<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News - Newest: &#34;security&#34;</title><link>https://news.ycombinator.com/newest</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 14 May 2026 23:08:39 +0000</lastBuildDate><atom:link href="https://hnrss.org/newest?points=50&amp;q=security" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[CERT is releasing six CVEs for serious security vulnerabilities in dnsmasq]]></title><description><![CDATA[
<p>Article URL: <a href="https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html">https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=48112042">https://news.ycombinator.com/item?id=48112042</a></p>
<p>Points: 372</p>
<p># Comments: 236</p>
]]></description><pubDate>Tue, 12 May 2026 18:12:28 +0000</pubDate><link>https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html</link><dc:creator>chizhik-pyzhik</dc:creator><comments>https://news.ycombinator.com/item?id=48112042</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48112042</guid></item><item><title><![CDATA[Security through obscurity is not bad]]></title><description><![CDATA[
<p>Article URL: <a href="https://mobeigi.com/blog/security/security-through-obscurity-is-not-bad/">https://mobeigi.com/blog/security/security-through-obscurity-is-not-bad/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47997486">https://news.ycombinator.com/item?id=47997486</a></p>
<p>Points: 206</p>
<p># Comments: 214</p>
]]></description><pubDate>Sun, 03 May 2026 14:49:56 +0000</pubDate><link>https://mobeigi.com/blog/security/security-through-obscurity-is-not-bad/</link><dc:creator>mobeigi</dc:creator><comments>https://news.ycombinator.com/item?id=47997486</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47997486</guid></item><item><title><![CDATA[Investors pile into clean energy as Iran war drives push for energy security]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.ft.com/content/9921f2b5-c910-4cec-a50f-cad453935a1a">https://www.ft.com/content/9921f2b5-c910-4cec-a50f-cad453935a1a</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47995125">https://news.ycombinator.com/item?id=47995125</a></p>
<p>Points: 127</p>
<p># Comments: 183</p>
]]></description><pubDate>Sun, 03 May 2026 09:26:48 +0000</pubDate><link>https://www.ft.com/content/9921f2b5-c910-4cec-a50f-cad453935a1a</link><dc:creator>JumpCrisscross</dc:creator><comments>https://news.ycombinator.com/item?id=47995125</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47995125</guid></item><item><title><![CDATA[Kernel code removals driven by LLM-created security reports]]></title><description><![CDATA[
<p>Article URL: <a href="https://lwn.net/Articles/1068928/">https://lwn.net/Articles/1068928/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47862230">https://news.ycombinator.com/item?id=47862230</a></p>
<p>Points: 124</p>
<p># Comments: 118</p>
]]></description><pubDate>Wed, 22 Apr 2026 11:48:07 +0000</pubDate><link>https://lwn.net/Articles/1068928/</link><dc:creator>edward</dc:creator><comments>https://news.ycombinator.com/item?id=47862230</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47862230</guid></item><item><title><![CDATA[Vercel April 2026 security incident]]></title><description><![CDATA[
<p><a href="https://vercel.com/kb/bulletin/vercel-april-2026-security-incident" rel="nofollow">https://vercel.com/kb/bulletin/vercel-april-2026-security-in...</a></p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47824463">https://news.ycombinator.com/item?id=47824463</a></p>
<p>Points: 867</p>
<p># Comments: 492</p>
]]></description><pubDate>Sun, 19 Apr 2026 14:14:38 +0000</pubDate><link>https://www.bleepingcomputer.com/news/security/vercel-confirms-breach-as-hackers-claim-to-be-selling-stolen-data/</link><dc:creator>colesantiago</dc:creator><comments>https://news.ycombinator.com/item?id=47824463</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47824463</guid></item><item><title><![CDATA[Free, fast diagnostic tools for DNS, email authentication, and network security]]></title><description><![CDATA[
<p>Article URL: <a href="https://mrdns.com/">https://mrdns.com/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47771220">https://news.ycombinator.com/item?id=47771220</a></p>
<p>Points: 73</p>
<p># Comments: 6</p>
]]></description><pubDate>Tue, 14 Apr 2026 20:42:21 +0000</pubDate><link>https://mrdns.com/</link><dc:creator>dogsnews</dc:creator><comments>https://news.ycombinator.com/item?id=47771220</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47771220</guid></item><item><title><![CDATA[No one owes you supply-chain security]]></title><description><![CDATA[
<p>Article URL: <a href="https://purplesyringa.moe/blog/no-one-owes-you-supply-chain-security/">https://purplesyringa.moe/blog/no-one-owes-you-supply-chain-security/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47738595">https://news.ycombinator.com/item?id=47738595</a></p>
<p>Points: 75</p>
<p># Comments: 88</p>
]]></description><pubDate>Sun, 12 Apr 2026 11:49:33 +0000</pubDate><link>https://purplesyringa.moe/blog/no-one-owes-you-supply-chain-security/</link><dc:creator>birdculture</dc:creator><comments>https://news.ycombinator.com/item?id=47738595</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47738595</guid></item><item><title><![CDATA[You can't trust macOS Privacy and Security settings]]></title><description><![CDATA[
<p>Article URL: <a href="https://eclecticlight.co/2026/04/10/why-you-cant-trust-privacy-security/">https://eclecticlight.co/2026/04/10/why-you-cant-trust-privacy-security/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47719602">https://news.ycombinator.com/item?id=47719602</a></p>
<p>Points: 512</p>
<p># Comments: 170</p>
]]></description><pubDate>Fri, 10 Apr 2026 15:28:24 +0000</pubDate><link>https://eclecticlight.co/2026/04/10/why-you-cant-trust-privacy-security/</link><dc:creator>zdw</dc:creator><comments>https://news.ycombinator.com/item?id=47719602</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47719602</guid></item><item><title><![CDATA[Open source security at Astral]]></title><description><![CDATA[
<p>Article URL: <a href="https://astral.sh/blog/open-source-security-at-astral">https://astral.sh/blog/open-source-security-at-astral</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47699181">https://news.ycombinator.com/item?id=47699181</a></p>
<p>Points: 365</p>
<p># Comments: 109</p>
]]></description><pubDate>Thu, 09 Apr 2026 04:11:55 +0000</pubDate><link>https://astral.sh/blog/open-source-security-at-astral</link><dc:creator>vinhnx</dc:creator><comments>https://news.ycombinator.com/item?id=47699181</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47699181</guid></item><item><title><![CDATA[A security scanner as fast as a linter – written in Rust]]></title><description><![CDATA[
<p>Article URL: <a href="https://github.com/peaktwilight/foxguard">https://github.com/peaktwilight/foxguard</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47690405">https://news.ycombinator.com/item?id=47690405</a></p>
<p>Points: 53</p>
<p># Comments: 20</p>
]]></description><pubDate>Wed, 08 Apr 2026 14:05:14 +0000</pubDate><link>https://github.com/peaktwilight/foxguard</link><dc:creator>peaktwilight</dc:creator><comments>https://news.ycombinator.com/item?id=47690405</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47690405</guid></item><item><title><![CDATA[Cloudflare targets 2029 for full post-quantum security]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.cloudflare.com/post-quantum-roadmap/">https://blog.cloudflare.com/post-quantum-roadmap/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47675625">https://news.ycombinator.com/item?id=47675625</a></p>
<p>Points: 386</p>
<p># Comments: 112</p>
]]></description><pubDate>Tue, 07 Apr 2026 14:07:34 +0000</pubDate><link>https://blog.cloudflare.com/post-quantum-roadmap/</link><dc:creator>ilreb</dc:creator><comments>https://news.ycombinator.com/item?id=47675625</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47675625</guid></item><item><title><![CDATA[Breaking the console: a brief history of video game security]]></title><description><![CDATA[
<p>Article URL: <a href="https://sergioprado.blog/breaking-the-console-a-brief-history-of-video-game-security/">https://sergioprado.blog/breaking-the-console-a-brief-history-of-video-game-security/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47672778">https://news.ycombinator.com/item?id=47672778</a></p>
<p>Points: 96</p>
<p># Comments: 26</p>
]]></description><pubDate>Tue, 07 Apr 2026 09:51:28 +0000</pubDate><link>https://sergioprado.blog/breaking-the-console-a-brief-history-of-video-game-security/</link><dc:creator>sprado</dc:creator><comments>https://news.ycombinator.com/item?id=47672778</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47672778</guid></item><item><title><![CDATA[UK intelligence censored report on global warming and homeland security]]></title><description><![CDATA[
<p>Article URL: <a href="https://theoryofchange1.substack.com/p/from-global-warming-to-homeland-security">https://theoryofchange1.substack.com/p/from-global-warming-to-homeland-security</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47653816">https://news.ycombinator.com/item?id=47653816</a></p>
<p>Points: 101</p>
<p># Comments: 59</p>
]]></description><pubDate>Sun, 05 Apr 2026 20:59:52 +0000</pubDate><link>https://theoryofchange1.substack.com/p/from-global-warming-to-homeland-security</link><dc:creator>ewidar</dc:creator><comments>https://news.ycombinator.com/item?id=47653816</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47653816</guid></item><item><title><![CDATA[EmDash – A spiritual successor to WordPress that solves plugin security]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.cloudflare.com/emdash-wordpress/">https://blog.cloudflare.com/emdash-wordpress/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47602832">https://news.ycombinator.com/item?id=47602832</a></p>
<p>Points: 703</p>
<p># Comments: 504</p>
]]></description><pubDate>Wed, 01 Apr 2026 16:14:38 +0000</pubDate><link>https://blog.cloudflare.com/emdash-wordpress/</link><dc:creator>elithrar</dc:creator><comments>https://news.ycombinator.com/item?id=47602832</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47602832</guid></item><item><title><![CDATA[U.S. exempts oil industry from protecting Gulf animals, for 'national security']]></title><description><![CDATA[
<p>Article URL: <a href="https://www.npr.org/2026/03/30/nx-s1-5745926/endangered-species-committee-hegseth-security">https://www.npr.org/2026/03/30/nx-s1-5745926/endangered-species-committee-hegseth-security</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47595620">https://news.ycombinator.com/item?id=47595620</a></p>
<p>Points: 265</p>
<p># Comments: 115</p>
]]></description><pubDate>Wed, 01 Apr 2026 01:18:51 +0000</pubDate><link>https://www.npr.org/2026/03/30/nx-s1-5745926/endangered-species-committee-hegseth-security</link><dc:creator>Jimmc414</dc:creator><comments>https://news.ycombinator.com/item?id=47595620</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47595620</guid></item><item><title><![CDATA[Capability-Based Security for Redox: Namespace and CWD as Capabilities]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.redox-os.org/news/nlnet-cap-nsmgr-cwd/">https://www.redox-os.org/news/nlnet-cap-nsmgr-cwd/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47546911">https://news.ycombinator.com/item?id=47546911</a></p>
<p>Points: 66</p>
<p># Comments: 9</p>
]]></description><pubDate>Fri, 27 Mar 2026 19:06:44 +0000</pubDate><link>https://www.redox-os.org/news/nlnet-cap-nsmgr-cwd/</link><dc:creator>ejplatzer</dc:creator><comments>https://news.ycombinator.com/item?id=47546911</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47546911</guid></item><item><title><![CDATA[Hong Kong police can now demand phone passwords under new security rules]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.gadgetreview.com/hong-kong-police-can-now-demand-phone-passwords-under-new-security-rules">https://www.gadgetreview.com/hong-kong-police-can-now-demand-phone-passwords-under-new-security-rules</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47542722">https://news.ycombinator.com/item?id=47542722</a></p>
<p>Points: 138</p>
<p># Comments: 160</p>
]]></description><pubDate>Fri, 27 Mar 2026 13:57:36 +0000</pubDate><link>https://www.gadgetreview.com/hong-kong-police-can-now-demand-phone-passwords-under-new-security-rules</link><dc:creator>vidyesh</dc:creator><comments>https://news.ycombinator.com/item?id=47542722</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47542722</guid></item><item><title><![CDATA[Zero Days: Electric Motorcycles Are a Security Nightmare]]></title><description><![CDATA[
<p>Article URL: <a href="https://persephonekarnstein.github.io/post/zero-days/">https://persephonekarnstein.github.io/post/zero-days/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47533380">https://news.ycombinator.com/item?id=47533380</a></p>
<p>Points: 69</p>
<p># Comments: 17</p>
]]></description><pubDate>Thu, 26 Mar 2026 17:38:17 +0000</pubDate><link>https://persephonekarnstein.github.io/post/zero-days/</link><dc:creator>Ivoah</dc:creator><comments>https://news.ycombinator.com/item?id=47533380</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47533380</guid></item><item><title><![CDATA[Ubuntu wants to strip some of GRUB features in 26.10 for security purposes]]></title><description><![CDATA[
<p>Article URL: <a href="https://discourse.ubuntu.com/t/streamlining-secure-boot-for-26-10/79069">https://discourse.ubuntu.com/t/streamlining-secure-boot-for-26-10/79069</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47517885">https://news.ycombinator.com/item?id=47517885</a></p>
<p>Points: 52</p>
<p># Comments: 44</p>
]]></description><pubDate>Wed, 25 Mar 2026 14:34:09 +0000</pubDate><link>https://discourse.ubuntu.com/t/streamlining-secure-boot-for-26-10/79069</link><dc:creator>dryarzeg</dc:creator><comments>https://news.ycombinator.com/item?id=47517885</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47517885</guid></item><item><title><![CDATA[Study: 'Security Fatigue' May Weaken Digital Defenses]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.albany.edu/news-center/news/2026-study-security-fatigue-may-weaken-digital-defenses">https://www.albany.edu/news-center/news/2026-study-security-fatigue-may-weaken-digital-defenses</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47490150">https://news.ycombinator.com/item?id=47490150</a></p>
<p>Points: 91</p>
<p># Comments: 60</p>
]]></description><pubDate>Mon, 23 Mar 2026 14:36:30 +0000</pubDate><link>https://www.albany.edu/news-center/news/2026-study-security-fatigue-may-weaken-digital-defenses</link><dc:creator>giuliomagnifico</dc:creator><comments>https://news.ycombinator.com/item?id=47490150</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47490150</guid></item></channel></rss>