Threat actors abuse X’s Grok AI to spread malicious links
(bleepingcomputer.com)
181.
182.
What is it like to be a bat?
(news.ycombinator.com)
183.
What Is It Like to Be a Bat?
(news.ycombinator.com)
184.
Python has had async for 10 years – why isn't it more popular?
(news.ycombinator.com)
186.
New Group Claims AI May Be Aware and Suffering
(futurism.com)
187.
How RubyGems.org protects OSS infrastructure
(news.ycombinator.com)
188.
Malicious Android apps with 19M installs removed from Google Play
(bleepingcomputer.com)
191.
192.
LLMs and coding agents are a security nightmare
(news.ycombinator.com)
193.
LLMs and Coding Agents = Security Nightmare
(news.ycombinator.com)
194.
DoubleAgents: Fine-Tuning LLMs for Covert Malicious Tool Calls
(news.ycombinator.com)
195.
60 malicious Ruby gems downloaded 275,000 times steal credentials
(bleepingcomputer.com)
196.
Fake WhatsApp developer libraries hide destructive data-wiping code
(bleepingcomputer.com)
197.
Wave of 150 crypto-draining extensions hits Firefox add-on store
(bleepingcomputer.com)
198.
Attackers exploit link-wrapping services to steal Microsoft 365 logins
(bleepingcomputer.com)
199.
Inside a Real Clickfix Attack: How This Social Engineering Hack Unfolds
(bleepingcomputer.com)
200.
Flaw in Gemini CLI AI coding assistant allowed stealthy code execution
(bleepingcomputer.com)
201.
Consciousness and being: How humans and AI influence each other
(news.ycombinator.com)
202.
Hackers breach Toptal GitHub account, publish malicious npm packages
(bleepingcomputer.com)
203.
204.
Apple Sues the YouTuber Who Leaked iOS 26
(wired.com)
205.
Firefox-patch-bin, librewolf-fix-bin AUR packages contain malware
(news.ycombinator.com)
206.
207.
208.
Apple sues leaker Jon Prosser for stealing iOS secrets
(theverge.com)
209.
210.
GitHub abused to distribute payloads on behalf of malware-as-a-service
(arstechnica.com)