📰 Alle News
Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure to make it resilient to takedown efforts...
When it gets stuck, the bot will escalate rather than hallucinate ServiceNow claims it has created an AI agent that is currently solving 90 percent of the inbound IT tickets to the company's own emplo...
Our hosts unpack the news of the week, starting with the ongoing feud between Anthropic and the Pentagon. Plus: All you need to know about TAT-8 and undersea cables.
Anthropic CEO Dario Amodei said Thursday that he "cannot in good conscience accede" to the Pentagon's demands to give the military unrestricted access to its AI systems.
"Neanderthal deserts" in our genomes suggest a strong pattern in matings.
It's also a buttoned-down, ostensibly safer take on the OpenClaw concept.
Article URL: https://www.anthropic.com/news/statement-department-of-war Comments URL: https://news.ycombinator.com/item?id=47173121 Points: 2797 # Comments: 1484
Ubuntu 26.04 will show asterisks when you type your sudo password, as Canonical adds a patch to its Rust-based sudo-rs. Here's what changed and why. You're reading Ubuntu 26.04 ends a 40-year old sudo...
“Temu sound wall” not enough to quell fury over xAI’s power plant.
Geometry of tread patterns determines frequency, so blocks were designed to play Star Wars music.
Ubuntu 26.04 LTS 'Resolute Raccoon' has a new default wallpaper. It keeps the purple gradient but drops the sharp geometric angles. Download a high-res copy. You're reading Ubuntu 26.04 ‘Resolut...
Because nothing says hospitality like a bot counting your pleases The bot’s nagging will continue until morale improves. Burger King is rolling out a new employee-facing AI that, among other things, w...
The new open source project IronCurtain uses a unique method to secure and constrain AI assistant agents before they flip your digital life upside down.
A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025. The campaign...
Latest ORCA test results out exclusive Current-day LLMs are prediction engines and, as such, they can only find the most likely solution to problems, which is not necessarily the correct one. Though p...
What One Year of AI Has Already Changed
Researchers from Stanford and Princeton found that Chinese AI models are more likely than their Western counterparts to dodge political questions or deliver inaccurate answers.
Nothing here looks dramatic at first glance. That’s the point. Many of this week’s threats begin with something ordinary, like an ad, a meeting invite, or a software update. Behind the scenes, the tac...
Silicon Valley built AI coding agents that can handle most of the grunt work. Now, the most valuable skill in tech is deciding what they should do.
New study shows smart chatbots can figure out who you really are from just a few posts... and it only costs a couple of dollars.
Article URL: https://github.com/anadim/AdderBoard Comments URL: https://news.ycombinator.com/item?id=47170030 Points: 101 # Comments: 34
Pretending the software is sentient makes it sound more powerful As with any piece of obsolete software, you might expect an outdated AI model to just be switched off. Anthropic, however, argues that ...
Microsoft has released the February 2026 security baseline update (v2602) for Windows Server 2025, introducing updated configuration standards for enterprise environments. The updated baseline strengt...
Introduction: Steal It Today, Break It in a Decade Digital evolution is unstoppable, and though the pace may vary, things tend to fall into place sooner rather than later. That, of course, applies to ...
Google's new image model replaces the previous versions immediately.
An OTA update will be pushed out in a few weeks; owners can also go to a dealership.
The likes of AMD, Canonical, Google, Huawei, Qualcomm, Red Hat, and others are on board.
A "coordinated developer-targeting campaign" is using malicious repositories disguised as legitimate Next.js projects and technical assessments to trick victims into executing them and establish persi...
The San Francisco-based AI lab is growing its research team in London. The move puts it in direct competition with Google DeepMind for top research talent in the UK.
Google API keys for services like Maps embedded in accessible client-side code could be used to authenticate to the Gemini AI assistant and access private data. [...]
That guest network you set up for your neighbors may not be as secure as you think.
Cybersecurity researchers have disclosed details of a new malicious package discovered on the NuGet Gallery, impersonating a library from financial services firm Stripe in an attempt to target the fin...
Report claims more vulnerabilities created than fixed as remediation gap widens Veracode has posted its annual State of Software Security report, based on data from 1.6 million applications tested on ...
For years, Industry 4.0 transformation has centered on the convergence of intelligent technologies like AI, cloud, the internet of things, robotics, and digital twins. Industry 5.0 marks a pivotal shi...
The ability to resell Steam items for real value is key to the state's case.
TrendForce says eight hyperscalers are set to pour $710B into servers and infrastructure The big cloud operators are ramping up investment in AI servers and infrastructure to meet demand for AI develo...
Whac-A-Mole season continues as Redmond finds yet another corner to stuff its 21st century Clippy Microsoft has announced that its Edge browser will automatically open the Copilot side pane when users...
As software teams accelerate delivery in the AI era, security vulnerabilities are expanding at an even greater pace. The 2026 State of Software Security report reveals a sharp rise in high-risk flaws ...
This is today’s edition of The Download, our weekday newsletter that provides a daily dose of what’s going on in the world of technology. America was winning the race to find Martian life....
Trend Micro has patched two critical Apex One vulnerabilities that allow attackers to gain remote code execution (RCE) on vulnerable Windows systems. [...]
DIY store chain ManoMano is notifying customers of a data breach personal data, which was caused by hackers compromising a third-party service provider. [...]
Telegram posts promise up to $1,000 per call as gang refines IT helpdesk ruse Prolific cybercrime crew Scattered Lapsus$ Hunters (SLSH) is reportedly recruiting women in the hope of improving its soci...
From weatherproof jackets and pants to puffers, gloves, and socks, WIRED’s winter sports experts have got you covered.
Report highlights too many firsts in Artemis III mission The latest report from NASA's Aerospace Safety Advisory Panel (ASAP) raises questions about the mission objectives for Artemis III.…
LLMs are bad at generating passwords: There are strong noticeable patterns among these 50 passwords that can be seen easily: All of the passwords start with a letter, usually uppercase G, almost alway...
More people are turning to AI to explore their BDSM fantasies, but some in the community feel it’s a cop-out.
A newly disclosed maximum-severity security flaw in Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly vManage) has come under active exploitation in the wild as ...
A critical vulnerability in the Junos OS Evolved network operating system running on PTX Series routers from Juniper Networks could allow an unauthenticated attacker to execute code remotely with root...
A rare joint alert from all five spy agencies means serious business The Five Eyes intelligence alliance is urgently warning defenders to patch two Cisco Catalyst SD-WAN vulnerabilities used in attack...
The portable listening revolution is fully underway. From open earbuds to noise cancelers and wired headphones, I can find a reason to love them all.