Zero Tweet

Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture
thehackernews.com
Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture
Mercor, a $10B AI startup confirms major data breach
fortune.com
Mercor, a $10B AI startup confirms major data breach
2 points Discussion
New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
thehackernews.com
New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK
thehackernews.com
Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK
They thought they were downloading Claude Code source
www.theregister.com
They thought they were downloading Claude Code source
1 point Discussion
Show HN: SkillCompass – Diagnose and Improve AI Agent Skills Across 6 Dimensions
SkillCompass is a local evaluation engine for Claude Code and OpenClaw that scores AI agent skills across six dimensions. It identifies the weakest area, fixes it, and moves to the next while detecting when skills become obsolete. The tool runs locally and requires Node.js v18+.
github.com
Show HN: SkillCompass – Diagnose and Improve AI Agent Skills Across 6 Dimensions
2 points Discussion
Pentagon Pete's Bigoted Reason for Firing Top General Leaks
www.thedailybeast.com
Pentagon Pete's Bigoted Reason for Firing Top General Leaks
4 points Discussion
Can servers use elicitation for HITL scenarios?
realarcherl.github.io
Can servers use elicitation for HITL scenarios?
1 point Discussion
Open-source runtime security toolkit for autonomous AI agents covering OWASP Top
opensource.microsoft.com
Open-source runtime security toolkit for autonomous AI agents covering OWASP Top
1 point Discussion
How we caught the Axios supply chain attack
The article details the discovery of a supply chain attack on the Axios library, highlighting the technical investigation and the difficulties faced during responsible disclosure. Engagement is likely High given the critical nature of the software. Comments show appreciation for the researchers but frustration regarding the unresponsiveness of npmjs security channels.
www.elastic.co
How we caught the Axios supply chain attack
1 3 points Discussion
Show HN: Trytet – Deterministic WASM substrate for stateful AI agents
Trytet is a deterministic WebAssembly substrate designed to solve state and geography constraints for autonomous AI agents. It allows developers to snapshot, hibernate, or migrate agent execution state to edge nodes, enabling sub-millisecond, zero-trust execution without losing context. The project also includes a new Context Router to manage LLM context limits efficiently.
trytet.com
Show HN: Trytet – Deterministic WASM substrate for stateful AI agents
2 points Discussion
Node.js Security Bug Bounty Program Paused Due to Loss of Funding
nodejs.org
Node.js Security Bug Bounty Program Paused Due to Loss of Funding
1 point Discussion
Mount Everest Climbers 'Poisoned' By Guides In Insurance Fraud Scheme
Nepalese guides and trekking companies are running a sophisticated insurance fraud scheme by deliberately poisoning or frightening tourists into fake helicopter evacuations, then billing insurers inflated amounts. Methods include mixing baking powder into food, inducing altitude sickness symptoms through excessive water intake, and fabricating medical records while hospitals and operators collect massive commissions. The scam has persisted despite government investigations and reforms announced in 2018.
news.slashdot.org
Mount Everest Climbers 'Poisoned' By Guides In Insurance Fraud Scheme
1
Google releases Gemma 4 open models
Google released Gemma 4 open models, including a 31B dense and 26B MoE variant that users find competitive with Qwen 3.5 for local inference. The community discusses quantization, hardware requirements, and multimodal capabilities while debating the validity of Google's benchmark claims. Engagement is High, featuring active participation from developers and detailed technical analysis. Comments are enthusiastic but pragmatic, focusing on practical performance and tool integration.
deepmind.google
Google releases Gemma 4 open models
314 1011 points Discussion
Denuvo has been broken, company promises countermeasures against new DRM bypass
Denuvo's DRM protection has been bypassed again, with the company promising new countermeasures. An industry insider explains that while all DRM can eventually be cracked, publishers use it to delay piracy during the critical first 14-30 days when most revenue is made, forcing impatient pirates to convert to paying customers. The commenter notes that paying customers ultimately suffer through performance hits and monitoring while pirates eventually get cleaner versions.
Engagement Level: Medium
Comment sentiment is analytical and pragmatic, offering insider perspective rather than emotional reaction. The tone is balanced, acknowledging business realities while expressing sympathy for legitimate customers who bear the burden of DRM systems.
www.tomshardware.com
Denuvo has been broken, company promises countermeasures against new DRM bypass
1 1 point Discussion
Spyware Vendor Creates Fake WhatsApp App
securityaffairs.com
Spyware Vendor Creates Fake WhatsApp App
1 point Discussion
Show HN: Claude Code leak forced this early – Dojo dual agents vs. Claude/Codex
The author released ehAye Engine, a local-first agent environment with Dojo Agents that provides a unified interface for working with multiple coding tools and AI providers. It features multi-provider support, Telegram integration, browser automation, and privacy-focused design. The project was released early due to the Claude Code leak and aims to let users mix providers and workflows rather than lock into one ecosystem.
ehaye.io
Show HN: Claude Code leak forced this early – Dojo dual agents vs. Claude/Codex
1 point Discussion
UpGuard Discovers a Chinese Dark Web Monitoring Database
www.upguard.com
UpGuard Discovers a Chinese Dark Web Monitoring Database
1 point Discussion
Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials
thehackernews.com
Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials
IBM Teams Up With Arm To Run Arm Workloads On IBM Z Mainframes
IBM and Arm are partnering to enable Arm-based software to run on IBM Z mainframes through virtualization, targeting regulated industries that can't move workloads to the cloud. The collaboration focuses on security compliance, virtualization tools, and common technology layers, addressing a gap where mainframe customers missed out on Arm's efficiency gains already benefiting hyperscalers.
Engagement: Low (1 comment)
Sentiment: The single comment is humorous, making a pun about "Arm" and "leg day" workouts.
slashdot.org
IBM Teams Up With Arm To Run Arm Workloads On IBM Z Mainframes
1
The author has updated Shazzer's collection view with a new feature that allows users to expand results directly below the vector. This improvement makes it easier to view and analyze the data within each collection entry.
bsky.app
Analyzing Claude Code source leak
www.sabrina.dev
Analyzing Claude Code source leak
1 point Discussion
New Rowhammer attacks give complete control of machines running Nvidia GPUs
arstechnica.com
New Rowhammer attacks give complete control of machines running Nvidia GPUs
3 points Discussion
Anthropic leak reveals Claude Code tracking user frustration
www.scientificamerican.com
Anthropic leak reveals Claude Code tracking user frustration
Discussion
LinkedIn Is Illegally Searching Your Computer
LinkedIn scans Chrome-based browsers for thousands of specific installed extensions, revealing sensitive data such as religious beliefs, political opinions, and job search activity without user consent. This practice raises significant legal concerns under GDPR and highlights how browser fingerprinting techniques can be used for invasive profiling.
Engagement is High, with hundreds of comments debating the technical mechanics of extension scanning, the legality of data collection, and the ethical responsibilities of tech companies. The sentiment is overwhelmingly negative and frustrated, focusing on privacy invasion and corporate surveillance, though some users criticize the article's headline as alarmist while still agreeing the underlying behavior is problematic.
browsergate.eu
LinkedIn Is Illegally Searching Your Computer
499 1087 points Discussion
Claude.ai Prompt Injection Vulnerability
www.oasis.security
Claude.ai Prompt Injection Vulnerability
2 points Discussion
ICE says it bought Paragon’s spyware to use in drug trafficking cases
ICE Acting Director Todd Lyons confirmed to lawmakers that the agency purchased and deployed Paragon Solutions' spyware for drug trafficking investigations, claiming it complies with constitutional requirements. The contract, signed in 2024 and reactivated in September 2025 after a Biden administration review, has drawn criticism from lawmakers concerned about civil rights risks—especially given Paragon's involvement in a scandal where journalists and activists in Italy were targeted.
techcrunch.com
ICE says it bought Paragon’s spyware to use in drug trafficking cases
Discussion
Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise
thehackernews.com
Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise
Libinput Hit by Worrying Security Issues with Its Lua Plug-In System
www.phoronix.com
Libinput Hit by Worrying Security Issues with Its Lua Plug-In System
Discussion
[tl;dr sec] #322 - GitHub's Supply Chain Roadmap, Scaling Vulnerability Management with AI, Finding Vulnerabilities Across Repos
tldrsec.com
[tl;dr sec] #322 - GitHub's Supply Chain Roadmap, Scaling Vulnerability Management with AI, Finding Vulnerabilities Across Repos
Show HN: Local-first agent memory loop 48hrs before the Claude Code leak
The author spent a year building a "Dream Engine" to solve agent statelessness and open-sourced it on March 28th. 48 hours later, the Claude Code leak revealed an internal "autoDream" feature with identical 4-phase consolidation logic. They're now seeking a technical audit of their memory decay logic to ensure it won't bottleneck at scale with 100+ nodes.
github.com
Show HN: Local-first agent memory loop 48hrs before the Claude Code leak
1 point Discussion
Artemis II Launch Day Updates
Artemis II successfully launched four astronauts on the first crewed mission beyond low Earth orbit since 1972, conducting a lunar flyby before returning to Earth. The mission tests Orion spacecraft systems for future lunar landings under the Artemis program. High engagement with extensive technical discussion. Mixed sentiment: many express excitement and inspiration at returning humans to deep space, while others raise concerns about heat shield safety, program costs, political context, and question the value compared to robotic missions or other priorities.
www.nasa.gov
Artemis II Launch Day Updates
881 1005 points Discussion
Show HN: PGP Made Convenient
This is a Show HN post introducing an open-source PGP browser extension designed to make encryption more user-friendly with passkeys as the primary flow, zero permissions required, and no external server calls. The tool allows users to choose between synced storage or fully local storage, uses SequoiaPGP compiled to WASM for cryptography, and supports drag-and-drop file encryption. The creator built it to streamline their own workflow for encrypting vulnerability reports after finding existing solutions cumbersome.
chromewebstore.google.com
Show HN: PGP Made Convenient
1 point Discussion
I'm OK being left behind, thanks
The article advocates for a "wait and see" approach to new technologies like AI, arguing that early adoption is often a tax on one's time compared to learning mature tools later. Engagement is High, with a massive volume of detailed comments debating the premise. The sentiment is polarized; many agree with the skepticism towards hype cycles, while others argue that AI is uniquely transformative and waiting risks professional obsolescence.
shkspr.mobi
I'm OK being left behind, thanks
767 1000 points Discussion
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit
cloud.google.com
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit
1 point Discussion
Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit
thehackernews.com
Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit
Declining Global Security
epthinktank.eu
Declining Global Security
Discussion
Forensic analysis of 37GB data loss caused by Cursor AI Agent
github.com
Forensic analysis of 37GB data loss caused by Cursor AI Agent
Discussion
Show HN: Open-agent-SDK – Claude Code's internals, extracted and open-sourced
The author created open-agent-sdk by extracting core logic from Claude Code's leaked source map, offering a cloud-native alternative to the official SDK. This open-source version uses pure function calls instead of spawning CLI processes, improving scalability for heavy cloud deployments. It is MIT licensed and designed as a drop-in replacement for the existing claude-agent-sdk interface.
github.com
Show HN: Open-agent-SDK – Claude Code's internals, extracted and open-sourced
1 point Discussion
The Claude Code Leak
build.ms
The Claude Code Leak
1 point Discussion
What Claude Code Leak Teaches Us About Agent Skills
skilldb.dev
What Claude Code Leak Teaches Us About Agent Skills
2 points Discussion
CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails
thehackernews.com
CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails
Apple Issues Rare iOS 18 Security Update to Protect Against DarkSword Exploit
www.macrumors.com
Apple Issues Rare iOS 18 Security Update to Protect Against DarkSword Exploit
1 point Discussion
Is "Hackback" Official US Cybersecurity Strategy?
This article explores whether "hackback" - private companies retaliating against cyber attackers - has become official US policy. The piece likely examines the legal and strategic implications of shifting cyber defense responsibilities from government to private entities.
Engagement: Low (single comment visible)
The comment expresses skepticism about the strategy, questioning why the US military isn't better utilizing cyber reservists instead of relying on private companies. The tone is critical and analytical, suggesting poor recruitment or structural problems in how the government engages skilled cybersecurity professionals.
www.schneier.com
Is "Hackback" Official US Cybersecurity Strategy?
1 5 points Discussion
Anthropic Issues Copyright Takedown Requests To Remove 8,000+ Copies of Claude Code Source Code
Anthropic issued copyright takedown notices to remove 8,000+ copies of Claude Code source code that was accidentally leaked on GitHub. The code contained interesting features like a "dreaming" process for memory consolidation and instructions to operate "undercover" when publishing code. After the takedown requests, another programmer used AI tools to rewrite the functionality in other languages to keep it available.
Medium engagement with 9 comments. Sentiment is largely critical of Anthropic, with commenters expressing skepticism about the effectiveness of takedowns and drawing parallels to past failed censorship attempts. Several users appear to take satisfaction in seeing Anthropic face consequences, with one noting "The Net interprets censorship as damage and routes around it."
developers.slashdot.org
Anthropic Issues Copyright Takedown Requests To Remove 8,000+ Copies of Claude Code Source Code
9
Quantum physics can confirm where someone is located
www.sciencenews.org
Quantum physics can confirm where someone is located
Discussion
Show HN: Real-time dashboard for Claude Code agent teams
github.com
Show HN: Real-time dashboard for Claude Code agent teams
Discussion
Anthropic Races to Contain Leak of Code Behind Claude AI Agent
www.wsj.com
Anthropic Races to Contain Leak of Code Behind Claude AI Agent
3 points Discussion
AI Agent Security: What SoC 2, ISO 27001, and HIPAA Mean in Production
simplai.ai
AI Agent Security: What SoC 2, ISO 27001, and HIPAA Mean in Production
1 point Discussion
Axios NPM Package Supply Chain Hack
www.bleepingcomputer.com
Axios NPM Package Supply Chain Hack
1 point Discussion