Feed aggregator

US Lifts Sanctions Against Crypto Mixer Tornado Cash

Security Week - Mon, 03/24/2025 - 8:40am

The US Department of the Treasury has removed sanctions against the fully decentralized cryptocurrency mixer service Tornado Cash.

The post US Lifts Sanctions Against Crypto Mixer Tornado Cash appeared first on SecurityWeek.

Categories: SecurityWeek

FCC Probes Whether Banned Chinese Telecom Providers Still Operating in US

Security Week - Mon, 03/24/2025 - 8:30am

The FCC is investigating whether Chinese firms such as Huawei, ZTE and China Telecom are still operating in the US.

The post FCC Probes Whether Banned Chinese Telecom Providers Still Operating in US appeared first on SecurityWeek.

Categories: SecurityWeek

Are Starlink’s Satellites Depleting the Ozone?

CNET Feed - Mon, 03/24/2025 - 8:03am
Elon Musk's satellite internet company has been a game-changer for rural internet, but there could be dire consequences for Earth's stratosphere.
Categories: CNET

CISA Adds One Known Exploited Vulnerability to Catalog

US-Cert Current Activity - Mon, 03/24/2025 - 8:00am

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.

  • CVE-2025-30154 reviewdog action-setup GitHub Action Embedded Malicious Code Vulnerability

These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

Categories: US-CERT Feed

iPad 11th Gen Review: Great if You Keep It Basic

CNET Feed - Mon, 03/24/2025 - 8:00am
What do you actually want from an iPad? If you're keeping it simple, this is the one to get.
Categories: CNET

Ask HN: Model to Analyse Financial Transactions

Hacker News - Mon, 03/24/2025 - 7:55am

Are there any good product, LLMs or models to analyse financial transactions? Looking for local tools or models.

Comments URL: https://news.ycombinator.com/item?id=43459880

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: Oqtopus: Open-Source Full-Stack Quantum Cloud Platform

Hacker News - Mon, 03/24/2025 - 7:53am

We're excited to announce the open source release of a comprehensive quantum cloud platform — OQTOPUS. This project delivers an end-to-end solution for quantum computing by integrating both cloud and edge-server components, bridging the gap between user-facing quantum software and the underlying system operations.

Key Highlights:

- Cloud Layer: Provides RESTful APIs based on OpenAPI and FastAPI, along with robust user authentication and job scheduling. Infrastructure is automated through an Infrastructure as Code (IaC) approach using Terraform.

- Edge-Server Component: Manages critical preprocessing tasks such as quantum circuit transpilation (via a versatile multi-format transpiler framework), and handles sophisticated post-processing like readout error mitigation to improve result accuracy.

- End-to-End Integration: Seamlessly processes user-submitted quantum circuits—from job queuing, through circuit transformation and device execution, to final result correction—making quantum computing more accessible and efficient.

By releasing OQTOPUS as open source, the aim is to lower the entry barrier for quantum system software development and foster a vibrant community of contributors and innovators in quantum computing.

The full project details and source code are available on GitHub. Contributions and feedback are welcome to drive the next generation of quantum cloud solutions.

GitHub: https://github.com/oqtopus-team/ Website: https://oqtopus-team.github.io/

Comments URL: https://news.ycombinator.com/item?id=43459872

Points: 1

# Comments: 0

Categories: Hacker News

Tell HN: Taking care when responding to job postings in "who is hiring"

Hacker News - Mon, 03/24/2025 - 7:51am

Dear HN,

Without naming names (although come April will do so in response to specific poster) I want to share a piece of advice after having been careless myself and realizing the error afterwards.

When we are in job search mode, specially in this atrocious job market, we are vulnerable to social engineering, and some bad actors appear to be taking advantage of these (expected) vulnerabilities.

One such vulnerability is limited time resources. To do due diligence on every single company before applying is a luxury that we simply don't have. This is specially important when applying to little known startups. If you are like me, come first of the month, you are going down that page and applying to whatever seems a good fit, one after another.

The other (expected) vulnerability is when in response to the application requests are made that one would normally subject to critical consideration.

This month I received a response from a company that after having expressed great enthusiasm regarding my application, requested a video introduction. It should have been a red flag for me that when I provided this from a well known service provider they requested a link that did not require their logging in to that service. After providing a link that did not require a record of their access to the video, they have ghosted me and have not responded to follow ups. This felt strange and (doh) I finally started digging deeper into the names of the team members on their about page and the picture that emerged was unlike the little snippets on their about page. (Turns out their ceo is actually not a tech visionary but rather a glorified marketer.)

Now it is entirely possible that this is simply yet another example of the degraded social norms in our society. But it is also possible that this company is collecting resumes and video (biometrics) specially since their "privacy" page indicates the typical assertion of copyrights over communications with them.

What I will be doing going forward (and I recommend the same and expect YCombinator to also recommend this in the top post for the who is hiring thread) is to, before providing such content, first obtain an acknowledgement regarding non-transfer of copyrights and strictly limited scope of sharing of such content before providing it. We live after all in the age of trivially created AI dopelgangers.

Comments URL: https://news.ycombinator.com/item?id=43459855

Points: 1

# Comments: 0

Categories: Hacker News

Hitts.cc – Advanced Text to Speech with GPT-4o Mini TTS

Hacker News - Mon, 03/24/2025 - 7:45am

Article URL: https://hitts.cc

Comments URL: https://news.ycombinator.com/item?id=43459809

Points: 2

# Comments: 0

Categories: Hacker News

Medusa Ransomware Uses Malicious Driver to Disable Security Tools

Security Week - Mon, 03/24/2025 - 7:42am

The Medusa ransomware relies on a malicious Windows driver to disable the security tools running on the infected systems.

The post Medusa Ransomware Uses Malicious Driver to Disable Security Tools appeared first on SecurityWeek.

Categories: SecurityWeek

Pages