New font-rendering trick hides malicious commands from AI tools
(bleepingcomputer.com)
1.
3.
ShannonMax: A Library to Optimize Emacs Keybindings with Information Theory
(news.ycombinator.com)
4.
Show HN: A Unix environment in a single HTML file (420 KB)
(news.ycombinator.com)
5.
picol: A Tcl interpreter in 500 lines of code
(news.ycombinator.com)
6.
New tool blocks imposter attacks disguised as safe commands
(bleepingcomputer.com)
7.
Start all of your commands with a comma (2009)
(news.ycombinator.com)
8.
Start all of your commands with a comma
(news.ycombinator.com)
9.
Building a Telegram Bot with Cloudflare Workers, Durable Objects and Grammy
(news.ycombinator.com)
10.
11.
I’ll never buy earbuds without this Galaxy Buds feature
(androidauthority.com)
12.
13.
'Contagious Interview' Attack Now Delivers Backdoor Via VS Code
(darkreading.com)
14.
Show HN: Fence – Sandbox CLI commands with network/filesystem restrictions
(news.ycombinator.com)
17.
Emerson Smart brings offline voice control to lamps and fans
(engadget.com)
19.
Attackers Exploit Zero-Day in End-of-Life D-Link Routers
(darkreading.com)
21.
I wrote the manual Karpathy said was missing for agentic AI
(news.ycombinator.com)
22.
Show HN: A Claude Code plugin that catch destructive Git and filesystem commands
(news.ycombinator.com)
23.
Toad is a unified experience for AI in the terminal
(news.ycombinator.com)
24.
25.
26.
New OS aims to provide (some) compatibility with macOS
(news.ycombinator.com)
27.
Critical Fortinet FortiWeb WAF Bug Exploited in the Wild
(darkreading.com)
28.
Decades-old ‘Finger’ protocol abused in ClickFix malware attacks
(bleepingcomputer.com)
29.
30.
ClickFix malware attacks evolve with multi-OS support, video tutorials
(bleepingcomputer.com)