661.
662.
Pg_lake: Postgres with Iceberg and data lake access
(news.ycombinator.com)
663.
The Top 3 Browser Sandbox Threats That Slip Past Modern Security Tools
(bleepingcomputer.com)
664.
665.
666.
US cybersecurity experts indicted for BlackCat ransomware attacks
(bleepingcomputer.com)
667.
668.
669.
Most-Viewed Bills - Week of November 2, 2025
(congress.gov)
670.
The Pixel 10 Pro’s new voice typing is wild, and it’s changed how I use my phone
(androidauthority.com)
671.
672.
Open VSX rotates access tokens used in supply-chain malware attack
(bleepingcomputer.com)
673.
Why Nextcloud feels slow to use
(news.ycombinator.com)
674.
676.
Kimi Linear: An Expressive, Efficient Attention Architecture
(news.ycombinator.com)
677.
Show HN: Pipelex – Declarative language for repeatable AI workflows
(news.ycombinator.com)
678.
Extropic Aims to Disrupt the Data Center Bonanza
(wired.com)
680.
Glyph: Scaling Context Windows via Visual-Text Compression
(news.ycombinator.com)
681.
682.
DeepSeek may have found a new way to improve AI’s ability to remember
(technologyreview.com)
683.
Show HN: Dexto – Connect your AI Agents with real-world tools and data
(news.ycombinator.com)
684.
Text2SQL is dead – long live text2SQL
(news.ycombinator.com)
685.
New Herodotus Android malware fakes human typing to avoid detection
(bleepingcomputer.com)
686.
687.
688.
Here’s how Google might make Messages easier to use with one hand
(androidauthority.com)
689.
The high tech studio transforming movie car stunts
(feeds.bbci.co.uk)
690.
Belittled Magazine: Thirty years after the Sokal affair
(news.ycombinator.com)