Show HN: Hackerbrief – Top posts on Hacker News summarized daily
Article URL: https://hackerbrief.vercel.app/ Comments URL: https://news.ycombinator.com/item?id=47398441 Points: 42 # Comments: 27
Article URL: https://hackerbrief.vercel.app/ Comments URL: https://news.ycombinator.com/item?id=47398441 Points: 42 # Comments: 27
Article URL: https://www.timesofisrael.com/gamblers-trying-to-win-a-bet-on-polymarket-are-vowing-to-kill-me-if-i-dont-rewrite-an-iran-missile-story/ C...
Why IAM Alone Is No Longer Sufficient for Cloud Security Organizations now process and move data differently because of modern, cloud-native platforms...

If you run security at any reasonably complex organization, your validation stack probably looks something like this: a BAS tool in one corner. A pent...

Article URL: https://www.thenerve.news/p/palantir-technologies-uk-mod-sources-government-data-insights-security-state-secrets Comments URL: https://ne...

Three different ClickFix campaigns have been found to act as a delivery vector for the deployment of a macOS information stealer called MacSync. "Unli...

On the magical day that is Mardi Gras day, I performed the sacred ritual of giving the small child next to me a throw I caught. In this case, it was a...

As AI development tools continue to grow in popularity, attackers are beginning to exploit their ecosystems. A recent campaign is distributing fake Cl...

The vulnerability has already been patched by Anthropic. Claude Code communicates with Anthropic's services using an API key, transmitted with each au...

Deep Dive: The 4-Stage Security Pipeline for AI Blockchain Agents If you're building AI agents that interact with blockchain networks, you face a uniq...
I’m skeptical about—and not qualified to review—this new result in factorization with a quantum computer, but if it’s true it’s a theoretical improvem...
In this series, you will learn how to build a Product Security pipeline in your home lab. Series 1 covers how I automated vulnerability scanning, tria...

Ukrainian entities have emerged as the target of a new campaign likely orchestrated by threat actors linked to Russia, according to a report from S2 G...

If you run an e-commerce store shipping valuable items, you've probably dealt with lost or damaged packages. Carrier declared value coverage (usually...

🥷 CloudGoat: SNS Secrets Write-up: Exploiting SNS subscriptions to leak API keys 🧭 Overview Scenario: sns_secrets \ Platform: CloudGoat (Rhino Secur...

🥷 CloudGoat: Beanstalk Secrets (AWS CLI) Write-up: From low-privilege user to admin (AWS CLI approach) 🧭 Overview Scenario: beanstalk_secrets \ Plat...

Why the biggest DeFi risk in 2026 isn't a bridge hack — it's a proposal that "passes." The Governance Vector Nobody Is Pricing In We've spent three ye...

Google is testing a new security feature as part of Android Advanced Protection Mode (AAPM) that prevents certain kinds of apps from using the accessi...

It's 2 AM, markets are volatile, and a flash crash just triggered across three exchanges. And your platform is the only one that detected the anomaly...

Cross-Program Invocations (CPIs) are Solana's superpower — and its most dangerous attack surface. In Q1 2026 alone, CPI-related vulnerabilities contri...
Showing 821 - 840 of 2052 articles