Daily overview of the Top 10 Hacker News posts. Post and comment summarization by AI.
…
continue reading
Hacker News Highlights Podcasts
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading

1
8.23.25 | FFmpeg 8.0 released, Switching from Gmail to Mailbox.org, Cloudflare launches first Media over QUIC CDN
12:18
12:18
Play later
Play later
Lists
Like
Liked
12:18This is a recap of the top 10 posts on Hacker News on Aug 23, 2025. (00:00) - Intro (00:21) - FFmpeg 8.0 (01:31) - Leaving Gmail for Mailbox.org (02:36) - The first Media over QUIC CDN: Cloudflare (03:50) - LabPlot: Free, open source and cross-platform Data Visualization and Analysis (05:04) - Nitro: A tiny but flexible init system and process supe…
…
continue reading

1
The Evolving Landscape of Cybersecurity Training: Effective Strategies and Misleading Headlines
1:22:43
1:22:43
Play later
Play later
Lists
Like
Liked
1:22:43In this episode of Cybersecurity Today, host Jim Love explores the complex dynamics of cybersecurity training with guests Michael Joyce and David Shipley. They discuss the importance of continuous awareness and the temporal decay of training effects. The conversation highlights the critical balance between training frequency and effectiveness, with…
…
continue reading

1
Humans extinct: 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Aaran Leyland.. - SWN #505
34:12
34:12
Play later
Play later
Lists
Like
Liked
34:12Humans wiped out by 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Philip K. Dick, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-505
…
continue reading

1
8.22.25 | AWS CEO criticizes AI replacing juniors, AI tooling disclosure required, DeepSeek-v3.1 released
12:22
12:22
Play later
Play later
Lists
Like
Liked
12:22This is a recap of the top 10 posts on Hacker News on Aug 22, 2025. (00:00) - Intro (00:23) - AWS CEO says using AI to replace junior staff is 'Dumbest thing I've ever heard' (01:37) - AI tooling must be disclosed for contributions (02:49) - DeepSeek-v3.1 (03:50) - Weaponizing image scaling against production AI systems (05:08) - Show HN: OS X Mave…
…
continue reading

1
Cybersecurity Today: Massive Data Exposures, Microsoft Failures, and PayPal Breach Claims
9:09
9:09
Play later
Play later
Lists
Like
Liked
9:09In this episode of Cybersecurity Today, host Jim Love covers a range of recent cybersecurity incidents. A major privacy failure has hit Elon Musk's Grok chatbot, exposing over 370,000 private conversations with sensitive information. Microsoft's recent security update has caused SSD and HDD failures, complicating data recovery. Hackers have exploit…
…
continue reading

1
What We’ve Learned from LockBit and Black Basta Leaks (and News) - Ian Gray - PSW #888
2:15:17
2:15:17
Play later
Play later
Lists
Like
Liked
2:15:17This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them! Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window in…
…
continue reading

1
8.21.25 | Spherical helix visualization, anime catgirls blocking Linux kernel access, Zedless fork prioritizing privacy and local-first
11:57
11:57
Play later
Play later
Lists
Like
Liked
11:57This is a recap of the top 10 posts on Hacker News on Aug 21, 2025. (00:00) - Intro (00:19) - Show HN: I was curious about spherical helix, ended up making this visualization (01:25) - Why are anime catgirls blocking my access to the Linux kernel? (02:43) - Zedless: Zed fork focused on privacy and being local-first (03:46) - Sequoia backs Zed (05:0…
…
continue reading

1
8.20.25 | Exploited CodeRabbit for RCE, AGENTS.md for coding agents, Copilot broke audit logs without customer notification
12:16
12:16
Play later
Play later
Lists
Like
Liked
12:16This is a recap of the top 10 posts on Hacker News on Aug 20, 2025. (00:00) - Intro (00:21) - How we exploited CodeRabbit: From simple PR to RCE and write access on 1M repos (01:40) - AGENTS.md – Open format for guiding coding agents (02:58) - Copilot broke audit logs, but Microsoft won't tell customers (04:15) - How to Draw a Space Invader (05:13)…
…
continue reading

1
Misconfiguration, The Forgotten Vulnerability and the Power and Failure of "Yes" - Danny Jenkins - BSW #409
53:55
53:55
Play later
Play later
Lists
Like
Liked
53:55The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?…
…
continue reading

1
Cybersecurity Breaches: Salesforce, Workday, and Critical Infrastructure Hacked
9:04
9:04
Play later
Play later
Lists
Like
Liked
9:04In today's episode of 'Cybersecurity Today,' hosted by Jim Love, we cover several key issues in the cybersecurity landscape. Firstly, a breach involving Workday and social engineering attacks targeting Salesforce customers is discussed. Next, the risks posed by a recent Windows update potentially causing data corruption on SSDs and HDDs are highlig…
…
continue reading

1
The cult of Doug, Crime, Pipemagic, Clickfix, Cats in Space, Josh Marpet, and more... - SWN #504
34:06
34:06
Play later
Play later
Lists
Like
Liked
34:06The cult of Doug, Crime, Pipemagic, Clickfix, Cats in Space, Uncle Silvio, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-504
…
continue reading

1
8.19.25 | Anna's Archive update, app to block Shorts and Reels, Obsidian Bases
11:28
11:28
Play later
Play later
Lists
Like
Liked
11:28This is a recap of the top 10 posts on Hacker News on Aug 19, 2025. (00:00) - Intro (00:18) - Anna's Archive: An Update from the Team (01:27) - Show HN: I built an app to block Shorts and Reels (02:32) - Obsidian Bases (03:38) - Show HN: Whispering – Open-source, local-first dictation you can trust (04:37) - FFmpeg Assembly Language Lessons (05:44)…
…
continue reading

1
Managing the Minimization of a Container Attack Surface - Neil Carpenter - ASW #344
1:08:17
1:08:17
Play later
Play later
Lists
Like
Liked
1:08:17A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a container image small has a lot of challenges in terms of what should be considered minimal. Neil Carpenter shares advice and anecdotes on what it takes to…
…
continue reading

1
8.18.25 | Claudia assists Claude coding, NextDNS introduces age verification bypass, The Enterprise Experience
12:36
12:36
Play later
Play later
Lists
Like
Liked
12:36This is a recap of the top 10 posts on Hacker News on Aug 18, 2025. (00:00) - Intro (00:20) - Claudia – Desktop companion for Claude code (01:29) - Show HN: NextDNS Adds "Bypass Age Verification" (02:40) - The Enterprise Experience (03:53) - ArchiveTeam has finished archiving all goo.gl short links (05:05) - Show HN: OverType – A Markdown WYSIWYG e…
…
continue reading

1
Rethinking risk based vulnerability management, Black Hat expo insights, and the news - Snehal Antani - ESW #420
1:55:35
1:55:35
Play later
Play later
Lists
Like
Liked
1:55:35Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
…
continue reading

1
Breaking Cybersecurity News: Canada's House of Commons Breached and Windows 10 Support Ending Soon
9:51
9:51
Play later
Play later
Lists
Like
Liked
9:51In this episode of Cybersecurity Today, host David Shipley reports from Fredericton, New Brunswick, amidst severe forest fires. The main story covers a data breach in Canada’s House of Commons involving parliamentary employee information, attributed to a recent Microsoft vulnerability. The episode also discusses Fortinet’s recent high-severity vuln…
…
continue reading

1
8.17.25 | Compiler bug affects Solidity, OpenBSD's speed requires program adjustment, CIA's heart attack gun incident
11:36
11:36
Play later
Play later
Lists
Like
Liked
11:36This is a recap of the top 10 posts on Hacker News on Aug 17, 2025. (00:00) - Intro (00:19) - Compiler Bug Causes Compiler Bug: How a 12-Year-Old G++ Bug Took Down Solidity (01:36) - OpenBSD is so fast, I had to modify the program slightly to measure itself (02:44) - When the CIA got away with building a heart attack gun (03:47) - US F-16s lose out…
…
continue reading

1
8.16.25 | Open hardware 3D printing decline, Amsterdam’s Ritman Library digitizes occult books, Edka enables Kubernetes on Hetzner
12:08
12:08
Play later
Play later
Lists
Like
Liked
12:08This is a recap of the top 10 posts on Hacker News on Aug 16, 2025. Open hardware desktop 3D printing is dead? https://www.josefprusa.com/articles/open-hardware-in-3d-printing-is-dead/ https://news.ycombinator.com/item?id=44911423 Occult books digitized and put online by Amsterdam’s Ritman Library https://www.openculture.com/2025/08/2178-occult-boo…
…
continue reading

1
Exploring the Ransomware Ecosystem with Tammy Harper
1:13:55
1:13:55
Play later
Play later
Lists
Like
Liked
1:13:55In this episode of 'Cybersecurity Today,' the host welcomes Tammy Harper from Flair.io for an in-depth exploration into the ransomware ecosystem. Tammy, a seasoned threat intelligence researcher and certified dark web investigator, shines a light on the complex world of ransomware, its history, business models, and the various threat actor groups i…
…
continue reading

1
Creepy chatbots, Fortinet, CISA, Agentic AI, FIDO, EDR, Aaran Leyland, and More... - SWN #503
35:09
35:09
Play later
Play later
Lists
Like
Liked
35:09Creepy chatbots, Fortinet, CISA, Agentic AI, FIDO, EDR, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-503
…
continue reading

1
8.15.25 | Strongest AI model on a laptop, Gemma 3 270M for efficient AI, Steve Wozniak on happiness over accomplishment
12:37
12:37
Play later
Play later
Lists
Like
Liked
12:37This is a recap of the top 10 posts on Hacker News on Aug 15, 2025. What's the strongest AI model you can train on a laptop in five minutes? https://www.seangoedecke.com/model-on-a-mbp/ https://news.ycombinator.com/item?id=44875848 Gemma 3 270M: Compact model for hyper-efficient AI https://developers.googleblog.com/en/introducing-gemma-3-270m/ http…
…
continue reading

1
300 Million In Crypto Fraud Funds Frozen: Cybersecurity Today
8:43
8:43
Play later
Play later
Lists
Like
Liked
8:43Cyber Crime Crackdown: $300 Million in Crypto Frozen, FBI Accounts Hacked, and Critical Microsoft Patches Released In this episode of Cybersecurity Today, host Jim Love covers major recent events in cybercrime and cybersecurity. Over $300 million in cryptocurrency tied to cybercrime has been frozen through coordinated efforts by the private sector …
…
continue reading

1
Hackberry PIs and Other Hacker Things - PSW #887
2:08:42
2:08:42
Play later
Play later
Lists
Like
Liked
2:08:42We kick things off with a deep dive into the Hackberry PI and how to build one. Then in the security news: Will Perplexity buy Chrome? ESP32 Bus Pirates Poisoned telemetry Docker image security Fully Open Source Quantum Sensors Securing your car, Flippers, and show me the money Bringing your printer and desktop to Starbucks Paying a ransom? You nee…
…
continue reading

1
8.14.25 | FFmpeg 8.0 adds Whisper, Nginx supports ACME protocol, PYX advances Python packaging
12:41
12:41
Play later
Play later
Lists
Like
Liked
12:41This is a recap of the top 10 posts on Hacker News on Aug 14, 2025. FFmpeg 8.0 adds Whisper support https://code.ffmpeg.org/FFmpeg/FFmpeg/commit/13ce36fef98a3f4e6d8360c24d6b8434cbb8869b https://news.ycombinator.com/item?id=44886647 Nginx introduces native support for ACME protocol https://blog.nginx.org/blog/native-support-for-acme-protocol https:/…
…
continue reading

1
8.13.25 | Claude Sonnet 4 supports 1M tokens, Building a web search engine with 3B embeddings, Search all text in New York City
12:06
12:06
Play later
Play later
Lists
Like
Liked
12:06This is a recap of the top 10 posts on Hacker News on Aug 13, 2025. Claude Sonnet 4 now supports 1M tokens of context https://www.anthropic.com/news/1m-context https://news.ycombinator.com/item?id=44878147 Show HN: Building a web search engine from scratch with 3B neural embeddings https://blog.wilsonl.in/search-engine/ https://news.ycombinator.com…
…
continue reading

1
Defending Trust & Reputation as CISOs and Leaders Prepare Their AI Strategy - Santosh Nair - BSW #408
50:05
50:05
Play later
Play later
Lists
Like
Liked
50:05As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Securit…
…
continue reading

1
Urgent Vulnerabilities: Patching Exchange, Citrix, and Fortinet
14:33
14:33
Play later
Play later
Lists
Like
Liked
14:33In this episode of Cybersecurity Today, host David Shipley covers critical security updates and vulnerabilities affecting Microsoft Exchange, Citrix NetScaler, and Fortinet SSL VPNs. With over 29,000 unpatched Exchange servers posing a risk for admin escalation and potential full domain compromise, urgent action is needed. Citrix Bleed 2 is activel…
…
continue reading

1
300 Baud, Buddy Hackett Nudes, Dell, badUSB, Exchange, Erlang/OTP, Josh Marpet... - SWN #502
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14300 Baud, Buddy Hackett Nudes, Dell, badUSB, Exchange, Erlang/OTP, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-502
…
continue reading

1
8.12.25 | GitHub loses independence post-CEO resignation, todo app experiment leads to .txt file, Wikipedia fails against Online Safety Act
11:42
11:42
Play later
Play later
Lists
Like
Liked
11:42This is a recap of the top 10 posts on Hacker News on Aug 12, 2025. GitHub is no longer independent at Microsoft after CEO resignation https://www.theverge.com/news/757461/microsoft-github-thomas-dohmke-resignation-coreai-team-transition https://news.ycombinator.com/item?id=44865560 I tried every todo app and ended up with a .txt file https://www.a…
…
continue reading

1
The Future of Supply Chain Security - Janet Worthington - ASW #343
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most…
…
continue reading

1
8.11.25 | Fight Chat Control, Coding with AI affordably, Try and
11:45
11:45
Play later
Play later
Lists
Like
Liked
11:45This is a recap of the top 10 posts on Hacker News on Aug 11, 2025. Fight Chat Control https://fightchatcontrol.eu/ https://news.ycombinator.com/item?id=44856426 How I code with AI on a budget/free https://wuu73.org/blog/aiguide1.html https://news.ycombinator.com/item?id=44850913 Try and https://ygdp.yale.edu/phenomena/try-and https://news.ycombina…
…
continue reading

1
ESW at BlackHat and the weekly enterprise security news - ESW #419
45:44
45:44
Play later
Play later
Lists
Like
Liked
45:44Topic Segment - What's new at Black Hat? We're coming live from hacker summer camp 2025, so it seemed appropriate to share what we've seen and heard so far at this year's event. Adrian's on vacation, so this episode is featuring Jackie McGuire and Ayman Elsawah! News Segment Then, in the enterprise security news, Tons of funding! SentinelOne picks …
…
continue reading

1
Cyber Attacks, Jailbreaking GPT-5, and Hacker Summer Camp 2025 Highlights
14:34
14:34
Play later
Play later
Lists
Like
Liked
14:34In today's episode of Cybersecurity Today, host David Shipley covers critical updates on recent cyber attacks and breaches impacting the US Federal judiciary's case management systems, and SonicWall firewall compromises. He also discusses researchers' new jailbreak method against GPT-5, which bypasses ethical guardrails to produce harmful instructi…
…
continue reading

1
8.9.25 | Ultrathin business card simulates fluid, offline AI workspace creation, Jim Lovell, Apollo 13 commander, has died
12:15
12:15
Play later
Play later
Lists
Like
Liked
12:15This is a recap of the top 10 posts on Hacker News on Aug 9, 2025. Ultrathin business card runs a fluid simulation https://github.com/Nicholas-L-Johnson/flip-card https://news.ycombinator.com/item?id=44835879 I want everything local – Building my offline AI workspace https://instavm.io/blog/building-my-offline-ai-workspace https://news.ycombinator.…
…
continue reading

1
Cybersecurity Today Month In Review: August 9, 2025
58:55
58:55
Play later
Play later
Lists
Like
Liked
58:55Cybersecurity Today: July Review - Massive Lawsuits, AI Warnings, and Major Breaches In this episode of Cybersecurity Today: The Month in Review, host Jim Love and an expert panel, including David Shipley, Anton Levaja, and Tammy Harper, discuss the most significant cybersecurity stories from July. Key topics include the $380 million lawsuit betwee…
…
continue reading

1
SonicWall, Informants Exposed, Cisco Vishing, Perplexity, GPT‑5, Josh Marpet–SWN #501 - SWN #501
34:23
34:23
Play later
Play later
Lists
Like
Liked
34:23This week we have, SonicWall, Confidential Informants Exposed, Cisco Vishing, Perplexity vs robots.txt, Microsoft’s Project Ire, Meta–Flo Jury Verdict, GPT‑5 Lands, TeaOnHer Data Leak, Josh Marpet, and more on the Security Weekly News.. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-…
…
continue reading

1
8.8.25 | GPT-5, Vibechart, GPT-5 features and pricing
10:58
10:58
Play later
Play later
Lists
Like
Liked
10:58This is a recap of the top 10 posts on Hacker News on Aug 8, 2025. GPT-5 https://openai.com/gpt-5/ https://news.ycombinator.com/item?id=44826997 Vibechart https://www.vibechart.net/ https://news.ycombinator.com/item?id=44830684 GPT-5: Key characteristics, pricing and system card https://simonwillison.net/2025/Aug/7/gpt-5/ https://news.ycombinator.c…
…
continue reading

1
Cybersecurity Alerts: Black Hat Exposes AI and Firmware Vulnerabilities
11:54
11:54
Play later
Play later
Lists
Like
Liked
11:54In this episode, host Jim Love thanks listeners for their support of his book 'Elisa, A Tale of Quantum Kisses,' which is available for 99 cents on Kindle. The show then dives into pressing cybersecurity issues discussed at Black Hat USA, including vulnerabilities in AI assistants via prompt injection attacks, and critical flaws in Broadcom chips u…
…
continue reading
Why should hate AI When firmware attacks The 300 second breach Old ways still work, AI might help And so begins the crawler wars Turn off your SonicWall VPN Your Pie may be wrapped in PII Attackers will find a way Signed kernel drivers D-Link on the KEV Rasperry PIs attack Stealthy LoRa LLM's don't commit code, people do Jame's Bond style rescue wi…
…
continue reading

1
8.7.25 | Claude Code integrates with Emacs, passwords replaced with worse alternatives, Automerge 3.0 released
12:59
12:59
Play later
Play later
Lists
Like
Liked
12:59This is a recap of the top 10 posts on Hacker News on Aug 7, 2025. Claude Code IDE integration for Emacs https://github.com/manzaltu/claude-code-ide.el https://news.ycombinator.com/item?id=44811567 We replaced passwords with something worse https://blog.danielh.cc/blog/passwords https://news.ycombinator.com/item?id=44819917 Automerge 3.0 https://au…
…
continue reading