Hacker & Security News
banner
hacker.at.thenote.app
Hacker & Security News
@hacker.at.thenote.app
#hacker and #security news from Hacker News, LifeHacker, Security Boulevard and others.
Our other projects: #macos, #ios and #android apps for notes TheNote.app
Pinned
We launched a Public Feed on Bluesky with #Hacker and #Security #News from sources like Hacker News, LifeHacker, Security Boulevard and others your convenience 🚀 🤗
bsky.app/profile/hack...
Product showcase: PCAPdroid analyzes Android app network activity

PCAPdroid is a free, open-source Android app that allows inspection of network traffic. Installation is straightforward and does not require creating an account. To begin capturing traffic, a VPN request must be ac…
#hackernews #news
Product showcase: PCAPdroid analyzes Android app network activity
PCAPdroid is a free, open-source Android app that allows inspection of network traffic. Installation is straightforward and does not require creating an account. To begin capturing traffic, a VPN request must be accepted, which allows the app to monitor network activity. Once permission is granted, tapping the play button starts PCAPdroid, which then runs in the background until stopped. Viewing connections The Connections tab displays active and past connections. For each entry, it shows which …
www.helpnetsecurity.com
February 12, 2026 at 4:45 AM
Security teams are paying for sprawl in more ways than one

Most enterprises run security programs across sprawling environments that include mobile devices, SaaS applications, cloud infrastructure, and telecom networks. Spend control in these areas often sits outside the security…
#hackernews #news
Security teams are paying for sprawl in more ways than one
Most enterprises run security programs across sprawling environments that include mobile devices, SaaS applications, cloud infrastructure, and telecom networks. Spend control in these areas often sits outside the security organization, even when the operational consequences land directly on security teams. Tangoe’s 2026 Trends & Savings Recommendations Report connects these cost domains to recurring governance failures that create risk exposure across identity, endpoint management, and infrastructure visibility. The report focuses on IT expense management across three …
www.helpnetsecurity.com
February 12, 2026 at 4:26 AM
I tested a 9,000,000mAh battery pack from eBay - here's my buying advice

I often get asked about the cheap power banks on the internet that have bold claims. Well, I bought one, and this is my verdict.
#hackernews #news
I took apart a 9,000,000mAh power bank from eBay to learn the truth - here's what's inside
I often get asked about the cheap power banks on the internet that have bold claims. Well, I bought one, and this is my verdict.
www.zdnet.com
February 12, 2026 at 4:06 AM
Can you trust LastPass in 2026? Inside the multimillion-dollar quest to rebuild its security culture

After a string of high-profile breaches, the password manager's new CEO says security is now at the 'very heart' of what it does.
#hackernews #news
Can you trust LastPass in 2026? Inside the multimillion-dollar quest to rebuild its security culture
After a string of high-profile breaches, the password manager's new CEO says security is now at the 'very heart' of what it does.
www.zdnet.com
February 12, 2026 at 3:45 AM
Microsoft releases Windows 11 26H1 for select and upcoming CPUs

Microsoft has announced Windows 11 26H1, but it's not for existing PCs. Instead, it will ship on devices with Snapdragon X2 processors and possibly other rumored ARM chips.w [...]
#hackernews #microsoft #news
Microsoft releases Windows 11 26H1 for select and upcoming CPUs
Microsoft has announced Windows 11 26H1, but it's not for existing PCs. Instead, it will ship on devices with Snapdragon X2 processors and possibly other rumored ARM chips.w [...]
www.bleepingcomputer.com
February 12, 2026 at 3:24 AM
ISC Stormcast For Wednesday, February 11th, 2026 https://isc.sans.edu/podcastdetail/9804, (Wed, Feb 11th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
#hackernews #news
ISC Stormcast For Wednesday, February 11th, 2026 https://isc.sans.edu/podcastdetail/9804, (Wed, Feb 11th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
isc.sans.edu
February 12, 2026 at 3:04 AM
These Windows 11 PCs are getting a free Bluetooth upgrade - here's how to use it properly

Both your laptop and hearing device must be compatible with Bluetooth LE Audio to use the latest connectivity feature.
#hackernews #news
These Windows 11 PCs are getting a free Bluetooth upgrade - here's how to use it properly
Both your laptop and hearing device must be compatible with Bluetooth LE Audio to use the latest connectivity feature.
www.zdnet.com
February 12, 2026 at 2:43 AM
New Linux botnet SSHStalker uses old-school IRC for C2 comms

A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations. [...]
#hackernews #news
New Linux botnet SSHStalker uses old-school IRC for C2 comms
A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations. [...]
www.bleepingcomputer.com
February 12, 2026 at 2:23 AM
Microsoft Patch Tuesday security updates for February 2026 fix six actively exploited zero-days

Microsoft Patch Tuesday security updates for February 2026 fix six actively exploited zero-day vulnerabilities. Microsoft Patch Tuesday security updates for February 2026 fi…
#hackernews #microsoft #news
Microsoft Patch Tuesday security updates for February 2026 fix six actively exploited zero-days
Microsoft Patch Tuesday security updates for February 2026 fix six actively exploited zero-day vulnerabilities. Microsoft Patch Tuesday security updates for February 2026 fix 58 new security flaws across Windows, Office, Azure, Edge, Exchange, Hyper-V, WSL, and other components, rising to 62 CVEs when third-party updates are included. Five vulnerabilities are Critical, two Moderate, and most […]
securityaffairs.com
February 12, 2026 at 2:02 AM
This AI Tool Turns 400 Informal Names Into Accurate OMOP Code

In the HELIOS Singapore study, Llettuce mapped 400 informal medication names to OMOP standard concepts. Combining vector search and a local LLM, it outperformed traditional string-matching tools like Usagi and ran…
#hackernews #llm #news
This AI Tool Turns 400 Informal Names Into Accurate OMOP Code
In the HELIOS Singapore study, Llettuce mapped 400 informal medication names to OMOP standard concepts. Combining vector search and a local LLM, it outperformed traditional string-matching tools like Usagi and ran locally on consumer hardware, preserving patient confidentiality. Llettuce shows that AI can streamline healthcare data standardization while maintaining GDPR compliance.
hackernoon.com
February 12, 2026 at 1:41 AM
Llettuce: The AI Tool Mapping Messy Medical Records to Standard Code

Llettuce uses AI to automate mapping informal medical terms to OMOP standard concepts. Its architecture combines a local LLM, vector-based semantic search, and database queries. Users can interact via GUI o…
#hackernews #llm #news
Llettuce: The AI Tool Mapping Messy Medical Records to Standard Code
Llettuce uses AI to automate mapping informal medical terms to OMOP standard concepts. Its architecture combines a local LLM, vector-based semantic search, and database queries. Users can interact via GUI or API, uploading terms or files, while results are displayed clearly. Llettuce ensures accurate, GDPR-compliant healthcare data conversion without requiring cloud services.
hackernoon.com
February 12, 2026 at 1:21 AM
North Korean hackers use new macOS malware in crypto-theft attacks

North Korean hackers are running tailored campaigns using AI-generated video and the ClickFix technique to deliver malware for macOS and Windows to targets in the cryptocurrency sector. [...]
#hackernews #news
North Korean hackers use new macOS malware in crypto-theft attacks
North Korean hackers are running tailored campaigns using AI-generated video and the ClickFix technique to deliver malware for macOS and Windows to targets in the cryptocurrency sector. [...]
www.bleepingcomputer.com
February 12, 2026 at 1:00 AM
Survey Sees Little Post-Quantum Computing Encryption Progress

A global survey of 4,149 IT and security practitioners finds that while three-quarters (75%) expect a quantum computer will be capable of breaking traditional public key encryption within five years, only 38% at this p…
#hackernews #news
Survey Sees Little Post-Quantum Computing Encryption Progress
A global survey of 4,149 IT and security practitioners finds that while three-quarters (75%) expect a quantum computer will be capable of breaking traditional public key encryption within five years, only 38% at this point in time are preparing to adopt post-quantum cryptography. Conducted by the Ponemon Institute on behalf of Entrust, a provider of..
securityboulevard.com
February 12, 2026 at 12:40 AM
Microsoft's Valentine's gift to admins: 6 exploited zero-day fixes

Roses are red, violets are blue ... now get patching
What better way to say I love you than with an update? Attackers exploited a whopping six Microsoft bugs as zero-days prior to Redmond releasing sof…
#hackernews #microsoft #news
Microsoft's Valentine's gift to admins: 6 exploited zero-day fixes
Roses are red, violets are blue ... now get patching What better way to say I love you than with an update? Attackers exploited a whopping six Microsoft bugs as zero-days prior to Redmond releasing software fixes on February's Patch Tuesday.…
go.theregister.com
February 12, 2026 at 12:19 AM
How This Open-Source AI Simplifies Mapping Healthcare Data

Mapping medical terms to OMOP standard concepts is complex, often requiring time-consuming manual review. Llettuce, an open-source AI tool, automates this process using large language models, fuzzy matching, and database …
#hackernews #news
How This Open-Source AI Simplifies Mapping Healthcare Data
Mapping medical terms to OMOP standard concepts is complex, often requiring time-consuming manual review. Llettuce, an open-source AI tool, automates this process using large language models, fuzzy matching, and database queries. Running locally, it preserves GDPR compliance while delivering high accuracy in converting informal patient-reported terms into standardized medical concepts.
hackernoon.com
February 11, 2026 at 11:59 PM
How Often Does the Agent Misinterpret the User’s Intent — and Is It Correctable?

The User Trust Probe is a way to measure the accuracy of AI. It asks: Does the agent’s interpretation match the user's meaning? And if not, is that interpretation correctable?
#hackernews #news
How Often Does the Agent Misinterpret the User’s Intent — and Is It Correctable?
The User Trust Probe is a way to measure the accuracy of AI. It asks: Does the agent’s interpretation match the user's meaning? And if not, is that interpretation correctable?
hackernoon.com
February 11, 2026 at 11:38 PM
How to Bridge the Gap Between Specs and Agents: MLOps Coding Skills

The beauty of an Agent Skill lies in its simplicity. It is essentially a markdown file (SKILL.md) that functions as a context injection module. It gives the agent “muscle memory” for a specific  topic.
#hackernews #ml #news
How to Bridge the Gap Between Specs and Agents: MLOps Coding Skills
The beauty of an Agent Skill lies in its simplicity. It is essentially a markdown file (SKILL.md) that functions as a context injection module. It gives the agent “muscle memory” for a specific  topic.
hackernoon.com
February 11, 2026 at 11:18 PM
Ethereum’s Sticky Dominance: Why DeFi Still Runs on Vitalik’s Tracks

Ethereum has emerged as DeFi’s dominant settlement layer by prioritizing modular scaling, composability, and battle-tested security, quietly absorbing rivals as hype cycles fade.
#hackernews #news
Ethereum’s Sticky Dominance: Why DeFi Still Runs on Vitalik’s Tracks
Ethereum has emerged as DeFi’s dominant settlement layer by prioritizing modular scaling, composability, and battle-tested security, quietly absorbing rivals as hype cycles fade.
hackernoon.com
February 11, 2026 at 10:57 PM
AI Model Forensics: The Source of Suspicious Text-to-Image AI

AI models can misuse generated images to train new models without permission. This research introduces a method to trace a suspicious model’s training data to its source using inherent memorization patterns. The approa…
#hackernews #news
AI Model Forensics: The Source of Suspicious Text-to-Image AI
AI models can misuse generated images to train new models without permission. This research introduces a method to trace a suspicious model’s training data to its source using inherent memorization patterns. The approach achieves over 80% instance-level accuracy and 85% statistical-level accuracy, reliably identifying infringing models without altering the original AI or its outputs.
hackernoon.com
February 11, 2026 at 10:47 PM
How to Spot Unauthorized Use of AI-Generated Images Without Changing the Model

Text-to-image models are often misused when attackers train new models on outputs from commercial models. This paper introduces an injection-free method to identify whether a suspicious model’s trainin…
#hackernews #news
How to Spot Unauthorized Use of AI-Generated Images Without Changing the Model
Text-to-image models are often misused when attackers train new models on outputs from commercial models. This paper introduces an injection-free method to identify whether a suspicious model’s training data comes from a source model. Leveraging inherent memorization patterns, the approach achieves over 80% instance-level accuracy and 85% statistical-level accuracy without altering the source model.
hackernoon.com
February 11, 2026 at 10:37 PM
A spyware swiss army knife.

The CyberWire podcast discusses various cybersecurity threats and developments. ZeroDayRAT, a new spyware kit, can fully compromise both Android and iOS devices. The UK government is urging infrastructure operators to be proactive against severe c…
#hackernews #llm #news
A spyware swiss army knife.
The CyberWire podcast discusses various cybersecurity threats and developments. ZeroDayRAT, a new spyware kit, can fully compromise both Android and iOS devices. The UK government is urging infrastructure operators to be proactive against severe cyberattacks. Russia is restricting access to Telegram. The FTC is emphasizing data privacy by addressing data sales to foreign adversaries. Researchers are analyzing DeadVax, a stealthy malware campaign, and a resurfaced old-school Linux botnet. BeyondTrust has patched a critical remote code execution vulnerability. The rapid development of AI is raising concerns about potential safety risks, with some researchers demonstrating how to bypass safety mechanisms. The guest is Omer Akgul, discussing LLM consistency metrics for cybersecurity. A county paid a significant sum to pentesters for assessing courthouse security.
www.thecyberwire.com
February 11, 2026 at 10:26 PM
Researchers Can Now Identify If Your AI Stole Its Training Data

Text-to-image models are often misused when attackers train new models on outputs from commercial models. This paper introduces an injection-free method to identify whether a suspicious model’s training data comes fr…
#hackernews #news
Researchers Can Now Identify If Your AI Stole Its Training Data
Text-to-image models are often misused when attackers train new models on outputs from commercial models. This paper introduces an injection-free method to identify whether a suspicious model’s training data comes from a source model. Leveraging inherent memorization patterns, the approach achieves over 80% instance-level accuracy and 85% statistical-level accuracy without altering the source model.
hackernoon.com
February 11, 2026 at 10:16 PM
Ravasend Earns a 49 Proof of Usefulness Score by Building Instant Crypto-to-Fiat Settlement for Emerging Markets

Ravasend is a crypto-to-bank off-ramp built for emerging markets, focused on delivering predictable, minutes-level settlement for time-critical real-world payments.
#hackernews #news
Ravasend Earns a 49 Proof of Usefulness Score by Building Instant Crypto-to-Fiat Settlement for Emerging Markets
Ravasend is a crypto-to-bank off-ramp built for emerging markets, focused on delivering predictable, minutes-level settlement for time-critical real-world payments.
hackernoon.com
February 11, 2026 at 10:06 PM
Best Tools for Test Data Management to Accelerate QA Teams in 2026

Test Data Management tools for 2026 ranked for QA and DevOps teams, comparing speed, self service, masking, CI/CD fit, and enterprise readiness.
#hackernews #news
Best Tools for Test Data Management to Accelerate QA Teams in 2026
Test Data Management tools for 2026 ranked for QA and DevOps teams, comparing speed, self service, masking, CI/CD fit, and enterprise readiness.
hackread.com
February 11, 2026 at 9:56 PM
When Compute Stops Being Infrastructure and Starts Behaving Like a Market

AI has quietly changed compute from stable infrastructure into a market with volatility, pricing signals, and performance variance. Identical GPUs no longer behave the same, token pricing introduces financi…
#hackernews #news
When Compute Stops Being Infrastructure and Starts Behaving Like a Market
AI has quietly changed compute from stable infrastructure into a market with volatility, pricing signals, and performance variance. Identical GPUs no longer behave the same, token pricing introduces financial risk, and cost, capacity, and performance are tightly linked. Teams that rely on static planning tools are flying blind. The winners treat compute as something to actively navigate—not just provision.
hackernoon.com
February 11, 2026 at 9:46 PM