1681.
1683.
Palo Alto Networks agrees to buy CyberArk for $25B
(news.ycombinator.com)
1684.
1685.
1686.
Supporting the BEAM community with free CI/CD security audits
(news.ycombinator.com)
1687.
AI-powered Cursor IDE vulnerable to prompt-injection attacks
(bleepingcomputer.com)
1688.
Understanding the Complete Identity Management Ecosystem
(news.ycombinator.com)
1689.
Read This Before You Trust Any AI-Written Code
(gizmodo.com)
1690.
CISA open-sources Thorium platform for malware, forensic analysis
(bleepingcomputer.com)
1691.
Launch HN: Gecko Security (YC F24) – AI That Finds Vulnerabilities in Code
(news.ycombinator.com)
1692.
1693.
App Store safety again called into question by Tea app
(9to5mac.com)
1694.
1695.
1696.
Critical vulnerability in AI coding platform Base44 allowing unauthorized access
(news.ycombinator.com)
1697.
1698.
1699.
Palo Alto Networks agrees to buy CyberArk for $25 billion
(techcrunch.com)
1700.
Critical Vulnerability in AI Vibe Coding platform Base44
(news.ycombinator.com)
1701.
Critical Vulnerability Discovered 11 Days After Wix Buys Base44
(news.ycombinator.com)
1705.
1706.
1707.
1708.
Trump caving on Nvidia H20 export curbs may disrupt his bigger trade war
(arstechnica.com)
1709.
1710.