Hacker News

Many African families spend fortunes burying their dead Native Instant Space Switching on macOS How NASA Built Artemis II’s Fault-Tolerant Computer Charcuterie – Visual similarity Unicode explorer PicoZ80 – Drop-In Z80 Replacement Reverse engineering Gemini's SynthID detection Robots Eat Cars Instant 1.0, a backend for AI-coded apps Will I ever own a zettaflop? Moving from WordPress to Jekyll (and static site generators in general) Unfolder for Mac – A 3D model unfolding tool for creating papercraft Hegel, a universal property-based testing protocol and family of PBT libraries Research-Driven Agents: When an agent reads before it codes Old laptops in a colo as low cost servers Top laptops to use with FreeBSD BunnyCDN has been silently losing our production files for 15 months Reallocating $100/Month Claude Code Spend to Zed and OpenRouter Microsoft is employing dark patterns to goad users into paying for storage? Show HN: I built a Cargo-like build tool for C/C++ How the Trivy supply chain attack harvested credentials from secrets managers How Close Is Too Close? Applying Fluid Dynamics Research Methods to PC Cooling Introduction to Nintendo DS Programming EFF is leaving X A WebGPU implementation of Augmented Vertex Block Descent Show HN: Druids – Build your own software factory The Training Example Lie Bracket Wit, unker, Git: The lost medieval pronouns of English intimacy Maine is about to become the first state to ban major new data centers Progressive encoding and decoding of 'repeated' protobuffer fields Help Keep Thunderbird Alive

Bleeping Computer

New ‘LucidRook’ malware used in targeted attacks on NGOs, universities New VENOM phishing attacks steal senior executives' Microsoft logins Healthcare IT solutions provider ChipSoft hit by ransomware attack Google Chrome adds infostealer protection against session cookie theft Smart Slider updates hijacked to push malicious WordPress, Joomla versions When attackers already have the keys, MFA is just another door to open Webinar: From noise to signal - What threat actors are targeting next Eurail says December data breach impacts 300,000 individuals Hackers exploiting Acrobat Reader zero-day flaw since December Hackers steal $3.6 million from crypto ATM giant Bitcoin Depot Microsoft suspends dev accounts for high-profile open source projects Hackers use pixel-large SVG trick to hide credit card stealer Google: New UNC6783 hackers steal corporate Zendesk support tickets New macOS stealer campaign uses Script Editor in ClickFix attack CISA orders feds to patch exploited Ivanti EPMM flaw by Sunday

Ars Technica

Trump-appointed judges refuse to block Trump blacklisting of Anthropic AI tech Police corporal created AI porn from driver's license pics First man convicted under Take It Down Act kept making AI nudes after arrest LinkedIn scanning users' browser extensions sparks controversy and two lawsuits Iran-linked hackers disrupt operations at US critical infrastructure sites How our digital devices are putting our right to privacy at risk To beat Altman in court, Musk offers to give all damages to OpenAI nonprofit Tankers passing through Strait of Hormuz will have to pay cryptocurrency toll Thousands of consumer routers hacked by Russia's military What the heck is wrong with our AI overlords? SCOTUS overturns 5th Circuit ruling that told ISP to kick pirates off Internet Sports bets on prediction markets ruled to be "swaps," exempt from state laws “The problem is Sam Altman”: OpenAI insiders don’t trust CEO Tech companies are trying to neuter Colorado’s landmark right-to-repair law Elon Musk insists banks working on SpaceX IPO must buy Grok subscriptions Trump ignores biggest reasons his AI data center buildout is failing Netflix must refund customers for years of price hikes, Italian court rules Perplexity's "Incognito Mode" is a "sham," lawsuit says SpaceX tries to convince FCC that Amazon put satellites into wrong altitude Amazon is trying to buy Globalstar to compete with SpaceX's Starlink

Slashdot

Hacker Steals 10 Petabytes of Data From China's Tianjin Supercomputer Center EFF Is Leaving X Little Snitch Comes To Linux To Expose What Your Software Is Really Doing Anthropic Loses Appeals Court Bid To Temporarily Block Pentagon Blacklisting John Deere To Pay $99 Million In Monumental Right-To-Repair Settlement CIA Reportedly Used Secret Quantum Tool To Find Downed Airman in Iran Russian Government Hackers Broke Into Thousands of Home Routers To Steal Passwords Supreme Court Wipes Piracy Liability Verdict Against Grande Communications LinkedIn Faces Spying Allegations Over Browser Extension Scanning New Jersey Cannot Regulate Kalshi's Prediction Market, US Appeals Court Rules OpenAI Calls For Robot Taxes, Public Wealth Fund, and 4-Day Workweek To Tackle AI Disruption Germany Doxes 'UNKN,' Head of RU Ransomware Gangs REvil, GandCrab Russia's VPN Crackdown Caused Bank Outages, Telegram Founder Says Crooks Behind $27M in 'Refund' Scams Busted By YouTube Pranksters After Being Lured to Fake Funeral America's CIA Recruited Iran's Nuclear Scientists - By Threatening To Kill Them

Events

The Verge

PSA: Anyone with a link can view your Granola notes by default Claude Code leak exposes a Tamagotchi-style ‘pet’ and an always-on agent Okta’s CEO is betting big on AI agent identity PSA: Hackers can raid iOS 18 with an infected link Iran-linked cyber attack targets US medtech giant Stryker Facebook, WhatsApp, and Messenger get new ways to protect users from scams Anthropic makes last-ditch effort to salvage deal with Pentagon after blowup CISA is getting a new acting director after less than a year

The Cipher Brief

America’s Drone Strategy Has a Supply Chain Problem Drones Are Changing Warfare And America Isn’t Ready How the Iran War Is Reordering the World, Second and Third-Order Effects U.S. Intel’s Sobering Assessment of Iran’s War Resilience Admiral James Stavridis (Ret.) A Wartime Budget Without an Innovation Strategy A Declining Demand for Strategic Intelligence? U.S. and Israeli cases Iran War Scorecard Looks Bad for America’s Strategic Interests While the U.S. Focuses on Iran, Russia and China See Strategic Gain New Presidential Executive Order Targets Transnational Cybercrime

Blogs

Cory Doctorow

Cindy Cohn's "Privacy's Defender" Process knowledge Switzerland's Goldilocks fiber Your boss wants to use surveillance data to cut your wages EU ready to cave to Trump on tech It's extremely good that Claude's source-code leaked Trumpismo vs minilateralism State Dems must stop ICE from stealing the midterms Market participation is exhausting The cost of doing business