Trending

#hackernews

Latest posts tagged with #hackernews on Bluesky

Latest Top
Trending

Posts tagged #hackernews

Senior Engineers Know the Hardest Part Isn’t Coding The most expensive code I ever wrote solved the wrong problem perfectly. I’d taken stakeholder requests at face value, translated them into technical requirements, and built exactly what was asked for. The hardest part of engineering isn’t writing code, it's figuring out what to build.

Senior Engineers Know the Hardest Part Isn’t Coding

The most expensive code I ever wrote solved the wrong problem perfectly. I’d taken stakeholder requests at face value, translated them into technical requirements, and built exactly what was asked for. The hardest part of engine…
#hackernews #news

0 0 0 0
The Scoring System That Fixed My Scene Graph Continuity CLIP-only ranking broke scene continuity, so I built a multi-signal reward mixer with group-relative normalization and null-safe scoring.

The Scoring System That Fixed My Scene Graph Continuity

CLIP-only ranking broke scene continuity, so I built a multi-signal reward mixer with group-relative normalization and null-safe scoring.
#hackernews #news

0 0 0 0
I Fixed Voice Latency by Routing Before Reasoning How a regex-first RouterAgent cut voice assistant latency, reduced repeats, and made a multi-agent voice stack feel truly responsive.

I Fixed Voice Latency by Routing Before Reasoning

How a regex-first RouterAgent cut voice assistant latency, reduced repeats, and made a multi-agent voice stack feel truly responsive.
#hackernews #news

0 0 0 0

Why Mathematica does not simplify sinh(arccosh(x))

#HackerNews

https://www.johndcook.com/blog/2026/03/10/sinh-arccosh/

0 0 0 0
D3 Morpheus for Your Microsoft Security Environment You have Sentinel. You have Defender. Here is what fills the autonomous investigation gap between detection and autonomous resolution.

D3 Morpheus for Your Microsoft Security Environment

You have Sentinel. You have Defender. Here is what fills the autonomous investigation gap between detection and autonomous resolution.
#hackernews #microsoft #news

0 0 0 0
Preview
An AI Agent Didn’t Hack McKinsey. Its Exposed APIs Did. The recent McKinsey incident should serve as a wake-up call for enterprises deploying AI, highlighting the importance of considering AI security beyond the model layer. Many organizations are still focused on the model layer, while the real risk lies in the action layer, including APIs, internal services, and shadow integrations that AI agents can access and manipulate. The technical details of the McKinsey incident, including its internal AI platform with a broad API footprint and unauthenticated APIs, demonstrate the potential for enormous exposure. This is not an isolated case, as the McDonald's AI hiring incident also points to the same structural problem of weakly governed APIs and exposed administrative access. The real risk is not the AI model itself, but what the agent can do, including retrieving data, calling APIs, and accessing systems. The AI security market is currently focused on prompts, model behavior, and output controls, but these are only one layer of the problem. The industry framing of AI security is still too narrow, and the attack surface is no longer just the model, but the full connected system around it. The emergence of shadow APIs connected to agents is a particularly dangerous category, as these internal or lightly governed APIs can become part of an external attack surface once connected to AI systems. To address this risk, enterprises need to shift their focus from just the model to the action layer, including APIs, endpoints, and MCP servers, and consider the potential blast radius of AI agents.

An AI Agent Didn’t Hack McKinsey. Its Exposed APIs Did.

The recent McKinsey incident should serve as a wake-up call for enterprises deploying AI, highlighting the importance of considering AI security beyond the model layer. Many organizations are still focused on the model layer…
#hackernews #news

1 0 0 0

A most elegant TCP hole punching algorithm

#HackerNews

robertsdotpm.github.io/cryptography/tcp_hole_pu...

0 0 0 0

🌐Ageless Linux – 年齢不詳の人間のためのソフトウェア
https://agelesslinux.org/
via #HackerNews

0 0 0 0
Microsoft: Windows 11 users can't access C: drive on some Samsung PCs Microsoft is investigating a new issue affecting some Samsung laptops running Windows 11 after installing the February 2026 security updates, in which users lose access to their C:\ drive and are unable to launch applications. [...]

Microsoft: Windows 11 users can't access C: drive on some Samsung PCs

Microsoft is investigating a new issue affecting some Samsung laptops running Windows 11 after installing the February 2026 security updates, in which users lose access to their C:\ drive and are …
#hackernews #microsoft #samsung

0 0 0 0
U.S. CISA adds Google Chrome flaws to its Known Exploited Vulnerabilities catalog U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chrome flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two Google Chrome flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws added to the catalog: This week, Google released security updates to address two high-severity vulnerabilities, […]

U.S. CISA adds Google Chrome flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chrome flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
#hackernews #news

0 0 0 0
Microslop

Microslop

Microslop

#HackerNews

https://www.s-config.com/microslop/

0 0 0 0
How relieved are teams with managed machine identities Are Your Machine Identities Securely Managed? Understanding Non-Human Identities Imagine the complexities involved in managing something that can’t think, act, or even decide on its own. Yet, this is the reality of dealing with Non-Human Identities (NHIs)—machine identities that play a crucial role in cybersecurity. These identities are not just strings of code; they’re pivotal […]

How relieved are teams with managed machine identities

Are Your Machine Identities Securely Managed? Understanding Non-Human Identities Imagine the complexities involved in managing something that can’t think, act, or even decide on its own. Yet, this is the reality of dealing wi…
#hackernews #news

0 0 0 0

Rack-Mount Hydroponics

#HackerNews

https://sa.lj.am/rack-mount-hydroponics/

0 0 0 0
How is Agentic AI innovating financial sector practices Are Non-Human Identities the Key to Securing the Financial Sector? One topic gaining notable traction is the management of Non-Human Identities (NHIs). With financial institutions increasingly migrate to cloud-based operations, securing machine identities becomes pivotal. These NHIs—consisting of encrypted passwords, tokens, or keys that define machine identities—are critical to ensuring secure operations and protecting sensitive […]

How is Agentic AI innovating financial sector practices

Are Non-Human Identities the Key to Securing the Financial Sector? One topic gaining notable traction is the management of Non-Human Identities (NHIs). With financial institutions increasingly migrate to cloud-based operatio…
#hackernews #news

1 0 0 0

SBCL Fibers – Lightweight Cooperative Threads

#HackerNews

https://atgreen.github.io/repl-yell/posts/sbcl-fibers/

0 0 0 0
Are businesses free to choose their AI-driven solutions How Do Non-Human Identities Impact Cloud Security? What role do non-human identities (NHIs) play in strengthening cloud security for your organization? Where businesses increasingly migrate operations to the cloud, ensuring robust security becomes essential. Non-human identities, or NHIs, are pivotal, representing machine identities that interact within your digital. By effectively managing these identities, businesses ensure […]

Are businesses free to choose their AI-driven solutions

How Do Non-Human Identities Impact Cloud Security? What role do non-human identities (NHIs) play in strengthening cloud security for your organization? Where businesses increasingly migrate operations to the cloud, ensuring …
#hackernews #news

1 0 1 0

🌐イーロン・マスク氏、AIコーディングの取り組みが頓挫する中、xAIの創業者をさらに追放
www.ft.com/content/e5fbc6c2-d5a6-4b...
via #HackerNews

0 0 0 0
Preview
IRONSCALES Winter ’26 Release: Preemptive Email Security A few months ago, I wrote about the Phishing Renaissance and how AI hasn't invented new attack types so much as perfected the classics. Credential theft, vendor impersonation, executive fraud. Same playbook, exponentially better execution.

IRONSCALES Winter ’26 Release: Preemptive Email Security

A few months ago, I wrote about the Phishing Renaissance and how AI hasn't invented new attack types so much as perfected the classics. Credential theft, vendor impersonation, executive fraud. Same playbook, exponentially b…
#hackernews #news

0 0 0 0
Friday Squid Blogging: Increased Squid Population in the Falklands Some good news: squid stocks seem to be recovering in the waters off the Falkland Islands. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.

Friday Squid Blogging: Increased Squid Population in the Falklands

Some good news: squid stocks seem to be recovering in the waters off the Falkland Islands.

As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Blog m…
#hackernews #news

0 0 0 0
Mathematics Distillation Challenge – Equational Theories

Mathematics Distillation Challenge – Equational Theories

Mathematics Distillation Challenge – Equational Theories

#HackerNews

terrytao.wordpress.com/2026/03/13/mathematics-d...

0 0 0 0

🌐マッキンゼーのAIプラットフォームをハッキングした方法
codewall.ai/blog/how-we-hacked-mckin...
via #HackerNews

0 0 0 0
FBI seeks victims of Steam games used to spread malware The FBI is asking gamers who installed Steam titles containing malware to provide information as part of an ongoing investigation into eight malicious games uploaded to the gaming platform. [...]

FBI seeks victims of Steam games used to spread malware

The FBI is asking gamers who installed Steam titles containing malware to provide information as part of an ongoing investigation into eight malicious games uploaded to the gaming platform. [...]
#hackernews #news

2 0 0 0
Treasure hunter freed from jail after refusing to turn over shipwreck gold

Treasure hunter freed from jail after refusing to turn over shipwreck gold

Treasure hunter freed from jail after refusing to turn over shipwreck gold

#HackerNews

https://www.bbc.com/news/articles/cg4g7kn99q3o

1 1 0 0
Netflix Premium vs. Netflix Standard: I compared the subscriptions plans to find the best deal Netflix ranges from $8/month to $25/month, but you should know which streaming tier works best for your household.

Netflix Premium vs. Netflix Standard: I compared the subscriptions plans to find the best deal

Netflix ranges from $8/month to $25/month, but you should know which streaming tier works best for your household.
#hackernews #news

0 0 0 0

Tree Search Distillation for Language Models Using PPO

#HackerNews

ayushtambde.com/blog/tree-search-distill...

0 0 0 0
INTERPOL Operation Synergia III Shuts Down 45,000 Malicious IPs, 94 Arrested INTERPOL’s Operation Synergia III led to 94 arrests and the takedown of 45,000 malicious IPs in 72 countries targeting phishing, malware, and fraud networks.

INTERPOL Operation Synergia III Shuts Down 45,000 Malicious IPs, 94 Arrested

INTERPOL’s Operation Synergia III led to 94 arrests and the takedown of 45,000 malicious IPs in 72 countries targeting phishing, malware, and fraud networks.
#hackernews #news

0 0 0 0
From Braun T3 to Apple's iPod

From Braun T3 to Apple's iPod

From Braun T3 to Apple's iPod

#HackerNews

drams.framer.website/journal/from-braun-t3-to...

0 0 0 0

How Kernel Anti-Cheats Work: A Deep Dive into Modern Game Protection

#HackerNews

s4dbrd.github.io/posts/how-kernel-anti-ch...

0 0 0 0
Socks pulled, patches pushed. Europol shut down the SocksEscort proxy service used for malicious activities. Cyber operations reflect an asymmetrical cyber warfare dynamic in Iran's context. Google issued urgent patches to address newly discovered zero-day vulnerabilities in Chrome. Veeam has addressed critical flaws that could lead to remote code execution on backup servers. A former cybersecurity incident responder faces charges related to ALPHV ransomware extortion. Thomson Reuters employees protested an ICE contract related to surveillance tools. Attackers are exploiting backup tools to steal data in various attacks. CISA flagged a critical n8n vulnerability as actively exploited in attacks. Maria Varmazis interviewed Jack R. Bialik about the risks of a fully-digital society and his book. The episode also covered an incident involving a fake photo that promoted a non-existent evacuation flight.

Socks pulled, patches pushed.

Europol shut down the SocksEscort proxy service used for malicious activities. Cyber operations reflect an asymmetrical cyber warfare dynamic in Iran's context. Google issued urgent patches to address newly discovered zero-day vulnerabilities in Chro…
#hackernews #news

0 0 0 0
Federal Surveillance Tech Becomes Mandatory in New Cars by 2027

Federal Surveillance Tech Becomes Mandatory in New Cars by 2027

Federal Surveillance Tech Becomes Mandatory in New Cars by 2027

#HackerNews

www.gadgetreview.com/federal-surveillance-tec...

0 0 0 0