DRAGNET]0 · 2d ago

TheGentlemen Ransomware Strike on EEC Group

TheGentlemen Ransomware Strike on EEC Group    DeXpose
[DRAGNET]0 · 2d ago

KRYBIT Strikes Narteks Tekstil A.S in Ransomware Attack

KRYBIT Strikes Narteks Tekstil A.S in Ransomware Attack    DeXpose
[DRAGNET]-45 · 1d ago

My First Zero Day (Day 22)

My First Zero Day (Day 22)    The Trek