Hacker & Security News
banner
hacker.at.thenote.app
Hacker & Security News
@hacker.at.thenote.app
#hacker and #security news from Hacker News, LifeHacker, Security Boulevard and others.
Our other projects: #macos, #ios and #android apps for notes TheNote.app
Pinned
We launched a Public Feed on Bluesky with #Hacker and #Security #News from sources like Hacker News, LifeHacker, Security Boulevard and others your convenience 🚀 🤗
bsky.app/profile/hack...
Microsoft Teams to let users report messages wrongly flagged as threats

Microsoft says that Teams users will be able to report false-positive threat alerts triggered by messages incorrectly flagged as malicious. [...]
#hackernews #microsoft #news
Microsoft Teams to let users report messages wrongly flagged as threats
Microsoft says that Teams users will be able to report false-positive threat alerts triggered by messages incorrectly flagged as malicious. [...]
www.bleepingcomputer.com
November 19, 2025 at 6:01 PM
Google Vids premium features now available to everyone - here's everything you can do

All users can now add AI voiceovers, remove filler words, and edit photos. Get a hands-on look at all the tools you can try.
#hackernews #news
Google Vids premium features now available to everyone - here's everything you can do
All users can now add AI voiceovers, remove filler words, and edit photos. Get a hands-on look at all the tools you can try.
www.zdnet.com
November 19, 2025 at 5:50 PM
Big Tech’s Appetite for Carbon Removal Credits Causes Market Shortage

Major tech companies like Microsoft and Google are driving a spike in demand — and prices — for durable carbon removal credits, tightening supply and accelerating investment in long-term climate solu…
#hackernews #microsoft #news
Big Tech’s Appetite for Carbon Removal Credits Causes Market Shortage
Major tech companies like Microsoft and Google are driving a spike in demand — and prices — for durable carbon removal credits, tightening supply and accelerating investment in long-term climate solutions such as biochar and direct air capture.
hackernoon.com
November 19, 2025 at 5:40 PM
Amazon Launches $15 Billion Bond Sale as AI Infrastructure Spending Surges

Amazon is returning to the U.S. bond market with a $15 billion, six-part offering to fuel AI-driven infrastructure expansion, drawing heavy investor demand and joining a wider wave of tech companies issuin…
#hackernews #news
Amazon Launches $15 Billion Bond Sale as AI Infrastructure Spending Surges
Amazon is returning to the U.S. bond market with a $15 billion, six-part offering to fuel AI-driven infrastructure expansion, drawing heavy investor demand and joining a wider wave of tech companies issuing debt to support soaring capital expenditures.
hackernoon.com
November 19, 2025 at 5:30 PM
As Stablecoins Boom, Brazil Considers a New Tax on Crypto Transfers

Brazil is exploring whether its IOF financial transaction tax should apply to international crypto payments, a move aimed at closing a regulatory loophole as stablecoin-driven crypto activity reaches new highs.
#hackernews #news
As Stablecoins Boom, Brazil Considers a New Tax on Crypto Transfers
Brazil is exploring whether its IOF financial transaction tax should apply to international crypto payments, a move aimed at closing a regulatory loophole as stablecoin-driven crypto activity reaches new highs.
hackernoon.com
November 19, 2025 at 5:19 PM
From Cloud to Code: Salt Cloud Connect Now Scans GitHub

Salt Cloud Connect, an agentless discovery tool, provides rapid API inventory and security for cloud platforms like AWS and Azure. Customers quickly gain visibility and asked for similar functionality for their code. Salt i…
#hackernews #news
From Cloud to Code: Salt Cloud Connect Now Scans GitHub
Salt Cloud Connect, an agentless discovery tool, provides rapid API inventory and security for cloud platforms like AWS and Azure. Customers quickly gain visibility and asked for similar functionality for their code. Salt is now launching GitHub Connect, extending its agentless capability to private GitHub repositories. This tool identifies high-risk "MCP-related APIs and posture gaps" within code, unlike generic scanners. GitHub Connect analyzes code for vulnerabilities, delivering a prioritized risk score without traffic. It mirrors the "wow" moment of Cloud Connect by providing immediate value to developers. GitHub Connect is a precision tool specifically designed for the AI-driven world and developers using such APIs. The tool integrates with Salt Illuminate, offering a unified risk view across code, cloud, and runtime environments. This integrated approach provides a foundation for comprehensive API security, starting from code. Customers are encouraged to explore Salt's resources and request assessments to strengthen their security posture.
securityboulevard.com
November 19, 2025 at 5:09 PM
French agency Pajemploi reports data breach affecting 1.2M people

Pajemploi, the French social security service for parents and home-based childcare providers, has suffered a data breach that may have exposed personal information of 1.2 million individuals. [...]
#hackernews #news
French agency Pajemploi reports data breach affecting 1.2M people
Pajemploi, the French social security service for parents and home-based childcare providers, has suffered a data breach that may have exposed personal information of 1.2 million individuals. [...]
www.bleepingcomputer.com
November 19, 2025 at 4:58 PM
How a Standardized Logistics Context Protocol (LCP) Can Unlock AI's Full Potential in Supply Chain

Logistics industry stands at an inflection point. Lack of a standardized protocol for logistics providers to communicate is a bottleneck. A protocol similar to Anthropic'…
#anthropic #hackernews #news
How a Standardized Logistics Context Protocol (LCP) Can Unlock AI's Full Potential in Supply Chain
Logistics industry stands at an inflection point. Lack of a standardized protocol for logistics providers to communicate is a bottleneck. A protocol similar to Anthropic's Model Context Protocol (MCP) could become the missing infrastructure layer.
hackernoon.com
November 19, 2025 at 4:48 PM
Why SSOJet Is a Strong Choice for Teams Migrating from AWS Cognito, Auth0, or WorkOS

Why growing SaaS teams migrate from AWS Cognito, Auth0, or WorkOS to SSOJet — a developer-first identity platform with transparent pricing, easy migration, and built-in multi-tenant support.
#hackernews #news
Why SSOJet Is a Strong Choice for Teams Migrating from AWS Cognito, Auth0, or WorkOS
Why growing SaaS teams migrate from AWS Cognito, Auth0, or WorkOS to SSOJet — a developer-first identity platform with transparent pricing, easy migration, and built-in multi-tenant support.
securityboulevard.com
November 19, 2025 at 4:37 PM
Think Like an AI PM

AI Product Management is reshaping how products are built, demanding a new mindset from traditional product leaders. Unlike deterministic software development, AI products thrive on data, experimentation, and probabilistic outcomes, requiring PMs to collab…
#hackernews #ml #news
Think Like an AI PM
AI Product Management is reshaping how products are built, demanding a new mindset from traditional product leaders. Unlike deterministic software development, AI products thrive on data, experimentation, and probabilistic outcomes, requiring PMs to collaborate closely with ML teams, manage stakeholder expectations, and continuously refine models post launch. Success isn’t just shipping features, it’s navigating uncertainty, defining nuanced success metrics, and ensuring ethical, user centric outcomes. This guide unpacks the key differences, skills, and pitfalls to help product leaders thrive in the AI first era.
hackernoon.com
November 19, 2025 at 4:27 PM
Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year

Meta on Tuesday said it has made available a tool called WhatsApp Research Proxy to some of its long-time bug bounty researchers to help improve the program and more effectively resear…
#hackernews #meta #news
Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year
Meta on Tuesday said it has made available a tool called WhatsApp Research Proxy to some of its long-time bug bounty researchers to help improve the program and more effectively research the messaging platform's network protocol. The idea is to make it easier to delve into WhatsApp-specific technologies as the application continues to be a lucrative attack surface for state-sponsored actors and
thehackernews.com
November 19, 2025 at 4:16 PM
Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale

You’ve probably already moved some of your business to the cloud—or you’re planning to. That’s a smart move. It helps you work faster, serve your customers better, and stay ahead.
But as your cloud set…
#hackernews #news
Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale
You’ve probably already moved some of your business to the cloud—or you’re planning to. That’s a smart move. It helps you work faster, serve your customers better, and stay ahead. But as your cloud setup grows, it gets harder to control who can access what. Even one small mistake—like the wrong person getting access—can lead to big problems. We're talking data leaks, legal trouble, and serious
thehackernews.com
November 19, 2025 at 4:06 PM
Researchers Detail Tuoni C2's Role in an Attempted 2025 Real-Estate Cyber Intrusion

Cybersecurity researchers have disclosed details of a cyber attack targeting a major U.S.-based real-estate company that involved the use of a nascent command-and-control (C2) and red teaming fram…
#hackernews #news
Researchers Detail Tuoni C2's Role in an Attempted 2025 Real-Estate Cyber Intrusion
Cybersecurity researchers have disclosed details of a cyber attack targeting a major U.S.-based real-estate company that involved the use of a nascent command-and-control (C2) and red teaming framework known as Tuoni. "The campaign leveraged the emerging Tuoni C2 framework, a relatively new, command-and-control (C2) tool (with a free license) that delivers stealthy, in-memory payloads,"
thehackernews.com
November 19, 2025 at 3:56 PM
Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks

Suspected espionage-driven threat actors from Iran have been observed deploying backdoors like TWOSTROKE and DEEPROOT as part of continued attacks aimed at aerospace, aviation, and defense industr…
#hackernews #news
Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks
Suspected espionage-driven threat actors from Iran have been observed deploying backdoors like TWOSTROKE and DEEPROOT as part of continued attacks aimed at aerospace, aviation, and defense industries in the Middle East. The activity has been attributed by Google-owned Mandiant to a threat cluster tracked as UNC1549 (aka GalaxyGato, Nimbus Manticore, or Subtle Snail), which was first documented
thehackernews.com
November 19, 2025 at 3:45 PM
Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

Identity security fabric (ISF) is a unified architectural framework that brings together disparate identity capabilities. Through ISF, identity governance and administration (…
#hackernews #news
Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities
Identity security fabric (ISF) is a unified architectural framework that brings together disparate identity capabilities. Through ISF, identity governance and administration (IGA), access management (AM), privileged access management (PAM), and identity threat detection and response (ITDR) are all integrated into a single, cohesive control plane. Building on Gartner’s definition of “identity
thehackernews.com
November 19, 2025 at 3:35 PM
Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages

Cybersecurity researchers have discovered a set of seven npm packages published by a single threat actor that leverages a cloaking service called Adspect to differentiate between real victims and secu…
#hackernews #news
Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages
Cybersecurity researchers have discovered a set of seven npm packages published by a single threat actor that leverages a cloaking service called Adspect to differentiate between real victims and security researchers to ultimately redirect them to sketchy crypto-themed sites. The malicious npm packages, published by a threat actor named "dino_reborn" between September and November 2025, are
thehackernews.com
November 19, 2025 at 3:24 PM
Microsoft Mitigates Record 15.72 Tbps DDoS Attack Driven by AISURU Botnet

Microsoft on Monday disclosed that it automatically detected and neutralized a distributed denial-of-service (DDoS) attack targeting a single endpoint in Australia that measured 15.72 terabits pe…
#hackernews #microsoft #news
Microsoft Mitigates Record 15.72 Tbps DDoS Attack Driven by AISURU Botnet
Microsoft on Monday disclosed that it automatically detected and neutralized a distributed denial-of-service (DDoS) attack targeting a single endpoint in Australia that measured 15.72 terabits per second (Tbps) and nearly 3.64 billion packets per second (pps). The tech giant said it was the largest DDoS attack ever observed in the cloud, and that it originated from a TurboMirai-class Internet of
thehackernews.com
November 19, 2025 at 3:14 PM
Fedora vs. Ubuntu: How to choose your next Linux distro (and which one I use)

If you're looking for a new operating system or want to do a bit of distro hopping, you might be considering either Fedora or Ubuntu. Let me help you choose which to try first.
#hackernews #news
Fedora vs. Ubuntu: How to choose your next Linux distro (and which one I use)
If you're looking for a new operating system or want to do a bit of distro hopping, you might be considering either Fedora or Ubuntu. Let me help you choose which to try first.
www.zdnet.com
November 19, 2025 at 3:04 PM
Microsoft's new AI agents create your Word, Excel, and PowerPoint projects now

They can generate documents, spreadsheets, and presentations from simple text prompts. Here's how to make the most of it.
#hackernews #microsoft #news
Microsoft's new AI agents create your Word, Excel, and PowerPoint projects now
They can generate documents, spreadsheets, and presentations from simple text prompts. Here's how to make the most of it.
www.zdnet.com
November 19, 2025 at 2:43 PM
Hyper-realistic synthetic data via agentic AI has arrived. Meet the Fabricate Data Agent.

Tonic.ai has launched the Fabricate Data Agent to enable you to effortlessly generate hyper-realistic synthetic data in a matter of minutes via agentic AI. Chat your way to the domain-specif…
#hackernews #news
Hyper-realistic synthetic data via agentic AI has arrived. Meet the Fabricate Data Agent.
Tonic.ai has launched the Fabricate Data Agent to enable you to effortlessly generate hyper-realistic synthetic data in a matter of minutes via agentic AI. Chat your way to the domain-specific data you need, whether that’s a relational database, JSON, unstructured files like PDFs, and more.
securityboulevard.com
November 19, 2025 at 2:23 PM
Google just rolled out Gemini 3 to Search - here's what it can do and how to try it

Gemini 3 is the most significant change to Search since AI Overviews, but it's not available to everyone yet.
#gemini #hackernews #news
Google just rolled out Gemini 3 to Search - here's what it can do and how to try it
Gemini 3 is the most significant change to Search since AI Overviews, but it's not available to everyone yet.
www.zdnet.com
November 19, 2025 at 2:02 PM
Securing Java Microservices with Zero Trust Architecture

Microservices still rely on outdated “implicit trust” models that make leaked API keys catastrophic. This article explains how Zero Trust—built on identity, mTLS, OPA, and dynamic secrets—redefines secure service-to-service…
#hackernews #news
Securing Java Microservices with Zero Trust Architecture
Microservices still rely on outdated “implicit trust” models that make leaked API keys catastrophic. This article explains how Zero Trust—built on identity, mTLS, OPA, and dynamic secrets—redefines secure service-to-service communication and shows how to implement it in Java and Spring Boot.
hackernoon.com
November 19, 2025 at 1:41 PM
SecurityMetrics Wins “Data Leak Detection Solution of the Year” in 2025 CyberSecurity Breakthrough Awards Program

Orem, United States, 18th November 2025, CyberNewsWire
#hackernews #news
SecurityMetrics Wins “Data Leak Detection Solution of the Year” in 2025 CyberSecurity Breakthrough Awards Program
Orem, United States, 18th November 2025, CyberNewsWire
securityboulevard.com
November 19, 2025 at 1:20 PM
The HackerNoon Newsletter: Heres How You Can Code It Forward and Help Out Your Community (11/18/2025)

The HackerNoon Newsletter for November 18, 2025, presents top tech stories, recalling past events like the Utah monolith and NASA's MAVEN launch. AI research marks progression as…
#hackernews #news
The HackerNoon Newsletter: Heres How You Can Code It Forward and Help Out Your Community (11/18/2025)
The HackerNoon Newsletter for November 18, 2025, presents top tech stories, recalling past events like the Utah monolith and NASA's MAVEN launch. AI research marks progression as researchers are developing AI to spot early signs of cerebral palsy in infants. The newsletter highlights coding's role in community support, sharing guidance for those wanting to contribute. An article explores the AI reality gap, showcasing insights from professionals on AI's current business impact. Updates to the Apache SeaTunnel Flink Engine ensure seamless schema updates for CDC data sources. Google is set to invest $40 billion in Texas for cloud and AI infrastructure development. The newsletter promotes writing as a valuable tool for consolidating knowledge and gaining credibility. It encourages readers to explore interview questions and share the email with tech enthusiasts, promoting community engagement. The HackerNoon Team signs off, inviting readers to the internet.
hackernoon.com
November 19, 2025 at 12:59 PM
SpyCloud Unveils Top 10 Cybersecurity Predictions Poised to Disrupt Identity Security in 2026

Austin, TX/USA, 18th November 2025, CyberNewsWire
#hackernews #news
SpyCloud Unveils Top 10 Cybersecurity Predictions Poised to Disrupt Identity Security in 2026
Austin, TX/USA, 18th November 2025, CyberNewsWire
hackread.com
November 19, 2025 at 12:49 PM