And that it wasn't even capable of committing. Related Stories
<ul><li>Judge Prepares Slide Deck of Lawyer's Mistakes</li><li>First Alleged Space Crime … Didn't Happen</li><li>Six-Month Sentence in Bee-Assault Case</li></ul>
Radley Balko reports that it wasn’t hard to get ChatGPT to confess it had hacked into someone’s email and sent unauthorized text messages to all his contacts. That’s a crime (granted, most things are… [+5452 chars]
PinTheft is a Linux LPE flaw in the RDS subsystem with public exploit code. Arch Linux users face the highest risk and should patch immediately. The wave of Linux local privilege escalation vulnerabilities showing up with working exploit code is not slowing d…
PinTheft: Another Linux Privilege Escalation, Another Working Exploit, This Time Targeting Arch
The wave of Linux local privilege escalation vulnerabilities showing up with working exploit code is n… [+3920 chars]
Analysis: Practitioners see measured risk.
Early fears that Anthropic’s new AI model, Mythos, could dramatically turbocharge hacking are looking overstated a month after its release.
The company warned at launch in April that Mythos had un… [+5683 chars]
Analysis: Practitioners see measured risk.
Early fears that Anthropic’s new AI model, Mythos, could dramatically turbocharge hacking are looking overstated a month after its release.
The company warned at launch in April that Mythos had un… [+5683 chars]
Analysis: Practitioners see measured risk.
Early fears that Anthropic’s new AI model, Mythos, could dramatically turbocharge hacking are looking overstated a month after its release.
The company warned at launch in April that Mythos had un… [+5683 chars]
Analysis: Practitioners see measured risk.
Early fears that Anthropic’s new AI model, Mythos, could dramatically turbocharge hacking are looking overstated a month after its release.
The company warned at launch in April that Mythos had un… [+5683 chars]
Vollebak's new Sonic Jacket is a marvel of engineering, and you could actually buy one — theoretically…
<ul><li>Vollebak reveals a Sonic Jacket with 180 built-in speakers</li><li>It's designed to immerse you in frequencies, not music</li><li>The idea is to help get your brain into "entrainment" states<… [+4001 chars]
Dropper fetches destructive code and extensive credentials stealer.
Supply chain attacks with a Dune sci-fi saga branding continue to spread across the open-source ecosystem, with a Microsoft package being among the latest target of worm-like malware that steals cred… [+3317 chars]
Around 3800 internal repositories exfiltrated.
Microsoft-owned web-based code hosting and collaboration platform GitHub has confirmed that it has been compromised, following reports that the TeamPCP hacking group had successfully attacked it.
Gi… [+2727 chars]
GitHub says attackers accessed thousands of internal repositories after a company employee’s device was compromised through a malicious Visual Studio Code extension, though the company said it has removed the malicious extension, isolated the compromised endp…
GitHub says attackers accessed thousands of internal repositories after a company employees device was compromised through a malicious Visual Studio Code extension, though the company said it has rem… [+3140 chars]
Play as Agent Green
The post ZERO CONTACT: Secret Documents Is a New Stealth Game on Android appeared first on Droid Gamers.
ZERO CONTACT: Secret Documents is the latest stealth game on mobile. Developed by Michele Iacubino from Italy, its a 2D stealth puzzle arcade game with one very strict rule: zero contact. No combat, … [+1646 chars]
Storm-2949 is engaged in a "methodical, sophisticated, and multi-layered" campaign against Microsoft 365 accounts.
<ul><li>Microsoft researchers warn Storm‑2949 is abusing the Self‑Service Password Reset flow to hijack accounts</li><li>Attackers trick victims into approving MFA prompts via phone calls, then reset… [+2703 chars]
Cisco’s 2026 Gartner® Magic Quadrant™ recognition highlights its AI-ready secure network strategy across wired and wireless LAN, security, and operations.
I am pleased to share that Cisco has been named a Leader in the 2026 Gartner® Magic Quadrant for Enterprise Wired and Wireless LAN Infrastructure.
This recognition reflects the focus and execution o… [+7443 chars]
A personal history of Prestel and Micronet 800, Britain’s pre-internet online world of chatlines, hacking, MUDs, and Shades.
These days, we sit down at a PC or whip out a smartphone, and we are connected to pretty much every corner of the world. There was a time, however, when going online meant physically wrestling the fa… [+14159 chars]
Article URL: https://github.com/receptron/mulmoclaude
Comments URL: https://news.ycombinator.com/item?id=48208997
Points: 2
# Comments: 0
English · · · · Español · Português (BR) · Français · Deutsch
How AI-Native Applications Should Be Built the architecture, UX, and protocol thesis behind MulmoClaude.
MulmoClaude is an open-source,… [+32116 chars]
Interested in PureVPN? Here's the detailed PureVPN review based on our hands-on testing to help you decide if you should buy or skip it.
© Gizmodo.com
We can’t start our PureVPN review without addressing its past. It started as a small VPN in 2006, growing into one of the major VPN services. PureVPN had a rough patch when an incident… [+28130 chars]
MSI's new Roamii BE Pro Wi-Fi 7 Mesh System won't suit very large homes with Wi-Fi black spots, but it's a very good budget mesh option.Continue reading at TweakTown
Introduction & Specification Details and Close-up
Wi-Fi 7 is no longer the new kid on the block, and that means that there's very much a space for more affordable Wi-Fi 7-capable mesh kits.
Des… [+10071 chars]
Most of the discussion about AI agents in B2B right now treats the agent as a feature you ship: a chat box, a copilot, a magical button inside your product. That framing has been throwing people off, including me, for the past year. What’s actually working at…
Most of the discussion about AI agents in B2B right now treats the agent as a feature you ship: a chat box, a copilot, a magical button inside your product. That framing has been throwing people off,… [+20467 chars]
It is an unsettling irony when the world’s largest code-hosting platform becomes the victim of its own ecosystem. GitHub confirmed on Tuesday that a threat actor exfiltrated approximately 3,800 internal repositories after compromising an employee’s device thr…
TL;DR
GitHub confirmed that the cybercrime group TeamPCP exfiltrated roughly 3,800 internal code repositories after compromising an employee device through a poisoned VS Code extension. The Microsof… [+4343 chars]
Browser-based sticker designer for a Zebra LP2844 thermal label printer. I bought an $40 UPS branded LP2844 to print stickers and ended up building this after I couldn't find existing tools that did what I wanted.GW raster appears to be broken over USB on fir…
Turn electronic eBay waste into art.
Sticky Icky is a browser-based sticker design tool for the Zebra LP2844 thermal printer the kind you can grab on eBay for $40.
Design labels in your browser, hi… [+14659 chars]
Spring 2026 Biannual Threats Report shows how strengthening payment security is pushing criminals toward AI-enabled social engineering SAN FRANCISCO — Visa (NYSE: V), a world leader in digital payments, today released its Spring 2026 Biannual Threats Report, …
Spring 2026 Biannual Threats Report shows how strengthening payment security is pushing criminals toward AI-enabled social engineering
THIS CONTENT IS RESERVED FOR SUBSCRIBERS ONLY
Subscribe now to… [+6111 chars]
Early fears that Anthropic’s new AI model, Mythos, could dramatically turbocharge hacking are looking overstated a month after its release. The company warned at launch in April that Mythos had uncovered thousands of software vulnerabilities — including flaws…
Early fears that Anthropic’s new AI model, Mythos, could dramatically turbocharge hacking are looking overstated a month after its release.
The company warned at launch in April that Mythos had unco… [+5698 chars]
Little Gadgets' Hacknect is an ESP32-S3-powered wireless USB Type-A hacking cable with Wi-Fi control, HID automation for keyboard/mouse events, payload deployment, and a microSD card slot hidden in one of the Type-A connectors. The USB cable is designed for m…
Little Gadgets’ Hacknect is an ESP32-S3-powered wireless USB Type-A hacking cable with Wi-Fi control, HID automation for keyboard/mouse events, payload deployment, and a microSD card slot hidden in o… [+2906 chars]
Cybersecurity researchers have flagged fresh activity from a China-aligned threat actor known as Webworm in 2025, deploying custom backdoors that employ Discord and Microsoft Graph API for command-and-control (C2 or C&C) communications.
Webworm, first public…
Cybersecurity researchers have flagged fresh activity from a China-aligned threat actor known as Webworm in 2025, deploying custom backdoors that employ Discord and Microsoft Graph API for command-an… [+4384 chars]
Carding forum B1ack’s Stash claims to have released millions of stolen CVV2 payment card records for free after suspending sellers. B1ack’s Stash, one of the most active stolen card marketplaces on the dark web, has released 4.6 million credit card records fo…
Carding site B1acks Stash dumps 4.6 Million stolen cards for free
B1ack’s Stash, one of the most active stolen card marketplaces on the dark web, has released 4.6 million credit card records for fr… [+4413 chars]