TI to invest $60B to manufacture foundational semiconductors in the U.S.
(news.ycombinator.com)
1981.
1982.
1983.
1984.
Microsoft 365 to block file access via legacy auth protocols by default
(bleepingcomputer.com)
1985.
ChainLink Phishing: How Trusted Domains Become Threat Vectors
(bleepingcomputer.com)
1986.
1988.
1989.
1990.
Wyze says its security cameras deserve your trust again
(theverge.com)
1991.
1992.
Cybersecurity takes a big hit in new Trump executive order
(arstechnica.com)
1993.
1994.
1995.
Our top air purifier is $35 off in an early Prime Day deal
(engadget.com)
1996.
1997.
1998.
1999.
2001.
2002.
2003.
The Skyscraper That Could Have Toppled over in the Wind (1995)
(news.ycombinator.com)
2004.
Over 46,000 Grafana instances exposed to account takeover bug
(bleepingcomputer.com)
2005.
2006.
Ruby on Rails Audit Complete
(news.ycombinator.com)
2007.
Infineon security microcontroller flaw enabled extraction of TPM secret keys
(news.ycombinator.com)
2008.
So... You Want to Become a Penetration Tester?
(techspot.com)
2009.
So... You Want to Become a Penetration Tester?
(techspot.com)
2010.
Red team AI now to build safer, smarter models tomorrow
(venturebeat.com)
Today's top topics:
android authority
startup
apple
anthropic
y combinator
delve
funding
ios 18
darksword
microsoft