📰 Alle News

← Command Center
AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise over 600 FortiGate devices locate...

Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning

Artificial intelligence (AI) company Anthropic has begun to roll out a new security feature for Claude Code that can scan a user's software codebase for vulnerabilities and suggest patches. The capabi...

CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing ev...

EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

With $5.5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, four new AI certifications and Certified CISO v4 help close the gap between AI adoption and workforce readine...

A Powerful To-Do App for Android That Collects Absolutely None of Your Data

It handles time tracking, Jira sync, and Pomodoro timers without going after its users' data.

Ghostty terminal is finally adding scrollbar support

Ghostty's most-thumbed feature request is finally being answered. Yup, scrollbar support is finally coming in Ghostty 1.3 for Linux and macOS. You're reading Ghostty terminal is finally adding scrollb...

Friday Squid Blogging: Squid Cartoon

I like this one. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.

BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

Threat actors have been observed exploiting a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products to conduct a wide range of...

‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA

Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealt...

Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems

In yet another software supply chain attack, the open-source, artificial intelligence (AI)-powered coding assistant Cline CLI was updated to stealthily install OpenClaw, a self-hosted autonomous AI ag...

Rudra is a new keyboard-driven launcher for GNOME Shell

The world isn’t short on keyboard-based Linux launchers. Albert, Ulauncher, rofi and GNOME Do (if you’re old enough to remember that one) are among those I’ve written about in the pa...

ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware

Cybersecurity researchers have disclosed details of a new ClickFix campaign that abuses compromised legitimate sites to deliver a previously undocumented remote access trojan (RAT) called MIMICRAT (ak...

Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026

With one in three cyber-attacks now involving compromised employee accounts, insurers and regulators are placing far greater emphasis on identity posture when assessing cyber risk.  For many orga...

Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case

A 29-year-old Ukrainian national has been sentenced to five years in prison in the U.S. for his role in facilitating North Korea's fraudulent information technology (IT) worker scheme. In November 202...

An AI coding bot took down Amazon Web Services

Blames "user error, not AI error" for incident in December involving its Kiro tool.

FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025

The U.S. Federal Bureau of Investigation (FBI) has warned of an increase in ATM jackpotting incidents across the country, leading to losses of more than $20 million in 2025. The agency said 1,900 ATM ...

Microsoft deletes blog telling users to train AI on pirated Harry Potter books

The now-deleted Harry Potter dataset was "mistakenly" marked public domain.

Ring Cancels Its Partnership with Flock

It’s a demonstration of how toxic the surveillance-tech company Flock has become when Amazon’s Ring cancels the partnership between the two companies. As Hamilton Nolan advises, remove you...

Former Google Engineers Indicted Over Trade Secret Transfers to Iran

Two former Google engineers and one of their husbands have been indicted in the U.S. for allegedly committing trade secret theft from the search giant and other tech firms and transferring the informa...

GGML and llama.cpp join HF to ensure the long-term progress of Local AI
Train AI models with Unsloth and Hugging Face Jobs for FREE
Is AI creating accountability debt? (Sponsor)

VP: "Just have AI write all your Playwright tests, and you'll release features 10x faster."Dev: "Sure, but who's accountable if something goes wrong?"VP: "Still you."Unreasonable? Yes. But when AI wri...

Predictive Optimization at Scale: A Year of Innovation and What's Next (5 minute read)

Databricks' Predictive Optimization feature is now enabled by default for all new Unity Catalog managed tables after managing millions of production tables throughout 2025, delivering up to 22% faster...

VS Code becomes multi-agent command center for developers (5 minute read)

Visual Studio Code v1.109 introduces multi-agent orchestration with support for Anthropic Claude and OpenAI Codex alongside GitHub Copilot, unified session management, parallel subagents, and MCP Apps...

Modernizing Prometheus: Native Storage for Composite Types (4 minute read)

The Prometheus community is evolving its TSDB from classic primitive sample storage to native composite sample support for histograms and other types, improving efficiency, transactionality, and relia...

Chat with Your App Service Logs Using GitHub Copilot (7 minute read)

An open source MCP server integrates GitHub Copilot with Azure App Service logs, enabling natural language debugging, log queries, deployment correlation, and root cause analysis directly in the IDE u...

Run NanoClaw in Docker Shell Sandboxes (3 minute read)

Docker Sandboxes launched a new shell sandbox feature that lets developers run AI agents like NanoClaw (a Claude-powered WhatsApp assistant) inside isolated microVMs with secure credential management....

Choosing a Language Based on Its Syntax? (7 minute read)

Choosing a programming language based solely on its surface-level syntax misunderstands what truly matters: semantics, type systems, and overall language design. Syntax affects ergonomics and readabil...

AWS CloudWatch Alarm Mute Rules eliminate alert fatigue (2 minute read)

Amazon CloudWatch's Alarm Mute Rules allow teams to temporarily silence up to 100 alarms during deployments or maintenance while preserving visibility. Expired rules automatically trigger pending acti...

Announcing Kyverno 1.17! (4 minute read)

Kyverno 1.17 promotes its Common Expression Language (CEL) policy engine to stable v1 status while officially deprecating the legacy ClusterPolicy and CleanupPolicy types that used JMESPath.

TIL: Docker log rotation (3 minute read)

Docker does not rotate container logs by default, which can cause log files to grow indefinitely and fill disk space.

Watch Pliny the Liberator probe LLM vulnerabilities onstage (Sponsor)

Pliny the Liberator is AI's most notorious jailbreak researcher, known for turning “harmless” LLMs into offensive tools.This April at the SANS AI Cybersecurity Summit in Arlington, VA, Pliny will appe...

Google test NotebookLM integration for Opal workflows (1 minute read)

Google tests NotebookLM integration within Opal workflows, enhancing data extraction and automation. This integration aims to streamline processes and improve workflow efficiency for users.

PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence

Cybersecurity researchers have discovered what they say is the first Android malware that abuses Gemini, Google's generative artificial intelligence (AI) chatbot, as part of its execution flow and ach...

BleachBit 5.1.0 Beta adds cookie manager and expert mode

BleachBit 5.1.0 beta is out with a new cookie manager, expert mode to prevent accidental data loss, new browser support, and fixes for Linux users. You're reading BleachBit 5.1.0 Beta adds cookie mana...

INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown

An international cybercrime operation against online scams has led to 651 arrests and recovered more than $4.3 million as part of an effort led by law enforcement agencies from 16 African countries. T...

Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center

Microsoft has disclosed a now-patched security flaw in Windows Admin Center that could allow an attacker to escalate their privileges. Windows Admin Center is a locally deployed, browser-based managem...

Lawsuit: ChatGPT told student he was "meant for greatness"—then came psychosis

"AI Injury Attorneys" target the chatbot design itself.

FOSS Weekly #26.08: KDE Plasma 6.6, Mint Release Schedule Change, ASCII Weather, Firefox Tweaking and More Linux Stuff

Quizzes and Puzzles? Yes or no?

ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories

The cyber threat space doesn’t pause, and this week makes that clear. New risks, new tactics, and new security gaps are showing up across platforms, tools, and industries — often all at the same time....

Google announces Gemini 3.1 Pro, says it's better at complex problem-solving

Google says 3.1 Pro is ready for "your hardest challenges."

From Exposure to Exploitation: How AI Collapses Your Response Window

We’ve all seen this before: a developer deploys a new cloud workload and grants overly broad permissions just to keep the sprint moving. An engineer generates a "temporary" API key for testing and for...

OpenClaw security fears lead Meta, other AI firms to restrict its use

The viral agentic AI tool is known for being highly capable but also wildly unpredictable.

Ask HN: How do you employ LLMs for UI development?

I have found a workflow that makes Claude a fantastic companion for most of the work involved in fullstack web development. The exception I find to be the most significant limitatipn to productive pot...

Malicious AI

Interesting: Summary: An AI agent of unknown ownership autonomously wrote and published a personalized hit piece about me after I rejected its code, attempting to damage my reputation and shame me int...

IBM and UC Berkeley Diagnose Why Enterprise Agents Fail Using IT-Bench and MAST
Record scratch—Google's Lyria 3 AI music model is coming to Gemini today

With a simple prompt, you can generate 30 seconds of something like music.

Designing A Streak System: The UX And Psychology Of Streaks

What makes streaks so powerful and addictive? To design them well, you need to understand how they align with human psychology. Victor Ayomipo breaks down the UX and design principles behind effective...

AI Found Twelve New Vulnerabilities in OpenSSL

The title of the post is”What AI Security Research Looks Like When It Works,” and I agree: In the latest OpenSSL security release> on January 27, 2026, twelve new zero-day vulnerabilit...

One-Shot Any Web App with Gradio's gr.HTML
← Neuere Seite 12 Ältere →