frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
500•klaussilveira•8h ago•139 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
841•xnx•13h ago•503 comments

How we made geo joins 400× faster with H3 indexes

https://floedb.ai/blog/how-we-made-geo-joins-400-faster-with-h3-indexes
54•matheusalmeida•1d ago•10 comments

A century of hair samples proves leaded gas ban worked

https://arstechnica.com/science/2026/02/a-century-of-hair-samples-proves-leaded-gas-ban-worked/
112•jnord•4d ago•18 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
164•dmpetrov•9h ago•76 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
166•isitcontent•8h ago•18 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
280•vecti•10h ago•127 comments

Dark Alley Mathematics

https://blog.szczepan.org/blog/three-points/
60•quibono•4d ago•10 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
340•aktau•15h ago•164 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
225•eljojo•11h ago•139 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
332•ostacke•14h ago•89 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
421•todsacerdoti•16h ago•221 comments

PC Floppy Copy Protection: Vault Prolok

https://martypc.blogspot.com/2024/09/pc-floppy-copy-protection-vault-prolok.html
34•kmm•4d ago•2 comments

Show HN: ARM64 Android Dev Kit

https://github.com/denuoweb/ARM64-ADK
11•denuoweb•1d ago•0 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
360•lstoll•14h ago•251 comments

Why I Joined OpenAI

https://www.brendangregg.com/blog/2026-02-07/why-i-joined-openai.html
76•SerCe•4h ago•60 comments

Female Asian Elephant Calf Born at the Smithsonian National Zoo

https://www.si.edu/newsdesk/releases/female-asian-elephant-calf-born-smithsonians-national-zoo-an...
15•gmays•3h ago•2 comments

Show HN: R3forth, a ColorForth-inspired language with a tiny VM

https://github.com/phreda4/r3
59•phreda4•8h ago•9 comments

Delimited Continuations vs. Lwt for Threads

https://mirageos.org/blog/delimcc-vs-lwt
9•romes•4d ago•1 comments

How to effectively write quality code with AI

https://heidenstedt.org/posts/2026/how-to-effectively-write-quality-code-with-ai/
210•i5heu•11h ago•157 comments

Introducing the Developer Knowledge API and MCP Server

https://developers.googleblog.com/introducing-the-developer-knowledge-api-and-mcp-server/
33•gfortaine•6h ago•8 comments

I spent 5 years in DevOps – Solutions engineering gave me what I was missing

https://infisical.com/blog/devops-to-solutions-engineering
123•vmatsiiako•13h ago•51 comments

Learning from context is harder than we thought

https://hy.tencent.com/research/100025?langVersion=en
159•limoce•3d ago•80 comments

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/
257•surprisetalk•3d ago•33 comments

I now assume that all ads on Apple news are scams

https://kirkville.com/i-now-assume-that-all-ads-on-apple-news-are-scams/
1017•cdrnsf•18h ago•422 comments

FORTH? Really!?

https://rescrv.net/w/2026/02/06/associative
51•rescrv•16h ago•17 comments

I'm going to cure my girlfriend's brain tumor

https://andrewjrod.substack.com/p/im-going-to-cure-my-girlfriends-brain
93•ray__•5h ago•46 comments

Evaluating and mitigating the growing risk of LLM-discovered 0-days

https://red.anthropic.com/2026/zero-days/
44•lebovic•1d ago•12 comments

WebView performance significantly slower than PWA

https://issues.chromium.org/issues/40817676
10•denysonique•5h ago•0 comments

Show HN: Smooth CLI – Token-efficient browser for AI agents

https://docs.smooth.sh/cli/overview
81•antves•1d ago•59 comments
Open in hackernews

Never-before-seen Linux malware is "more advanced than typical"

https://arstechnica.com/security/2026/01/never-before-seen-linux-malware-is-far-more-advanced-than-typical/
133•Brajeshwar•3w ago

Comments

pmontra•3w ago
> Similar frameworks targeting Windows servers have flourished for years. They are less common on Linux machines.

That's good for me, as I develop on a Linux laptop but I never really understood why that is the case. I know that most people are on Windows so B2C malware naturally runs on Windows. However basically all the Internet infrastructure is on Linux and B2B malware should have been targeting that since a long time.

dist-epoch•3w ago
cloud servers have devs/admins keeping an eye on them

cloud providers monitor internal traffic and can detect a lot of malware activity, so you need stealthier ones

reincarnate0x14•3w ago
Even slightly higher barriers greatly reduces attempts, and the developers have much more practice at it. Rootkits and such for unix/linux have been around forever, but with VMs and containers getting recycled and such and long term expectations around impermanence and thus programmatically recreated and verifiable configurations, it's a lot harder to get something to stick without being found.

On top of that is the user interactivity model and software distribution model. For most non-admins the various protection schemes on Windows are a choice between "use my computer" and "don't use my computer" and thus basically meaningless. Plus there are fewer centrally managed repos because so much Windows software is hostile to being managed that way and large companies all have to build their own, and small organizations generally give up trying. Quick, hands-off integrity checks on linux can happen in the background and generally won't explode things.

Logging is a factor too. Windows logging tends to be "nothing" or "tsunami" with not a lot in between, and when log monitoring solutions charge by volume and analysts have to comb through oceans of noise to identify potentially dangerous activity, the end result is much less effective watchdogs. I've seen a lot of "Windows -> low cost log monitor doing filtering -> high cost log monitor that people actually look at" due to this, which is obviously harder to manage and less effective.

Most of this can be made the case for Windows, of course, but often isn't because getting Windows into a desired state is such a pain in the ass that it trains people into the "don't touch it, it's working!" mindset. Microsoft was making real strides towards this 20 years ago but their current product management has been security counterproductive IMHO. Doing things in the OS that look a lot like malware turns out to not be a good idea.

When we were developing attacks for unix environments it was often easier to go after the application deployment or CI chains than try to root the box unless there was a juicy SSHD or bash or whatever bug, which have been highly publicized are usually rapidly fixed without needing major effort from endpoint managers.

Volundr•3w ago
> Logging is a factor too. Windows logging tends to be "nothing" or "tsunami" with not a lot in between

You forgot mysterious GUID that shows up on exactly one forum post on the Internet with no solution.

reincarnate0x14•3w ago
From 10 years on an abandoned Microsoft forum, yes. Trust me, I'm TRYING to forget about those.
itintheory•3w ago
Or only in search results that link to... a 404 on Microsoft's site.
therein•3w ago
Or a link to a discussion on experts-exchange. Might as well not exist.
api•3w ago
I think it's just that there's more bounty on the Windows side: more business users, more credentials to steal, etc.
resfirestar•3w ago
Linux malware looks different usually. This kind of plugin based framework running as its own process is uncommon, but web shells with similar functionality have been around for a while. And bad guys like working in the shell on Linux too, just a simple binary that reads commands from a socket is often all they need, but doesn't make for very fascinating blog posts. Some just install cloudflared, nothing custom needed at all.
jmclnx•3w ago
>With no indication that VoidLink is actively targeting machines, there’s no immediate action required by defenders,

Plus no mention of how these machines get "infected". My guess is the admin will need to download something and manually install it. So a root kit ?

I wish these articles would mention how these "most advance malware" gets on your system.

dist-epoch•3w ago
it probably has multiple ways - infected npm packages, quickly exploiting CVEs before they are patched, ...
worksonmine•3w ago
If you've ever worked in the node ecosystem you'd be surprised at the amount of devs that blindly run `sudo npm i -g ...`. Not to mention `curl ... | sudo bash`. The industry is very bad at teaching developers good hygiene on their machines.
ACV001•3w ago
trash ad for linux antivirus. who uses that anyway?
onlyrealcuzzo•3w ago
Ah, classic, the solution to your problem is a bigger problem!

Step 1 -> install anti virus protection

Step 2 -> expose yourself to viruses via the protection method

Step 3 -> pay for more virus protection

The infinite flywheel!

kotaKat•3w ago
Good news! There's a Cloudstrike sensor for Linux! ;)
1970-01-01•3w ago
It's only Linux malware if it has a GPL or other FOSS license. This is just untrustworthy code.

--Linux users, probably

askl•3w ago
It's called GNU/malware.
hackeraccount•3w ago
Technically it can only be called GNU if it's written in the GNU region of France.
AlienRobot•3w ago
It has a viral license.
happyPersonR•3w ago
lol there’s no real technical details in this article sadly. Checkpoint has a better analysis.

https://research.checkpoint.com/2026/voidlink-the-cloud-nati...

Some kind of opensource ish malware framework the kids are running that can use eBPF …. In addition to limiting CAP_BPF or CAP_SYS_ADMIN you should also take other measures.

dralley•3w ago
>VoidLink is an impressive piece of software, written in Zig for Linux

Finally, Zig has a user in production /s

(I like Zig, it's a joke, don't hate me)

dijit•3w ago
Hey, I don’t hate you, but I feel like Ghostty has users.

Is it critical software? Unsure- it will feel critical if it hangs when you’re doing some data processing via a shell its running- but that's besides the point.

Maybe “production” requires it being used for a backend? ;)

neurostimulant•3w ago
How long until antivirus vendors start flagging zig binaries as malware (like they did to golang binaries a while ago)?
jjmarr•3w ago
An B2B SaaS platform with an amazing plugin ecosystem that works on my Kubernetes cluster, for any Linux distribution, written in Zig?

Where do I sign up?

reincarnate0x14•3w ago
Much better article, thanks.

That reminds me of the ninjaone interface, they could probably be selling that as a legit management tool, minus the detection avoidance and self-deletion feature :)

lifetimerubyist•3w ago
and here I am with my main PC with CPU mitigations off and SE Linux completely removed

come at me bro

jijijijij•3w ago
Targeting containerized environments, VoidLink seems most sensible when accompanying universal exploits like the xz backdoor. May be indicative of continuing efforts and confidence to infiltrate the base Linux ecosystem. I imagine, this framework isn't primarily used for targeted attacks and espionage, but rather as rapid staging ground for "cyber warfare" operations.
worthless-trash•3w ago
Most Linux malware is low quality garbage with easily exploitable bugs in itself.