frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Transcribe your aunts post cards with Gemini 3 Pro

https://leserli.ch/ocr/
1•nielstron•42s ago•0 comments

.72% Variance Lance

1•mav5431•1m ago•0 comments

ReKindle – web-based operating system designed specifically for E-ink devices

https://rekindle.ink
1•JSLegendDev•3m ago•0 comments

Encrypt It

https://encryptitalready.org/
1•u1hcw9nx•3m ago•0 comments

NextMatch – 5-minute video speed dating to reduce ghosting

https://nextmatchdating.netlify.app/
1•Halinani8•4m ago•1 comments

Personalizing esketamine treatment in TRD and TRBD

https://www.frontiersin.org/articles/10.3389/fpsyt.2025.1736114
1•PaulHoule•5m ago•0 comments

SpaceKit.xyz – a browser‑native VM for decentralized compute

https://spacekit.xyz
1•astorrivera•6m ago•1 comments

NotebookLM: The AI that only learns from you

https://byandrev.dev/en/blog/what-is-notebooklm
1•byandrev•6m ago•1 comments

Show HN: An open-source starter kit for developing with Postgres and ClickHouse

https://github.com/ClickHouse/postgres-clickhouse-stack
1•saisrirampur•7m ago•0 comments

Game Boy Advance d-pad capacitor measurements

https://gekkio.fi/blog/2026/game-boy-advance-d-pad-capacitor-measurements/
1•todsacerdoti•7m ago•0 comments

South Korean crypto firm accidentally sends $44B in bitcoins to users

https://www.reuters.com/world/asia-pacific/crypto-firm-accidentally-sends-44-billion-bitcoins-use...
1•layer8•8m ago•0 comments

Apache Poison Fountain

https://gist.github.com/jwakely/a511a5cab5eb36d088ecd1659fcee1d5
1•atomic128•10m ago•1 comments

Web.whatsapp.com appears to be having issues syncing and sending messages

http://web.whatsapp.com
1•sabujp•10m ago•2 comments

Google in Your Terminal

https://gogcli.sh/
1•johlo•12m ago•0 comments

Shannon: Claude Code for Pen Testing: #1 on Github today

https://github.com/KeygraphHQ/shannon
1•hendler•12m ago•0 comments

Anthropic: Latest Claude model finds more than 500 vulnerabilities

https://www.scworld.com/news/anthropic-latest-claude-model-finds-more-than-500-vulnerabilities
2•Bender•16m ago•0 comments

Brooklyn cemetery plans human composting option, stirring interest and debate

https://www.cbsnews.com/newyork/news/brooklyn-green-wood-cemetery-human-composting/
1•geox•16m ago•0 comments

Why the 'Strivers' Are Right

https://greyenlightenment.com/2026/02/03/the-strivers-were-right-all-along/
1•paulpauper•18m ago•0 comments

Brain Dumps as a Literary Form

https://davegriffith.substack.com/p/brain-dumps-as-a-literary-form
1•gmays•18m ago•0 comments

Agentic Coding and the Problem of Oracles

https://epkconsulting.substack.com/p/agentic-coding-and-the-problem-of
1•qingsworkshop•19m ago•0 comments

Malicious packages for dYdX cryptocurrency exchange empties user wallets

https://arstechnica.com/security/2026/02/malicious-packages-for-dydx-cryptocurrency-exchange-empt...
1•Bender•19m ago•0 comments

Show HN: I built a <400ms latency voice agent that runs on a 4gb vram GTX 1650"

https://github.com/pheonix-delta/axiom-voice-agent
1•shubham-coder•20m ago•0 comments

Penisgate erupts at Olympics; scandal exposes risks of bulking your bulge

https://arstechnica.com/health/2026/02/penisgate-erupts-at-olympics-scandal-exposes-risks-of-bulk...
4•Bender•20m ago•0 comments

Arcan Explained: A browser for different webs

https://arcan-fe.com/2026/01/26/arcan-explained-a-browser-for-different-webs/
1•fanf2•22m ago•0 comments

What did we learn from the AI Village in 2025?

https://theaidigest.org/village/blog/what-we-learned-2025
1•mrkO99•22m ago•0 comments

An open replacement for the IBM 3174 Establishment Controller

https://github.com/lowobservable/oec
1•bri3d•25m ago•0 comments

The P in PGP isn't for pain: encrypting emails in the browser

https://ckardaris.github.io/blog/2026/02/07/encrypted-email.html
2•ckardaris•27m ago•0 comments

Show HN: Mirror Parliament where users vote on top of politicians and draft laws

https://github.com/fokdelafons/lustra
1•fokdelafons•27m ago•1 comments

Ask HN: Opus 4.6 ignoring instructions, how to use 4.5 in Claude Code instead?

1•Chance-Device•29m ago•0 comments

We Mourn Our Craft

https://nolanlawson.com/2026/02/07/we-mourn-our-craft/
2•ColinWright•31m ago•0 comments
Open in hackernews

The Nature of Security Failure

1•__spirit__•3w ago
What I Learned After Studying Real-World Hacking Attacks?

I had conceived that successful hacking requires pure technical skill: new exploits, clever payloads, and deep knowledge of operating systems. Then I started reading opinions on post-incident breach reports, leaked attack timelines, and other such things, and that failed to hold up. Real-life attacks benefit much more from simple things.

Most Breaches Start With Something Boring : So incidents benefit from credential reuse from a previous breach, an exposed admin interface, a misconfigured cloud service, and a successful phishing email. These aren't edge cases: They are defaults. An attacker doesn't have to be creative when the same mistakes repeat across organizations. What amazed me was the operationally careless manner in which many technically "secure" systems were treated. The vulnerabilities were not unknown; they were just tolerated.

Phishing Works Because It Is Context-Based, Not Ignorance-Based : I had supposed that phishing must target naive users. Far from it, the data suggest that many of the victims were engineers, managers, and administrators. Phishing works because it mocks up normal workflows. Messages drop in during busy hours, mirror internal tools, and apply time pressure. The design isn't one to nail everybody; it's to catch somebody at the wrong moment. Security wisdom often tells one to look for "obvious" red flags. Real attacks do not have to be perfect; they only need to be plausible.

Misconfiguration Is Deadlier than Vulnerabilities : In reading through the incident analyses, I was struck by how rarely zero-day exploits came into play. More often than not, attackers simply stumbled on services that should not have been public. Open S3 buckets, unsecured dashboards, default credentials, and overly permissive roles showed up repeatedly. These issues weren't hidden; they were discoverable through routine scanning. What surprised me was how long some of these exposures existed before being exploited. The window wasn't minutes; it wasn't hours; it was months.

The Attackers Optimize for Silence : Another fallacy I held was that attackers engaged in speedy work once inside. In fact, many breaches involved prolonged dwell times. Attackers moved largely unhurriedly, keeping their heads low to avoid alerting any, and maximizing their persistence. The immediate harm was never the objective; the plan was continued access. By the time the defenders turned up heads, the attackers already had a mental map of the systems and pilfered data. This really made me rethink detection. It is not only about quickness; it is about being seen.

Quietly Failing Security Tools : Many environments under breach had up-to-date security stacks. It was not the lack of tools that caused failure; it was that alerts were drowned out in noise, logs were not reviewed, and ownership was ambivalent. Security was not eroded through any significant process of failure, but it was neglected. Over a period of time, exceptions accumulated, and temporary decisions took on a life of their own.

Boring Practices Prevent Non-Boring Incidents : The most effective forms of defence were also the most mundane: ⦁Enforced multi-factor authentication ⦁Limited credential reuse ⦁Reduced default access ⦁Regular audits of exposed services ⦁None of this is new. Perhaps that's the issue.

Studying raw attacks flipped my mental model. Scaling it, hack is not so much about sophistication as about reliability. Attackers win when defenders repeat the same predictable mistakes.

"Security does not fail by shouting; it fails by stealth."