New comment by jabedude in "Ask HN: Who wants to be hired? (November 2025)"
news.ycombinator.com·5h·
Discuss: Hacker News
🦹cybercrime
Flag this post
Resolving the Scourge of Java's Checked Exceptions on Its Streams and Lambdas
javajanitorjim.substack.com·3h·
Discuss: Substack
🦹cybercrime
Flag this post
CyberGhost DMCAs Our Story About Their Bogus DMCA (Yes, Really)
techdirt.com·2d·
Discuss: Hacker News
🦹cybercrime
Flag this post
Cybersecurity Alert as PolarEdge Botnet Hijacks 25,000 IoT Systems Globally
blogger.com·18h
🦹cybercrime
Flag this post
Introducing FadCrypt v2.0: Finally, a Beautiful Desktop App Locker & File Encryptor That Actually Works
reddit.com·14h·
Discuss: r/linux
🦹cybercrime
Flag this post
Meta’s ‘Rule of Two’ Is Dangerous: The AI Security Crisis No One’s Admitting
pub.towardsai.net·2d
🦹cybercrime
Flag this post
Crowdstrike: AI Accelerating Ransomware Attacks Across Europe
techrepublic.com·2d
🔍Cyber threat intelligence
Flag this post
Ernst & Young Exposes 4TB Database Backup Online, Leaking Company Secrets
blogger.com·14h
🦹cybercrime
Flag this post
Deploy Your Web App in 1 Minute
dev.to·7h·
Discuss: DEV
🦹cybercrime
Flag this post
Protection against surveillance
discuss.privacyguides.net·4h
🦹cybercrime
Flag this post
US Congressional Budget Office Hit By Suspected Foreign Cyberattack
it.slashdot.org·2d
🦹cybercrime
Flag this post
Use Case: CC and Sonnet 4.5 as system monitoring tool
reddit.com·6h·
Discuss: r/ClaudeAI
🦹cybercrime
Flag this post
AI-Induced Psychosis as Existential Risk Lower Bound
flocrivello.com·1d·
Discuss: Hacker News
🦹cybercrime
Flag this post
NPM supply chain attacks with Charlie Erickson
opensourcesecurity.io·1h
🦹cybercrime
Flag this post
Washington Post among breach victims in Oracle EBS zero-day attacks
scworld.com·1d·
Discuss: Hacker News
🦹cybercrime
Flag this post
Ransomware Surge Poses Geopolitical and Economic Risks, Warns Joint Cybersecurity Report
blogger.com·12h
🦹cybercrime
Flag this post
Account Takeover via IDOR: From UserID to Full Access
infosecwriteups.com·16h
🔍Cyber threat intelligence
Flag this post
Hackers Exploit AI Stack in Windows to Deploy Malware
blogger.com·10h
🦹cybercrime
Flag this post
How to rate-limit requests with NGINX
joshtronic.com·1d
🦹cybercrime
Flag this post