Our other projects: #macos, #ios and #android apps for notes TheNote.app
bsky.app/profile/hack...
Tenable Cloud Security expands its Tenable One platform with enhanced multi-cloud exploration capabilities. A key feature is the Explorer, integr…
#hackernews #microsoft #news
Tenable Cloud Security expands its Tenable One platform with enhanced multi-cloud exploration capabilities. A key feature is the Explorer, integr…
#hackernews #microsoft #news
Spotify and the Big Three labels have filed a record-breaking $13 trillion lawsuit against Anna’s Archive over a massive music data scrape. Find out what this means for the future of digital music.
#hackernews #news
Spotify and the Big Three labels have filed a record-breaking $13 trillion lawsuit against Anna’s Archive over a massive music data scrape. Find out what this means for the future of digital music.
#hackernews #news
The data breach notification service Have I Been Pwned says that a data breach at the U.S. food chain Panera Bread affected 5.1 million accounts, not 14 million customers as previously reported. [...]
#hackernews #news
The data breach notification service Have I Been Pwned says that a data breach at the U.S. food chain Panera Bread affected 5.1 million accounts, not 14 million customers as previously reported. [...]
#hackernews #news
AI agent orchestration is reshaping how businesses build intelligent systems. It moves beyond single chatbots or generative interfaces, coordinating multiple specialized AI agents to complete...
#hackernews #news
AI agent orchestration is reshaping how businesses build intelligent systems. It moves beyond single chatbots or generative interfaces, coordinating multiple specialized AI agents to complete...
#hackernews #news
Breach lingered for months before stronger signature checks shut the door
A state-sponsored cyber criminal compromised Notepad++'s update service in 2025, according to the project's author.…
#hackernews #news
Breach lingered for months before stronger signature checks shut the door
A state-sponsored cyber criminal compromised Notepad++'s update service in 2025, according to the project's author.…
#hackernews #news
Suspected Chinese state-sponsored attackers hijacked the Notepad++ update mechanism by compromising the software project’s shared hosting server and intercepting and redirecting update traffic destined for notepad-plus-plus…
#hackernews #news
Suspected Chinese state-sponsored attackers hijacked the Notepad++ update mechanism by compromising the software project’s shared hosting server and intercepting and redirecting update traffic destined for notepad-plus-plus…
#hackernews #news
With preparations well underway, Span Cyber Security Arena 2026 is set to return for its third edition, bringing together domestic and international experts in cyber security. As in previous years, the…
#hackernews #news
With preparations well underway, Span Cyber Security Arena 2026 is set to return for its third edition, bringing together domestic and international experts in cyber security. As in previous years, the…
#hackernews #news
Agentic development tools dramatically compress build cycles while pushing engineers up the abstraction stack, shifting the bottleneck from writing code to judgment, specification, and system-level coor…
#claude #hackernews #news
Agentic development tools dramatically compress build cycles while pushing engineers up the abstraction stack, shifting the bottleneck from writing code to judgment, specification, and system-level coor…
#claude #hackernews #news
Multitools are often too flashy, expensive, and not really that handy. I found a cheaper alternative that's somehow better.
#hackernews #news
Multitools are often too flashy, expensive, and not really that handy. I found a cheaper alternative that's somehow better.
#hackernews #news
A survey of 200 active Laravel developers shows strong reliance on third-party packages, but growing frustration with poor documentation, abandoned tools, and the lack of standardized ways to evaluate package heal…
#hackernews #news
A survey of 200 active Laravel developers shows strong reliance on third-party packages, but growing frustration with poor documentation, abandoned tools, and the lack of standardized ways to evaluate package heal…
#hackernews #news
Writing in public for one month showed that consistency is manageable, but distribution and authentic engagement—not writing—are the real long-term challenges.
#hackernews #news
Writing in public for one month showed that consistency is manageable, but distribution and authentic engagement—not writing—are the real long-term challenges.
#hackernews #news
Why I Stopped JIT’ing Users and Started JIT’ing Permissions By Cole HorsmanField CTO, Sonrai Security I first tried to “shift left” cloud identity in early 2020. We were building a greenfield AWS environment with a strong cloud team and leadership…
#hackernews #news
Why I Stopped JIT’ing Users and Started JIT’ing Permissions By Cole HorsmanField CTO, Sonrai Security I first tried to “shift left” cloud identity in early 2020. We were building a greenfield AWS environment with a strong cloud team and leadership…
#hackernews #news
There’s a new report about two AI coding assistants, used by 1.5 million developers, that are surreptitiously sending a copy of everything they ingest to China.
Maybe avoid using them.
#hackernews #news
There’s a new report about two AI coding assistants, used by 1.5 million developers, that are surreptitiously sending a copy of everything they ingest to China.
Maybe avoid using them.
#hackernews #news
These must-have tools help protect against hacking and data loss, without costing an arm and a leg.
#hackernews #news
These must-have tools help protect against hacking and data loss, without costing an arm and a leg.
#hackernews #news
Collaborating online means communication, file sharing, and task management. Here are the tools to stay connected with teammates without sacrificing personal boundaries.
#hackernews #news
Collaborating online means communication, file sharing, and task management. Here are the tools to stay connected with teammates without sacrificing personal boundaries.
#hackernews #news
Published in 1932, The Wave of a Handkerchief captures pulp sci-fi’s fascination with intellect as ultimate power. Dr. Ku Sui’s calm psychological dominance over armed opponents explores early ideas of mind control, sensory manipulation, and intelligen…
#hackernews #news
Published in 1932, The Wave of a Handkerchief captures pulp sci-fi’s fascination with intellect as ultimate power. Dr. Ku Sui’s calm psychological dominance over armed opponents explores early ideas of mind control, sensory manipulation, and intelligen…
#hackernews #news
Every week brings new discoveries, attacks, and defenses that shape the state of cybersecurity. Some threats are stopped quickly, while others go unseen until they cause real damage.
Sometime…
#hackernews #news
Every week brings new discoveries, attacks, and defenses that shape the state of cybersecurity. Some threats are stopped quickly, while others go unseen until they cause real damage.
Sometime…
#hackernews #news
Thermal cameras are infinitely useful, and this one from Thermal Master would be a fantastic addition to any Android user's toolkit.
#hackernews #news
Thermal cameras are infinitely useful, and this one from Thermal Master would be a fantastic addition to any Android user's toolkit.
#hackernews #news
Apache Spark 4.1 marks a shift from hand-crafted data pipelines to declarative design, reducing operational complexity through automated optimization, incremental views, built-in CDC, and native data qual…
#hackernews #news
Apache Spark 4.1 marks a shift from hand-crafted data pipelines to declarative design, reducing operational complexity through automated optimization, incremental views, built-in CDC, and native data qual…
#hackernews #news
For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an expanding attack surface. Combined with effective protection that blocks thr…
#hackernews #news
For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an expanding attack surface. Combined with effective protection that blocks thr…
#hackernews #news
Apache Spark 4.1 is moving away from the role of "orchestration plumber" and toward something far more strategic. We are entering an era of declarative clarity that promises to reduce pipeline d…
#hackernews #news
Apache Spark 4.1 is moving away from the role of "orchestration plumber" and toward something far more strategic. We are entering an era of declarative clarity that promises to reduce pipeline d…
#hackernews #news
Microsoft has fixed a known issue that was causing the password sign-in option to disappear from the lock screen options after installing Windows 11 updates released since August 2025. [...]
#hackernews #microsoft #news
Microsoft has fixed a known issue that was causing the password sign-in option to disappear from the lock screen options after installing Windows 11 updates released since August 2025. [...]
#hackernews #microsoft #news
Mutuum Finance has launched its V1 lending and borrowing protocol on Sepolia testnet. The project has surpassed $20 million raised in its presale. Since its launch, MUTM token price has climbed by 3…
#hackernews #news
Mutuum Finance has launched its V1 lending and borrowing protocol on Sepolia testnet. The project has surpassed $20 million raised in its presale. Since its launch, MUTM token price has climbed by 3…
#hackernews #news
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter KONNI Adopts AI to Generate PowerShell Backdoors Who Operates the B…
#hackernews #huggingface #news
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter KONNI Adopts AI to Generate PowerShell Backdoors Who Operates the B…
#hackernews #huggingface #news
Windows is shifting to a more secure authentication approach, moving away from New Technology LAN Manager (NTLM) and toward stronger, Kerberos-based options. NTLM has been part of Windows for decades and continues…
#hackernews #microsoft #news
Windows is shifting to a more secure authentication approach, moving away from New Technology LAN Manager (NTLM) and toward stronger, Kerberos-based options. NTLM has been part of Windows for decades and continues…
#hackernews #microsoft #news