Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: configuration Clear Filter

SonicWall warns customers to reset credentials after breach

SonicWall warned customers today to reset credentials after their firewall configuration backup files were exposed in a security breach that impacted MySonicWall accounts. After detecting the incident, SonicWall has cut off the attackers' access to its systems and has been collaborating with cybersecurity and law enforcement agencies to investigate the attack's impact. "As part of our commitment to transparency, we are notifying you of an incident that exposed firewall configuration backup fil

Pgstream: Postgres streaming logical replication with DDL changes

pgstream - Postgres replication with DDL changes pgstream is an open source CDC command-line tool and library that offers Postgres replication support with DDL changes to any provided target. Features Schema change tracking and replication of DDL changes Support for multiple out of the box targets Elasticsearch/OpenSearch Webhooks PostgreSQL Initial and on demand PostgreSQL snapshots (for when you don't need continuous replication) Column value transformations (anonymise your data on the g

Meow: Yet another modal editing on Emacs

Meow Introduction Less is more Meow is yet another modal editing mode for Emacs. Meow aims to blend modal editing into Emacs with minimal interference with its original key-bindings, avoiding most of the hassle introduced by key-binding conflicts. This leads to lower necessary configuration and better integration. More is achieved with fewer commands to remember. Key features compared to existing solutions: Minimal configuration – build your own modal editing system No third-party depende

macOS dotfiles should not go in –/Library/Application Support

#macOS dotfiles should not go in ~/Library/Application Support One of my pet peeves is when command-line tools look for user configuration files in ~/Library/Application Support when running on macOS. In addition to offering poor ergonomics for users, I believe this behavior is incorrect according to the documentation which is cited to justify it. Instead, command-line tools should implement the XDG Base Directory Specification and look for configuration files in $XDG_CONFIG_HOME , which defaul

Dotfiles feel too personal to share

I love dotfiles. “Dotfiles” is a term that refers to configuration files used to configure software and operating systems. They are called such because often these files start with a dot. You may have seen .bashrc , .tmux.conf or .zshrc in the wild. Whenever a software doesn’t offer direct file-based configuration, I feel sad because it means I need to take extra steps to keep my configuration across different devices in sync or when setting up a new machine. I love sharing. I regularly publ

Dotfiles feel too intimate and personal to share

I love dotfiles. “Dotfiles” is a term that refers to configuration files used to configure software and operating systems. They are called such because often these files start with a dot. You may have seen .bashrc , .tmux.conf or .zshrc in the wild. Whenever a software doesn’t offer direct file-based configuration, I feel sad because it means I need to take extra steps to keep my configuration across different devices in sync or when setting up a new machine. I love sharing. I regularly publ

Chinese hackers breached National Guard to steal network configurations

The Chinese state-sponsored hacking group known as Salt Typhoon breached and remained undetected in a U.S. Army National Guard network for nine months in 2024, stealing network configuration files and administrator credentials that could be used to compromise other government networks. Salt Typhoon is a Chinese state-sponsored hacking group that is believed to be affiliated with China's Ministry of State Security (MSS) intelligence agency. The hacking group has gained notoriety over the past tw

Breaking Git with a carriage return and cloning RCE

tl;dr: On Unix-like platforms, if you use git clone --recursive on an untrusted repo, it could achieve remote code execution. Update to a fixed version of git and other software that embeds Git (including GitHub Desktop). If you've ever used an old mechanical typewriter, you know that when you get to the end of the line there's a physical action to to get back to the start of the line. Sometimes this was done through an actual lever on the typewriter, later models had a button. Because this act

CVE-2025-48384: Breaking Git with a carriage return and cloning RCE

tl;dr: On Unix-like platforms, if you use git clone --recursive on an untrusted repo, it could achieve remote code execution. Update to a fixed version of git and other software that embeds Git (including GitHub Desktop). If you've ever used an old mechanical typewriter, you know that when you get to the end of the line there's a physical action to to get back to the start of the line. Sometimes this was done through an actual lever on the typewriter, later models had a button. Because this act

NovaCustom – Framework Laptop alternative focusing on privacy

Privacy and security NovaCustom respects your privacy and focuses on security. We are switching to Dasharo coreboot firmware for our laptops, which is open-source and security-focused. You can find the Dasharo coreboot models here. We do not use Google Analytics. We use Signal and you can reach us via Protonmail. You can buy your laptop with Linux preinstalled. We setup your operating system with the most privacy-friendly settings. Even if we install Windows! Customisation We build your laptop

SymbolicAI: A neuro-symbolic perspective on LLMs

SymbolicAI: A neuro-symbolic perspective on LLMs What is SymbolicAI? SymbolicAI is a neuro-symbolic framework, combining classical Python programming with the differentiable, programmable nature of LLMs in a way that actually feels natural in Python. It's built to not stand in the way of your ambitions. It's easily extensible and customizable to your needs by virtue of its modular design. It's quite easy to write your own engine, host locally an engine of your choice, or interface with tools l