Hacker & Security News
banner
hacker.at.thenote.app
Hacker & Security News
@hacker.at.thenote.app
#hacker and #security news from Hacker News, LifeHacker, Security Boulevard and others.
Our other projects: #macos, #ios and #android apps for notes TheNote.app
Pinned
We launched a Public Feed on Bluesky with #Hacker and #Security #News from sources like Hacker News, LifeHacker, Security Boulevard and others your convenience 🚀 🤗
bsky.app/profile/hack...
China Regains 14 % of Global Bitcoin Mining Share in Surprise Revival

China’s Bitcoin mining resurges to around 14% of global share, driven by cheap power and rig demand, even though the 2021 ban still formally stands.
#hackernews #news
China Regains 14 % of Global Bitcoin Mining Share in Surprise Revival
China’s Bitcoin mining resurges to around 14% of global share, driven by cheap power and rig demand, even though the 2021 ban still formally stands.
hackernoon.com
November 26, 2025 at 3:10 AM
Meta Accused of Burying Research that Linked Facebook Usage to Teen Depression

Meta is accused of shelving internal research that found Facebook use caused increased depression and anxiety, U.S. court filings show.
#hackernews #meta #news
Meta Accused of Burying Research that Linked Facebook Usage to Teen Depression
Meta is accused of shelving internal research that found Facebook use caused increased depression and anxiety, U.S. court filings show.
hackernoon.com
November 26, 2025 at 2:59 AM
CISA: Spyware and RATs used to target WhatsApp and Signal Users

CISA warns that threat actors are actively using commercial spyware and RATs to target users of mobile messaging apps WhatsApp and Signal. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning o…
#hackernews #news
CISA: Spyware and RATs used to target WhatsApp and Signal Users
CISA warns that threat actors are actively using commercial spyware and RATs to target users of mobile messaging apps WhatsApp and Signal. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of threat actors using commercial spyware and remote access trojans (RATs) to target users of popular instant messaging applications, including WhatsApp and Signal. […]
securityaffairs.com
November 26, 2025 at 2:49 AM
Microsoft cracks down on malicious meeting invites

Phishing is shifting into places people rarely check. Meeting invites that plant themselves on calendars can survive long after the malicious email is gone. That leaves a quiet opening for attackers. Microsoft has upda…
#hackernews #microsoft #news
Microsoft cracks down on malicious meeting invites
Phishing is shifting into places people rarely check. Meeting invites that plant themselves on calendars can survive long after the malicious email is gone. That leaves a quiet opening for attackers. Microsoft has updated Defender for Office 365 so that security teams can now remove those leftover calendar entries when they perform a Hard Delete. Microsoft also added stronger domain blocking for phishing links. Attackers have been sending harmful meeting invites because Outlook often auto …
www.helpnetsecurity.com
November 26, 2025 at 2:38 AM
ZTE, China Unicom Liaoning and Dalian Changhai Airport launch 5G-A ISAC private network to elevate low-altitude security and airport safety

Millimeter-wave ISAC and edge AI create unified sensing-communication capabilities for next-generation low-altitude security
#hackernews #news
ZTE, China Unicom Liaoning and Dalian Changhai Airport launch 5G-A ISAC private network to elevate low-altitude security and airport safety
Millimeter-wave ISAC and edge AI create unified sensing-communication capabilities for next-generation low-altitude security
go.theregister.com
November 26, 2025 at 2:28 AM
Nevada’s Trojan Download, Penn’s 1.2M Donor Breach, and the Malware That Kills Your Defenses First

In Nevada, a state employee downloaded what looked like a harmless tool from a search ad. The file had been tampered with, and that single moment opened the door to months of silent…
#hackernews #news
Nevada’s Trojan Download, Penn’s 1.2M Donor Breach, and the Malware That Kills Your Defenses First
In Nevada, a state employee downloaded what looked like a harmless tool from a search ad. The file had been tampered with, and that single moment opened the door to months of silent attacker movement across more than 60 agencies.  That pattern shows up again and again in the latest ColorTokens Threat Intelligence Brief. Attackers rarely break in with […]
securityboulevard.com
November 26, 2025 at 2:17 AM
Why Dumb People Outsmart You and Steal Your Success

The smarter you are, the easier it is to get stuck. Intelligence creates hesitation, doubt, and perfectionism. Success comes from motion, visibility, and repetition. Not mastery. Confidence is built through exposure.
#hackernews #news
Why Dumb People Outsmart You and Steal Your Success
The smarter you are, the easier it is to get stuck. Intelligence creates hesitation, doubt, and perfectionism. Success comes from motion, visibility, and repetition. Not mastery. Confidence is built through exposure.
hackernoon.com
November 26, 2025 at 2:07 AM
SitusAMC confirms data breach affecting customer information

SitusAMC says a recent breach exposed customer data; the real-estate financing firm provides back-office services for banks and lenders. SitusAMC, a leading real-estate financing services provider for banks and lenders,…
#hackernews #news
SitusAMC confirms data breach affecting customer information
SitusAMC says a recent breach exposed customer data; the real-estate financing firm provides back-office services for banks and lenders. SitusAMC, a leading real-estate financing services provider for banks and lenders, disclosed a data breach discovered earlier this month that exposed customer information. The firm manages back-office functions such as mortgage origination, servicing, and compliance for […]
securityaffairs.com
November 26, 2025 at 1:56 AM
NSFOCUS Receives International Recognition: 2025 Global Competitive Strategy Leadership for AI-Driven Security Operation

SANTA CLARA, Calif., Nov 25, 2025 – Recently, NSFOCUS Generative Pre-trained Transformer (NSFGPT) and Intelligent Security Operations Platform (NSFOCUS IS…
#gpt #hackernews #news
NSFOCUS Receives International Recognition: 2025 Global Competitive Strategy Leadership for AI-Driven Security Operation
SANTA CLARA, Calif., Nov 25, 2025 – Recently, NSFOCUS Generative Pre-trained Transformer (NSFGPT) and Intelligent Security Operations Platform (NSFOCUS ISOP) were recognized by the internationally renowned consulting firm Frost & Sullivan and won the 2025 Global Competitive Strategy Leadership for AI-Driven Security Operation [1]. Frost & Sullivan Best Practices Recognition awards companies each year in […]
securityboulevard.com
November 26, 2025 at 1:46 AM
The TechBeat: Stop Building Your Product for Yourself: Why Most Early-Stage Startups Fail at Marketing (11/25/2025)

HackerNoon presents trending tech articles covering various topics. One article discusses how risk-averse engineering built resilient internet companies, emphasizi…
#chatgpt #gpt #llm
The TechBeat: Stop Building Your Product for Yourself: Why Most Early-Stage Startups Fail at Marketing (11/25/2025)
HackerNoon presents trending tech articles covering various topics. One article discusses how risk-averse engineering built resilient internet companies, emphasizing stable infrastructure over new frameworks. Another explains how search engines answer questions using knowledge graphs and DeepQA. Startups are advised to market by understanding customers, building founder brands, and hiring doers, rather than just building products for themselves. A guide is offered for creating winning proposals for data quality projects, focusing on clear goals and justification. The best SOC 2 compliance software platforms for 2025 are reviewed, comparing automation and usability. HackerNoon's Blogging Course is promoted as a writing upgrade for clarity, distribution, and audience building. The evolving role of technical leadership in the AI age highlights the rise of hybrid leaders. Articles also explore ChatGPT's market performance, AI coding agent limitations, and the potential of programmable money for environmental issues. Real-world AI adoption insights are shared from professionals, contrasting with academic studies. Caching strategies for resilient Symfony applications are detailed, addressing latency and security. Furthermore, advice is given on contributing to the next generation of engineers and running open-source LLMs locally. The limitations of current AI architectures are discussed, proposing toroidal math as a solution. Finally, the first autonomous AI cyberattack and advancements in biology as a language for developers are highlighted.
hackernoon.com
November 26, 2025 at 1:36 AM
How an AI meltdown could reset enterprise expectations

In this Help Net Security interview, Graham McMillan, CTO at Redgate Software, discusses AI, security, and the future of enterprise oversight. He explains why past incidents haven’t pushed the industry to mature. McMillan als…
#hackernews #news
How an AI meltdown could reset enterprise expectations
In this Help Net Security interview, Graham McMillan, CTO at Redgate Software, discusses AI, security, and the future of enterprise oversight. He explains why past incidents haven’t pushed the industry to mature. McMillan also outlines the structural shifts he expects once failures start to have business impact. What type of AI-driven failure do you believe is most likely to force the industry into a maturity leap, and why have recent incidents not been enough to …
www.helpnetsecurity.com
November 26, 2025 at 1:25 AM
A midseason takeaway. [CISO Perspectives]

In this mid-season episode, Kim takes a step back to reflect on the conversations he has had so far. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, diving into how new technologies are imp…
#hackernews #news
A midseason takeaway. [CISO Perspectives]
In this mid-season episode, Kim takes a step back to reflect on the conversations he has had so far. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, diving into how new technologies are impacting longstanding challenges, both from a security standpoint and from an attacker's view. Whether you're catching up or tuning in weekly, this episode offers a thoughtful recap and fresh perspective on where we've been—and what's still to come.
thecyberwire.com
November 26, 2025 at 1:15 AM
Elite Cyber Veterans Launch Blast Security With $10M to Turn Cloud Detection Into Prevention

Blast Security is a cybersecurity startup founded by industry veterans from Solebit (acquired by Mimecast) and elite IDF units. The company is already working with numerous global enterpr…
#hackernews #news
Elite Cyber Veterans Launch Blast Security With $10M to Turn Cloud Detection Into Prevention
Blast Security is a cybersecurity startup founded by industry veterans from Solebit (acquired by Mimecast) and elite IDF units. The company is already working with numerous global enterprises to secure their production environments, preventing cloud risk by over 90%. Blast’s Preemptive Cloud Defense Platform marks an inflection point for organizations shifting from reactive alert-chasing to proactive, continuously enforced prevention.
hackernoon.com
November 26, 2025 at 1:04 AM
CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday issued an alert warning of bad actors actively leveraging commercial spyware and remote access trojans (RATs) to target…
#hackernews #news
CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday issued an alert warning of bad actors actively leveraging commercial spyware and remote access trojans (RATs) to target users of mobile messaging applications. "These cyber actors use sophisticated targeting and social engineering techniques to deliver spyware and gain unauthorized access to a victim's messaging app,
thehackernews.com
November 26, 2025 at 12:54 AM
Aircraft cabin IoT leaves vendor and passenger data exposed

The expansion of IoT devices in shared, multi-vendor environments, such as aircraft cabins, has created tension between the benefits of data collaboration and the risks to passenger privacy, vendor intellectual property,…
#hackernews #news
Aircraft cabin IoT leaves vendor and passenger data exposed
The expansion of IoT devices in shared, multi-vendor environments, such as aircraft cabins, has created tension between the benefits of data collaboration and the risks to passenger privacy, vendor intellectual property, and regulatory compliance. A new study finds that even with protections that scramble data while it moves between devices, sensitive information often remains exposed once it reaches its destination. The moment information becomes exposed The cabin network works by having devices send updates to …
www.helpnetsecurity.com
November 26, 2025 at 12:43 AM
The breaches everyone gets hit by (and how to stop them)

Headlines scream about zero-days and nation-state attacks, but the reality is far less glamorous. Ross Haleliuk, from Venture in Security talks about the concept of humans being wired to overweight rare, dramatic events and…
#hackernews #news
The breaches everyone gets hit by (and how to stop them)
Headlines scream about zero-days and nation-state attacks, but the reality is far less glamorous. Ross Haleliuk, from Venture in Security talks about the concept of humans being wired to overweight rare, dramatic events and underweight the everyday risks that quietly do the most damage. For perspective: you’re about 7,000 times more likely to drown in a pool than to die in a plane crash. In other words, the scariest part of your holiday probably isn’t …
www.helpnetsecurity.com
November 26, 2025 at 12:33 AM
Building a Strong Cloud Data Loss Prevention Strategy: A Step-by-Step Guide

In an era where data fuels every business decision, protecting that data has become a defining element of organisational resilience. Companies today depend on vast volumes of digital information, from cus…
#hackernews #news
Building a Strong Cloud Data Loss Prevention Strategy: A Step-by-Step Guide
In an era where data fuels every business decision, protecting that data has become a defining element of organisational resilience. Companies today depend on vast volumes of digital information, from customer records and financial details to proprietary research, making an effective Data Loss Prevention (DLP) strategy indispensable. Securing this information isn’t just about preventing cyberattacks; […]
securityboulevard.com
November 26, 2025 at 12:23 AM
Supply chain sprawl is rewriting security priorities

Organizations depend on long chains of vendors, but many cybersecurity professionals say these relationships create gaps they cannot see or control. A new ISC2 survey of more than 1,000 cybersecurity professionals shows that su…
#hackernews #news
Supply chain sprawl is rewriting security priorities
Organizations depend on long chains of vendors, but many cybersecurity professionals say these relationships create gaps they cannot see or control. A new ISC2 survey of more than 1,000 cybersecurity professionals shows that supply chain risk sits near the top of their concerns. 70% of respondents said their organizations are concerned about cybersecurity risks linked to third party suppliers. Concern is highest in enterprise environments and in sectors that handle financial or government data. Vendor …
www.helpnetsecurity.com
November 26, 2025 at 12:12 AM
Cybersecurity jobs available right now: November 25, 2025

Associate Director, Cybersecurity Specialist HSBC | India | Remote – No longer accepting applications As an Associate Director, Cybersecurity Specialist, you will lead the Cyber Professional Testing Practice, setting direc…
#hackernews #news
Cybersecurity jobs available right now: November 25, 2025
Associate Director, Cybersecurity Specialist HSBC | India | Remote – No longer accepting applications As an Associate Director, Cybersecurity Specialist, you will lead the Cyber Professional Testing Practice, setting direction, mentoring teams, and planning resources to support organisation-wide adoption. You will define and deliver the testing strategy, including frameworks, processes, methodologies, tooling, and automated testing practices, while guiding teams on appropriate performance and stress testing. You will also oversee testing process management, documentation, and continuous …
www.helpnetsecurity.com
November 26, 2025 at 12:01 AM
I Was Sick of the Crypto Off-Ramp Pain. So I Built My Own Crypto Card

For years, crypto was easy to earn but painfully hard to spend. Off-ramps meant four slow, expensive steps and constant bank friction. I finally got tired of this and built a solution — the EMCD Payment Card, a…
#hackernews #news
I Was Sick of the Crypto Off-Ramp Pain. So I Built My Own Crypto Card
For years, crypto was easy to earn but painfully hard to spend. Off-ramps meant four slow, expensive steps and constant bank friction. I finally got tired of this and built a solution — the EMCD Payment Card, a virtual USD Mastercard that lets you spend USDT in one step. Top-ups are instant, the card works anywhere Mastercard is accepted, and your main funds stay safely in your wallet. It’s a simple, controlled way to turn stablecoins into real-world purchasing power without the usual off-ramp pain.
hackernoon.com
November 25, 2025 at 11:51 PM
I would ditch Apple's most expensive smartwatch and buy this one instead

Outdoor enthusiasts and Apple obsessives love the Apple Watch Ultra 3. An earlier model is on sale for $200 less, and I'd recommend it.
#apple #hackernews #news
I would ditch Apple's most expensive smartwatch and buy this one instead
Outdoor enthusiasts and Apple obsessives love the Apple Watch Ultra 3. An earlier model is on sale for $200 less, and I'd recommend it.
www.zdnet.com
November 25, 2025 at 11:40 PM
Is Opus 4.5 really 'the best model in the world for coding'? It just failed half my tests

Here's what happened when I pushed Anthropic's new model through some simple development tasks.
#anthropic #hackernews #news
Is Opus 4.5 really 'the best model in the world for coding'? It just failed half my tests
Here's what happened when I pushed Anthropic's new model through some simple development tasks.
www.zdnet.com
November 25, 2025 at 11:30 PM
Attackers are Using Fake Windows Updates in ClickFix Scams

Huntress threat researchers are tracking a ClickFix campaign that includes a variant of the scheme in which the malicious code is hidden in the fake image of a Windows Update and, if inadvertently downloaded by victims, w…
#hackernews #news
Attackers are Using Fake Windows Updates in ClickFix Scams
Huntress threat researchers are tracking a ClickFix campaign that includes a variant of the scheme in which the malicious code is hidden in the fake image of a Windows Update and, if inadvertently downloaded by victims, will deploy the info-stealing malware LummaC2 and Rhadamanthys.
securityboulevard.com
November 25, 2025 at 11:19 PM
I just adopted a kitten, and this is the pet tech I'm buying this Black Friday

Adding another cat to the house means adding more products to keep two cats fed, safe, and entertained. This is what I'm buying this week.
#hackernews #news
I just adopted a kitten, and this is the pet tech I'm buying this Black Friday
Adding another cat to the house means adding more products to keep two cats fed, safe, and entertained. This is what I'm buying this week.
www.zdnet.com
November 25, 2025 at 11:09 PM
If you want more screen space for work, I'd recommend this 37-inch Samsung monitor

Samsung's ViewFinity S8 is a spacious, 4K monitor with an ergonomic design, and it's 34% off with this Black Friday deal.
#hackernews #news #samsung
If you want more screen space for work, I'd recommend this 37-inch Samsung monitor
Samsung's ViewFinity S8 is a spacious, 4K monitor with an ergonomic design, and it's 34% off with this Black Friday deal.
www.zdnet.com
November 25, 2025 at 10:58 PM