Hacker & Security News
banner
hacker.at.thenote.app
Hacker & Security News
@hacker.at.thenote.app
#hacker and #security news from Hacker News, LifeHacker, Security Boulevard and others.
Our other projects: #macos, #ios and #android apps for notes TheNote.app
Pinned
We launched a Public Feed on Bluesky with #Hacker and #Security #News from sources like Hacker News, LifeHacker, Security Boulevard and others your convenience 🚀 🤗
bsky.app/profile/hack...
What’s New in Tenable Cloud Security: Multi-cloud Risk Analysis, Attack Surface Assessments, Improved IAM Security and More

Tenable Cloud Security expands its Tenable One platform with enhanced multi-cloud exploration capabilities. A key feature is the Explorer, integr…
#hackernews #microsoft #news
What’s New in Tenable Cloud Security: Multi-cloud Risk Analysis, Attack Surface Assessments, Improved IAM Security and More
Tenable Cloud Security expands its Tenable One platform with enhanced multi-cloud exploration capabilities. A key feature is the Explorer, integrating data for in-depth analysis of cloud resources and findings. The Explorer uses a query builder and graph view, facilitating the visualization of complex asset relationships and potential risks. The platform now validates the external network attack surface through outside-in probing for accurate exposure assessment. Identity management is enhanced with expanded entitlement visibility across cloud platforms, including Microsoft Entra ID and Google Workspace. This allows detection of overprivileged roles and unused policies for improved security. Support for public Amazon Machine Image (AMI) scanning is now available for supply chain risk mitigation. The platform also provides guided use cases to prioritize cloud risks and secure AI workloads effectively. These enhancements contribute to building a strong foundation for managing cloud exposure at scale. Tenable's focus is on providing comprehensive CNAPP capabilities within their exposure management platform. This development reinforces Tenable's commitment to providing valuable cloud security solutions.
securityboulevard.com
February 3, 2026 at 7:48 AM
Spotify and Major Music Labels Sue Anna’s Archive for $13 Trillion

Spotify and the Big Three labels have filed a record-breaking $13 trillion lawsuit against Anna’s Archive over a massive music data scrape. Find out what this means for the future of digital music.
#hackernews #news
Spotify and Major Music Labels Sue Anna’s Archive for $13 Trillion
Spotify and the Big Three labels have filed a record-breaking $13 trillion lawsuit against Anna’s Archive over a massive music data scrape. Find out what this means for the future of digital music.
hackread.com
February 3, 2026 at 7:38 AM
Panera Bread breach impacts 5.1 million accounts, not 14 million customers

The data breach notification service Have I Been Pwned says that a data breach at the U.S. food chain Panera Bread affected 5.1 million accounts, not 14 million customers as previously reported. [...]
#hackernews #news
Panera Bread breach impacts 5.1 million accounts, not 14 million customers
The data breach notification service Have I Been Pwned says that a data breach at the U.S. food chain Panera Bread affected 5.1 million accounts, not 14 million customers as previously reported. [...]
www.bleepingcomputer.com
February 3, 2026 at 7:28 AM
AI Agent Orchestration: How It Works and Why It Matters

AI agent orchestration is reshaping how businesses build intelligent systems. It moves beyond single chatbots or generative interfaces, coordinating multiple specialized AI agents to complete...
#hackernews #news
AI Agent Orchestration: How It Works and Why It Matters
AI agent orchestration is reshaping how businesses build intelligent systems. It moves beyond single chatbots or generative interfaces, coordinating multiple specialized AI agents to complete...
securityboulevard.com
February 3, 2026 at 7:18 AM
Notepad++ update service hijacked in targeted state-linked attack

Breach lingered for months before stronger signature checks shut the door
A state-sponsored cyber criminal compromised Notepad++'s update service in 2025, according to the project's author.…
#hackernews #news
Notepad++ update service hijacked in targeted state-linked attack
Breach lingered for months before stronger signature checks shut the door A state-sponsored cyber criminal compromised Notepad++'s update service in 2025, according to the project's author.…
go.theregister.com
February 3, 2026 at 7:08 AM
How state-sponsored attackers hijacked Notepad++ updates

Suspected Chinese state-sponsored attackers hijacked the Notepad++ update mechanism by compromising the software project’s shared hosting server and intercepting and redirecting update traffic destined for notepad-plus-plus…
#hackernews #news
How state-sponsored attackers hijacked Notepad++ updates
Suspected Chinese state-sponsored attackers hijacked the Notepad++ update mechanism by compromising the software project’s shared hosting server and intercepting and redirecting update traffic destined for notepad-plus-plus.org, the software’s maintainer Don Ho confirmed on Monday. The attack timeline In early December 2025, security researcher Kevin Beaumont said that he knew of three organizations that have had security incidents traced back to Notepad++ processes providing the attackers initial access to the computers. “I’ve only talked to a …
www.helpnetsecurity.com
February 3, 2026 at 6:58 AM
Span Cyber Security Arena 2026: Only 10 days left to secure early bird tickets

With preparations well underway, Span Cyber Security Arena 2026 is set to return for its third edition, bringing together domestic and international experts in cyber security. As in previous years, the…
#hackernews #news
Span Cyber Security Arena 2026: Only 10 days left to secure early bird tickets
With preparations well underway, Span Cyber Security Arena 2026 is set to return for its third edition, bringing together domestic and international experts in cyber security. As in previous years, the conference is designed for everyone involved in that area – from regulatory and legal professionals to technical practitioners and decision makers. The conference will take place from 20 to 22 May 2026 in Poreč (Croatia) at Pical Resort 5*, Valamar Collection, offering three days …
www.helpnetsecurity.com
February 3, 2026 at 6:47 AM
With Claude Code, Software Engineering Moves Up the Abstraction Stack

Agentic development tools dramatically compress build cycles while pushing engineers up the abstraction stack, shifting the bottleneck from writing code to judgment, specification, and system-level coor…
#claude #hackernews #news
With Claude Code, Software Engineering Moves Up the Abstraction Stack
Agentic development tools dramatically compress build cycles while pushing engineers up the abstraction stack, shifting the bottleneck from writing code to judgment, specification, and system-level coordination.
hackernoon.com
February 3, 2026 at 6:37 AM
These unassuming pliers replaced my multitool for a fraction of the cost

Multitools are often too flashy, expensive, and not really that handy. I found a cheaper alternative that's somehow better.
#hackernews #news
These unassuming pliers replaced my multitool for a fraction of the cost
Multitools are often too flashy, expensive, and not really that handy. I found a cheaper alternative that's somehow better.
www.zdnet.com
February 3, 2026 at 6:27 AM
The State of Laravel Packages in 2026, According to 200 Developers

A survey of 200 active Laravel developers shows strong reliance on third-party packages, but growing frustration with poor documentation, abandoned tools, and the lack of standardized ways to evaluate package heal…
#hackernews #news
The State of Laravel Packages in 2026, According to 200 Developers
A survey of 200 active Laravel developers shows strong reliance on third-party packages, but growing frustration with poor documentation, abandoned tools, and the lack of standardized ways to evaluate package health—prompting the need for better curation.
hackernoon.com
February 3, 2026 at 6:17 AM
What One Month of Writing in Public Taught Me

Writing in public for one month showed that consistency is manageable, but distribution and authentic engagement—not writing—are the real long-term challenges.
#hackernews #news
What One Month of Writing in Public Taught Me
Writing in public for one month showed that consistency is manageable, but distribution and authentic engagement—not writing—are the real long-term challenges.
hackernoon.com
February 3, 2026 at 6:07 AM
Shift Left Is Dead for Cloud PAM

Why I Stopped JIT’ing Users and Started JIT’ing Permissions By Cole HorsmanField CTO, Sonrai Security I first tried to “shift left” cloud identity in early 2020. We were building a greenfield AWS environment with a strong cloud team and leadership…
#hackernews #news
Shift Left Is Dead for Cloud PAM
Why I Stopped JIT’ing Users and Started JIT’ing Permissions By Cole HorsmanField CTO, Sonrai Security I first tried to “shift left” cloud identity in early 2020. We were building a greenfield AWS environment with a strong cloud team and leadership support to do things properly. The idea was familiar: push security decisions earlier, give developers […]
securityboulevard.com
February 3, 2026 at 5:57 AM
AI Coding Assistants Secretly Copying All Code to China

There’s a new report about two AI coding assistants, used by 1.5 million developers, that are surreptitiously sending a copy of everything they ingest to China.

Maybe avoid using them.
#hackernews #news
AI Coding Assistants Secretly Copying All Code to China
There’s a new report about two AI coding assistants, used by 1.5 million developers, that are surreptitiously sending a copy of everything they ingest to China. Maybe avoid using them.
www.schneier.com
February 3, 2026 at 5:46 AM
3 security gadgets I never leave home without (and they're more affordable than you'd think)

These must-have tools help protect against hacking and data loss, without costing an arm and a leg.
#hackernews #news
3 security gadgets I never leave home without (and they're more affordable than you'd think)
These must-have tools help protect against hacking and data loss, without costing an arm and a leg.
www.zdnet.com
February 3, 2026 at 5:36 AM
The best online collaboration software of 2026: Expert tested

Collaborating online means communication, file sharing, and task management. Here are the tools to stay connected with teammates without sacrificing personal boundaries.
#hackernews #news
The best online collaboration software of 2026: Expert tested
Collaborating online means communication, file sharing, and task management. Here are the tools to stay connected with teammates without sacrificing personal boundaries.
www.zdnet.com
February 3, 2026 at 5:26 AM
When Genius Became a Weapon

Published in 1932, The Wave of a Handkerchief captures pulp sci-fi’s fascination with intellect as ultimate power. Dr. Ku Sui’s calm psychological dominance over armed opponents explores early ideas of mind control, sensory manipulation, and intelligen…
#hackernews #news
When Genius Became a Weapon
Published in 1932, The Wave of a Handkerchief captures pulp sci-fi’s fascination with intellect as ultimate power. Dr. Ku Sui’s calm psychological dominance over armed opponents explores early ideas of mind control, sensory manipulation, and intelligence warfare in space. Republished as part of HackerNoon’s public domain Book Series.
hackernoon.com
February 3, 2026 at 5:16 AM
⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats

Every week brings new discoveries, attacks, and defenses that shape the state of cybersecurity. Some threats are stopped quickly, while others go unseen until they cause real damage.
Sometime…
#hackernews #news
⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats
Every week brings new discoveries, attacks, and defenses that shape the state of cybersecurity. Some threats are stopped quickly, while others go unseen until they cause real damage. Sometimes a single update, exploit, or mistake changes how we think about risk and protection. Every incident shows how defenders adapt — and how fast attackers try to stay ahead. This week’s recap brings you the
thehackernews.com
February 3, 2026 at 5:06 AM
This thermal camera is my new favorite smartphone accessory (and it's $50 off)

Thermal cameras are infinitely useful, and this one from Thermal Master would be a fantastic addition to any Android user's toolkit.
#hackernews #news
This tiny accessory gives your Android thermal vision superpowers (and works on iPhone, too)
Thermal cameras are infinitely useful, and this one from Thermal Master would be a fantastic addition to any Android user's toolkit.
www.zdnet.com
February 3, 2026 at 4:55 AM
Youtu-VL Shows How Treating Vision as a Target Unlocks Better Multimodal AI

Apache Spark 4.1 marks a shift from hand-crafted data pipelines to declarative design, reducing operational complexity through automated optimization, incremental views, built-in CDC, and native data qual…
#hackernews #news
Youtu-VL Shows How Treating Vision as a Target Unlocks Better Multimodal AI
Apache Spark 4.1 marks a shift from hand-crafted data pipelines to declarative design, reducing operational complexity through automated optimization, incremental views, built-in CDC, and native data quality checks.
hackernoon.com
February 3, 2026 at 4:45 AM
Securing the Mid-Market Across the Complete Threat Lifecycle

For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an expanding attack surface. Combined with effective protection that blocks thr…
#hackernews #news
Securing the Mid-Market Across the Complete Threat Lifecycle
For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an expanding attack surface. Combined with effective protection that blocks threats, they play a critical role in stopping cyberattacks before damage is done. The challenge is that many security tools add complexity and cost that most mid-market businesses
thehackernews.com
February 3, 2026 at 4:35 AM
5 Ways Spark 4.1 Moves Data Engineering From Manual Pipelines to Intent-Driven Design

Apache Spark 4.1 is moving away from the role of "orchestration plumber" and toward something far more strategic. We are entering an era of declarative clarity that promises to reduce pipeline d…
#hackernews #news
5 Ways Spark 4.1 Moves Data Engineering From Manual Pipelines to Intent-Driven Design
Apache Spark 4.1 is moving away from the role of "orchestration plumber" and toward something far more strategic. We are entering an era of declarative clarity that promises to reduce pipeline development time by up to 90%. Materialized View (MV) is the end of "Stale Data" anxiety.
hackernoon.com
February 3, 2026 at 4:25 AM
Microsoft fixes bug causing password sign-in option to disappear

Microsoft has fixed a known issue that was causing the password sign-in option to disappear from the lock screen options after installing Windows 11 updates released since August 2025. [...]
#hackernews #microsoft #news
Microsoft fixes bug causing password sign-in option to disappear
Microsoft has fixed a known issue that was causing the password sign-in option to disappear from the lock screen options after installing Windows 11 updates released since August 2025. [...]
www.bleepingcomputer.com
February 3, 2026 at 4:15 AM
Analysts Bullish on Mutuum Finance (MUTM) After $20M Raise and V1 Protocol Launch

Mutuum Finance has launched its V1 lending and borrowing protocol on Sepolia testnet. The project has surpassed $20 million raised in its presale. Since its launch, MUTM token price has climbed by 3…
#hackernews #news
Analysts Bullish on Mutuum Finance (MUTM) After $20M Raise and V1 Protocol Launch
Mutuum Finance has launched its V1 lending and borrowing protocol on Sepolia testnet. The project has surpassed $20 million raised in its presale. Since its launch, MUTM token price has climbed by 300%.
hackernoon.com
February 3, 2026 at 4:05 AM
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 82

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter KONNI Adopts AI to Generate PowerShell Backdoors   Who Operates the B…
#hackernews #huggingface #news
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 82
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter KONNI Adopts AI to Generate PowerShell Backdoors   Who Operates the Badbox 2.0 Botnet? Weaponized in China, Deployed in India: The SyncFuture Espionage Targeted Campaign Android Trojan Campaign Uses Hugging Face Hosting for RAT Payload […]
securityaffairs.com
February 3, 2026 at 3:54 AM
Microsoft sets a path to switch off NTLM across Windows

Windows is shifting to a more secure authentication approach, moving away from New Technology LAN Manager (NTLM) and toward stronger, Kerberos-based options. NTLM has been part of Windows for decades and continues…
#hackernews #microsoft #news
Microsoft sets a path to switch off NTLM across Windows
Windows is shifting to a more secure authentication approach, moving away from New Technology LAN Manager (NTLM) and toward stronger, Kerberos-based options. NTLM has been part of Windows for decades and continues to appear in some environments, particularly where legacy systems and older applications are present. Security threats have changed over time, and security expectations have risen with them. Today, NTLM’s weaker cryptography leaves it open to attacks such as replay attacks and man-in-the-middle attacks. …
www.helpnetsecurity.com
February 3, 2026 at 3:44 AM