The Oxford Comma – Why and Why Not
(news.ycombinator.com)
1.
2.
Suspected RedLine infostealer malware admin extradited to US
(bleepingcomputer.com)
3.
Ex-NSA Directors Discuss 'Red Line' for Offensive Cyberattacks
(darkreading.com)
4.
OpenAI is shutting down its Sora video generation app
(engadget.com)
5.
6.
Ripgrep is faster than grep, ag, git grep, ucg, pt, sift (2016)
(news.ycombinator.com)
7.
The final switch: Goldsboro, 1961
(news.ycombinator.com)
9.
New font-rendering trick hides malicious commands from AI tools
(bleepingcomputer.com)
10.
Building a Shell
(news.ycombinator.com)
12.
Invoker Commands API
(news.ycombinator.com)
13.
Show HN: Terminal Phone – E2EE Walkie Talkie from the Command Line
(news.ycombinator.com)
14.
The Missing Semester of Your CS Education – Revised for 2026
(news.ycombinator.com)
15.
ShannonMax: A Library to Optimize Emacs Keybindings with Information Theory
(news.ycombinator.com)
17.
Show HN: A Unix environment in a single HTML file (420 KB)
(news.ycombinator.com)
18.
Using go fix to modernize Go code
(news.ycombinator.com)
19.
Suicide Linux (2009)
(news.ycombinator.com)
20.
picol: A Tcl interpreter in 500 lines of code
(news.ycombinator.com)
21.
New ClickFix attack abuses nslookup to retrieve PowerShell payload via DNS
(bleepingcomputer.com)
22.
Use Microsoft Office Shortcuts in Libre Office
(news.ycombinator.com)
23.
My smart sleep mask broadcasts users' brainwaves to an open MQTT broker
(news.ycombinator.com)
24.
25.
Rendering the Visible Spectrum
(news.ycombinator.com)
26.
Claude LLM artifacts abused to push Mac infostealers in ClickFix attack
(bleepingcomputer.com)
27.
Once-hobbled Lumma Stealer is back with lures that are hard to resist
(arstechnica.com)
28.
LummaStealer infections surge after CastleLoader malware campaigns
(bleepingcomputer.com)
29.
Warp unveils new software for collaborative AI coding
(feeds.feedburner.com)
30.
Offpunk 3.0
(news.ycombinator.com)