North Korea Uses ClickFix to Target macOS Users' Data
Sapphire Sleet uses fake job offers and phony Zoom updates to deliver ClickFix attacks that steal credentials and sensitive data from Macs.
Aggregated from vendor advisories, security research, and industry publications.
Sapphire Sleet uses fake job offers and phony Zoom updates to deliver ClickFix attacks that steal credentials and sensitive data from Macs.
Today our hosts discuss IPv6 Privacy and Temporary Addresses to clarify how address provisioning can potentially work for host operating systems. The discussion covers the differen…
We asked for follow ups and you did not disappoint! On today’s show we respond to listener comments and corrections on multicast, routing protocols, security, and more. We also hav…
I trained a transformer in HyperCard. 1,216 parameters. 1989 Macintosh. And yes, it took a while.MacMind is a complete transformer neural network, embeddings, positional encodin…
Malware has shifted from phishing expeditions to open source packages, domains, and repositories. Ned and Kyler welcome Jenn Gile, co-founder of Open Source Malware, to discuss how…
Article URL: https://www.businesswire.com/news/home/20260414237496/en/Amazon-to-Acquire-Globalstar-and-Expand-Amazon-Leo-Satellite-Network Comments URL: https://news.ycombinator.co…
Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-d…
Threat actors are behaving more like professional organizations in an effort to launch more effective and profitable attacks. We explore this and other themes from the latest Threa…
Speedtest Certified is a network connectivity verification program for properties and venues, allowing them to prove the performance of their Wi-Fi. Alan Blake of Ookla joins the s…
Take a Network Break! We commence with a red alert on FastMCP, and then debate whether Anthropic’s Project Glasswing is a marketing stunt or a reasonable response to the growing ab…
How should you shape your IT strategy around the possibility–or is it probability–that the AI economy is a true bubble and will burst soon? John Burke and Johna Johnson revisit the…
Today we welcome Damien Garros, Co-Founder and CEO of OpsMill, to discuss how network automation is creating the need to redefine roles beyond traditional engineers, including netw…
On today’s sponsored episode we talk with David Gee, CEO at Curvium, a systems integrator and VAR. David holds thoughtful opinions about network automation and orchestration, how s…
Kevin and Alexis are back with a behind-the-scenes look at the podcast with guest Melina Bertholf, who joined the team a while back to help manage content. (And yes, sharp-eyed rea…
Vibe coding: give AI a description of what you want, the model writes the code, you ship it, and then you hope for the best. It works great for side projects, but it can fall apart…
Eric Chou is joined by Matt Campbell, a seasoned network engineer whose career has taken him into some of the most demanding and high-stakes environments around. Together they’ll e…
The best strategy in the world won’t succeed if a team falters operationally. But what is operational excellence, and what does it take to acquire it? Cal Poly faculty member (and …
In the cybercrime industry, initial access brokers specialize in break-ins. They pick digital locks and slide open electronic windows, and then sell that access to other threat act…
Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security e…
Take a Network Break! We start with a critical vulnerability in Cisco’s Integrated Management Controller. In the news, Verizon settles patent litigation over IoT antenna technology…
An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Rus…
Article URL: https://friendi.ca/ Comments URL: https://news.ycombinator.com/item?id=47648048 Points: 166 # Comments: 58
Article URL: https://mtlynch.io/claude-code-found-linux-vulnerability/ Comments URL: https://news.ycombinator.com/item?id=47633855 Points: 433 # Comments: 268
https://old.reddit.com/r/sysadmin/comments/1sbdw29/if_youre_...https://web.archive.org/web/20260403174514/https://old.reddi... Comments URL: https://news.ycombinator.com/item?id=4…
Ethan Banks sits down with Ryan Hamel at the 96th North American Network Operators’ Group (NANOG96). Ryan, a network automation developer for the Zayo Group, talks about why boring…
Today our hosts discuss the essential role of Stateless Address Autoconfiguration (SLAAC) in successfully deploying an IPv6-mostly network. SLAAC is required to assign a unique IPv…
Article URL: https://yggdrasil-network.github.io/ Comments URL: https://news.ycombinator.com/item?id=47618100 Points: 122 # Comments: 60
Lenny Giuliano, Sr. Distinguished Systems Engineer at HPE Juniper Networks, joins Holly and Ethan for another round of multicast. Part two helps fill in details not covered in epis…
Article URL: https://www.atomic.computer/blog/white-house-app-network-traffic-analysis/ Comments URL: https://news.ycombinator.com/item?id=47595865 Points: 234 # Comments: 72
Article URL: https://sockpuppet.org/blog/2026/03/30/vulnerability-research-is-cooked/ Comments URL: https://news.ycombinator.com/item?id=47578086 Points: 267 # Comments: 170