Hacker News Highlights public
[search 0]
More
Download the App!
show episodes
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
This is a recap of the top 10 posts on Hacker News on Aug 11, 2025. Fight Chat Control https://fightchatcontrol.eu/ https://news.ycombinator.com/item?id=44856426 How I code with AI on a budget/free https://wuu73.org/blog/aiguide1.html https://news.ycombinator.com/item?id=44850913 Try and https://ygdp.yale.edu/phenomena/try-and https://news.ycombina…
  continue reading
 
In today's episode of Cybersecurity Today, host David Shipley covers critical updates on recent cyber attacks and breaches impacting the US Federal judiciary's case management systems, and SonicWall firewall compromises. He also discusses researchers' new jailbreak method against GPT-5, which bypasses ethical guardrails to produce harmful instructi…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 9, 2025. Ultrathin business card runs a fluid simulation https://github.com/Nicholas-L-Johnson/flip-card https://news.ycombinator.com/item?id=44835879 I want everything local – Building my offline AI workspace https://instavm.io/blog/building-my-offline-ai-workspace https://news.ycombinator.…
  continue reading
 
Cybersecurity Today: July Review - Massive Lawsuits, AI Warnings, and Major Breaches In this episode of Cybersecurity Today: The Month in Review, host Jim Love and an expert panel, including David Shipley, Anton Levaja, and Tammy Harper, discuss the most significant cybersecurity stories from July. Key topics include the $380 million lawsuit betwee…
  continue reading
 
This week we have, SonicWall, Confidential Informants Exposed, Cisco Vishing, Perplexity vs robots.txt, Microsoft’s Project Ire, Meta–Flo Jury Verdict, GPT‑5 Lands, TeaOnHer Data Leak, Josh Marpet, and more on the Security Weekly News.. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 8, 2025. GPT-5 https://openai.com/gpt-5/ https://news.ycombinator.com/item?id=44826997 Vibechart https://www.vibechart.net/ https://news.ycombinator.com/item?id=44830684 GPT-5: Key characteristics, pricing and system card https://simonwillison.net/2025/Aug/7/gpt-5/ https://news.ycombinator.c…
  continue reading
 
In this episode, host Jim Love thanks listeners for their support of his book 'Elisa, A Tale of Quantum Kisses,' which is available for 99 cents on Kindle. The show then dives into pressing cybersecurity issues discussed at Black Hat USA, including vulnerabilities in AI assistants via prompt injection attacks, and critical flaws in Broadcom chips u…
  continue reading
 
Why should hate AI When firmware attacks The 300 second breach Old ways still work, AI might help And so begins the crawler wars Turn off your SonicWall VPN Your Pie may be wrapped in PII Attackers will find a way Signed kernel drivers D-Link on the KEV Rasperry PIs attack Stealthy LoRa LLM's don't commit code, people do Jame's Bond style rescue wi…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 7, 2025. Claude Code IDE integration for Emacs https://github.com/manzaltu/claude-code-ide.el https://news.ycombinator.com/item?id=44811567 We replaced passwords with something worse https://blog.danielh.cc/blog/passwords https://news.ycombinator.com/item?id=44819917 Automerge 3.0 https://au…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 6, 2025. Open models by OpenAI https://openai.com/open-models/ https://news.ycombinator.com/item?id=44800746 Genie 3: A new frontier for world models https://deepmind.google/discover/blog/genie-3-a-new-frontier-for-world-models/ https://news.ycombinator.com/item?id=44798166 uBlock Origin Lit…
  continue reading
 
Recent findings of AI ecosystem insecurities and attacks show the importance of needing AI governance in the supply chain. And this supply chain is rapidly expanding to include not only open-source software but also collaborative platforms where custom models, agents, prompts, and other AI resources are used. And with this expansion of third-party …
  continue reading
 
In this episode, host Jim Love explores a variety of pressing cybersecurity threats and developments. The episode begins with an invitation for listeners to share their summer reading choices. The main content highlights include North Korean operatives infiltrating US companies through fake identities and AI-generated resumes, the ability of large …
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 5, 2025. Perplexity is using stealth, undeclared crawlers to evade no-crawl directives https://blog.cloudflare.com/perplexity-is-using-stealth-undeclared-crawlers-to-evade-website-no-crawl-directives/ https://news.ycombinator.com/item?id=44785636 Show HN: I spent 6 years building a ridiculou…
  continue reading
 
Maintaining code is a lot more than keeping dependencies up to date. It involved everything from keeping old code running to changing frameworks to even changing implementation languages. Jonathan Schneider talks about the engineering considerations of refactoring and rewriting code, why code maintenance is important to appsec, and how to build con…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 4, 2025. If you're remote, ramble https://stephango.com/ramblings https://news.ycombinator.com/item?id=44775563 Modern Node.js Patterns https://kashw1n.com/blog/nodejs-2025/ https://news.ycombinator.com/item?id=44778936 Writing a good design document https://grantslatton.com/how-to-design-do…
  continue reading
 
The Weekly Enterprise News (segments 1 and 2) This week, we’ve had to make some last minute adjustments, so we’re going to do the news first, split into two segments. This week, we’re discussing: Some interesting funding Two acquisitions - one picked up for $250M, the other slightly larger, at $25 BILLION Interesting new companies! On the 1 year an…
  continue reading
 
In this episode of 'Cybersecurity Today,' host David Chipley discusses several major security incidents and threats. Hamilton, Ontario faces a $5 million insurance denial following a ransomware attack due to incomplete deployment of Multi-Factor Authentication (MFA). The episode also highlights a severe vulnerability, CVE-2025-54135, in the AI-powe…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 3, 2025. Helsinki records zero traffic deaths for full year https://www.helsinkitimes.fi/finland/finland-news/domestic/27539-helsinki-records-zero-traffic-deaths-for-full-year.html https://news.ycombinator.com/item?id=44736025 Telo MT1 https://www.telotrucks.com/ https://news.ycombinator.com…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 2, 2025. Show HN: Draw a fish and watch it swim with the others https://drawafish.com https://news.ycombinator.com/item?id=44719222 At 17, Hannah Cairo solved a major math mystery https://www.quantamagazine.org/at-17-hannah-cairo-solved-a-major-math-mystery-20250801/ https://news.ycombinator…
  continue reading
 
This episode explores the 'Grandparent Scam,' a prevalent and profitable fraud targeting seniors by exploiting their concern for their grandchildren. Experts Deirdre and John from Ireland's National Cybersecurity Center and the Ontario Provincial Police share insights into the scam's mechanics, the emotional impact on victims, and the challenges la…
  continue reading
 
Pipes, Thorium, Excel, Weird Ports, ATM Hillbilly Cannibal Attack, Lambdas, National Guard, AIs, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-499
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 1, 2025. Slow https://michaelnotebook.com/slow/index.html https://news.ycombinator.com/item?id=44748934 Face it: you're a crazy person https://www.experimental-history.com/p/face-it-youre-a-crazy-person https://news.ycombinator.com/item?id=44710651 How was the Universal Pictures 1936 opening…
  continue reading
 
In this episode, the host Jim Love discusses the increasing sophistication of supply chain attacks, starting with an account of a blockchain developer who lost $500,000 due to a malicious extension in a popular AI-powered coding tool. The episode also covers a significant cyber emergency in St. Paul, Minnesota, which required National Guard support…
  continue reading
 
In the security news: Hacking washing machines, good clean fun! Hacking cars via Bluetooth More Bluetooth hacking with Breaktooth Making old vulnerabilities great again: exploiting abandoned hardware Clorox and Cognizant point fingers AI generated Linux malware Attacking Russian airports When user verification data leaks Turns out you CAN steal car…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Jul 31, 2025. Fast https://www.catherinejue.com/fast https://news.ycombinator.com/item?id=44736967 Our $100M Series B https://oxide.computer/blog/our-100m-series-b https://news.ycombinator.com/item?id=44733817 Vibe code is legacy code https://blog.val.town/vibe-code https://news.ycombinator.com/…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Jul 30, 2025. Study mode https://openai.com/index/chatgpt-study-mode/ https://news.ycombinator.com/item?id=44725764 M8.7 earthquake in Western Pacific, tsunami warning issued https://earthquake.usgs.gov/earthquakes/eventpage/us6000qw60/executive https://news.ycombinator.com/item?id=44729865 My 2…
  continue reading
 
In the leadership and communications section, The CISO code of conduct: Ditch the ego, lead for real, The books shaping today’s cybersecurity leaders, How to Succeed in Your Career When Change Is a Constant, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-406…
  continue reading
 
In this episode of 'Cybersecurity Today,' host Jim Love covers several significant cybersecurity incidents. Hackers disrupt all Aeroflot flights, causing massive delays in Russia. The women-only dating app 'Tea' faces a second serious data leak, exposing 1.1 million private messages. A game on Steam named 'Camia' is found to contain three types of …
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Jul 29, 2025. Copyparty – Turn almost any device into a file server https://github.com/9001/copyparty https://news.ycombinator.com/item?id=44711519 Show HN: Use Their ID – Use your local UK MP’s ID for the Online Safety Act https://use-their-id.com/ https://news.ycombinator.com/item?id=44716106 …
  continue reading
 
A successful strategy in appsec is to build platforms with defaults and designs that ease the burden of security choices for developers. But there's an important difference between expecting (or requiring!) developers to use a platform and building a platform that developers embrace. Julia Knecht shares her experience in building platforms with an …
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Jul 28, 2025. Performance and telemetry analysis of Trae IDE, ByteDance's VSCode fork https://github.com/segmentationf4u1t/trae_telemetry_research https://news.ycombinator.com/item?id=44703164 Dumb Pipe https://www.dumbpipe.dev/ https://news.ycombinator.com/item?id=44701555 EU age verification a…
  continue reading
 
Interview Segment - Lessons Learned from the tj-actions GitHub Action Supply Chain Attack with Dimitri Stiliadis Breach analysis is one of my favorite topics to dive into and I’m thrilled Dimitri is joining us today to reveal some of the insights he’s pulled out of this GitHub Actions incident. It isn’t an overstatement to say that some of the less…
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley covers several key incidents impacting the cybersecurity landscape. Amazon's generative AI coding assistant 'Q' was compromised by a hacker who injected data-wiping code into the tool's GitHub repository. Scattered Spider, a notorious cybercrime group, continues its malware attacks on VMwar…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Jul 27, 2025. Rust running on every GPU https://rust-gpu.github.io/blog/2025/07/25/rust-on-every-gpu/ https://news.ycombinator.com/item?id=44692876 How we rooted Copilot https://research.eye.security/how-we-rooted-copilot/ https://news.ycombinator.com/item?id=44695098 Purple Earth hypothesis htt…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Jul 26, 2025. Do not download the app, use the website https://idiallo.com/blog/dont-download-apps https://news.ycombinator.com/item?id=44689059 Steam, Itch.io are pulling ‘porn’ games. Critics say it's a slippery slope https://www.wired.com/story/steam-itchio-are-pulling-porn-games-censorship/ …
  continue reading
 
This is repeat of a broadcast from last October, still relevant, especially in the light of so many current breaches which have begun not with technical weaknesses but with phishing and social engineering. In this deeper dive episode of 'Cybersecurity Today,' hosts Jim Love and David Shipley, a top cybersecurity expert from Beauceron Security, expl…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Jul 25, 2025. Graphene OS: a security-enhanced Android build https://lwn.net/SubscriberLink/1030004/898017c7953c0946/ https://news.ycombinator.com/item?id=44676691 There is no memory safety without thread safety https://www.ralfj.de/blog/2025/07/24/memory-safety.html https://news.ycombinator.com…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play