Our other projects: #macos, #ios and #android apps for notes TheNote.app
bsky.app/profile/hack...
PCAPdroid is a free, open-source Android app that allows inspection of network traffic. Installation is straightforward and does not require creating an account. To begin capturing traffic, a VPN request must be ac…
#hackernews #news
PCAPdroid is a free, open-source Android app that allows inspection of network traffic. Installation is straightforward and does not require creating an account. To begin capturing traffic, a VPN request must be ac…
#hackernews #news
Most enterprises run security programs across sprawling environments that include mobile devices, SaaS applications, cloud infrastructure, and telecom networks. Spend control in these areas often sits outside the security…
#hackernews #news
Most enterprises run security programs across sprawling environments that include mobile devices, SaaS applications, cloud infrastructure, and telecom networks. Spend control in these areas often sits outside the security…
#hackernews #news
I often get asked about the cheap power banks on the internet that have bold claims. Well, I bought one, and this is my verdict.
#hackernews #news
I often get asked about the cheap power banks on the internet that have bold claims. Well, I bought one, and this is my verdict.
#hackernews #news
After a string of high-profile breaches, the password manager's new CEO says security is now at the 'very heart' of what it does.
#hackernews #news
After a string of high-profile breaches, the password manager's new CEO says security is now at the 'very heart' of what it does.
#hackernews #news
Microsoft has announced Windows 11 26H1, but it's not for existing PCs. Instead, it will ship on devices with Snapdragon X2 processors and possibly other rumored ARM chips.w [...]
#hackernews #microsoft #news
Microsoft has announced Windows 11 26H1, but it's not for existing PCs. Instead, it will ship on devices with Snapdragon X2 processors and possibly other rumored ARM chips.w [...]
#hackernews #microsoft #news
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
#hackernews #news
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
#hackernews #news
Both your laptop and hearing device must be compatible with Bluetooth LE Audio to use the latest connectivity feature.
#hackernews #news
Both your laptop and hearing device must be compatible with Bluetooth LE Audio to use the latest connectivity feature.
#hackernews #news
A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations. [...]
#hackernews #news
A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations. [...]
#hackernews #news
Microsoft Patch Tuesday security updates for February 2026 fix six actively exploited zero-day vulnerabilities. Microsoft Patch Tuesday security updates for February 2026 fi…
#hackernews #microsoft #news
Microsoft Patch Tuesday security updates for February 2026 fix six actively exploited zero-day vulnerabilities. Microsoft Patch Tuesday security updates for February 2026 fi…
#hackernews #microsoft #news
In the HELIOS Singapore study, Llettuce mapped 400 informal medication names to OMOP standard concepts. Combining vector search and a local LLM, it outperformed traditional string-matching tools like Usagi and ran…
#hackernews #llm #news
In the HELIOS Singapore study, Llettuce mapped 400 informal medication names to OMOP standard concepts. Combining vector search and a local LLM, it outperformed traditional string-matching tools like Usagi and ran…
#hackernews #llm #news
Llettuce uses AI to automate mapping informal medical terms to OMOP standard concepts. Its architecture combines a local LLM, vector-based semantic search, and database queries. Users can interact via GUI o…
#hackernews #llm #news
Llettuce uses AI to automate mapping informal medical terms to OMOP standard concepts. Its architecture combines a local LLM, vector-based semantic search, and database queries. Users can interact via GUI o…
#hackernews #llm #news
North Korean hackers are running tailored campaigns using AI-generated video and the ClickFix technique to deliver malware for macOS and Windows to targets in the cryptocurrency sector. [...]
#hackernews #news
North Korean hackers are running tailored campaigns using AI-generated video and the ClickFix technique to deliver malware for macOS and Windows to targets in the cryptocurrency sector. [...]
#hackernews #news
A global survey of 4,149 IT and security practitioners finds that while three-quarters (75%) expect a quantum computer will be capable of breaking traditional public key encryption within five years, only 38% at this p…
#hackernews #news
A global survey of 4,149 IT and security practitioners finds that while three-quarters (75%) expect a quantum computer will be capable of breaking traditional public key encryption within five years, only 38% at this p…
#hackernews #news
Roses are red, violets are blue ... now get patching
What better way to say I love you than with an update? Attackers exploited a whopping six Microsoft bugs as zero-days prior to Redmond releasing sof…
#hackernews #microsoft #news
Roses are red, violets are blue ... now get patching
What better way to say I love you than with an update? Attackers exploited a whopping six Microsoft bugs as zero-days prior to Redmond releasing sof…
#hackernews #microsoft #news
Mapping medical terms to OMOP standard concepts is complex, often requiring time-consuming manual review. Llettuce, an open-source AI tool, automates this process using large language models, fuzzy matching, and database …
#hackernews #news
Mapping medical terms to OMOP standard concepts is complex, often requiring time-consuming manual review. Llettuce, an open-source AI tool, automates this process using large language models, fuzzy matching, and database …
#hackernews #news
The User Trust Probe is a way to measure the accuracy of AI. It asks: Does the agent’s interpretation match the user's meaning? And if not, is that interpretation correctable?
#hackernews #news
The User Trust Probe is a way to measure the accuracy of AI. It asks: Does the agent’s interpretation match the user's meaning? And if not, is that interpretation correctable?
#hackernews #news
The beauty of an Agent Skill lies in its simplicity. It is essentially a markdown file (SKILL.md) that functions as a context injection module. It gives the agent “muscle memory” for a specific topic.
#hackernews #ml #news
The beauty of an Agent Skill lies in its simplicity. It is essentially a markdown file (SKILL.md) that functions as a context injection module. It gives the agent “muscle memory” for a specific topic.
#hackernews #ml #news
Ethereum has emerged as DeFi’s dominant settlement layer by prioritizing modular scaling, composability, and battle-tested security, quietly absorbing rivals as hype cycles fade.
#hackernews #news
Ethereum has emerged as DeFi’s dominant settlement layer by prioritizing modular scaling, composability, and battle-tested security, quietly absorbing rivals as hype cycles fade.
#hackernews #news
AI models can misuse generated images to train new models without permission. This research introduces a method to trace a suspicious model’s training data to its source using inherent memorization patterns. The approa…
#hackernews #news
AI models can misuse generated images to train new models without permission. This research introduces a method to trace a suspicious model’s training data to its source using inherent memorization patterns. The approa…
#hackernews #news
Text-to-image models are often misused when attackers train new models on outputs from commercial models. This paper introduces an injection-free method to identify whether a suspicious model’s trainin…
#hackernews #news
Text-to-image models are often misused when attackers train new models on outputs from commercial models. This paper introduces an injection-free method to identify whether a suspicious model’s trainin…
#hackernews #news
The CyberWire podcast discusses various cybersecurity threats and developments. ZeroDayRAT, a new spyware kit, can fully compromise both Android and iOS devices. The UK government is urging infrastructure operators to be proactive against severe c…
#hackernews #llm #news
The CyberWire podcast discusses various cybersecurity threats and developments. ZeroDayRAT, a new spyware kit, can fully compromise both Android and iOS devices. The UK government is urging infrastructure operators to be proactive against severe c…
#hackernews #llm #news
Text-to-image models are often misused when attackers train new models on outputs from commercial models. This paper introduces an injection-free method to identify whether a suspicious model’s training data comes fr…
#hackernews #news
Text-to-image models are often misused when attackers train new models on outputs from commercial models. This paper introduces an injection-free method to identify whether a suspicious model’s training data comes fr…
#hackernews #news
Ravasend is a crypto-to-bank off-ramp built for emerging markets, focused on delivering predictable, minutes-level settlement for time-critical real-world payments.
#hackernews #news
Ravasend is a crypto-to-bank off-ramp built for emerging markets, focused on delivering predictable, minutes-level settlement for time-critical real-world payments.
#hackernews #news
Test Data Management tools for 2026 ranked for QA and DevOps teams, comparing speed, self service, masking, CI/CD fit, and enterprise readiness.
#hackernews #news
Test Data Management tools for 2026 ranked for QA and DevOps teams, comparing speed, self service, masking, CI/CD fit, and enterprise readiness.
#hackernews #news
AI has quietly changed compute from stable infrastructure into a market with volatility, pricing signals, and performance variance. Identical GPUs no longer behave the same, token pricing introduces financi…
#hackernews #news
AI has quietly changed compute from stable infrastructure into a market with volatility, pricing signals, and performance variance. Identical GPUs no longer behave the same, token pricing introduces financi…
#hackernews #news