Our other projects: #macos, #ios and #android apps for notes TheNote.app
bsky.app/profile/hack...
Artificial intelligence will decide which B2B brands are considered, compared, and shortlisted before a human conversation ever begins. The buying journey doesn’t start with a website visit or a demo request …
#hackernews #news
Artificial intelligence will decide which B2B brands are considered, compared, and shortlisted before a human conversation ever begins. The buying journey doesn’t start with a website visit or a demo request …
#hackernews #news
Ransomware kingpin who escaped Armenian custody is believed to be lying low back home
German cops have added Russian national Oleg Evgenievich Nefekov to their list of most-wanted criminals for his services to ransomware.…
#hackernews #news
Ransomware kingpin who escaped Armenian custody is believed to be lying low back home
German cops have added Russian national Oleg Evgenievich Nefekov to their list of most-wanted criminals for his services to ransomware.…
#hackernews #news
A data breach at Canada’s investment watchdog, Canadian Investment Regulatory Organization (CIRO), impacted about 750,000 people. The Canadian Investment Regulatory Orga…
#hackernews #news
A data breach at Canada’s investment watchdog, Canadian Investment Regulatory Organization (CIRO), impacted about 750,000 people. The Canadian Investment Regulatory Orga…
#hackernews #news
Cisco has finally shipped security updates for its Email Security Gateway and Secure Email and Web Manager devices, which fix CVE-2025-20393, a vulnerability in the devices’ AsyncOS that has been exp…
#hackernews #news
Cisco has finally shipped security updates for its Email Security Gateway and Secure Email and Web Manager devices, which fix CVE-2025-20393, a vulnerability in the devices’ AsyncOS that has been exp…
#hackernews #news
More than a decade after Aaron Swartz’s death, the United States is still living inside the contradiction that destroyed him.
Swartz believed that knowledge, especially publicly funded knowledge, should be freely accessible. Acting on th…
#hackernews #news
More than a decade after Aaron Swartz’s death, the United States is still living inside the contradiction that destroyed him.
Swartz believed that knowledge, especially publicly funded knowledge, should be freely accessible. Acting on th…
#hackernews #news
It's the ultimate AI paradox, but it doesn't have to be that way.
#hackernews #news
It's the ultimate AI paradox, but it doesn't have to be that way.
#hackernews #news
Traditional firewalls can’t stop modern DDoS attacks. Learn why high-volume, multi-layer attacks overwhelm perimeter defenses—and how to build real DDoS resilience.
#hackernews #news
Traditional firewalls can’t stop modern DDoS attacks. Learn why high-volume, multi-layer attacks overwhelm perimeter defenses—and how to build real DDoS resilience.
#hackernews #news
Cybersecurity researchers have discovered five new malicious Google Chrome web browser extensions that masquerade as human resources (HR) and enterprise resource planning (ERP) platforms like Wor…
#hackernews #news
Cybersecurity researchers have discovered five new malicious Google Chrome web browser extensions that masquerade as human resources (HR) and enterprise resource planning (ERP) platforms like Wor…
#hackernews #news
"Opportunity is missed by most people because it is dressed in overalls and looks like work." — Thomas A. Edison
#hackernews #news
"Opportunity is missed by most people because it is dressed in overalls and looks like work." — Thomas A. Edison
#hackernews #news
From quantum resilience to identity fatigue, print security is emerging as a critical risk in 2026. Learn the three trends forcing organizations to rethink printer and edge-device security.
#hackernews #news
From quantum resilience to identity fatigue, print security is emerging as a critical risk in 2026. Learn the three trends forcing organizations to rethink printer and edge-device security.
#hackernews #news
Perimeter security is obsolete. Modern cyberresilience demands zero-trust, continuous verification, and intelligent automation that detects and contains threats before damage occurs.
#hackernews #news
Perimeter security is obsolete. Modern cyberresilience demands zero-trust, continuous verification, and intelligent automation that detects and contains threats before damage occurs.
#hackernews #news
GitLab announced the GitLab Duo Agent Platform, delivering agentic AI that enables teams to orchestrate agents across the entire software lifecycle. AI tools have been improving developers’ ability to write code…
#hackernews #news
GitLab announced the GitLab Duo Agent Platform, delivering agentic AI that enables teams to orchestrate agents across the entire software lifecycle. AI tools have been improving developers’ ability to write code…
#hackernews #news
Let's just say backups and restraint are nonnegotiable.
#anthropic #claude #hackernews
Let's just say backups and restraint are nonnegotiable.
#anthropic #claude #hackernews
AI-driven microservices often fail due to black-box decision-making. This IEEE award-winning research introduces a transparency-driven resilience framework using explainable AI to make automated actions in…
#hackernews #news
AI-driven microservices often fail due to black-box decision-making. This IEEE award-winning research introduces a transparency-driven resilience framework using explainable AI to make automated actions in…
#hackernews #news
Check Point observes 40K+ attack attempts in our hours, with government organizations under fire
A critical HPE OneView flaw is now being exploited at scale, with Check Point tying mass, automated attacks …
#hackernews #news
Check Point observes 40K+ attack attempts in our hours, with government organizations under fire
A critical HPE OneView flaw is now being exploited at scale, with Check Point tying mass, automated attacks …
#hackernews #news
Android 17, aka 'Cinnamon Bun,' is on the horizon, and there's already a lot of speculation about what it includes. Here's what I want with the next OS.
#hackernews #news
Android 17, aka 'Cinnamon Bun,' is on the horizon, and there's already a lot of speculation about what it includes. Here's what I want with the next OS.
#hackernews #news
Microsoft confirmed that the KB5074109 January Windows 11 security update causes the classic Outlook desktop client to freeze and hang for users with POP email accounts. [...]
#hackernews #microsoft #news
Microsoft confirmed that the KB5074109 January Windows 11 security update causes the classic Outlook desktop client to freeze and hang for users with POP email accounts. [...]
#hackernews #microsoft #news
If you spot one of these in a friend's or family member's power outlet, unplug it ASAP and use this instead.
#hackernews #news
If you spot one of these in a friend's or family member's power outlet, unplug it ASAP and use this instead.
#hackernews #news
Owner reverse-engineered his ride, revealing authentication was never properly individualized
An Estonian e-scooter owner locked out of his own ride after the manufacturer went bust did what any determined engineer m…
#hackernews #news
Owner reverse-engineered his ride, revealing authentication was never properly individualized
An Estonian e-scooter owner locked out of his own ride after the manufacturer went bust did what any determined engineer m…
#hackernews #news
Dutch police arrest the alleged AVCheck operator at Schiphol as part of Operation Endgame, a global effort targeting malware services and cybercrime.
#hackernews #news
Dutch police arrest the alleged AVCheck operator at Schiphol as part of Operation Endgame, a global effort targeting malware services and cybercrime.
#hackernews #news
Researcher shows how anyone can access Copenhagen experience attendees' names, videos
Exclusive The Carlsberg exhibition in Copenhagen offers a bunch of fun activities, like blending your own b…
#hackernews #news
Researcher shows how anyone can access Copenhagen experience attendees' names, videos
Exclusive The Carlsberg exhibition in Copenhagen offers a bunch of fun activities, like blending your own b…
#hackernews #news
You lock your doors at night. You avoid sketchy phone calls. You’re careful about what you post on social media.
But what about the information about you that’s already out there—without your permission?
Your name. Home add…
#hackernews #news
You lock your doors at night. You avoid sketchy phone calls. You’re careful about what you post on social media.
But what about the information about you that’s already out there—without your permission?
Your name. Home add…
#hackernews #news
Attackers are now exploiting a critical Fortinet FortiSIEM vulnerability with publicly available proof-of-concept exploit code. [...]
#hackernews #news
Attackers are now exploiting a critical Fortinet FortiSIEM vulnerability with publicly available proof-of-concept exploit code. [...]
#hackernews #news
Security experts have disclosed details of a new campaign that has targeted U.S. government and policy entities using politically themed lures to deliver a backdoor known as LOTUSLITE.
The targe…
#hackernews #news
Security experts have disclosed details of a new campaign that has targeted U.S. government and policy entities using politically themed lures to deliver a backdoor known as LOTUSLITE.
The targe…
#hackernews #news
Cisco fixed a maximum severity AsyncOS flaw in Secure Email products, previously exploited as a zero-day by China-linked APT group UAT-9686. Cisco fixed a critical AsyncOS flaw, tracked as CVE-2025-20393 (C…
#hackernews #news
Cisco fixed a maximum severity AsyncOS flaw in Secure Email products, previously exploited as a zero-day by China-linked APT group UAT-9686. Cisco fixed a critical AsyncOS flaw, tracked as CVE-2025-20393 (C…
#hackernews #news