Hacker & Security News
@hacker.at.thenote.app
640 followers 6 following 25K posts
#hacker and #security news from Hacker News, LifeHacker, Security Boulevard and others. Our other projects: #macos, #ios and #android apps for notes TheNote.app
Posts Media Videos Starter Packs
Pinned
hacker.at.thenote.app
We launched a Public Feed on Bluesky with #Hacker and #Security #News from sources like Hacker News, LifeHacker, Security Boulevard and others your convenience 🚀 🤗
bsky.app/profile/hack...
hacker.at.thenote.app
British govt agents demand action after UK mega-cyberattacks surge 50%

Warn businesses to act now as high-severity incidents keep climbing
Cyberattacks that meet upper severity thresholds set by the UK government's cyber agents have risen 50 percent in the last year, despite al…

#hackernews #news
British govt agents demand action after UK mega-cyberattacks surge 50%
Warn businesses to act now as high-severity incidents keep climbing Cyberattacks that meet upper severity thresholds set by the UK government's cyber agents have risen 50 percent in the last year, despite almost zero change in the volume of cases handled.…
go.theregister.com
hacker.at.thenote.app
How Top SOCs Stay Up-to-Date on Current Threat Landscape

Disclosure: This article was provided by ANY.RUN. The information and analysis presented are based on their research and findings.

#hackernews #news
How Top SOCs Stay Up-to-Date on Current Threat Landscape
Disclosure: This article was provided by ANY.RUN. The information and analysis presented are based on their research and findings.
hackread.com
hacker.at.thenote.app
Astaroth Trojan Uses GitHub Images to Stay Active After Takedowns

Astaroth banking trojan has evolved to use GitHub and steganography for resilient C2, hiding its vital commands in images. Learn how this sophisticated malware employs fileless techniques to steal banking and cryp…

#hackernews #news
Astaroth Trojan Uses GitHub Images to Stay Active After Takedowns
Astaroth banking trojan has evolved to use GitHub and steganography for resilient C2, hiding its vital commands in images. Learn how this sophisticated malware employs fileless techniques to steal banking and crypto credentials from users across Latin America.
hackread.com
hacker.at.thenote.app
No Good Deed Goes Unpunished: Why Voluntary Disclosure of Cybersecurity Violations Doesn’t Mean You Won’t Be Punished for Bad Security

Voluntary cybersecurity disclosure reduces penalties but not liability. In compliance, honesty helps—but it’s no safe harbor.

#hackernews #news
No Good Deed Goes Unpunished: Why Voluntary Disclosure of Cybersecurity Violations Doesn’t Mean You Won’t Be Punished for Bad Security
Voluntary cybersecurity disclosure reduces penalties but not liability. In compliance, honesty helps—but it’s no safe harbor.
securityboulevard.com
hacker.at.thenote.app
Rethinking Microsoft Security: Why Identity is Your First Line of Defense

Identity is the new security perimeter. Defend Microsoft Entra ID and Microsoft 365 from evolving identity-based cyberattacks.

#hackernews #microsoft #news
Rethinking Microsoft Security: Why Identity is Your First Line of Defense
Identity is the new security perimeter. Defend Microsoft Entra ID and Microsoft 365 from evolving identity-based cyberattacks.
securityboulevard.com
hacker.at.thenote.app
This midrange OnePlus phone outperforms pricier models - and it's on sale at Best Buy

Although it's not a flagship model, the OnePlus 13R still delivers top-notch performance and an excellent battery. You can get it for $450.

#hackernews #news
This midrange OnePlus phone outperforms pricier models - and it's on sale at Best Buy
Although it's not a flagship model, the OnePlus 13R still delivers top-notch performance and an excellent battery. You can get it for $450.
www.zdnet.com
hacker.at.thenote.app
IPVanish VPN review: Fast connections and solid protection

IPVanish is an easy-to-use, secure VPN offering fast speeds and unlimited connections.

#hackernews #news
IPVanish VPN review: Why it earned a spot in my favorites list
IPVanish is an easy-to-use, secure VPN offering fast speeds and unlimited connections.
www.zdnet.com
hacker.at.thenote.app
Apple could launch 3 new M5-powered devices this week, including a Vision Pro successor

Apple's October 2025 product release cycle, with the next-generation M5 chipset, is approaching fast.

#apple #hackernews #news
Apple could launch 3 new M5-powered devices this week, including a Vision Pro successor
Apple's October 2025 product release cycle, with the next-generation M5 chipset, is approaching fast.
www.zdnet.com
hacker.at.thenote.app
Gcore Mitigates Record-Breaking 6 Tbps DDoS Attack

Luxembourg, Luxembourg, 14th October 2025, CyberNewsWire

#hackernews #news
Gcore Mitigates Record-Breaking 6 Tbps DDoS Attack
Luxembourg, Luxembourg, 14th October 2025, CyberNewsWire
hackread.com
hacker.at.thenote.app
Gcore Mitigates Record-Breaking 6 Tbps DDoS Attack

Luxembourg, Luxembourg, 14th October 2025, CyberNewsWire

#hackernews #news
Gcore Mitigates Record-Breaking 6 Tbps DDoS Attack
Luxembourg, Luxembourg, 14th October 2025, CyberNewsWire
securityboulevard.com
hacker.at.thenote.app
EU biometric border system launches, suffers teeting problems

Malfunctioning equipment and manual processing cause 90-minute waits
The European Union's new biometric Exit/Entry System (EES) got off to a chaotic start at Prague's international airport, with travelers facing leng…

#hackernews #news
EU biometric border system launches, suffers teeting problems
Malfunctioning equipment and manual processing cause 90-minute waits The European Union's new biometric Exit/Entry System (EES) got off to a chaotic start at Prague's international airport, with travelers facing lengthy queues and malfunctioning equipment forcing border staff to process arrivals manually.…
go.theregister.com