🌐米国とイランが暫定停戦で合意
www.theguardian.com/us-news/2026/apr/07/trum...
via #HackerNews
Latest posts tagged with #hackernews on Bluesky
🌐米国とイランが暫定停戦で合意
www.theguardian.com/us-news/2026/apr/07/trum...
via #HackerNews
Russian hackers hijack internet traffic using vulnerable routers
The Russian state cyber group APT28 has been compromising routers to hijack web traffic and spy on victims, the UK’s The National Cyber Security Centre (NCSC) has warned. Attackers are exploiting vulnerable routers …
#hackernews #news
Why I returned to Enlightenment Linux after 30 years: Testing the new Elive beta
This Debian-based distro brings back the old-school desktop environment but shrugs off the boring UI. I just wish I could've tried voice control.
#hackernews #news
GrafanaGhost Vulnerability Allows Data Theft via AI Injection
GrafanaGhost is a critical vulnerability in Grafana’s AI components that uses indirect prompt injection and protocol-relative URL bypasses to exfiltrate data.
#hackernews #news
Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins
An international operation from law enforcement authorities in partnership with private companies has disrupted FrostArmada, an APT28 campaign hijacking local traffic from MikroTik and TP-Link ro…
#hackernews #microsoft #news
The Git Commands I Run Before Reading Any Code
The Git Commands I Run Before Reading Any Code
#HackerNews
piechowski.io/post/git-commands-before...
I tried Google Photos' new AI Enhance tool: How it crops, relights, and fixes your shots - sometimes
Now rolling out to Android users globally, AI Enhance uses generative AI to improve your photos instantly. Here's how to use it, and where it falls short.
#hackernews #news
Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access
A high-severity security vulnerability has been disclosed in Docker Engine that could permit an attacker to bypass authorization plugins (AuthZ) under specific circumstances.
The vulnerability, tracked…
#hackernews #news
Škoda DuoBell: A bicycle bell that penetrates noise-cancelling headphones
Škoda DuoBell: A bicycle bell that penetrates noise-cancelling headphones
#HackerNews
www.skoda-storyboard.com/en/skoda-world/skoda-duo...
The Complete Guide to Passwordless Authentication in 2026: How It Works, Why It Matters, and How to Implement It
Passwords are responsible for 80% of data breaches. Passwordless authentication eliminates the attack surface entirely. Here is the complete technical and business gui…
#hackernews #news
[un]prompted 2026 – Developing & Deploying AI Fingerprints For Advanced Threat Detection
Author, Creator & Presenter: Natalie Isak, Software Engineer, Microsoft & Waris Gill, Applied Scientist, Microsoft
Our thanks to [un]prompted for publishing their Creators, Author…
#hackernews #microsoft #news
Legacy Systems are Undermining Financial Institution Cybersecurity
Legacy systems are increasing cyber risk for financial institutions, exposing banks to attacks, compliance gaps and rising costs.
#hackernews #news
Veracrypt Project Update
#HackerNews
sourceforge.net/p/veracrypt/discussion/g...
How I calibrated my subwoofer placement for peak impact in awkward room setups
Adding a subwoofer to your home theater is exciting, but not every room is a perfect square designed for subwoofers.
#hackernews #news
We moved Railway's frontend off Next.js. Builds went from 10+ mins to under two
We moved Railway's frontend off Next.js. Builds went from 10+ mins to under two
#HackerNews
blog.railway.com/p/moving-railways-fronte...
Why Your Automated Pentesting Tool Just Hit a Wall
Automated pentesting tools deliver strong early results, then quickly plateau. Picus Security explains how the "PoC cliff" leaves major attack surfaces untested and creates a dangerous validation gap. [...]
#hackernews #news
Major outage cripples Russian banking apps and metro payments nationwide
A major outage hit Russian banking apps and payments, blocking card use, cash withdrawals, and mobile access for hours. A widespread outage disrupted banking apps and payment systems across Russia, leaving c…
#hackernews #news
Acronis MDR by TRU brings 24/7 managed detection and response to MSPs
Acronis has announced the launch of Acronis MDR by Acronis TRU, a globally available 24/7/365 managed detection and response (MDR) service. Built specifically for managed service providers (MSPs) of all sizes, …
#hackernews #news
🌐GLM-5.1:長期タスクに向けて
https://z.ai/blog/glm-5.1
via #HackerNews
Fast-moving Storm-1175 uses new exploits to breach networks and drop Medusa
China-based actor Storm-1175 runs fast ransomware attacks, exploiting new flaws to breach systems and quickly deploy Medusa ransomware. China-based actor Storm-1175 carries out fast, financially driven ra…
#hackernews #news
Revision Demoparty 2026: Razor1911 [video]
#HackerNews
https://www.youtube.com/watch?v=Lw4W9V57SKs&t=5716s
Minimus Hyper-Growth Underway with Yael Nardi as New Chief Business Officer
New York, USA, 7th April 2026, CyberNewswire
#hackernews #news
Sonnet 4.6 Elevated Rate of Errors
Sonnet 4.6 Elevated Rate of Errors
#HackerNews
https://status.claude.com/incidents/lhws0phdvzz3
I tested the AirPods Max 2, Sony XM6, and Bose Ultra 2: Why Bose is my top pick
I've worn the latest over-ear headphones from Apple, Sony, and Bose in real-world settings. Here's how they compare.
#apple #hackernews #news
Cloudflare moves up its post-quantum deadline as researchers narrow the path to Q-Day
Cloudflare announced it is targeting 2029 to complete post-quantum security across its entire product suite, including post-quantum authentication. The company is following a revised roadmap tha…
#hackernews #news
Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign
An active campaign has been observed targeting internet-exposed instances running ComfyUI, a popular stable diffusion platform, to enlist them into a cryptocurrency mining and proxy botnet.
"A purpose-b…
#hackernews #news
認証情報に関する問題が繰り返し発生する隠れたコスト
The Hidden Cost of Recurring Credential Incidents #HackerNews (Apr 7)
thehackernews.com/2026/04/the-...
Multi-Tenant SaaS and Single Sign-On (SSO)
Uncover the complexities of multi-tenant SaaS architecture, understand how SSO simplifies access management, and explore how to fortify security in these enviro
#hackernews #news
AI Agents and Non-Human Identities Creating Critical Security Gaps, Report
New research from Keeper Security, reveals non-human identities and automated system-to-system interactions are becoming the top security risk for businesses in 2026.
#hackernews #news
AI-enabled device code phishing campaign exploits OAuth flow for account takeover
A phishing campaign that bypasses the standard 15-minute expiration window through automation and dynamic code generation, leveraging the OAuth Device Code Authentication flow to compromi…
#hackernews #microsoft #news