Hacker & Security News
banner
hacker.at.thenote.app
Hacker & Security News
@hacker.at.thenote.app
#hacker and #security news from Hacker News, LifeHacker, Security Boulevard and others.
Our other projects: #macos, #ios and #android apps for notes TheNote.app
Pinned
We launched a Public Feed on Bluesky with #Hacker and #Security #News from sources like Hacker News, LifeHacker, Security Boulevard and others your convenience 🚀 🤗
bsky.app/profile/hack...
Cyber Startup Frenetik Launches with Patented Deception Technology That Bets Against the AI Arms Race

Bethesda, USA / Maryland, 2nd December 2025, CyberNewsWire
#hackernews #news
Cyber Startup Frenetik Launches with Patented Deception Technology That Bets Against the AI Arms Race
Bethesda, USA / Maryland, 2nd December 2025, CyberNewsWire
hackread.com
December 3, 2025 at 7:47 AM
Cyber Startup Frenetik Launches with Patented Deception Technology That Bets Against the AI Arms Race

Bethesda, USA / Maryland, 2nd December 2025, CyberNewsWire
#hackernews #news
Cyber Startup Frenetik Launches with Patented Deception Technology That Bets Against the AI Arms Race
Bethesda, USA / Maryland, 2nd December 2025, CyberNewsWire
securityboulevard.com
December 3, 2025 at 7:37 AM
University of Pennsylvania confirms new data breach after Oracle hack

The University of Pennsylvania (Penn) has confirmed a new data breach after attackers stole documents containing personal information from its Oracle E-Business Suite servers in August. [...]
#hackernews #news
University of Pennsylvania confirms new data breach after Oracle hack
The University of Pennsylvania (Penn) has confirmed a new data breach after attackers stole documents containing personal information from its Oracle E-Business Suite servers in August. [...]
www.bleepingcomputer.com
December 3, 2025 at 7:26 AM
Span Cyber Security Arena 2026 to offer new perspectives on the development of cybersecurity

Through lectures, deep-dive presentations, best practice examples, and masterclasses, the focus of Span Cyber Security Arena 2026 will be on what strengthens our defense against cyber thr…
#hackernews #news
Span Cyber Security Arena 2026 to offer new perspectives on the development of cybersecurity
Through lectures, deep-dive presentations, best practice examples, and masterclasses, the focus of Span Cyber Security Arena 2026 will be on what strengthens our defense against cyber threats. Span Cyber Security Arena 2026 will be held in Poreč from May 20 to 22, 2026, at the Pical Resort 5* Valamar Collection. Keynote speakers are Sami Laiho and Joe Tidy. Sami Laiho is known as one of the world’s leading experts in Windows security. Laiho will provide …
www.helpnetsecurity.com
December 3, 2025 at 7:16 AM
‘Korea’s Amazon’ Coupang discloses a data breach impacting 34M customers

Coupang disclosed a five-month data breach that exposed the personal information of nearly 34 million South Korean customers. South Korean e-commerce giant disclosed a data breach affecting nearly 34 million…
#hackernews #news
‘Korea’s Amazon’ Coupang discloses a data breach impacting 34M customers
Coupang disclosed a five-month data breach that exposed the personal information of nearly 34 million South Korean customers. South Korean e-commerce giant disclosed a data breach affecting nearly 34 million customers, exposing personal information over a period of more than five months. “According to the investigation so far, it is believed that unauthorized access to […]
securityaffairs.com
December 3, 2025 at 7:05 AM
Like Social Media, AI Requires Difficult Choices

Jamie Susskind, in his book “Future Politics,” posits that the central political query has shifted from the 20th century's focus on the state versus market and civil society. He argues that the dominant question of the current era…
#hackernews #news
Like Social Media, AI Requires Difficult Choices
Jamie Susskind, in his book “Future Politics,” posits that the central political query has shifted from the 20th century's focus on the state versus market and civil society. He argues that the dominant question of the current era is the extent to which powerful digital systems should direct and control human lives, and under what conditions. Artificial intelligence is the technology that immediately brings this critical question to the forefront of political discussion. AI inherently increases the power of its users, enabling them to execute far-reaching actions with minimal effort. For example, a user can issue a single instruction and have their message instantly written, personalized, and distributed to vast audiences across multiple digital channels. This amplification is available to various users, including managers, marketers, political campaigners, and individual internet users with strong opinions. AI allows for the customization of political appeals, such as individualizing requests for financial donations. Furthermore, AI systems can elaborate a simple grievance into a sophisticated and well-articulated policy position. Critically, AI facilitates the tailoring of persuasive arguments to resonate specifically with particular identity groups or even individual persons. This personalization and propagation capability dramatically alters how influence and control are exercised in modern society.
www.schneier.com
December 3, 2025 at 6:54 AM
AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk

Baltimore, MD, 2nd December 2025, CyberNewsWire
#hackernews #news
AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk
Baltimore, MD, 2nd December 2025, CyberNewsWire
hackread.com
December 3, 2025 at 6:44 AM
AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk

Baltimore, MD, 2nd December 2025, CyberNewsWire
#hackernews #news
AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk
Baltimore, MD, 2nd December 2025, CyberNewsWire
securityboulevard.com
December 3, 2025 at 6:33 AM
Proxyearth Tool Lets Anyone Trace Users in India with Just a Mobile Number

Proxyearth is a new site that shows names, Aadhaar numbers, and live locations of users in India using only mobile numbers, raising serious privacy and security concerns.
#hackernews #news
Proxyearth Tool Lets Anyone Trace Users in India with Just a Mobile Number
Proxyearth is a new site that shows names, Aadhaar numbers, and live locations of users in India using only mobile numbers, raising serious privacy and security concerns.
hackread.com
December 3, 2025 at 6:23 AM
Radiant Logic expands RadiantOne with composable remediation and unified identity observability

Radiant Logic announced major enhancements to its RadiantOne Platform. The release introduces new AI-powered collaborative remediation, an agentic AI-first approach that leverages the …
#hackernews #news
Radiant Logic expands RadiantOne with composable remediation and unified identity observability
Radiant Logic announced major enhancements to its RadiantOne Platform. The release introduces new AI-powered collaborative remediation, an agentic AI-first approach that leverages the Model Context Protocol (MCP) standard, and support for the Shared Signals Framework (SSF) with the Continuous Access Evaluation Profile (CAEP). Collectively, these capabilities transform visibility into continuous, actionable intelligence that triggers immediate responses to identity risks and policy violations, ensuring a more robust Zero Trust approach and a more resilient identity environment. …
www.helpnetsecurity.com
December 3, 2025 at 6:12 AM
SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities

Vulnerability management is a core component of every cybersecurity strategy. However, businesses often use thousands of software without realising it (when was the last time you checked?), and k…
#hackernews #news
SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities
Vulnerability management is a core component of every cybersecurity strategy. However, businesses often use thousands of software without realising it (when was the last time you checked?), and keeping track of all the vulnerability alerts, notifications, and updates can be a burden on resources and often leads to missed vulnerabilities.  Taking into account that nearly 10% of
thehackernews.com
December 3, 2025 at 6:02 AM
Windows 11 KB5070311 update fixes File Explorer freezes, search issues

Microsoft has released the KB5070311 preview cumulative update for Windows 11 systems, which includes 49 changes, including fixes for File Explorer freezes and search issues. [...]
#hackernews #microsoft #news
Windows 11 KB5070311 update fixes File Explorer freezes, search issues
Microsoft has released the KB5070311 preview cumulative update for Windows 11 systems, which includes 49 changes, including fixes for File Explorer freezes and search issues. [...]
www.bleepingcomputer.com
December 3, 2025 at 5:51 AM
How I Built an AI-Powered Research Automation System with n8n, Groq, and 5 Academic APIs

This post guides you through architecting an AI-powered research automation system using a low-code approach. It shows you how to integrate n8n for workflow orchestration, Groq for high-…
#hackernews #llm #news
How I Built an AI-Powered Research Automation System with n8n, Groq, and 5 Academic APIs
This post guides you through architecting an AI-powered research automation system using a low-code approach. It shows you how to integrate n8n for workflow orchestration, Groq for high-speed LLM inference, and five different academic APIs to automatically query, analyze, and process research data, accelerating the entire R&D-to-publication cycle.
hackernoon.com
December 3, 2025 at 5:41 AM
How a noisy ransomware intrusion exposed a long-term espionage foothold

Getting breached by two separate and likely unconnected cyber attack groups is a nightmare scenario for any organization, but can result in an unexpected silver lining: the noisier intrusion can draw attentio…
#hackernews #news
How a noisy ransomware intrusion exposed a long-term espionage foothold
Getting breached by two separate and likely unconnected cyber attack groups is a nightmare scenario for any organization, but can result in an unexpected silver lining: the noisier intrusion can draw attention to a far stealthier threat that might otherwise linger undetected for months. A double whammy In a recently published report, threat researchers at Positive Technologies have detailed the findings of their investigation into two incidents at Russian companies, which they have tied to: …
www.helpnetsecurity.com
December 3, 2025 at 5:30 AM
The Organisational Kernel Panic: AI at Scale Meets a Human OS From 1998

AI is scaling; organisations are not. Most failures blamed on models are really symptoms of a human OS built for 1998. Until decision-making, incentives, and ownership modernise, AI programs will keep rebooti…
#hackernews #news
The Organisational Kernel Panic: AI at Scale Meets a Human OS From 1998
AI is scaling; organisations are not. Most failures blamed on models are really symptoms of a human OS built for 1998. Until decision-making, incentives, and ownership modernise, AI programs will keep rebooting.
hackernoon.com
December 3, 2025 at 5:20 AM
The Hidden Cost of Bad Data: Why It’s Undermining Your AI Strategy

Poor data quality is a massive hidden cost that silently sabotages expensive AI projects and drains company resources. The "1-10-100 Rule" proves that proactive prevention is exponentially cheaper than fixing fail…
#hackernews #news
The Hidden Cost of Bad Data: Why It’s Undermining Your AI Strategy
Poor data quality is a massive hidden cost that silently sabotages expensive AI projects and drains company resources. The "1-10-100 Rule" proves that proactive prevention is exponentially cheaper than fixing failures downstream. The solution requires a systematic approach, starting with a data audit and establishing continuous data governance, which ultimately transforms data from a liability into a high-ROI strategic asset.
hackernoon.com
December 3, 2025 at 5:09 AM
Google’s latest Android security update fixes two actively exploited flaws

Google’s latest Android security update fixes 107 flaws across multiple components, including two vulnerabilities actively exploited in the wild. Google’s new Android update patches 107 vulnerabilities, in…
#hackernews #news
Google’s latest Android security update fixes two actively exploited flaws
Google’s latest Android security update fixes 107 flaws across multiple components, including two vulnerabilities actively exploited in the wild. Google’s new Android update patches 107 vulnerabilities, including two already exploited in the wild, across system, kernel, and major vendor components. Here’s a concise summary under 160 characters: December’s Android update offers two patch levels (12-01, […]
securityaffairs.com
December 3, 2025 at 4:59 AM
How Will We Distinguish Truth From Fiction?

Deepfake technology has its greatest impact on people through identity theft. It is no longer just fake videos on social media; even a few seconds of voice recording can create a convincing scam. The real challenge for consumers is not …
#hackernews #news
How Will We Distinguish Truth From Fiction?
Deepfake technology has its greatest impact on people through identity theft. It is no longer just fake videos on social media; even a few seconds of voice recording can create a convincing scam. The real challenge for consumers is not so much the deepfake itself, but the fatigue of trying to verify it.
hackernoon.com
December 3, 2025 at 4:49 AM
The Limits of Spec-Driven Development

SDD (Spec-Driven Development) is being positioned as the "right way" to build with AI. For certain problems such as API integrations with strict contracts, regulated industries with compliance requirements, this works well.

But for explorato…
#hackernews #news
The Limits of Spec-Driven Development
SDD (Spec-Driven Development) is being positioned as the "right way" to build with AI. For certain problems such as API integrations with strict contracts, regulated industries with compliance requirements, this works well. But for exploratory development like most of the cases? SDD breaks down fast. Stop chasing perfect upfront specifications. The future isn't about better specs, it's about better context.
hackernoon.com
December 3, 2025 at 4:38 AM
MuddyWater cyber campaign adds new backdoors in latest wave of attacks

ESET researchers say an Iran aligned threat group is refining its playbook again, and the latest activity shows how much its tactics have shifted. MuddyWater is a long running cyberespionage group, and new fin…
#hackernews #news
MuddyWater cyber campaign adds new backdoors in latest wave of attacks
ESET researchers say an Iran aligned threat group is refining its playbook again, and the latest activity shows how much its tactics have shifted. MuddyWater is a long running cyberespionage group, and new findings points to a campaign that hits a range of organizations in Israel, with one confirmed victim in Egypt. A wider set of targets and tools Researchers say the victims in Israel were in the technology, engineering, manufacturing, local government and educational …
www.helpnetsecurity.com
December 3, 2025 at 4:28 AM
Stateful API-to-Database Synchronization: Implementing Incremental Data Ingestion from REST APIs wit

Stop writing fragile cron scripts. Learn to build stateful, incremental data streams from any REST API using Python and a pull-based CDC model.
#hackernews #news
Stateful API-to-Database Synchronization: Implementing Incremental Data Ingestion from REST APIs wit
Stop writing fragile cron scripts. Learn to build stateful, incremental data streams from any REST API using Python and a pull-based CDC model.
hackernoon.com
December 3, 2025 at 4:17 AM
The Oxidized Age: Why Rust’s "Fungal" Growth Might Outlast Us All

By 2025, Rust has crossed the "immortality threshold," embedding itself in Linux and automotive systems via the Ferrocene project. Despite challenges like async fragmentation and the steep learning curve, its resil…
#hackernews #news
The Oxidized Age: Why Rust’s "Fungal" Growth Might Outlast Us All
By 2025, Rust has crossed the "immortality threshold," embedding itself in Linux and automotive systems via the Ferrocene project. Despite challenges like async fragmentation and the steep learning curve, its resilient "fungal" growth ensures longevity. The consensus is that Rust won't replace C in legacy systems but has become the default for greenfield infrastructure. For developers, learning Rust is no longer optional, it's a discipline that sharpens engineering skills across all languages.
hackernoon.com
December 3, 2025 at 4:07 AM
Skyflow delivers Runtime AI Data Security for protecting sensitive data in agentic workflows

Skyflow announced the launch of its Runtime AI Data Security platform for AWS AgentCore. While AI models are improving every few months and the industry is investing hundreds of billions …
#hackernews #news
Skyflow delivers Runtime AI Data Security for protecting sensitive data in agentic workflows
Skyflow announced the launch of its Runtime AI Data Security platform for AWS AgentCore. While AI models are improving every few months and the industry is investing hundreds of billions of dollars on AI infrastructure, most organizations still struggle to move from demos and prototypes to production-grade agentic applications. As enterprises and the startups and ISVs that serve them begin deploying agentic applications in production, they need a reliable way to protect sensitive customer data. …
www.helpnetsecurity.com
December 3, 2025 at 3:57 AM
Upwind adds real-time AI security and posture management to its CNAPP

Upwind announced the launch of its integrated AI security suite, expanding the company’s CNAPP to protect the growing enterprise AI attack surface. The suite introduces real-time AI security, AI posture managem…
#hackernews #news
Upwind adds real-time AI security and posture management to its CNAPP
Upwind announced the launch of its integrated AI security suite, expanding the company’s CNAPP to protect the growing enterprise AI attack surface. The suite introduces real-time AI security, AI posture management, AI agents, and runtime protection, allowing AI security to benefit from the same deep cloud context that already powers Upwind’s CNAPP across data security, API security, identity, and cloud detection and response. “AI security should not be a stand-alone security component,” said Amiram Shachar, …
www.helpnetsecurity.com
December 3, 2025 at 3:46 AM
Google Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the Wild

Google on Monday released monthly security updates for the Android operating system, including two vulnerabilities that it said have been exploited in the wild.
The patch addresses a total of 107…
#hackernews #news
Google Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the Wild
Google on Monday released monthly security updates for the Android operating system, including two vulnerabilities that it said have been exploited in the wild. The patch addresses a total of 107 security flaws spanning different components, including Framework, System, Kernel, as well as those from Arm, Imagination Technologies, MediaTek, Qualcomm, and Unison. The two high-severity shortcomings
thehackernews.com
December 3, 2025 at 3:36 AM