Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: config Clear Filter

Chinese hackers breached National Guard to steal network configurations

The Chinese state-sponsored hacking group known as Salt Typhoon breached and remained undetected in a U.S. Army National Guard network for nine months in 2024, stealing network configuration files and administrator credentials that could be used to compromise other government networks. Salt Typhoon is a Chinese state-sponsored hacking group that is believed to be affiliated with China's Ministry of State Security (MSS) intelligence agency. The hacking group has gained notoriety over the past tw

Diffsitter – A Tree-sitter based AST difftool to get meaningful semantic diffs

diffsitter Disclaimer diffsitter is very much a work in progress and nowhere close to production ready (yet). Contributions are always welcome! Summary diffsitter creates semantically meaningful diffs that ignore formatting differences like spacing. It does so by computing a diff on the AST (abstract syntax tree) of a file rather than computing the diff on the text contents of the file. diffsitter uses the parsers from the tree-sitter project to parse source code. As such, the languages sup

Breaking Git with a carriage return and cloning RCE

tl;dr: On Unix-like platforms, if you use git clone --recursive on an untrusted repo, it could achieve remote code execution. Update to a fixed version of git and other software that embeds Git (including GitHub Desktop). If you've ever used an old mechanical typewriter, you know that when you get to the end of the line there's a physical action to to get back to the start of the line. Sometimes this was done through an actual lever on the typewriter, later models had a button. Because this act

CVE-2025-48384: Breaking Git with a carriage return and cloning RCE

tl;dr: On Unix-like platforms, if you use git clone --recursive on an untrusted repo, it could achieve remote code execution. Update to a fixed version of git and other software that embeds Git (including GitHub Desktop). If you've ever used an old mechanical typewriter, you know that when you get to the end of the line there's a physical action to to get back to the start of the line. Sometimes this was done through an actual lever on the typewriter, later models had a button. Because this act

Show HN: Semcheck – AI Tool for checking implementation follows spec

Semcheck Semcheck is a tool that uses large language models to verify that your implementation matches your specification. Define semantic rules to describe how your code should align with your specification, then let Semcheck handle the comparison. Use it as a final check before committing or merging code. Features Non-intrusive: no changes required to existing code or specification files Bring Your Own Model: supports OpenAI, Anthropic, Gemini, Cerebras and Ollama (local) Supports remote

Building Linux kernel on macOS natively

I've recently added a Linux compatibility layer to Starina operating system based on a lightweight VM approach similar to WSL2. I can cross-compile its init program with Cargo. I can prepare a container image contents using skopeo. However, I need to build the genuine Linux kernel, preferably on my daily driver: macOS. The most common way to build Linux kernel on macOS would be using Docker Desktop, and that works fine. I know nobody need to build on macOS natively, but it looked possible - th

Nimtable: Open-source web UI to browse and manage Apache Iceberg tables

Nimtable: The Control Plane for Apache Iceberg™ A lightweight, easy-to-use platform to monitor, optimize, and govern your Iceberg-based lakehouse. Overview Nimtable helps you easily manage and explore Apache Iceberg catalogs. With a web-based platform designed for clarity and simplicity, Nimtable makes it easy to browse tables, run queries, analyze file distributions, and optimize storage layouts. Key Features 🌟 Multi-Catalog Support Connect to REST Catalog, AWS Glue, AWS S3 Tables, and Po

NovaCustom – Framework Laptop alternative focusing on privacy

Privacy and security NovaCustom respects your privacy and focuses on security. We are switching to Dasharo coreboot firmware for our laptops, which is open-source and security-focused. You can find the Dasharo coreboot models here. We do not use Google Analytics. We use Signal and you can reach us via Protonmail. You can buy your laptop with Linux preinstalled. We setup your operating system with the most privacy-friendly settings. Even if we install Windows! Customisation We build your laptop

SymbolicAI: A neuro-symbolic perspective on LLMs

SymbolicAI: A neuro-symbolic perspective on LLMs What is SymbolicAI? SymbolicAI is a neuro-symbolic framework, combining classical Python programming with the differentiable, programmable nature of LLMs in a way that actually feels natural in Python. It's built to not stand in the way of your ambitions. It's easily extensible and customizable to your needs by virtue of its modular design. It's quite easy to write your own engine, host locally an engine of your choice, or interface with tools l

LLM Chat via SSH

# Server name, optional, can be changed to your own domain SERVER_NAME = chat.aigc.ing # Whether it's a public server, required. If not configured, it defaults to private server and requires whitelist configuration PUBLIC_SERVER = false # Rate limiting settings, optional. TTL suffix is for time, LIMIT is for count. Strongly recommended for public servers RATE_LIMIT_TTL = 3600 RATE_LIMIT_LIMIT = 300 LOGIN_FAILED_TTL = 600 LOGIN_FAILED_LIMIT = 10 # Blacklist and whitelist, opt

iMazing delivers powerful capabilities for managing Apple devices and their data

Long considered the standard for local device backups and data transfer between Apple’s mobile device ecosystem and a Mac or Windows PC, iMazing continues to provide innovative solutions for managing Apple mobile devices individually or at scale. Last year’s release of iMazing 3 marked the beginning of a broader vision for the company: to provide scalable, professional-grade tools for managing Apple mobile devices across personal, educational, and enterprise contexts. Paired with iMazing Profi