frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

At Age 25, Wikipedia Refuses to Evolve

https://spectrum.ieee.org/wikipedia-at-25
1•asdefghyk•2m ago•1 comments

Show HN: ReviewReact – AI review responses inside Google Maps ($19/mo)

https://reviewreact.com
1•sara_builds•3m ago•0 comments

Why AlphaTensor Failed at 3x3 Matrix Multiplication: The Anchor Barrier

https://zenodo.org/records/18514533
1•DarenWatson•4m ago•0 comments

Ask HN: How much of your token use is fixing the bugs Claude Code causes?

1•laurex•7m ago•0 comments

Show HN: Agents – Sync MCP Configs Across Claude, Cursor, Codex Automatically

https://github.com/amtiYo/agents
1•amtiyo•8m ago•0 comments

Hello

1•otrebladih•10m ago•0 comments

FSD helped save my father's life during a heart attack

https://twitter.com/JJackBrandt/status/2019852423980875794
2•blacktulip•12m ago•0 comments

Show HN: Writtte – Draft and publish articles without reformatting, anywhere

https://writtte.xyz
1•lasgawe•14m ago•0 comments

Portuguese icon (FROM A CAN) makes a simple meal (Canned Fish Files) [video]

https://www.youtube.com/watch?v=e9FUdOfp8ME
1•zeristor•16m ago•0 comments

Brookhaven Lab's RHIC Concludes 25-Year Run with Final Collisions

https://www.hpcwire.com/off-the-wire/brookhaven-labs-rhic-concludes-25-year-run-with-final-collis...
2•gnufx•18m ago•0 comments

Transcribe your aunts post cards with Gemini 3 Pro

https://leserli.ch/ocr/
1•nielstron•22m ago•0 comments

.72% Variance Lance

1•mav5431•23m ago•0 comments

ReKindle – web-based operating system designed specifically for E-ink devices

https://rekindle.ink
1•JSLegendDev•25m ago•0 comments

Encrypt It

https://encryptitalready.org/
1•u1hcw9nx•25m ago•1 comments

NextMatch – 5-minute video speed dating to reduce ghosting

https://nextmatchdating.netlify.app/
1•Halinani8•26m ago•1 comments

Personalizing esketamine treatment in TRD and TRBD

https://www.frontiersin.org/articles/10.3389/fpsyt.2025.1736114
1•PaulHoule•27m ago•0 comments

SpaceKit.xyz – a browser‑native VM for decentralized compute

https://spacekit.xyz
1•astorrivera•28m ago•0 comments

NotebookLM: The AI that only learns from you

https://byandrev.dev/en/blog/what-is-notebooklm
2•byandrev•28m ago•1 comments

Show HN: An open-source starter kit for developing with Postgres and ClickHouse

https://github.com/ClickHouse/postgres-clickhouse-stack
1•saisrirampur•29m ago•0 comments

Game Boy Advance d-pad capacitor measurements

https://gekkio.fi/blog/2026/game-boy-advance-d-pad-capacitor-measurements/
1•todsacerdoti•29m ago•0 comments

South Korean crypto firm accidentally sends $44B in bitcoins to users

https://www.reuters.com/world/asia-pacific/crypto-firm-accidentally-sends-44-billion-bitcoins-use...
2•layer8•30m ago•0 comments

Apache Poison Fountain

https://gist.github.com/jwakely/a511a5cab5eb36d088ecd1659fcee1d5
1•atomic128•32m ago•2 comments

Web.whatsapp.com appears to be having issues syncing and sending messages

http://web.whatsapp.com
1•sabujp•32m ago•2 comments

Google in Your Terminal

https://gogcli.sh/
1•johlo•33m ago•0 comments

Shannon: Claude Code for Pen Testing: #1 on Github today

https://github.com/KeygraphHQ/shannon
1•hendler•34m ago•0 comments

Anthropic: Latest Claude model finds more than 500 vulnerabilities

https://www.scworld.com/news/anthropic-latest-claude-model-finds-more-than-500-vulnerabilities
2•Bender•38m ago•0 comments

Brooklyn cemetery plans human composting option, stirring interest and debate

https://www.cbsnews.com/newyork/news/brooklyn-green-wood-cemetery-human-composting/
1•geox•38m ago•0 comments

Why the 'Strivers' Are Right

https://greyenlightenment.com/2026/02/03/the-strivers-were-right-all-along/
1•paulpauper•40m ago•0 comments

Brain Dumps as a Literary Form

https://davegriffith.substack.com/p/brain-dumps-as-a-literary-form
1•gmays•40m ago•0 comments

Agentic Coding and the Problem of Oracles

https://epkconsulting.substack.com/p/agentic-coding-and-the-problem-of
1•qingsworkshop•41m ago•0 comments
Open in hackernews

The Nature of Security Failure

1•__spirit__•3w ago
What I Learned After Studying Real-World Hacking Attacks?

I had conceived that successful hacking requires pure technical skill: new exploits, clever payloads, and deep knowledge of operating systems. Then I started reading opinions on post-incident breach reports, leaked attack timelines, and other such things, and that failed to hold up. Real-life attacks benefit much more from simple things.

Most Breaches Start With Something Boring : So incidents benefit from credential reuse from a previous breach, an exposed admin interface, a misconfigured cloud service, and a successful phishing email. These aren't edge cases: They are defaults. An attacker doesn't have to be creative when the same mistakes repeat across organizations. What amazed me was the operationally careless manner in which many technically "secure" systems were treated. The vulnerabilities were not unknown; they were just tolerated.

Phishing Works Because It Is Context-Based, Not Ignorance-Based : I had supposed that phishing must target naive users. Far from it, the data suggest that many of the victims were engineers, managers, and administrators. Phishing works because it mocks up normal workflows. Messages drop in during busy hours, mirror internal tools, and apply time pressure. The design isn't one to nail everybody; it's to catch somebody at the wrong moment. Security wisdom often tells one to look for "obvious" red flags. Real attacks do not have to be perfect; they only need to be plausible.

Misconfiguration Is Deadlier than Vulnerabilities : In reading through the incident analyses, I was struck by how rarely zero-day exploits came into play. More often than not, attackers simply stumbled on services that should not have been public. Open S3 buckets, unsecured dashboards, default credentials, and overly permissive roles showed up repeatedly. These issues weren't hidden; they were discoverable through routine scanning. What surprised me was how long some of these exposures existed before being exploited. The window wasn't minutes; it wasn't hours; it was months.

The Attackers Optimize for Silence : Another fallacy I held was that attackers engaged in speedy work once inside. In fact, many breaches involved prolonged dwell times. Attackers moved largely unhurriedly, keeping their heads low to avoid alerting any, and maximizing their persistence. The immediate harm was never the objective; the plan was continued access. By the time the defenders turned up heads, the attackers already had a mental map of the systems and pilfered data. This really made me rethink detection. It is not only about quickness; it is about being seen.

Quietly Failing Security Tools : Many environments under breach had up-to-date security stacks. It was not the lack of tools that caused failure; it was that alerts were drowned out in noise, logs were not reviewed, and ownership was ambivalent. Security was not eroded through any significant process of failure, but it was neglected. Over a period of time, exceptions accumulated, and temporary decisions took on a life of their own.

Boring Practices Prevent Non-Boring Incidents : The most effective forms of defence were also the most mundane: ⦁Enforced multi-factor authentication ⦁Limited credential reuse ⦁Reduced default access ⦁Regular audits of exposed services ⦁None of this is new. Perhaps that's the issue.

Studying raw attacks flipped my mental model. Scaling it, hack is not so much about sophistication as about reliability. Attackers win when defenders repeat the same predictable mistakes.

"Security does not fail by shouting; it fails by stealth."