The New AI Consciousness Paper – By Scott Alexander
(news.ycombinator.com)
91.
92.
Google exposes BadAudio malware used in APT24 espionage campaigns
(bleepingcomputer.com)
93.
GlobalProtect VPN portals probed with 2.3 million scan sessions
(bleepingcomputer.com)
94.
W3 Total Cache WordPress plugin vulnerable to PHP command injection
(bleepingcomputer.com)
96.
Cursor Issue Paves Way for Credential-Stealing Attacks
(darkreading.com)
97.
98.
150,000 Packages Flood NPM Registry in Token Farming Campaign
(darkreading.com)
101.
102.
103.
104.
5 questions with Ikea’s new CEO, who explains why he’s happy with revenue being flat
(feeds.feedburner.com)
105.
106.
Malicious NuGet packages drop disruptive 'time bombs'
(bleepingcomputer.com)
107.
Supply chain attacks are exploiting our assumptions
(news.ycombinator.com)
109.
Gootloader malware is back with new tricks after 7-month break
(bleepingcomputer.com)
110.
The Top 3 Browser Sandbox Threats That Slip Past Modern Security Tools
(bleepingcomputer.com)
112.
Fake Solidity VSCode extension on Open VSX backdoors developers
(bleepingcomputer.com)
113.
Open VSX rotates access tokens used in supply-chain malware attack
(bleepingcomputer.com)
114.
115.
116.
117.
118.
What Is Intelligence?
(news.ycombinator.com)
120.
The security paradox of local LLMs
(news.ycombinator.com)