Zero Tweet

Border social media searches and English: Australian conservative migration plan
www.smh.com.au
Border social media searches and English: Australian conservative migration plan
1 point Discussion
Fake job recruiters hide malware in developer coding challenges
www.bleepingcomputer.com
Fake job recruiters hide malware in developer coding challenges
2 points Discussion
DHS has reportedly sent out subpoenas to identify ICE critics online
DHS has issued hundreds of administrative subpoenas to Google, Reddit, Discord, and Meta seeking identifying information on users who criticize ICE or share agent locations. Some companies have already complied with portions of these requests, raising First Amendment concerns.
Engagement: High
Sentiment: Comments are overwhelmingly critical, expressing alarm over government surveillance of political speech and frustration at tech companies for cooperating.
www.engadget.com
DHS has reportedly sent out subpoenas to identify ICE critics online
1 6 points Discussion
The conversation on European nukes is heating up in Munich
The article discusses growing European interest in developing an independent nuclear deterrent, driven by concerns over US reliability and Russian aggression. Key figures at the Munich Security Conference are debating whether Europe needs its own nuclear capabilities outside of NATO's umbrella.
Engagement Level: High. This is a major geopolitical topic with significant implications for European security architecture.
Comment Sentiment: Mixed to tense. Discussions are serious and polarized, with some users advocating for European strategic autonomy while others worry about escalation with Russia or the feasibility of such programs.
www.politico.eu
The conversation on European nukes is heating up in Munich
1 1 point Discussion
Crypto Asset Tracing Specialists – Intelligence Cyber Wizard
Overview: This is a promotional post for Intelligence Cyber Wizard, a cryptocurrency wallet recovery service founded in 2016 with offices in San Francisco and Switzerland. The post details their history, global presence at crypto conferences, and includes warnings about scammers impersonating them on social media. Engagement Level: Low-Medium. Sentiment: Highly skeptical—HN users typically view crypto recovery services with suspicion, often flagging them as potential scams or questioning their legitimacy.
news.ycombinator.com
Crypto Asset Tracing Specialists – Intelligence Cyber Wizard
1 point
Must see: Hacking Gemini - A Multi-Layered Approach.
buganizer.cc
Must see: Hacking Gemini - A Multi-Layered Approach.
uBlock filter list to hide all YouTube Shorts
Users discuss a uBlock filter list that hides YouTube Shorts from the interface, with many sharing alternative solutions like redirecting shorts to normal video URLs, using extensions like Unhook, or disabling watch history entirely. Engagement is High with extensive technical discussion and solution-sharing. Comments show frustration with YouTube's aggressive shorts promotion, viewing it as manipulative and addictive, while users enthusiastically exchange workarounds.
github.com
uBlock filter list to hide all YouTube Shorts
315 1065 points Discussion
Fake Job Recruiters Hid Malware In Developer Coding Challenges
North Korean hackers pose as fake recruiters targeting devs with malicious coding challenges on LinkedIn and Reddit. Over 190 malicious npm/PyPI packages deliver a RAT that steals crypto and exfiltrates files. Engagement: Medium. Comments show cynical debate about job market desperation vs. gullibility, with some victim-blaming and broader critiques of LinkedIn and crypto.
it.slashdot.org
Fake Job Recruiters Hid Malware In Developer Coding Challenges
11
Show HN: Threat Radar – Live cyber threat intelligence dashboard
This is a Show HN post for Threat Radar, a live cyber threat intelligence dashboard hosted at radar.offseq.com. The tool appears to provide real-time visualization of cybersecurity threats and threat intelligence data for security professionals.
Engagement level cannot be determined as no comment data was provided.
No comments available to analyze sentiment or tone.
radar.offseq.com
Show HN: Threat Radar – Live cyber threat intelligence dashboard
222 points Discussion
Apple Patches Decade-Old IOS Zero-Day, Possibly Exploited By Commercial Spyware
Apple patched a decade-old iOS zero-day (CVE-2026-20700) that enabled sophisticated attacks including code execution and sandbox escape, likely exploited by commercial spyware vendors. The flaw was discovered by Apple and Google's Threat Analysis Group and linked to two WebKit zero-days patched in December 2025.
Engagement: Low (7 comments)
Sentiment: Technical but scattered discussion. Comments touch on Chrome/Safari shared code origins, mild criticism of Apple's transparency, a pedantic IOS vs iOS correction, and one crude off-topic remark.
apple.slashdot.org
Apple Patches Decade-Old IOS Zero-Day, Possibly Exploited By Commercial Spyware
7
Homeland Security reportedly sent hundreds of subpoenas seeking to unmask anti-ICE accounts
DHS has reportedly sent hundreds of administrative subpoenas to Google, Meta, Reddit, and Discord seeking to unmask anonymous accounts critical of ICE or sharing agent locations. These subpoenas don't require judicial approval, and while some tech companies have complied, DHS has withdrawn demands when targeted users fought back with lawsuits.
techcrunch.com
Homeland Security reportedly sent hundreds of subpoenas seeking to unmask anti-ICE accounts
Discussion
Textpattern CMS 4.9.1 released: security fixes, patches and tweaks
Summary: Textpattern CMS version 4.9.1 has been released with a focus on security fixes, patches, and general improvements. It's a maintenance update addressing vulnerabilities and refining the platform.
Engagement: Low (no visible comments on the post)
Comments Vibe: No comments available to assess sentiment or discussion tone.
textpattern.com
Textpattern CMS 4.9.1 released: security fixes, patches and tweaks
1 point Discussion
Sudden Telnet Traffic Drop. Are Telcos Filtering Ports to Block Critical Vulnerability?
Summary: Telnet traffic plummeted 59% on Jan 14, 2026—six days before a critical root-access vulnerability (CVE-2026-24061) was publicly disclosed. GreyNoise researchers suspect Tier 1 telcos received advance warning and quietly implemented port 23 filtering.
Engagement: Medium (16 comments)
Comments Vibe: Mostly disbelief and amusement that anyone still runs Telnet in 2026. Commenters are shocked telnetd servers exist on the open internet, joke about "zombie protocols," and support the port blocking. A few note the semi-secret early CVE disclosure process for major orgs.
tech.slashdot.org
Sudden Telnet Traffic Drop. Are Telcos Filtering Ports to Block Critical Vulnerability?
16
[Media] Abuse-prevention design: using IP reputation as one signal in signup defense-in-depthh [...]
Summary: Discusses using IP reputation as one layer in a multi-layered approach to preventing signup abuse. Emphasizes defense-in-depth strategy where no single signal is relied upon alone, but combined with other signals for better detection. Practical guidance for security teams building abuse prevention systems.
t.me
[Media] Abuse-prevention design: using IP reputation as one signal in signup defense-in-depthh [...]
[Media] I’m building graph-based compliance risk engine, looking for honest feedbackhttp://joi [...]
A developer is building a graph-based compliance risk engine and seeking honest feedback from the community. The project appears to leverage graph database technology for identifying and assessing compliance-related risks. Shared via a NetSec Telegram channel.
t.me
[Media] I’m building graph-based compliance risk engine, looking for honest feedbackhttp://joi [...]
[Media] Hacking a pharmacy to get free prescription drugs and morehttps://ift.tt/jakwG37Submit [...]
Article discusses methods for hacking pharmacy systems to obtain free prescription drugs and other unauthorized access. Covers vulnerabilities in pharmacy software and potential security risks in healthcare infrastructure.
t.me
[Media] Hacking a pharmacy to get free prescription drugs and morehttps://ift.tt/jakwG37Submit [...]
CIA investigated secret 'Havana syndrome' weapon experiment in Norway
Summary: The CIA reportedly investigated a secret experiment in Norway linked to "Havana syndrome," the mysterious health condition affecting US personnel abroad. This suggests possible directed-energy weapon testing on foreign soil.
Engagement: Cannot assess (no comments provided)
Comments Vibe: N/A - No comments available to analyze.
www.washingtonpost.com
CIA investigated secret 'Havana syndrome' weapon experiment in Norway
1 point Discussion
Hold the security: a vibe-coding story
Summary: Article appears to discuss "vibe-coding" (intuitive/AI-assisted coding) and its security implications, likely a cautionary tale about skipping security practices. Engagement: Unable to assess - no comments displayed. Comments Vibe: N/A - no comments available to analyze.
blog.harrym.com
Hold the security: a vibe-coding story
1 point Discussion
Israeli Soldiers Accused of Using Polymarket To Bet on Strikes
Summary: Israeli reservists were arrested for allegedly using classified military intel to bet on Polymarket about Israeli strikes on Iran, with one account winning over $150K by correctly predicting a 12-day war timeline. Shin Bet indicted suspects on serious security offenses.
Engagement: Low (13 comments)
Comments Vibe: Cynical and darkly amused—commenters reference the irony that prediction markets for violence were always predicted to enable insider trading by those with foreknowledge. Some debate whether this qualifies as "news for nerds," while others express moral outrage at profiting from conflict.
news.slashdot.org
Israeli Soldiers Accused of Using Polymarket To Bet on Strikes
13
How does token bucket enforces bursty output traffic?
Summary: A technical discussion question about how the token bucket algorithm controls and enforces bursty network traffic patterns. The post explores the mechanics of rate limiting through token accumulation and consumption.
Engagement: Unable to determine - no comments were provided in the data.
Comments Vibe: No comments available to analyze sentiment or discussion tone.
news.ycombinator.com
How does token bucket enforces bursty output traffic?
1 point
Fintech lending giant Figure confirms data breach
Figure Technology, a blockchain-based lending company, confirmed a data breach caused by a social engineering attack on an employee. Hacking group ShinyHunters claimed responsibility and published 2.5GB of stolen customer data—including names, addresses, DOBs, and phone numbers—after the company refused to pay a ransom. The breach was part of a larger campaign targeting Okta SSO customers.
techcrunch.com
Fintech lending giant Figure confirms data breach
Discussion
Fix the iOS keyboard before the timer hits zero or I'm switching back to Android
Summary: A frustrated iOS user created a countdown website threatening to switch to Android in 120 days if Apple doesn't fix the notoriously broken iOS keyboard. The keyboard suffers from autocorrect failures, incorrect key registration, and poor text selection—issues many users have experienced since iOS 17.
Engagement: High - massive comment thread with hundreds of responses validating the issue.
Comments Vibe: Exasperated and vindicated—users thought they were losing their minds or getting worse at typing, but now realize it's a widespread software regression. Many share similar frustrations and are considering leaving iOS. Some debate whether the threat is meaningful, while others appreciate the humor. Strong consensus that Apple's software quality has declined.
ios-countdown.win
Fix the iOS keyboard before the timer hits zero or I'm switching back to Android
703 1431 points Discussion
Gemini 3 Deep Think
Summary: Google's Gemini 3 Deep Think achieved 84.6% on ARC-AGI-2, significantly outperforming competitors like Opus 4.6 (68.8%), though at $13.62 per task. The release has sparked debate about whether benchmark gains translate to real-world utility, with users reporting mixed experiences despite impressive scores.
Engagement: High - extensive technical discussion with hundreds of comments debating AGI definitions, benchmark validity, and real-world model performance.
Comments Vibe: Deeply divided and skeptical. Users are torn between awe at benchmark breakthroughs and frustration that Gemini's real-world coding/product experience doesn't match its scores. Heated debates about "benchmaxxing," AGI definitions, and whether labs are gaming metrics. Many note Gemini's excellent visual reasoning but poor instruction-following and agentic workflows compared to Claude.
blog.google
Gemini 3 Deep Think
689 1044 points Discussion
[Media] Best Free Security Tools Everyone Should Use in 2026https://ift.tt/lbmaKt9Submitted Fe [...]
A 2026 guide highlighting essential free security tools for everyday users. Covers must-have software for protecting your digital life without spending a dime. Useful roundup for anyone looking to boost their cybersecurity posture.
t.me
[Media] Best Free Security Tools Everyone Should Use in 2026https://ift.tt/lbmaKt9Submitted Fe [...]
[tl;dr sec] #315 - Securing OpenClaw, Top 10 Web Hacking Techniques of 2025, Discovering Negative-Days with LLMs
This security newsletter covers securing OpenClaw AI agents with new tools like ClawShield and clawdstrike, PortSwigger's Top 10 Web Hacking Techniques of 2025 featuring novel SSRF and SSTI methods, and how LLMs are revolutionizing vulnerability discovery - Claude Opus 4.6 found 500+ memory corruption bugs while a GitHub Action now detects "negative-days" (vulnerabilities patched before getting a CVE). 🔐
tldrsec.com
[tl;dr sec] #315 - Securing OpenClaw, Top 10 Web Hacking Techniques of 2025, Discovering Negative-Days with LLMs
Windows 11 Notepad Flaw Let Files Execute Silently via Markdown Links
Summary: Microsoft patched a serious flaw in Windows 11 Notepad that let attackers silently execute programs via malicious Markdown links. The vulnerability (CVE-2026-20841) stemmed from Notepad's new Markdown support added after WordPad was discontinued.
Engagement: Medium (28 comments with substantial discussion)
Comments Vibe: Highly critical and cynical. Users are frustrated that Microsoft took a simple, secure app and made it a malware vector by adding unnecessary features. Many blame corporate incentives, incompetence, and the shift toward AI/cloud focus at the expense of OS quality. Several sarcastically note the irony of killing WordPad for "security" only to introduce worse vulnerabilities.
tech.slashdot.org
Windows 11 Notepad Flaw Let Files Execute Silently via Markdown Links
28
Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability
Critical BeyondTrust vulnerability (CVE-2026-1731, CVSS 9.9) is now being actively exploited in the wild, allowing unauthenticated remote code execution. CISA also added 4 flaws to its KEV catalog, including a Notepad++ supply chain attack by China-linked Lotus Blossom that went undetected for 5 months. Patch immediately if you use these products.
thehackernews.com
Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability
Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
Security researchers uncovered multiple malicious Chrome extension campaigns: "CL Suite" steals Meta/Facebook Business data and 2FA codes, "VK Styles" hijacked 500K VKontakte accounts, and "AiFrame" uses 32 fake AI extensions to siphon credentials from 260K+ users. A separate report found 287 extensions exfiltrating browsing history from 37.4 million installs—users should audit extensions and limit installs to essential, well-reviewed tools.
thehackernews.com
Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
FTC Ratchets Up Microsoft Probe, Queries Rivals on Cloud, AI
Summary: The FTC is escalating its antitrust probe into Microsoft, issuing civil subpoenas to competitors about potentially monopolistic practices in cloud computing and AI. Investigators are examining whether Microsoft's licensing and bundling of products like Windows, Office, and Copilot unfairly lock customers into its ecosystem.
Engagement: Medium (significant regulatory story with industry-wide implications)
Comments Vibe: Likely divided—some users critical of Microsoft's market dominance and bundling tactics, others skeptical of government intervention or pointing to similar practices by other tech giants.
slashdot.org
FTC Ratchets Up Microsoft Probe, Queries Rivals on Cloud, AI