Python library for Weishaupt WAB11 heat pump control via Modbus TCP
A Python library for controlling Weishaupt WAB11 heat pump controllers via Modbus TCP.
Features
<ul><li>Digital Twin Pattern: Maintains a synchronized local representation of the heat pump state</l… [+7460 chars]
India’s talent pool across colleges and universities are key for building next-gen startups, which is what YC is looking to tap into. It wants to target entrepreneurs building for global markets, focussed on fintech, consumer, B2B, and ecommerce, among others.
Theres too much capital going to a small number of companies at the very top, and not nearly enough going to seed stage firms where theres an insane number of possibilities, famed Silicon Valley acce… [+7015 chars]
Adobe addressed a critical Acrobat Reader vulnerability, tracked as CVE-2026-34621, which is actively exploited to run malicious code. Adobe released emergency updates to address a critical vulnerability, tracked as CVE-2026-34621 (CVSS score of 8.6), in Adob…
Adobe fixes actively exploited Acrobat Reader flaw CVE-2026-34621
Adobe released emergency updates to address a critical vulnerability, tracked as CVE-2026-34621 (CVSS score of 8.6), in Adobe Acroba… [+3371 chars]
Team Cymru Bogon Reference Checker for IPv4, IPv6, and ASNs
Introduction
Theoretical Background
In the context of Internet routing, a Bogon refers to an IP address space that should not be visible in the global routing table. These are typically addresses t… [+6230 chars]
The biotech industry's engineered cells could become an $8 trillion market by 2035, notes Phys.org. But how do you keep them from being stolen? Their article notes "an uptick in the theft and smuggling of high-value biological materials, including specially e…
In Science Advances, a team of U.S. researchers present a new approach to genetically securing precious biological material. They created a genetic combination lock in which the locking or encryption… [+853 chars]
Some 504 women were elected in recent Dutch local elections, with a "Vote for a Woman" campaign boosting their chances to gather preferential votes. Despite the record figure, women remain underrepresented.
Fatuma Muhumed is glowing as she arrives for an interview with DW just hours before her inauguration as a local councilor in the Dutch municipality of Apeldoorn her first political office, on top of … [+5871 chars]
Mechanistic interpretability toolkit for reward models
Mechanistic interpretability toolkit for reward models.
The first comprehensive open-source library for understanding what happens inside the models that define the RLHF training signal. Reward-lens… [+12934 chars]
Hackers breached Venice ’s San Marco flood system, claiming control of pumps and the ability to disable defenses and flood coastal areas. The technologies that govern the physical world are the quiet infrastructure of modern life. From energy grids to water s…
Hackers claim control over Venice San Marco anti-flood pumps
The technologies that govern the physical world are the quiet infrastructure of modern life. From energy grids to water systems, from fac… [+7181 chars]
All these apps offer end-to-end encryption, making sure no one can see your deepest and darkest thoughts.
Not all note-taking apps are created equal when it comes to privacy. Google Keep, for example, isnt as private as you may think. Sure, the chances of someone hacking into your account are minimized t… [+7967 chars]
South Korea's Ministry of Science and ICT said that the country’s three major carriers will provide more than seven million mobile subscribers with unmetered 400 Kbps data.
South Korea's Ministry of Science and ICT said on Thursday that SK Telecom, KT, and LG Uplus — the country’s three major carriers — will provide more than seven million mobile subscribers with unmete… [+2752 chars]
Is it true that my car can be hacked?
Car software can be hacked like any computer - however carmakers invest heavily in security
Yes. From engine management to drive assistance and even lighting, software governs many core functions, s… [+2017 chars]
A maniac reportedly attacked a US war plane with a hatchet at a major civilian airport in Ireland Saturday, causing extensive damage at a controversial stopover site for American military. He snuck into restricted space at Shannon Airport in County Clare, whe…
Skip to comments.
Lunatic reportedly attacks US war plane with hatchet at Ireland airport, extensively damaging $75M craft (C-130)NY Post ^
| 4/11/26
| Shane Galvin
Posted on 04/11/2026 4:08:59… [+1951 chars]
Censys researchers found 5,219 exposed Rockwell PLCs online, mostly in the U.S., urging defenders to secure or disconnect them. On April 7, 2026, U.S. agencies, including FBI, CISA, and NSA, warned of Iran-linked APTs exploiting internet-exposed Rockwell Auto…
Censys finds 5,219 devices exposed to attacks by Iranian APTs, majority in U.S.,
On April 7, 2026, U.S. agencies, including FBI, CISA, and NSA, warned of Iran-linked APTs exploiting internet-exposed… [+3383 chars]
An unidentified man snuck into restricted space at Shannon Airport in Ireland on Saturday, where the US Air Force’s C130 Hercules military transport aircraft was parked, local outlet The Journal reported.
A maniac reportedly attacked a US war plane with a hatchet at a major civilian airport in Ireland Saturday, causing extensive damage at a controversial stopover site for American military.
He snuck … [+1387 chars]
■林國賓 原文: As the attacks have broken out into a wider conflagration that threatens to engulf the entirety of West Asia, theories are flying thick and fast about how Israel tracked Khamenei. From dental implants to a spy inside the Islamic Revolutionary Guard C…
If you click 'Accept all', we and our partners, including 251 who are part of the IAB Transparency & Consent Framework, will also store and/or access information on a device (in other words, use … [+1045 chars]
The GlassWorm campaign uses a Zig-based dropper hidden in a fake IDE extension to infect developer tools and compromise systems. The GlassWorm campaign, active since 2025, has evolved from malicious npm packages to large-scale supply chain attacks across GitH…
GlassWorm evolves with Zig dropper to infect multiple developer tools
The GlassWorm campaign, active since 2025, has evolved from malicious npm packages to large-scale supply chain attacks across Gi… [+2077 chars]
Well known hacking group, ShinyHunters, claims to have breached the GTA 6 developers cloud servers
More bad news for Rockstar Games. This time, established hacker group ShinyHunters is claiming to have breached the company’s secured cloud servers and now claims to have their hands on a large colle… [+2462 chars]
Talking with [Tom Nardi] on the podcast this week, he mentioned his favorite kind of hack: the community-developed open-source firmware that can be flashed into a commercial product that has …read more
Talking with [Tom Nardi] on the podcast this week, he mentioned his favorite kind of hack: the community-developed open-source firmware that can be flashed into a commercial product that has crappy f… [+1402 chars]
In this article I share my personal highlights of PyCon Lithuania 2026.
Shout out to the organisers and volunteers
This was my second time at PyCon Lithuania and, for the second time in a row, I leave with the impression that everything was very well organised and smoot… [+8264 chars]
Google adds Device Bound Session Credentials (DBSC) to Chrome 146, using hardware keys to block infostealer use of stolen session cookies on Windows.
Google has launched a new security feature for Chrome on Windows to prevent session theft by hackers. This update, called Device Bound Session Credentials (DBSC), is now available for Chrome 146 user… [+2888 chars]
Time to start dropping SBOMs FEATURE Two supply chain attacks in March infected open source tools with malware and used this access to steal secrets from tens of thousands – if not more – organizations. We won't know the full blast radius for months.…
FEATURE Two supply chain attacks in March infected open source tools with malware and used this access to steal secrets from tens of thousands if not more organizations. We won't know the full blast … [+13514 chars]
A research team at Specops benchmarked an RTX 5090, against two AI datacenter GPUs with Hashcat to see which GPU is the better password cracker. Spoiler alert, the RTX 5090 was the winner.
Compute power surrounding datacenter AI GPUs keeps growing at an extraordinary pace with each new GPU generation. This led a research team atSpecops
to test whether some popular AI GPUs could also … [+2932 chars]
A critical flaw, tracked as CVE-2026-39987, in the open-source Python notebook tool Marimo was exploited within 10 hours of disclosure. A critical flaw in Marimo, tracked as CVE-2026-39987 (CVSS score of 9.3) was exploited just 10 hours after disclosure (On A…
CVE-2026-39987: Marimo RCE exploited in hours after disclosure
A critical flaw in Marimo, tracked as CVE-2026-39987 (CVSS score of 9.3) was exploited just 10 hours after disclosure (On April 8, 2026… [+3771 chars]
Article URL: https://hackingpassion.com/bluehammer-windows-defender-zero-day/
Comments URL: https://news.ycombinator.com/item?id=47729069
Points: 4
# Comments: 1
Want to learn ethical hacking? I built a complete course. Have a look!Learn penetration testing, web exploitation, network security, and the hacker mindset: Master ethical hacking hands-on(The link s… [+8460 chars]
CAPITAL CRYPTO RECOVER IS THE BEST IN BITCOIN RECOVERY CONTACT CALL+13363906684 - posted in Windows 10 Support: In the crypto world, this is great news I want to share. Last year, I fell victim to a scam disguised as a safe investment option. I have invested …
"In the crypto world, this is great news I want to share. Last year, I fell victim to a scam disguised as a safe investment option. I have invested in crypto trading platforms for about 10yrs thinkin… [+1235 chars]