What is this?
This mirrors the Hacker News front page. Click on tags to filter / exclude. You can combine multiple tags.
Get these tags inside Hacker News itself with these open-source browser extensions for Chrome and Firefox
histre is a power tool for your knowledge. This is a demo of its auto-tagging feature. Learn about its other features here
Windows ARM64 Internals: Deconstructing Pointer Authentication
• www.preludesecurity.com
Researchers claim 'largest leak ever' after uncovering WhatsApp enumeration flaw
• www.theregister.com
GoSign Desktop RCE flaws affecting users in Italy
• www.ush.it
People are using iPad OS features on their iPhones
• idevicecentral.com
Runc Vulnerabilities Can Be Exploited to Escape Containers
• www.securityweek.com
The Single Byte That Kills Your Exploit: Understanding Endianness
• pwnforfunandprofit.substack.com
Firefox and Chromium
• madaidans-insecurities.github.io
Two Windows vulnerabilities, one a 0-day, are under active exploitation
• arstechnica.com
Please stop using AI browsers
• www.xda-developers.com
Understanding the Worst .NET Vulnerability
• andrewlock.net
Cryptographic Issues in Cloudflare's Circl FourQ Implementation (CVE-2025-8556)
• www.botanica.software
Hackers exploit 34 zero-days on first day of Pwn2Own Ireland
• www.bleepingcomputer.com
Email bombs exploit lax authentication in Zendesk
• krebsonsecurity.com
Ld_preload, the Invisible Key Theft
• bomfather.dev
A kernel stack use-after-free: Exploiting Nvidia's GPU Linux drivers
• blog.quarkslab.com
GitHub Copilot: Remote Code Execution via Prompt Injection (CVE-2025-53773)
• embracethered.com
Apple Introduces $2M Bug Bounty for Spyware-Level Exploits
• www.macrumors.com
Ksmbd – Exploiting CVE-2025-37947
• blog.doyensec.com
RondoDox botnet fires 'exploit shotgun' at nearly every router and home device
• www.theregister.com
Level-10 vuln lurking in Redis source code for 13 years could allow RCE
• www.theregister.com
Arbitrary code execution in Unity Runtime
• flatt.tech