Security campaigns are now generally available to help address security debt at scale https://github.blog/changelog/2025-04-07-security-campaigns-are-now-generally-available-to-help-address-security-debt-at-scale
#github

Security campaigns are now generally available to help address security debt at scale https://github.blog/changelog/2025-04-07-security-campaigns-are-now-generally-available-to-help-address-security-debt-at-scale
#github
Git turns 20: A Q&A with Linus Torvalds
https://github.blog/open-source/git/git-turns-20-a-qa-with-linus-torvalds/
Using Token Sequences to Iterate Ranges
https://brevzin.github.io/c++/2025/04/03/token-sequence-for/
Neptune RAT Variant Spreads via YouTube to Steal Windows Passwords https://hackread.com/neptune-rat-variant-youtube-steal-windows-passwords/ #Cybersecurity #NeptuneRAT #Security #Telegram #Malware #CYFIRMA #Windows #youtube #GitHub #RAT
Show HN: Coroot – eBPF-based, open source observability with actionable insights
Wow, a "hierarchical navigable small world" index in just 500 lines of code!
Because who needs entire libraries when you can just slap a buzzword salad together on GitHub?
This is what happens when you combine #AI with pure, unfiltered hubris.
https://github.com/dicroce/hnsw #hierarchicalNavigableSmallWorld #coding #GitHub #buzzwordSalad #techHumor #HackerNews #ngated
HNSW index for vector embeddings in approx 500 LOC
Show HN: HNSW index for vector embeddings in approx 500 LOC
At some point raising a pull request on a fork in #github was changed to make the default target the original repository. It turns out this is an embarrassing way to publicly share your last year of private commits.
New problem, new library! This time, I made a small utility for Laravel to limit a group of models on the table.
https://github.com/Laragear/Capstone
I talked about the implementation on my Medium blog, but in a nutshell, it uses a subquery to keep only the records you don't want to delete, like the latest five.
Fine-grained PATs are now generally available · #GitHub https://github.blog/changelog/2025-03-18-fine-grained-pats-are-now-generally-available/
C Find out more about the new milestone hit from Microsoft and Anthropic open source release here.
#Github, #MCP, #LLMs, #DevOps @pythonbytes @talkpython @jerod @changelog
https://github.blog/changelog/2025-04-04-github-mcp-server-public-preview/
Git turns 20: A Q&A with Linus Torvalds
https://github.blog/open-source/git/git-turns-20-a-qa-with-linus-torvalds/
LLM-hacker-news: LLM plugin for pulling content from Hacker News
Neptune RAT Variant Spreads via YouTube to Steal Windows Passwords – Source:hackread.com https://ciso2ciso.com/neptune-rat-variant-spreads-via-youtube-to-steal-windows-passwords-sourcehackread-com/ #1CyberSecurityNewsPost #CyberSecurityNews #cybersecurity #NeptuneRAT #Hackread #security #Telegram #CYFIRMA #malware #Windows #youtube #GitHub #RAT
Tom and Jerry One-Minute Video Generation with Test-Time Training
CrazyHunter: The Rising Threat of Open-Source Ransomware
A ransomware attack on Mackay Memorial Hospital in Taiwan highlights the growing use of publicly available offensive tools by threat actors. The CrazyHunter ransomware, built using the Prince Ransomware builder from GitHub, encrypted over 600 devices across two hospital branches. The attack, likely initiated via a USB device, employed various tools for defense evasion, encryption, and lateral movement. The threat actor used a vulnerable Zemana driver to disable security products, utilized the Prince Ransomware builder for file encryption, and leveraged SharpGPOAbuse for lateral movement. The incident demonstrates the increasing accessibility of cyber attack tools, enabling even less skilled actors to launch sophisticated attacks. This trend poses significant challenges for attribution and defense against ransomware threats.
Pulse ID: 67f4fae37154dd3c27358f82
Pulse Link: https://otx.alienvault.com/pulse/67f4fae37154dd3c27358f82
Pulse Author: AlienVault
Created: 2025-04-08 10:30:59
Be advised, this data is unverified and should be considered preliminary. Always do further verification.