Record number of Russians support peace talks, end of war in Ukraine, poll shows ⌘ Read more
New watch. My old one was still fine and will probably be on sale soon, but this refurbished Galaxy Watch 7 has LTE. I can set up fall detection and use the emergency SOS feature in case of an emergency when my phone is out of reach or broken. Safety first. I can also leave my phone at home and still receive or make calls. ⌘ Read more
I’m sick with a really bad cold and my cat is trying to help me feel better ⌘ Read more
😻 ⌘ Read more
FriendlyElec NanoPi M5 Offers RK3576, Dual LAN, MIPI-CSI, and 6 TOPS NPU
FriendlyElec has introduced the NanoPi M5, a compact single-board computer based on the Rockchip RK3576 processor. It features a 6 TOPS INT8 NPU, supports LPDDR4X or LPDDR5 memory, and offers UFS 2.0 storage along with dual Gigabit Ethernet and MIPI-CSI/DSI interfaces. Compared to recently launched boards such as the NanoPi Zero2 (RK3528A), NanoPi M6 (RK3588S), […] ⌘ Read more
Putin Ally Says Ukraine Operation ‘Grounds for Nuclear Attack’ ⌘ Read more
Hack the model: Build AI security skills with the GitHub Secure Code Game
Dive into the novel security challenges AI introduces with the open source game that over 10,000 developers have used to sharpen their skills.
The post Hack the model: Build AI security skills with the GitHub Secure Code Game appeared first on The GitHub Blog. ⌘ Read more
DNS rebinding attacks explained: The lookup is coming from inside the house!
DNS rebinding attack without CORS against local network web applications. Explore the topic further and see how it can be used to exploit vulnerabilities in the real-world.
The post [DNS rebinding attacks explained: The lookup is coming from inside the house!](https://github.blog/security/application-security/dns-rebinding-attacks-explained-the-lookup-is-coming-from- … ⌘ Read more
Tech Journalist Engages in Lies & Doublespeak to Defame Lunduke
As part of a GNOME puff piece, a Tech Journalist for a Free and Open Source publication went on an unhinged attack on all things “Lunduke”. ⌘ Read more
thats his favorite slide ⌘ Read more
Trump appears to undercut US proposal to Iran, declaring he won’t allow any uranium enrichment ⌘ Read more
I couldn’t handle to see this cat every day in this condition outside of where I’m doing my internship, so I brought it home ⌘ Read more
Russia closes Crimea bridge hours after Ukraine underwater strike ⌘ Read more
Sony’s NEWS UNIX workstations
The first prototype was ready in just six months. By October 1986, the project was announced, and in January 1987, the first NEWS workstation, the NWS 800 series, officially launched. It ran 4.2BSD UNIX and featured a Motorola 68020 CPU. Its performance rivaled that of traditional super minicomputers, but with a dramatically lower price point ranging from ¥950,000 to ¥2.75 million (approximately $6,555 to $18,975 USD in 1987). Competing UNIX workstations typically cost clo … ⌘ Read more
Ukraine hits Crimea bridge amid stalled peace talks, seeks US support ⌘ Read more
Why haven’t you served my dinner yet? ⌘ Read more
Ukraine says it has struck bridge connecting Russia to Crimea with underwater explosives ⌘ Read more
Page Magic: A Chrome extension that uses AI to customize the appearance of any web page
Comments ⌘ Read more
Crimea bridge hit by explosion ⌘ Read more
Trump official who shut down Russia propaganda unit has links to Kremlin ⌘ Read more
cat says: 🤨 ⌘ Read more
Huckabee suggests Paris give Palestinians state in French Riviera ⌘ Read more
Can’t fool him 3 times 😅 ⌘ Read more
Quarkdown: A modern Markdown-based typesetting system
Article URL: https://github.com/iamgio/quarkdown
Comments URL: https://news.ycombinator.com/item?id=44167592
Points: 506
# Comments: 233 ⌘ Read more
Dutch government collapses after Geert Wilders’ far-right party quits ⌘ Read more
10 Unsettling Incidents We Still Can’t Explain
When something strange happens, we try to make sense of things by putting the scattered puzzle pieces together. For example, when Flight MH370 dropped off the radar in 2014, most people eventually accepted the theory that the pilot was suicidal. But how do we know that for a fact? The reality is that no one […]
The post [10 Unsettling Incidents We Still Can’t Explain](https://listverse.com/2025/06/03/10-unsettling-incidents-we-still-cant-e … ⌘ Read more
10 Movies That Missed the Point of Their Source Material
When adapting books and comics into movies, certain changes must be made to accommodate the new medium. While fans sometimes bristle at plotlines and characters being altered—or even cut out completely—there’s no way for adaptations to be entirely faithful. However, some film adaptations seem to entirely miss the point of their source material. That isn’t […]
The post [10 Movies That Missed the Point of Their Source Ma … ⌘ Read more
next-20250603: linux-next
Version:next-20250603 (linux-next)Released:2025-06-03 ⌘ Read more
The global temperature may be even higher than we thought ⌘ Read more
404 to $4,000: Exposed .git, .env, and Hidden Dev Files via Predictable Paths”
How Bug Bounty Hunters Can Turn Common 404s Into Critical Information Disclosure Bounties
[Continue reading on InfoSec Write-u … ⌘ Read more
How One Path Traversal in Grafana Unleashed XSS, Open Redirect and SSRF (CVE-2025–4123)
Abusing Client Path Traversal to Chain XSS, SSRF and Open Redirect in Grafana
[Continue rea … ⌘ Read more
**2. Setting Up the Ultimate Hacker’s Lab (Free Tools Only) **
“You don’t need a fortune to break into bug bounty. You just need the right mindset — and the right setup.”
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/2-se … ⌘ Read more
My sweet baby girl passed away 2 weeks ago - everyone please go hug your cats, they are only here for so long and they go so suddenly ⌘ Read more
** 19 Billion Stolen Passwords?! Here’s Why You Should Care — And How to Beat the Hackers** ⌘ Read more
Cracking JWTs: A Bug Bounty Hunting Guide [Part 3] ⌘ Read more
Webhook Vulnerabilities: Hidden Vulnerabilities in Automation Pipelines
How misconfigured webhooks in CI/CD, Slack, and third-party integrations can expose secrets, trigger SSRF, and lead to critical…
[Conti … ⌘ Read more
The Invisible Bottleneck: How IT Hierarchies Impact Growth ⌘ Read more