Show HN: 41 years sea surface temperature anomalies
(news.ycombinator.com)
1.
2.
Deterministic Primality Testing for Limited Bit Width
(news.ycombinator.com)
3.
Clinical application of base editing for treating β-thalassaemia
(feeds.nature.com)
4.
How to Find Out Whether Your Computer Is Part of a Botnet—and What to Do About It
(feeds.content.dowjones.io)
5.
Residential proxies evaded IP reputation checks in 78% of 4B sessions
(bleepingcomputer.com)
6.
Unsubscribe from the Church of Graphs
(news.ycombinator.com)
7.
Set the Line Before It's Crossed
(news.ycombinator.com)
8.
TikTok for Business accounts targeted in new phishing campaign
(bleepingcomputer.com)
9.
Tell HN: Litellm 1.82.7 and 1.82.8 on PyPI are compromised
(news.ycombinator.com)
10.
Fun with CSF firmware (RK3588 GPU firmware)
(news.ycombinator.com)
11.
12.
Opinion | One Exit Won’t Cure the FDA’s Culture
(feeds.content.dowjones.io)
13.
New font-rendering trick hides malicious commands from AI tools
(bleepingcomputer.com)
14.
Mathematics Distillation Challenge – Equational Theories
(news.ycombinator.com)
15.
Xygeni GitHub Action Compromised Via Tag Poison
(darkreading.com)
16.
17.
130k Lines of Formal Topology: Simple and Cheap Autoformalization for Everyone?
(news.ycombinator.com)
18.
19.
The normalization of corruption in organizations (2003) [pdf]
(news.ycombinator.com)
20.
Why the shift left dream has become a nightmare for security and developers
(bleepingcomputer.com)
21.
Supply Chain Attack Secretly Installs OpenClaw for Cline Users
(darkreading.com)
22.
Google says its AI systems helped deter Play Store malware in 2025
(techcrunch.com)
23.
99% of adults over 40 have shoulder "abnormalities" on an MRI, study finds
(news.ycombinator.com)
24.
25.
CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups
(bleepingcomputer.com)
26.
Fake job recruiters hide malware in developer coding challenges
(bleepingcomputer.com)
27.
Claude LLM artifacts abused to push Mac infostealers in ClickFix attack
(bleepingcomputer.com)
29.
Microsoft: New Windows LNK spoofing issues aren't vulnerabilities
(bleepingcomputer.com)