frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

I Was Trapped in Chinese Mafia Crypto Slavery [video]

https://www.youtube.com/watch?v=zOcNaWmmn0A
1•mgh2•2m ago•0 comments

U.S. CBP Reported Employee Arrests (FY2020 – FYTD)

https://www.cbp.gov/newsroom/stats/reported-employee-arrests
1•ludicrousdispla•4m ago•0 comments

Show HN: I built a free UCP checker – see if AI agents can find your store

https://ucphub.ai/ucp-store-check/
1•vladeta•9m ago•1 comments

Show HN: SVGV – A Real-Time Vector Video Format for Budget Hardware

https://github.com/thealidev/VectorVision-SVGV
1•thealidev•11m ago•0 comments

Study of 150 developers shows AI generated code no harder to maintain long term

https://www.youtube.com/watch?v=b9EbCb5A408
1•lifeisstillgood•11m ago•0 comments

Spotify now requires premium accounts for developer mode API access

https://www.neowin.net/news/spotify-now-requires-premium-accounts-for-developer-mode-api-access/
1•bundie•14m ago•0 comments

When Albert Einstein Moved to Princeton

https://twitter.com/Math_files/status/2020017485815456224
1•keepamovin•15m ago•0 comments

Agents.md as a Dark Signal

https://joshmock.com/post/2026-agents-md-as-a-dark-signal/
1•birdculture•17m ago•0 comments

System time, clocks, and their syncing in macOS

https://eclecticlight.co/2025/05/21/system-time-clocks-and-their-syncing-in-macos/
1•fanf2•19m ago•0 comments

McCLIM and 7GUIs – Part 1: The Counter

https://turtleware.eu/posts/McCLIM-and-7GUIs---Part-1-The-Counter.html
1•ramenbytes•21m ago•0 comments

So whats the next word, then? Almost-no-math intro to transformer models

https://matthias-kainer.de/blog/posts/so-whats-the-next-word-then-/
1•oesimania•22m ago•0 comments

Ed Zitron: The Hater's Guide to Microsoft

https://bsky.app/profile/edzitron.com/post/3me7ibeym2c2n
2•vintagedave•25m ago•1 comments

UK infants ill after drinking contaminated baby formula of Nestle and Danone

https://www.bbc.com/news/articles/c931rxnwn3lo
1•__natty__•26m ago•0 comments

Show HN: Android-based audio player for seniors – Homer Audio Player

https://homeraudioplayer.app
2•cinusek•26m ago•0 comments

Starter Template for Ory Kratos

https://github.com/Samuelk0nrad/docker-ory
1•samuel_0xK•28m ago•0 comments

LLMs are powerful, but enterprises are deterministic by nature

2•prateekdalal•32m ago•0 comments

Make your iPad 3 a touchscreen for your computer

https://github.com/lemonjesus/ipad-touch-screen
2•0y•37m ago•1 comments

Internationalization and Localization in the Age of Agents

https://myblog.ru/internationalization-and-localization-in-the-age-of-agents
1•xenator•37m ago•0 comments

Building a Custom Clawdbot Workflow to Automate Website Creation

https://seedance2api.org/
1•pekingzcc•40m ago•1 comments

Why the "Taiwan Dome" won't survive a Chinese attack

https://www.lowyinstitute.org/the-interpreter/why-taiwan-dome-won-t-survive-chinese-attack
2•ryan_j_naughton•40m ago•0 comments

Xkcd: Game AIs

https://xkcd.com/1002/
1•ravenical•41m ago•0 comments

Windows 11 is finally killing off legacy printer drivers in 2026

https://www.windowscentral.com/microsoft/windows-11/windows-11-finally-pulls-the-plug-on-legacy-p...
1•ValdikSS•42m ago•0 comments

From Offloading to Engagement (Study on Generative AI)

https://www.mdpi.com/2306-5729/10/11/172
1•boshomi•44m ago•1 comments

AI for People

https://justsitandgrin.im/posts/ai-for-people/
1•dive•45m ago•0 comments

Rome is studded with cannon balls (2022)

https://essenceofrome.com/rome-is-studded-with-cannon-balls
1•thomassmith65•50m ago•0 comments

8-piece tablebase development on Lichess (op1 partial)

https://lichess.org/@/Lichess/blog/op1-partial-8-piece-tablebase-available/1ptPBDpC
2•somethingp•52m ago•0 comments

US to bankroll far-right think tanks in Europe against digital laws

https://www.brusselstimes.com/1957195/us-to-fund-far-right-forces-in-europe-tbtb
4•saubeidl•53m ago•0 comments

Ask HN: Have AI companies replaced their own SaaS usage with agents?

1•tuxpenguine•56m ago•0 comments

pi-nes

https://twitter.com/thomasmustier/status/2018362041506132205
1•tosh•58m ago•0 comments

Show HN: Crew – Multi-agent orchestration tool for AI-assisted development

https://github.com/garnetliu/crew
1•gl2334•58m ago•0 comments
Open in hackernews

Hackers strike Harrods in latest UK cyberattack

https://observer.co.uk/news/national/article/hackers-strike-harrods-in-latest-uk-cyberattack
82•dijit•4mo ago

Comments

yakshaving_jgt•4mo ago
> A new cybersecurity and ­resilience bill will make it mandatory to report more incidents. The bill’s slow progress is frustrating security experts, according to Jamie MacColl, a senior research fellow at Rusi. However, ministers have been reluctant to impose more regulation on businesses, but having “major cybersecurity incidents is not good for economic growth,” he said.

A minister's bill is less effective than a Ukrainian soldier's bullet.

swarnie•4mo ago
> In July, four people including a 17-year-old boy were arrested on suspicion of being involved in cyberattacks on Harrods, the Co-op, and Marks and Spencer, and were bailed pending further inquiries.

Your proposal is we have a foreign army come over and start executing children? What is this Bush era nonsense.

yakshaving_jgt•4mo ago
My proposal is the Western world do more to support the Ukrainian military, defeat the Putin regime militarily, and usher in the collapse of the russian federation.

You can't have state-sponsored cyber-attacks if the state sponsoring the cyber-attacks goes away.

No, I am not proposing anyone start killing children. What a ridiculous misinterpretation of my words. It's the russian military who kill kids[0], and nobody should be ok with that. It's also the russian government recruiting children to commit acts of sabotage[1] abroad.

[0]: https://www.politico.eu/article/former-wagner-group-commande...

[1]: https://www.justiceinfo.net/en/147402-ukraine-fsb-recruits-t...

phatfish•4mo ago
Yup, I find I hard to believe kids have suddenly discovered hacking in the last two years.

It's either covertly state sponsored, or outsourcing everything to India is finally showing some results.

noir_lord•4mo ago
You know more than one thing can be true at once though right?

I.e.some combination of state sponsored, opportunistic script kiddies and better reporting. After the earlier attacks subsequent ones get more press as well.

swarnie•4mo ago
What's state sponsored about a bunch of bored children putting in dummy calls to retail helpdesks?

I dont see what this has to do with russia russia russia

yakshaving_jgt•4mo ago
It's literally in the article.

> Although cyberattacks have become more high profile, there is little reliable data on how many attacks take place in the UK each year. Hackers are drawn from a mix of organised criminal gangs, those sponsored by state actors including Russia and China, and hacktivists with a political agenda, according to a report by the Royal United Services Institute (Rusi).

swarnie•4mo ago
That's just a general statement; nothing suggests these children are working with or acting on behalf of Russia.

More likely they are spectrum'd to fuckery or pushing a political agenda.

yakshaving_jgt•4mo ago
> More likely

What are you basing this probability on?

The UK and EU has seen a significant increase in cyber-attacks and acts of sabotage since February 2022. In some cases, evidence has been found that the attacks were orchestrated by the russian government.

I suppose it's all one big coincidence?

kylemaxwell•4mo ago
I generally agree with your stance about the situation in eastern Europe, but there's no particular reason to connect that to this incident. There's no public evidence that this was state-sponsored or even connected to Russia at all. They definitely provide sponsorship and cover to a lot of attacks, but still are not the only source of online crime. We have plenty in the US and the UK and everywhere else.
edm0nd•4mo ago
Honestly, kinda.

I support legalizing drone striking ransomware operators.

isaacremuant•4mo ago
Unfortunately, it's become Bush-Obama-Biden-Trump era nonsense because it seems ingrained now.

Add all your other "western leaders" out there who also seem to love and push for wars fought by others and not their children or themselves.

some_random•4mo ago
Funny you say this because Scattered Spider is largely made up of Western teenagers, not Russians.
neffy•4mo ago
There is a fair bit of grooming going on out there on the private discord channels and similar.
ThrownOffGame•4mo ago
Bad news, folks: the erudite hackers have added an apostrophe to Harrod's logo
HPsquared•4mo ago
For some reason the "no apostrophe" thing is common in UK company names.
fredoralive•4mo ago
The greengrocer’s have taken the entirety of the British High Streets apostrophe supply.
marcosscriven•4mo ago
6 orange’s for just £3!
FearNotDaniel•4mo ago
> just £3

Which is of course pronounced: JAST FREE PAAAAAARND

celticninja•4mo ago
I think you will find that is JAST FREE PHAAAAAND
teddyh•4mo ago
Morny stannit!
fsckboy•4mo ago
we've used ours on cocktail's for happy hour
Angostura•4mo ago
https://londonist.com/2016/10/londons-dropped-apostrophes
HPsquared•4mo ago
Happy accident there with the URL.
SilasX•4mo ago
Interestingly, it's common in the Midwest to add "'s" where it doesn't exist when referring to a brand e.g. calling Costco "Costco's".

https://styleblueprint.com/everyday/why-do-people-add-s-to-t...

Apfel•4mo ago
Similarly common in the UK, or at least where I am (Glasgow, Scotland).

Completely normal to say "Tesco's", "Aldi's" etc.

dboreham•4mo ago
Marks and Spencers.

Wait..make that "Markses".

Some companies decided to embrace the pattern: Goldberg became Goldbergs, Morrisons, Dobbies...

oniony•4mo ago
It's because shops were traditionally named after the people who owned them. There are still loads of shops bearing people's names, even now.

"Sainsbury's" supermarket used to be "J. Sainsbury's" named after its founder John Sainsbury, &c. "Morrisons" was "Wm Morrison" founded by William Morrison. So when you refer to a shop you say Sainbury's as in [Mr.] Sainsbury's shop, or "Morrison's" as in Mr. Morrison's shop.

Then this becomes so ingrained it gets misapplied sometimes. I don't think I'd ever say Asda's though. But I would say Tesco's, even though Tesco is the initials of three people.

Surely this is the same worldwide?

celticninja•4mo ago
As mentioned above, in Liverpool, Asda becomes Asdas. Whether it has an apostrophe or not I don't know.
celticninja•4mo ago
Same in Liverpool, it's an Aldis or Asdas, neither of which have an S
nashashmi•4mo ago
It is this grammatical "mistakes" that make it so obvious a scam is a scam. I often raised my eyebrows at phishing messages and wondered if they knew grammar, but then realized in Nigeria this is their most appropriate grammatical structure and language begins with "Dear Sir..."
swarnie•4mo ago
Great, that'll be another intelligence review Monday morning.

Can someone give the kids a ping pong table or something so i can eat my breakfast in peace?

bloqs•4mo ago
It's almost like they earned enough from the data that the risk was worth it
damienwebdev•4mo ago
From a brief review, it looks like the underlying platform they use is https://www.scayle.com/ (though I'm not sure its the one that was attacked) its just the one I found while looking at their site.
eterm•4mo ago
From the article, it sounds like this was earlier in the year, but they're only revealing it now? Isn't that way beyond the deadline for such things?
akerl_•4mo ago
Does the UK actually have a mandated deadline for any kind of infosec disclosure?
arethuza•4mo ago
If the breach contains personal data then you are supposed to report it within 72 hours:

https://ico.org.uk/for-organisations/report-a-breach/persona...

eterm•4mo ago
We were still in the EU when GDPR came along, and we haven't repealed our implementation of it, the Data Protection Act ( 2018 ), which has mandated disclosure in line with GDPR.

Even pre-GDPR we had much stronger data protection than most countries with the Data Protection Act ( 1998 ), although I don't remember that having disclosure rules, it did have a lot of things that companies only freaked out about post GDPR and the weight of the EU behind severe penalties.

testplzignore•4mo ago
Terrible tech reporting, as is the norm.

https://www.bbc.com/news/articles/c8d70d912e6o indicates that the recently announced breach was separate from the one in May (for which the attackers were arrested in July?). I think the one in May leveraged CVE-2025–31324.

eterm•4mo ago
Thank you, from that article:

> A spokesman for the store said that its own system had not been compromised, and that the breach is not connected to a cyber attack in May

TheSilva•4mo ago
Just two days ago the BBC published[1] a story about how a ransomware group tried to infiltrate their network by.... approaching their cybersecurity correspondent.

I wonder if it was the same group.

[1] https://www.bbc.com/news/articles/c3w5n903447o

pandemic_region•4mo ago
How much time before a large bank will be held hostage by such an attack?
observationist•4mo ago
It's likely already happened, but we will never hear about it. Their attack surfaces will be clustered and broken up, through an inhomogenous distribution of various systems and layers and networks, and the entirety of the system will be protected through disjoint connections, both the intentional and the bureaucratic and structural that follow from the mere fact of being really big organizations. Any particular unit within the whole that gets pwned will have recovery tactics available, but reporting will probably be kept as private as humanly possible, even to the extent of avoiding reporting to government, so as to avoid "damage" to markets, loss of reputation, runs on the bank, and so forth. If they don't have a near instant recovery and mitigation of the attack, they'll be much more likely to pay and recover, quietly, than most other organizations. There are laws and regulations and boxes that get checked to ostensibly hold them to a high cybersecurity standard, but that's a lot of theater and pomp for public confidence over anything practical. Where they benefit is from being able to pay for teams and high quality security personnel and being incentivized to avoid getting hacked.

It's not in anyone's interest to make a lot of fuss or noise in the public eye, so us chickens out here won't ever hear about anything that happens.

That comes with the caveat that the big banks can afford to pay really nasty people to go find hackers and turn them over to authorities, or worse options in more lawless parts of the world, and the public will never hear about those actions either, which disincentivizes the hackers. There are easier ways of getting more money with less risk of catastrophic personal outcomes, with the technical difficulty of even attempting anything serious filtering out the impulsive and stupid.

catlikesshrimp•4mo ago
"Bank runaway" and "Loss of confidence in markets" does it.

That works for your country. Why aren't banks in smaller countries affected? Their security is not good, and markets aren't important.

In Costa Rica there was an incident where the equivalent of the IRS was held ransom and the government didn't pay. (Thumbs up to them.) Again, why doesn't that happen to banks there?

observationist•4mo ago
Depends on the confidence and appetite for risk of the leadership, what they're instructed to do by boards, what they think they can or should get away with. If it's a hesitant political creature who wants to hide weakness it's going to be much different outcome than a strong leader with a principled stance, like Costa Rica.

Lots of shitty behavior is grounded in what weak people imagine other people will think of them, and them bending over backwards to hide and cover up and obfuscate. Those are the ones that pay ransomware gangs, and they're also the ones that don't plan ahead and prepare responsibly.

some_random•4mo ago
Just because you never heard about, say, the BancoEstado ransomware attack doesn't mean it was covered up. It's actually pretty much impossible to cover up impactful ransomware events for several very obvious reasons.
observationist•4mo ago
For sure, but these are the level of organizations that have PR firms on hand to put in a lot of work to suppress news, to frame things in as bland a manner as possible, to use all the available tools to ensure that even if things get reported, they're noticed as little as possible. Authorities often work with them to suppress and gag reporting of specific institutions that get hit, for a variety of reasons, but obviously including corruption - it's easy to convince politicians that they don't want pension funds or mortgage lenders or whatever to take a hit from negative publicity.

Over the last 5 years, dozens of huge financial firms - banks, hedge funds, credit unions, mortgage lenders, etc - have been hit, and about 15-20% pay the ransoms.

Even if public notice is mandated, there are probably cases where it's an obscure notification on some official government website, or a 3-4 page deep "announcement" on a company page phrased to look innocuous and routine. "We experienced a cybersecurity incident which was resolved" or what have you.

It's fairly trivial for them - routine - to cover things up, right out in the open, and with the speed of the news cycle, it's only gotten easier.

We should probably mandate disclosure by big corporations, institutions, and banks through a glaringly obvious, top half of the front page of their website, blunt declaration for 30 days, with a government page listing incidents and responses for 5 years. "XXX Corp was hit by ransomware and paid $123 in bitcoin to the APT Group AwfulAsshats"

Mandating by law that ransom not be paid puts the onus of maintaining proper disaster and ransomware recovery on the insitutions - if you're handling a huge scale of resources, you're on the hook for responsibly managing your employees security and livelihoods, your users and customers assets and data, and not incentivizing ransomware as a viable avenue of attack. If you can't handle the responsibility of securing against ransomware, you've no business handling people's data and money, frankly.

This would wipe out a whole slew of nonsense businesses, I think.

pandemic_region•4mo ago
Please tell your creator to enable --prefer-concise-replies.
fredoralive•4mo ago
Luckily, the Venn diagram overlap of black hat hackers and greying IBM mainframe programmers who understand things like JCL, RPG, COBOL and VSAM is a very small one indeed.
SoftTalker•4mo ago
> JCL, RPG, COBOL and VSAM

Nobody understands those things, they just take working code and modify it.

pixl97•4mo ago
Hell a lot of it isn't modified. I've recently seen cobol files with a last modified entry of '85.
cdsghh•4mo ago
Like ICBC? Already happened
rich_sasha•4mo ago
I know very little about cyber security in the wild - little Bobby Tables is about my level.

Are these hacks unavoidable, or are they indicative of shoddy IT on the victim's side? There has been a sleugh of cyberattacks recently and I don't know what to make of it.

If it's kind of like getting burgled - get good home security but a determined burglar will get in anyway - then it's a systemic problem we have to somehow tackle as a society. And if it's shoddy workmanship, again, it would appear so widespread that we have to do something about it.

I'm not passing judgment, just trying to understand.

Veserv•4mo ago
There is no system in use by a commercial entity in the world that can stop criminals with ~10 M$ from completely bypassing all of their security and doing arbitrary amounts of damage. If the attackers can on average derive more than 10 M$ of return, then you are guaranteed profitable to hit.

For instance, in the 2023 casino hacks of MGM and Caesars, Caesar paid a random of ~15 M$, making them profitable. In the JLR hack, JLR has incurred ~500 M$ of damage to date. These attacks cost less than 10 M$ to create and deploy guaranteed.

However, most commercial systems are vastly easier to hit than even 10 M$. I would venture that most of these high profile attacks are on the order of merely ~10-100 K$ to actually create and deploy making them wildly profitable with a ROI in the 10-1000(!) range. And, if you have the choice of spending 100K to get 15 M$ or 10 M$ to get 15 M$, it is pretty obvious who you would prioritize.

It is like the story of two people and the hungry bear. Even if you can not outrun the bear, if you can outrun the other person then the bear will tear you apart second.

So it is both. Everything is shoddy. Some are dramatically more shoddy than others. And the hungry bears are breeding so they can eat all the dodos.

SXX•4mo ago
No doubt there are some professional cyber criminal groups like ones from North Korea, but I seriously doubt that most of high-profile attacks even cost $10-100k. I mean you could say that if salary of random black hat researcher from Turkey, ex-USSR or Nigeria was $100,000 / year. But they obviously have no salary whatsoever and just trying and trying until they finally find suitable target.

Most likely all that was used is $50 / month server for nmap and other tools, bunch of $3 / month VPNs. Or might be everything that was needed is $10 for a eSim and one scam call.

And of course a lot of time of a person who can't get properly paid job anyway. Obviously might be only few people succeed, but in the end each particular attack cost peanuts.

SCHiM•4mo ago
IMO it's shoddy. Anybody can get hacked, that's true. But a modern corp that has tried to defend itself should have multiple layers of defenses against complete pwnage.

If you've paid attention in the last 10 (or even 5) years as a company, and did some pentests and redteams, you've seen how you could be breached, and you took appropriate steps years ago.

A non-shoddy company will have:

- hardened their user endpoints with some sort of modern EDR/detection suite.

- Removed credentials from the network shares (really).

- Made sure random employees are not highly privileged.

- Made sure admin privileges are scoped to admin business roles (DBA admin is not admin on webservers, and vice-versa).

- Made sure everyone is using MFA for truly critical actions and resource access.

- Patched their servers.

- Done some pentests.

This won't stop the random tier 2 breach on some workstation or forgotten server still hooked up on prod/testing, but it will stop the compromise _after_ that first step. So sure, hackers will still shitpost some slack channel dumps, but they won't ransomware your whole workstation fleet...

SXX•4mo ago
I guess you forgot the most important part: making sure your security and devops teams and people in company management follow exactly the same protocol as everyone else with no exception.

Because big bosses hate it when their PC don't just let them run whatever they want and they are not allowed to VPN into network from their home or their grandma desktop because they like her very much.

Also any Linux nerd sysadmin dude (like me) who know better is another type of person who hate following rules.

bornfreddy•4mo ago
In these times of ransomware, also (off-site) backup / restore / disaster recovery.
FerretFred•4mo ago
> Are these hacks unavoidable, or are they indicative of shoddy IT on the victim's side?

That's a really good question and one that I've asked (myself) many times. What I can't understand is that on one side you have an IT division that (probably) has a substantial budget, security hardware and software layers, security strategies and probably hundreds of personnel. On the other side you have a group of hackers/crackers who have none of the above, but often succeed. How does that work? Srsly!

bornfreddy•4mo ago
The defenders need to score every time to win the game. The attackers only need to score once.