PyPI urges users to reset credentials after new phishing attacks
(bleepingcomputer.com)
841.
842.
843.
GitHub tightens npm security with mandatory 2FA, access tokens
(bleepingcomputer.com)
844.
Why attackers are moving beyond email-based phishing attacks
(bleepingcomputer.com)
845.
846.
INapGPU: Text-mode graphics card, using only TTL gates
(news.ycombinator.com)
847.
AI was supposed to help juniors shine. why does it mostly make seniors stronger?
(news.ycombinator.com)
848.
849.
850.
Rendezvous Hashing Explained (2020)
(news.ycombinator.com)
851.
How to motivate yourself to do a thing you don't want to do
(news.ycombinator.com)
852.
How to Motivate Yourself to Do a Thing You Don't Want to Do
(news.ycombinator.com)
853.
Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service
(bleepingcomputer.com)
854.
Things you can do with a Software Defined Radio (2024)
(news.ycombinator.com)
855.
Fifty Things you can do with a Software Defined Radio
(news.ycombinator.com)
856.
857.
New VoidProxy phishing service targets Microsoft 365, Google accounts
(bleepingcomputer.com)
858.
Reduce bandwidth costs with dm-cache: fast local SSD caching for network storage
(news.ycombinator.com)
859.
Learning lessons from the loss of the Norwegian frigate Helge Ingstad
(news.ycombinator.com)
860.
Tarsnap is cozy
(news.ycombinator.com)
861.
862.
Ask HN: Good resources for DIY-ish animatronic kits for Halloween?
(news.ycombinator.com)
863.
Hackers hijack npm packages with 2 billion weekly downloads in supply chain attack
(bleepingcomputer.com)
864.
iCloud Calendar abused to send phishing emails from Apple’s servers
(bleepingcomputer.com)
865.
867.
868.
869.