Advertisement · 728 × 90
#
Hashtag
#hackerNews
Advertisement · 728 × 90
Cybersecurity Leaders to Watch in California’s Artificial Intelligence Industry California’s artificial intelligence industry includes security leaders working across frontier model development, enterprise AI platforms, data infrastructure, observability, and AI-native software products. The executives in this feature bring experience from high-growth startups, major technology companies, cloud-native environments, offensive security, incident response, compliance, and product security. Their backgrounds reflect how AI security leadership now spans not […]

Cybersecurity Leaders to Watch in California’s Artificial Intelligence Industry

California’s artificial intelligence industry includes security leaders working across frontier model development, enterprise AI platforms, data infrastructure, observability, and AI-native software p…
#hackernews #news

0 0 0 0
Book Review: There Is No Antimemetics Division

Book Review: There Is No Antimemetics Division

Book Review: There Is No Antimemetics Division

#HackerNews

https://www.stephendiehl.com/posts/no_antimimetics/

0 0 0 0
The Team Behind a Pro-Iran, Lego-Themed Viral-Video Campaign

The Team Behind a Pro-Iran, Lego-Themed Viral-Video Campaign

The Team Behind a Pro-Iran, Lego-Themed Viral-Video Campaign

#HackerNews

www.newyorker.com/culture/infinite-scroll/...

0 0 0 0

I Won't Download Your App. The Web Version Is A-OK

#HackerNews

https://www.0xsid.com/blog/wont-download-your-app

0 0 0 0
Researchers didn’t want to glamorize cybercrims. So they roasted them True-crime tales of criminals making fools of themselves interview  Cybercrime crews have become almost mystical entities, with security vendors assigning them names like Wizard Spider and Velvet Tempest.…

Researchers didn’t want to glamorize cybercrims. So they roasted them

True-crime tales of criminals making fools of themselves
interview  Cybercrime crews have become almost mystical entities, with security vendors assigning them names like Wizard Spider and Velvet Tempest.…
#hackernews #news

0 0 0 0
Germany Doxes "UNKN," Head of RU Ransomware Gangs REvil, GandCrab

Germany Doxes "UNKN," Head of RU Ransomware Gangs REvil, GandCrab

Germany Doxes "UNKN," Head of RU Ransomware Gangs REvil, GandCrab

#HackerNews

krebsonsecurity.com/2026/04/germany-doxes-un...

0 0 0 0
Godot's Web Performance Boost: Things to Know The Web platform is often overlooked as a viable target, because of its less-than-ideal environment and its perceived poor performance.

Godot's Web Performance Boost: Things to Know

The Web platform is often overlooked as a viable target, because of its less-than-ideal environment and its perceived poor performance.
#hackernews #news

0 0 0 0
Post-Quantum Cryptography: Moving From Awareness to Execution Google recently released important research that moves Q-Day — the day quantum computers will be able to “break the Internet” — up to 2029. How should enterprises secure their systems?

Post-Quantum Cryptography: Moving From Awareness to Execution

Google recently released important research that moves Q-Day — the day quantum computers will be able to “break the Internet” — up to 2029. How should enterprises secure their systems?
#hackernews #news

0 0 0 0
Preview
Image or Malware? Read until the end and answer in comments :) A malicious email delivered a .cmd malware that escalates privileges, bypasses antivirus, downloads payloads, sets persistence, and self-deletes. I received this email from a friend to make an analysis. First, let me express my thanks to Janô Falkowski Burkard for this amazing contribution. A little context, He received an email that was really strange and […]

Image or Malware? Read until the end and answer in comments :)

A malicious email delivered a .cmd malware that escalates privileges, bypasses antivirus, downloads payloads, sets persistence, and self-deletes. I received this email from a friend to make an analysis. First, let me …
#hackernews #news

0 0 0 0
Sam Altman May Control Our Future – Can He Be Trusted?

Sam Altman May Control Our Future – Can He Be Trusted?

Sam Altman May Control Our Future – Can He Be Trusted?

#HackerNews

www.newyorker.com/magazine/2026/04/13/sam-...

0 0 0 0
What Being Ripped Off Taught Me

What Being Ripped Off Taught Me

What Being Ripped Off Taught Me

#HackerNews

belief.horse/notes/what-being-ripped-...

0 0 0 0
Security Affairs newsletter Round 571 by Pierluigi Paganini – INTERNATIONAL EDITION A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Qilin ransomware group claims the hack of German political party Die Linke U.S. CISA adds a […]

Security Affairs newsletter Round 571 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly Security…
#hackernews #news

0 0 0 0
The Hidden Auditory Knowledge Inside Language Models Text-only LLMs may already know enough about sound to predict downstream audio model performance before an encoder is ever attached.

The Hidden Auditory Knowledge Inside Language Models

Text-only LLMs may already know enough about sound to predict downstream audio model performance before an encoder is ever attached.
#hackernews #llm #news

1 0 0 0
Week in review: Axios npm supply chain compromise, critical FortiClient EMS bugs exploited Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Financial groups lay out a plan to fight AI identity attacks Generative AI tools have brought the cost of deepfake production low enough that criminals and state-sponsored actors now use them routinely against financial institutions. A joint paper from the American Bankers Association, the Better Identity Coalition, and the Financial Services Sector Coordinating Council lays out the scale of the …

Week in review: Axios npm supply chain compromise, critical FortiClient EMS bugs exploited

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Financial groups lay out a plan to fight AI identity attacks Generative AI tools have broug…
#hackernews #news

0 0 0 0

🌐マイクロソフトはペッツォルド以来、一貫したGUI戦略を持っていない。
www.jsnover.com/blog/2026/03/13/microsof...
via #HackerNews

0 0 0 0

🌐DelveはY Combinatorから除外されました
https://www.ycombinator.com/companies/delve
via #HackerNews

0 0 0 0
Is Germany's gold safe in New York ?

Is Germany's gold safe in New York ?

Is Germany's gold safe in New York ?

#HackerNews

www.dw.com/en/is-germanys-gold-safe...

0 0 0 0
Why DDoS Mitigation Fails: 5 Gaps That Testing Reveals Companies invest heavily in DDoS mitigation, yet outages still happen—often at the worst possible moment. The problem is rarely the protection technology, but the unseen gaps between deployment and a real attack, where misconfigurations, false assumptions, and untested scenarios quietly accumulate.  Red Button simulation data shows that 68% of identified faults are severe or critical, […]

Why DDoS Mitigation Fails: 5 Gaps That Testing Reveals

Companies invest heavily in DDoS mitigation, yet outages still happen—often at the worst possible moment. The problem is rarely the protection technology, but the unseen gaps between deployment and a real attack, where miscon…
#hackernews #news

0 0 0 0

🌐Show HN: 言語モデルの仕組みを分かりやすく説明するために、小さな大規模言語モデルを構築しました。
https://github.com/arman-bd/guppylm
via #HackerNews

0 0 0 0

Age Verification as Mass Surveillance Infrastructure

#HackerNews

https://tboteproject.com/surveillancefindings/

0 0 0 0
Why EHR Data Doesn't Fit Neat ML Tables Hospital data is sparse, irregular, and time-sensitive. Here's why standard machine learning struggles and event stream models work better.

Why EHR Data Doesn't Fit Neat ML Tables

Hospital data is sparse, irregular, and time-sensitive. Here's why standard machine learning struggles and event stream models work better.
#hackernews #ml #news

0 0 0 0

🌐スイスには25Gbpsのインターネットがあるのに、アメリカにはない理由
https://sschueller.github.io/posts/the-free-market-lie/
via #HackerNews

0 0 0 0
The Hidden Audio Bias Inside Audio-Visual Speech Recognition Shapley analysis reveals why AVSR models keep trusting corrupted audio, exposing a hidden bias in multimodal speech recognition.

The Hidden Audio Bias Inside Audio-Visual Speech Recognition

Shapley analysis reveals why AVSR models keep trusting corrupted audio, exposing a hidden bias in multimodal speech recognition.
#hackernews #news

0 0 0 0
Preview
Anjali Hansen: Cross team collaboration works best. [Privacy Counsel] [Career Notes] Please enjoy this encore of Career Notes. Anjali Hansen, a Senior Privacy Counselor from Noname Security shares her story as she climbed through the ranks to get to where she is today. When Anjali started, she wanted to do international law. She started working for the International Trade Commission after law school, where she was able to gain most of her experience and real world abilities. Working with online fraud and abuse, she shares, concerned her, because it felt like governments could not protect organizations from threats occurring, which is how she got interested in cybercrime. From there, she moved to Noname Security, and in working there, she found that she is working with every group in the organization, creating a cross team collaboration, saying how much she admires that type of model. She says "We have to help other departments protect the data because the data's throughout an organization, it's in HR, it's in sales and marketing, it's in IT, it's in finance. So you have to be able to work with all these teams." We thank Anjali for sharing her story.

Anjali Hansen: Cross team collaboration works best. [Privacy Counsel] [Career Notes]

Please enjoy this encore of Career Notes.
Anjali Hansen, a Senior Privacy Counselor from Noname Security shares her story as she climbed through the ranks to get to where she is today. When Anja…
#hackernews #news

0 0 0 0
Euro-Office – Your sovereign office

Euro-Office – Your sovereign office

Euro-Office – Your sovereign office

#HackerNews

https://github.com/Euro-Office

0 0 0 0
Matrix-Game-3.0 Brings Real-Time 720p Interactive Video to Open Source Matrix-Game-3.0 is Skywork’s open-source world model for real-time 720p interactive video generation at 40 FPS with strong temporal consistency.

Matrix-Game-3.0 Brings Real-Time 720p Interactive Video to Open Source

Matrix-Game-3.0 is Skywork’s open-source world model for real-time 720p interactive video generation at 40 FPS with strong temporal consistency.
#hackernews #news

0 0 0 0

France pulls last gold held in US for $15B gain

#HackerNews

www.mining.com/france-pulls-last-gold-h...

0 0 0 0
Preview
The TechBeat: What If Your Perfect Partner Isn’t in Your Country? Inside Dating.com’s 2026 Emotional Intelligence (4/5/2026) The Techbeat by HackerNoon presents a compilation of trending tech stories. One article explores stress testing IIoT databases using PostgreSQL for identifying bottlenecks. Another discusses emotionally intelligent countries for successful international dating in 2026. Readers can find a guide to implementing CPS 234 for cyber resilience. The text delves into why traditional supply and demand models fail with digital money. It also explains the concept of agentic testing and why it's important. The articles discuss the limitations of AI code review and how to prevent production failures. There's a warning about the M5 Pro chip in the 14-inch MacBook Pro. Recommendations for the best medical alert systems of 2026 are included. The compilation offers tactics for shipping software faster without sacrificing quality. Furthermore, the selection includes a guide on building a low-latency voice agent.

The TechBeat: What If Your Perfect Partner Isn’t in Your Country? Inside Dating.com’s 2026 Emotional Intelligence (4/5/2026)

The Techbeat by HackerNoon presents a compilation of trending tech stories. One article explores stress testing IIoT databases using PostgreSQL for identif…
#hackernews #news

0 0 0 0
Signals, the push-pull based algorithm

Signals, the push-pull based algorithm

Signals, the push-pull based algorithm

#HackerNews

willybrauner.com/journal/signal-the-push-...

0 0 0 0
Preview
36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different payloads to facilitate Redis and PostgreSQL exploitation, deploy reverse shells, harvest credentials, and drop a persistent implant. "Every package contains three files (package.json, index.js, postinstall.js), has no description, repository,

36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants

Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different payloads to facilitate Redis and PostgreSQL exp…
#hackernews #news

0 0 0 0