Daily overview of the Top 10 Hacker News posts. Post and comment summarization by AI.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading

1
8.11.25 | Fight Chat Control, Coding with AI affordably, Try and
11:45
11:45
Play later
Play later
Lists
Like
Liked
11:45This is a recap of the top 10 posts on Hacker News on Aug 11, 2025. Fight Chat Control https://fightchatcontrol.eu/ https://news.ycombinator.com/item?id=44856426 How I code with AI on a budget/free https://wuu73.org/blog/aiguide1.html https://news.ycombinator.com/item?id=44850913 Try and https://ygdp.yale.edu/phenomena/try-and https://news.ycombina…
…
continue reading

1
Cyber Attacks, Jailbreaking GPT-5, and Hacker Summer Camp 2025 Highlights
14:34
14:34
Play later
Play later
Lists
Like
Liked
14:34In today's episode of Cybersecurity Today, host David Shipley covers critical updates on recent cyber attacks and breaches impacting the US Federal judiciary's case management systems, and SonicWall firewall compromises. He also discusses researchers' new jailbreak method against GPT-5, which bypasses ethical guardrails to produce harmful instructi…
…
continue reading

1
8.9.25 | Ultrathin business card simulates fluid, offline AI workspace creation, Jim Lovell, Apollo 13 commander, has died
12:15
12:15
Play later
Play later
Lists
Like
Liked
12:15This is a recap of the top 10 posts on Hacker News on Aug 9, 2025. Ultrathin business card runs a fluid simulation https://github.com/Nicholas-L-Johnson/flip-card https://news.ycombinator.com/item?id=44835879 I want everything local – Building my offline AI workspace https://instavm.io/blog/building-my-offline-ai-workspace https://news.ycombinator.…
…
continue reading

1
Cybersecurity Today Month In Review: August 9, 2025
58:55
58:55
Play later
Play later
Lists
Like
Liked
58:55Cybersecurity Today: July Review - Massive Lawsuits, AI Warnings, and Major Breaches In this episode of Cybersecurity Today: The Month in Review, host Jim Love and an expert panel, including David Shipley, Anton Levaja, and Tammy Harper, discuss the most significant cybersecurity stories from July. Key topics include the $380 million lawsuit betwee…
…
continue reading

1
SonicWall, Informants Exposed, Cisco Vishing, Perplexity, GPT‑5, Josh Marpet–SWN #501 - SWN #501
34:23
34:23
Play later
Play later
Lists
Like
Liked
34:23This week we have, SonicWall, Confidential Informants Exposed, Cisco Vishing, Perplexity vs robots.txt, Microsoft’s Project Ire, Meta–Flo Jury Verdict, GPT‑5 Lands, TeaOnHer Data Leak, Josh Marpet, and more on the Security Weekly News.. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-…
…
continue reading

1
8.8.25 | GPT-5, Vibechart, GPT-5 features and pricing
10:58
10:58
Play later
Play later
Lists
Like
Liked
10:58This is a recap of the top 10 posts on Hacker News on Aug 8, 2025. GPT-5 https://openai.com/gpt-5/ https://news.ycombinator.com/item?id=44826997 Vibechart https://www.vibechart.net/ https://news.ycombinator.com/item?id=44830684 GPT-5: Key characteristics, pricing and system card https://simonwillison.net/2025/Aug/7/gpt-5/ https://news.ycombinator.c…
…
continue reading

1
Cybersecurity Alerts: Black Hat Exposes AI and Firmware Vulnerabilities
11:54
11:54
Play later
Play later
Lists
Like
Liked
11:54In this episode, host Jim Love thanks listeners for their support of his book 'Elisa, A Tale of Quantum Kisses,' which is available for 99 cents on Kindle. The show then dives into pressing cybersecurity issues discussed at Black Hat USA, including vulnerabilities in AI assistants via prompt injection attacks, and critical flaws in Broadcom chips u…
…
continue reading
Why should hate AI When firmware attacks The 300 second breach Old ways still work, AI might help And so begins the crawler wars Turn off your SonicWall VPN Your Pie may be wrapped in PII Attackers will find a way Signed kernel drivers D-Link on the KEV Rasperry PIs attack Stealthy LoRa LLM's don't commit code, people do Jame's Bond style rescue wi…
…
continue reading

1
8.7.25 | Claude Code integrates with Emacs, passwords replaced with worse alternatives, Automerge 3.0 released
12:59
12:59
Play later
Play later
Lists
Like
Liked
12:59This is a recap of the top 10 posts on Hacker News on Aug 7, 2025. Claude Code IDE integration for Emacs https://github.com/manzaltu/claude-code-ide.el https://news.ycombinator.com/item?id=44811567 We replaced passwords with something worse https://blog.danielh.cc/blog/passwords https://news.ycombinator.com/item?id=44819917 Automerge 3.0 https://au…
…
continue reading

1
8.6.25 | OpenAI's open models, Genie 3 advances world models, uBlock Origin Lite launches for Safari
12:29
12:29
Play later
Play later
Lists
Like
Liked
12:29This is a recap of the top 10 posts on Hacker News on Aug 6, 2025. Open models by OpenAI https://openai.com/open-models/ https://news.ycombinator.com/item?id=44800746 Genie 3: A new frontier for world models https://deepmind.google/discover/blog/genie-3-a-new-frontier-for-world-models/ https://news.ycombinator.com/item?id=44798166 uBlock Origin Lit…
…
continue reading

1
Say Easy, Do Hard - AI Governance in the Supply Chain - Richard Bird, Nick Mistry - BSW #407
54:55
54:55
Play later
Play later
Lists
Like
Liked
54:55Recent findings of AI ecosystem insecurities and attacks show the importance of needing AI governance in the supply chain. And this supply chain is rapidly expanding to include not only open-source software but also collaborative platforms where custom models, agents, prompts, and other AI resources are used. And with this expansion of third-party …
…
continue reading

1
Cybersecurity Threats and Trends: From North Korean Spies to AI-Driven Attacks
11:55
11:55
Play later
Play later
Lists
Like
Liked
11:55In this episode, host Jim Love explores a variety of pressing cybersecurity threats and developments. The episode begins with an invitation for listeners to share their summer reading choices. The main content highlights include North Korean operatives infiltrating US companies through fake identities and AI-generated resumes, the ability of large …
…
continue reading

1
MFA Bypass, SonicWall, BIOS Shade, Sex Toys, FBI Warning, Claude v GPT-5, Josh Marpet - SWN #500
32:30
32:30
Play later
Play later
Lists
Like
Liked
32:30MFA Bypass, SonicWall, BIOS Shade, Sex Toys, FBI Warnings, Claude vs GPT-5, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-500
…
continue reading

1
8.5.25 | Perplexity evades no-crawl directives, Show HN showcases wooden pixel display, Qwen-Image features native text rendering
11:54
11:54
Play later
Play later
Lists
Like
Liked
11:54This is a recap of the top 10 posts on Hacker News on Aug 5, 2025. Perplexity is using stealth, undeclared crawlers to evade no-crawl directives https://blog.cloudflare.com/perplexity-is-using-stealth-undeclared-crawlers-to-evade-website-no-crawl-directives/ https://news.ycombinator.com/item?id=44785636 Show HN: I spent 6 years building a ridiculou…
…
continue reading

1
Uniting software development and application security - Will Vandevanter, Jonathan Schneider - ASW #342
58:07
58:07
Play later
Play later
Lists
Like
Liked
58:07Maintaining code is a lot more than keeping dependencies up to date. It involved everything from keeping old code running to changing frameworks to even changing implementation languages. Jonathan Schneider talks about the engineering considerations of refactoring and rewriting code, why code maintenance is important to appsec, and how to build con…
…
continue reading

1
8.4.25 | Remote work encourages rambling, Node.js patterns explored, tips for effective design documents
12:00
12:00
Play later
Play later
Lists
Like
Liked
12:00This is a recap of the top 10 posts on Hacker News on Aug 4, 2025. If you're remote, ramble https://stephango.com/ramblings https://news.ycombinator.com/item?id=44775563 Modern Node.js Patterns https://kashw1n.com/blog/nodejs-2025/ https://news.ycombinator.com/item?id=44778936 Writing a good design document https://grantslatton.com/how-to-design-do…
…
continue reading

1
Weekly Enterprise Security News and Tips on Building Security From Day 1 - Guillaume Ross - ESW #418
1:45:52
1:45:52
Play later
Play later
Lists
Like
Liked
1:45:52The Weekly Enterprise News (segments 1 and 2) This week, we’ve had to make some last minute adjustments, so we’re going to do the news first, split into two segments. This week, we’re discussing: Some interesting funding Two acquisitions - one picked up for $250M, the other slightly larger, at $25 BILLION Interesting new companies! On the 1 year an…
…
continue reading

1
Cybersecurity Today: Hamilton's Ransomware Crisis and Emerging AI and OAuth Threats
9:46
9:46
Play later
Play later
Lists
Like
Liked
9:46In this episode of 'Cybersecurity Today,' host David Chipley discusses several major security incidents and threats. Hamilton, Ontario faces a $5 million insurance denial following a ransomware attack due to incomplete deployment of Multi-Factor Authentication (MFA). The episode also highlights a severe vulnerability, CVE-2025-54135, in the AI-powe…
…
continue reading

1
8.3.25 | Helsinki achieves zero traffic deaths, Telo MT1, A.I. may change our nature in addressing loneliness
11:37
11:37
Play later
Play later
Lists
Like
Liked
11:37This is a recap of the top 10 posts on Hacker News on Aug 3, 2025. Helsinki records zero traffic deaths for full year https://www.helsinkitimes.fi/finland/finland-news/domestic/27539-helsinki-records-zero-traffic-deaths-for-full-year.html https://news.ycombinator.com/item?id=44736025 Telo MT1 https://www.telotrucks.com/ https://news.ycombinator.com…
…
continue reading

1
8.2.25 | Draw a fish animation, Hannah Cairo solves math mystery, Cerebras Code
11:40
11:40
Play later
Play later
Lists
Like
Liked
11:40This is a recap of the top 10 posts on Hacker News on Aug 2, 2025. Show HN: Draw a fish and watch it swim with the others https://drawafish.com https://news.ycombinator.com/item?id=44719222 At 17, Hannah Cairo solved a major math mystery https://www.quantamagazine.org/at-17-hannah-cairo-solved-a-major-math-mystery-20250801/ https://news.ycombinator…
…
continue reading

1
Combating the Grandparent Scam: A Deep Dive into Cybersecurity and Law Enforcement Efforts
50:53
50:53
Play later
Play later
Lists
Like
Liked
50:53This episode explores the 'Grandparent Scam,' a prevalent and profitable fraud targeting seniors by exploiting their concern for their grandchildren. Experts Deirdre and John from Ireland's National Cybersecurity Center and the Ontario Provincial Police share insights into the scam's mechanics, the emotional impact on victims, and the challenges la…
…
continue reading

1
Pipes, Thorium, Excel, ATM Hillbilly Cannibal Attack, Lambdas, AIs, Aaran Leyland - SWN #499
35:55
35:55
Play later
Play later
Lists
Like
Liked
35:55Pipes, Thorium, Excel, Weird Ports, ATM Hillbilly Cannibal Attack, Lambdas, National Guard, AIs, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-499
…
continue reading

1
8.1.25 | Slow, Acknowledging personal craziness, Creation of Universal Pictures 1936 logo
11:42
11:42
Play later
Play later
Lists
Like
Liked
11:42This is a recap of the top 10 posts on Hacker News on Aug 1, 2025. Slow https://michaelnotebook.com/slow/index.html https://news.ycombinator.com/item?id=44748934 Face it: you're a crazy person https://www.experimental-history.com/p/face-it-youre-a-crazy-person https://news.ycombinator.com/item?id=44710651 How was the Universal Pictures 1936 opening…
…
continue reading

1
Cybersecurity Today: Supply Chain Attacks, St. Paul's Cyber Emergency, and Ingram Micro's Data Breach
12:41
12:41
Play later
Play later
Lists
Like
Liked
12:41In this episode, the host Jim Love discusses the increasing sophistication of supply chain attacks, starting with an account of a blockchain developer who lost $500,000 due to a malicious extension in a popular AI-powered coding tool. The episode also covers a significant cyber emergency in St. Paul, Minnesota, which required National Guard support…
…
continue reading

1
Hacking Washing Machines - PSW #885
1:58:07
1:58:07
Play later
Play later
Lists
Like
Liked
1:58:07In the security news: Hacking washing machines, good clean fun! Hacking cars via Bluetooth More Bluetooth hacking with Breaktooth Making old vulnerabilities great again: exploiting abandoned hardware Clorox and Cognizant point fingers AI generated Linux malware Attacking Russian airports When user verification data leaks Turns out you CAN steal car…
…
continue reading

1
7.31.25 | Fast's new developments, Our $100M Series B funding, Vibe code classified as legacy code
12:20
12:20
Play later
Play later
Lists
Like
Liked
12:20This is a recap of the top 10 posts on Hacker News on Jul 31, 2025. Fast https://www.catherinejue.com/fast https://news.ycombinator.com/item?id=44736967 Our $100M Series B https://oxide.computer/blog/our-100m-series-b https://news.ycombinator.com/item?id=44733817 Vibe code is legacy code https://blog.val.town/vibe-code https://news.ycombinator.com/…
…
continue reading

1
7.30.25 | Study mode, M8.7 earthquake in Western Pacific with tsunami warning, laptop writes Space Invaders in JavaScript
12:06
12:06
Play later
Play later
Lists
Like
Liked
12:06This is a recap of the top 10 posts on Hacker News on Jul 30, 2025. Study mode https://openai.com/index/chatgpt-study-mode/ https://news.ycombinator.com/item?id=44725764 M8.7 earthquake in Western Pacific, tsunami warning issued https://earthquake.usgs.gov/earthquakes/eventpage/us6000qw60/executive https://news.ycombinator.com/item?id=44729865 My 2…
…
continue reading

1
Aligning Security Objectives, Ditch the Ego, Lead for Real and Succeed - BSW #406
29:45
29:45
Play later
Play later
Lists
Like
Liked
29:45In the leadership and communications section, The CISO code of conduct: Ditch the ego, lead for real, The books shaping today’s cybersecurity leaders, How to Succeed in Your Career When Change Is a Constant, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-406…
…
continue reading

1
Cybersecurity Today: Major Data Leaks, Airline Disruptions, Malware in Games, and AI Bypasses Captchas
9:49
9:49
Play later
Play later
Lists
Like
Liked
9:49In this episode of 'Cybersecurity Today,' host Jim Love covers several significant cybersecurity incidents. Hackers disrupt all Aeroflot flights, causing massive delays in Russia. The women-only dating app 'Tea' faces a second serious data leak, exposing 1.1 million private messages. A game on Steam named 'Camia' is found to contain three types of …
…
continue reading

1
Popup Porn, LoveSense, Tea, Fire Ant, Scatterede Spider, AI Pricing, Josh Marpet... - SWN #498
31:06
31:06
Play later
Play later
Lists
Like
Liked
31:06Popup Porn, LoveSense, Tea, Fire Ant, Scatterede Spider, AI Pricing, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-498
…
continue reading

1
7.29.25 | Copyparty enables file server creation, Use Their ID utilizes UK MP’s ID for Online Safety Act, Claude Code imposes weekly rate limits
12:04
12:04
Play later
Play later
Lists
Like
Liked
12:04This is a recap of the top 10 posts on Hacker News on Jul 29, 2025. Copyparty – Turn almost any device into a file server https://github.com/9001/copyparty https://news.ycombinator.com/item?id=44711519 Show HN: Use Their ID – Use your local UK MP’s ID for the Online Safety Act https://use-their-id.com/ https://news.ycombinator.com/item?id=44716106 …
…
continue reading

1
How Product-Led Security Leads to Paved Roads - Julia Knecht - ASW #341
1:04:11
1:04:11
Play later
Play later
Lists
Like
Liked
1:04:11A successful strategy in appsec is to build platforms with defaults and designs that ease the burden of security choices for developers. But there's an important difference between expecting (or requiring!) developers to use a platform and building a platform that developers embrace. Julia Knecht shares her experience in building platforms with an …
…
continue reading

1
7.28.25 | Trae IDE performance analysis, Dumb Pipe, EU app bans unlicensed Android systems
11:30
11:30
Play later
Play later
Lists
Like
Liked
11:30This is a recap of the top 10 posts on Hacker News on Jul 28, 2025. Performance and telemetry analysis of Trae IDE, ByteDance's VSCode fork https://github.com/segmentationf4u1t/trae_telemetry_research https://news.ycombinator.com/item?id=44703164 Dumb Pipe https://www.dumbpipe.dev/ https://news.ycombinator.com/item?id=44701555 EU age verification a…
…
continue reading

1
tj-actions Lessons Learned, US Cyber Offense, this week's enterprise security news - Dimitri Stiliadis - ESW #417
1:42:01
1:42:01
Play later
Play later
Lists
Like
Liked
1:42:01Interview Segment - Lessons Learned from the tj-actions GitHub Action Supply Chain Attack with Dimitri Stiliadis Breach analysis is one of my favorite topics to dive into and I’m thrilled Dimitri is joining us today to reveal some of the insights he’s pulled out of this GitHub Actions incident. It isn’t an overstatement to say that some of the less…
…
continue reading

1
Amazon AI Tool Hacked, Scattered Spider Attacks VMware, and Major Ransomware Takedown | Cybersecurity Today
11:09
11:09
Play later
Play later
Lists
Like
Liked
11:09In this episode of Cybersecurity Today, host David Shipley covers several key incidents impacting the cybersecurity landscape. Amazon's generative AI coding assistant 'Q' was compromised by a hacker who injected data-wiping code into the tool's GitHub repository. Scattered Spider, a notorious cybercrime group, continues its malware attacks on VMwar…
…
continue reading

1
7.27.25 | Rust on all GPUs, Rooting Copilot, Purple Earth hypothesis
12:21
12:21
Play later
Play later
Lists
Like
Liked
12:21This is a recap of the top 10 posts on Hacker News on Jul 27, 2025. Rust running on every GPU https://rust-gpu.github.io/blog/2025/07/25/rust-on-every-gpu/ https://news.ycombinator.com/item?id=44692876 How we rooted Copilot https://research.eye.security/how-we-rooted-copilot/ https://news.ycombinator.com/item?id=44695098 Purple Earth hypothesis htt…
…
continue reading

1
7.26.25 | Avoid app, use website, Steam and Itch.io remove 'porn' games, modern CSS should replace SPA
12:56
12:56
Play later
Play later
Lists
Like
Liked
12:56This is a recap of the top 10 posts on Hacker News on Jul 26, 2025. Do not download the app, use the website https://idiallo.com/blog/dont-download-apps https://news.ycombinator.com/item?id=44689059 Steam, Itch.io are pulling ‘porn’ games. Critics say it's a slippery slope https://www.wired.com/story/steam-itchio-are-pulling-porn-games-censorship/ …
…
continue reading

1
The Evolution and Defense Against Advanced Phishing Attacks
49:32
49:32
Play later
Play later
Lists
Like
Liked
49:32This is repeat of a broadcast from last October, still relevant, especially in the light of so many current breaches which have begun not with technical weaknesses but with phishing and social engineering. In this deeper dive episode of 'Cybersecurity Today,' hosts Jim Love and David Shipley, a top cybersecurity expert from Beauceron Security, expl…
…
continue reading

1
Total Recall, Steam, Storm-2063, Unmarker, Altair, Josh Marpet, and More... - SWN #497
33:07
33:07
Play later
Play later
Lists
Like
Liked
33:07Total Recall, Steam, Storm-2063, Unmarker, Altair, Josh Marpet, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-497
…
continue reading

1
7.25.25 | Graphene OS enhances Android security, Memory safety requires thread safety, AMD CEO predicts TSMC US plant chips 5%-20% pricier
12:53
12:53
Play later
Play later
Lists
Like
Liked
12:53This is a recap of the top 10 posts on Hacker News on Jul 25, 2025. Graphene OS: a security-enhanced Android build https://lwn.net/SubscriberLink/1030004/898017c7953c0946/ https://news.ycombinator.com/item?id=44676691 There is no memory safety without thread safety https://www.ralfj.de/blog/2025/07/24/memory-safety.html https://news.ycombinator.com…
…
continue reading