frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Trying to make an Automated Ecologist: A first pass through the Biotime dataset

https://chillphysicsenjoyer.substack.com/p/trying-to-make-an-automated-ecologist
1•crescit_eundo•1m ago•0 comments

Watch Ukraine's Minigun-Firing, Drone-Hunting Turboprop in Action

https://www.twz.com/air/watch-ukraines-minigun-firing-drone-hunting-turboprop-in-action
1•breve•2m ago•0 comments

Free Trial: AI Interviewer

https://ai-interviewer.nuvoice.ai/
1•sijain2•2m ago•0 comments

FDA Intends to Take Action Against Non-FDA-Approved GLP-1 Drugs

https://www.fda.gov/news-events/press-announcements/fda-intends-take-action-against-non-fda-appro...
1•randycupertino•3m ago•0 comments

Supernote e-ink devices for writing like paper

https://supernote.eu/choose-your-product/
1•janandonly•5m ago•0 comments

We are QA Engineers now

https://serce.me/posts/2026-02-05-we-are-qa-engineers-now
1•SerCe•6m ago•0 comments

Show HN: Measuring how AI agent teams improve issue resolution on SWE-Verified

https://arxiv.org/abs/2602.01465
2•NBenkovich•6m ago•0 comments

Adversarial Reasoning: Multiagent World Models for Closing the Simulation Gap

https://www.latent.space/p/adversarial-reasoning
1•swyx•6m ago•0 comments

Show HN: Poddley.com – Follow people, not podcasts

https://poddley.com/guests/ana-kasparian/episodes
1•onesandofgrain•15m ago•0 comments

Layoffs Surge 118% in January – The Highest Since 2009

https://www.cnbc.com/2026/02/05/layoff-and-hiring-announcements-hit-their-worst-january-levels-si...
7•karakoram•15m ago•0 comments

Papyrus 114: Homer's Iliad

https://p114.homemade.systems/
1•mwenge•15m ago•1 comments

DicePit – Real-time multiplayer Knucklebones in the browser

https://dicepit.pages.dev/
1•r1z4•15m ago•1 comments

Turn-Based Structural Triggers: Prompt-Free Backdoors in Multi-Turn LLMs

https://arxiv.org/abs/2601.14340
2•PaulHoule•16m ago•0 comments

Show HN: AI Agent Tool That Keeps You in the Loop

https://github.com/dshearer/misatay
2•dshearer•18m ago•0 comments

Why Every R Package Wrapping External Tools Needs a Sitrep() Function

https://drmowinckels.io/blog/2026/sitrep-functions/
1•todsacerdoti•18m ago•0 comments

Achieving Ultra-Fast AI Chat Widgets

https://www.cjroth.com/blog/2026-02-06-chat-widgets
1•thoughtfulchris•20m ago•0 comments

Show HN: Runtime Fence – Kill switch for AI agents

https://github.com/RunTimeAdmin/ai-agent-killswitch
1•ccie14019•23m ago•1 comments

Researchers surprised by the brain benefits of cannabis usage in adults over 40

https://nypost.com/2026/02/07/health/cannabis-may-benefit-aging-brains-study-finds/
1•SirLJ•24m ago•0 comments

Peter Thiel warns the Antichrist, apocalypse linked to the 'end of modernity'

https://fortune.com/2026/02/04/peter-thiel-antichrist-greta-thunberg-end-of-modernity-billionaires/
3•randycupertino•25m ago•2 comments

USS Preble Used Helios Laser to Zap Four Drones in Expanding Testing

https://www.twz.com/sea/uss-preble-used-helios-laser-to-zap-four-drones-in-expanding-testing
3•breve•30m ago•0 comments

Show HN: Animated beach scene, made with CSS

https://ahmed-machine.github.io/beach-scene/
1•ahmedoo•31m ago•0 comments

An update on unredacting select Epstein files – DBC12.pdf liberated

https://neosmart.net/blog/efta00400459-has-been-cracked-dbc12-pdf-liberated/
3•ks2048•31m ago•0 comments

Was going to share my work

1•hiddenarchitect•34m ago•0 comments

Pitchfork: A devilishly good process manager for developers

https://pitchfork.jdx.dev/
1•ahamez•35m ago•0 comments

You Are Here

https://brooker.co.za/blog/2026/02/07/you-are-here.html
3•mltvc•39m ago•1 comments

Why social apps need to become proactive, not reactive

https://www.heyflare.app/blog/from-reactive-to-proactive-how-ai-agents-will-reshape-social-apps
1•JoanMDuarte•39m ago•1 comments

How patient are AI scrapers, anyway? – Random Thoughts

https://lars.ingebrigtsen.no/2026/02/07/how-patient-are-ai-scrapers-anyway/
1•samtrack2019•40m ago•0 comments

Vouch: A contributor trust management system

https://github.com/mitchellh/vouch
3•SchwKatze•40m ago•0 comments

I built a terminal monitoring app and custom firmware for a clock with Claude

https://duggan.ie/posts/i-built-a-terminal-monitoring-app-and-custom-firmware-for-a-desktop-clock...
1•duggan•41m ago•0 comments

Tiny C Compiler

https://bellard.org/tcc/
8•guerrilla•42m ago•1 comments
Open in hackernews

Google Android Team Finds Critical Qualcomm GPU Flaws Affecting Millions

2•Great_Cat•6mo ago
Google’s Android Security team, notably the Threat Analysis Group (TAG), has recently disclosed multiple critical zero-day vulnerabilities affecting Qualcomm’s Adreno GPU drivers — components embedded in the graphics subsystem of billions of Android devices worldwide. These vulnerabilities have been actively exploited in the wild, representing a severe security risk to end users.

Technical Overview

The flaws, identified as CVE-2025-21479, CVE-2025-21480, and CVE-2025-27038, are primarily rooted in memory corruption issues and improper authorization checks within the GPU’s driver code. Due to the Adreno GPU’s privileged position in the Android kernel space, these bugs enable attackers to escalate privileges from user space to kernel space by crafting malicious GPU command streams or malformed graphics data. • CVE-2025-21479 & CVE-2025-21480: These vulnerabilities relate to incorrect authorization mechanisms in the command execution path of the Adreno GPU driver. An attacker controlling a malicious app or injected code can bypass standard access controls, leading to unauthorized command execution within the GPU microkernel, which can corrupt memory or trigger out-of-bounds writes. • CVE-2025-27038: This is a use-after-free vulnerability that occurs during the rendering pipeline. When exploited, it can cause arbitrary code execution by manipulating freed memory buffers, enabling attackers to run arbitrary code with kernel-level privileges.

Impact and Exploitation

The Qualcomm Adreno GPU driver is widely deployed across Snapdragon chipsets powering numerous flagship and mid-range devices from manufacturers such as Samsung, OnePlus, Xiaomi, and more. Because these GPUs interact closely with the Android kernel, exploitation of these vulnerabilities enables: • Remote Code Execution (RCE): Attackers can execute arbitrary code on the device remotely without requiring user interaction in some scenarios. • Privilege Escalation: Gaining kernel privileges, thereby bypassing Android’s security sandboxing and app permission models. • Persistent Malware Installation: Ability to install rootkits or persistent malware modules that survive device reboots. • Data Exfiltration and Surveillance: Unauthorized access to sensitive user data, including credentials, messages, and media files.

Google TAG’s reports confirmed active exploitation of these zero-day flaws, underlining the urgency for device manufacturers and users to apply patches.

Mitigation and Recommendations

Qualcomm promptly released patches addressing these vulnerabilities, which have been forwarded to OEMs for integration into Android firmware updates. Due to the fragmentation of the Android ecosystem, rollout times vary widely, leaving many devices exposed.

Security experts recommend: • Immediate Updates: Users should regularly check for and install firmware updates from their device manufacturers. • App Vetting: Avoid downloading apps outside trusted sources like Google Play to minimize risk exposure. • Behavioral Monitoring: Users and enterprises should monitor devices for abnormal CPU/GPU usage, crashes, or suspicious network activity. • Enterprise Controls: Organizations should enforce mobile device management (MDM) policies to ensure timely patch deployment.

Broader Context

These vulnerabilities highlight the challenges inherent in securing low-level hardware drivers like GPUs, which often operate with high privileges and complex codebases. They remain attractive targets for advanced threat actors due to the potential for complete system compromise.

The incident reinforces the critical need for collaboration between chipset vendors, OS developers, and manufacturers to ensure rapid vulnerability identification and patch deployment, safeguarding the vast Android user base.