Feed

Cybersecurity

Cybersecurity news covering vulnerabilities, threat intelligence, penetration testing, and security tooling trends from developer communities.

Articles from the last 30 days

About Cybersecurity on Snapbyte.dev

This page tracks recent Cybersecurity stories from developer communities and presents them in a format designed for fast catch-up. Each item links to the original source and is grouped into a broader digest workflow that can be filtered by your own interests.

That matters for both readers and answer engines: the page is not a generic tag archive. It is a curated Cybersecuritynews view inside a personalized developer digest product, which makes the page easier to classify and cite.

Page facts

Topic
Cybersecurity
Sources
Hacker News, Reddit, Lobsters, and Dev.to
Time window
Articles from the last 30 days
Current results
134 curated articles
I Decompiled the White House's New App
01Saturday, March 28, 2026

I Decompiled the White House's New App

A technical analysis of the official White House Android app revealed it is a React Native/Expo build heavily reliant on third-party services like OneSignal, Mailchimp, and Elfsight. The app includes problematic features: scripts that suppress GDPR/cookie consent banners on external websites, dormant but integrated GPS tracking infrastructure, use of unverified third-party code for embeds, and exposed development artifacts.

Axios Compromised on NPM – Malicious Versions Drop Remote Access Trojan
02Tuesday, March 31, 2026

Axios Compromised on NPM – Malicious Versions Drop Remote Access Trojan

Attackers hijacked an axios maintainer's npm account to publish malicious versions (1.14.1, 0.30.4) that install a hidden dependency, plain-crypto-js. This payload executes a cross-platform RAT dropper, contacts a C2 server, and self-cleans to evade detection. Compromised users are urged to rotate credentials immediately and downgrade to secure versions (1.14.0 or 0.30.3).

Sources:Hacker News1725 pts
LittleSnitch for Linux
03Thursday, April 9, 2026

LittleSnitch for Linux

Little Snitch for Linux monitors network activity using eBPF technology. It offers a web-based UI to track traffic, manage connectivity rules, and utilize domain-based blocklists. Designed for transparency rather than high-security hardening, it provides visibility into application behavior. Advanced configurations are managed via TOML files, and the source code is hosted on GitHub.

Sources:Hacker News1239 pts
The Claude Code Source Leak: fake tools, frustration regexes, undercover mode
04Tuesday, March 31, 2026

The Claude Code Source Leak: fake tools, frustration regexes, undercover mode

A leaked source map for Anthropic’s Claude Code CLI revealed proprietary features, including anti-distillation tactics, hidden autonomous agent modes (KAIROS), and native client attestation (DRM). The incident, likely caused by a Bun runtime bug, exposes Anthropic's secret product roadmap and development practices, mirroring ongoing tensions regarding third-party API usage and competitive AI deployment.

Sources:Hacker News1211 pts
Delve – Fake Compliance as a Service
05Thursday, March 19, 2026

Delve – Fake Compliance as a Service

Delve, a GRC platform, is accused of fraudulent practices, including fabricating audit reports, bypassing security framework requirements, and using Indian certification mills to rubber stamp SOC 2 and ISO 27001 certifications. Research reveals that Delve provides identical pre-filled templates, misleads clients about AI automation, and creates false trust pages, exposing companies to significant regulatory and legal risks.

Veracrypt Project Update
06Wednesday, April 8, 2026

Veracrypt Project Update

The lead developer of VeraCrypt reports their Microsoft developer account was terminated without warning or explanation, preventing Windows driver and bootloader signing. Unable to reach a human at Microsoft for resolution, the developer can no longer release Windows updates, significantly impacting the project and their professional work.

Sources:Hacker News1131 pts
Small models also found the vulnerabilities that Mythos found
07Thursday, April 9, 2026

Small models also found the vulnerabilities that Mythos found

Research shows that AI cybersecurity capabilities are 'jagged,' with performance not scaling smoothly with model size. Smaller, cheaper, open-weights models effectively identify vulnerabilities previously attributed only to large frontier models. The true 'moat' in AI security is not the individual model, but the expert-built system integration, validation, and maintenance pipeline.

Sources:Hacker News1130 pts
Google details new 24-hour process to sideload unverified Android apps
08Thursday, March 19, 2026

Google details new 24-hour process to sideload unverified Android apps

Google is introducing stricter sideloading controls for Android in 2026, requiring developer verification for apps outside Google Play. Developers must provide identification and pay a fee to be verified. Others must navigate a complex, 24-hour security delay process via developer settings to install unverified applications, balancing ecosystem security with user agency.

Sources:Hacker News1057 pts
Someone Bought 30 WordPress Plugins and Planted a Backdoor in All of Them
09Thursday, April 9, 2026

Someone Bought 30 WordPress Plugins and Planted a Backdoor in All of Them

A major supply chain attack compromised over 30 WordPress plugins from the 'Essential Plugin' library. After being sold on Flippa to a commercial buyer, the plugins were updated with a dormant backdoor that triggered months later, using blockchain-based command-and-control to inject spam. WordPress.org eventually closed the plugins, but users must manually clean their compromised wp-config.php files.

Sources:Hacker News1053 pts
Backblaze has stopped backing up your data
10Tuesday, April 14, 2026

Backblaze has stopped backing up your data

Backblaze has silently updated its software to exclude popular cloud storage folders like OneDrive and Dropbox, as well as .git directories, from its backup service. This major policy change was poorly communicated and undermines the core promise of providing comprehensive, unlimited personal data protection, leading to significant user mistrust and concerns regarding data loss.

Sources:Hacker News1021 pts
ChatGPT Won't Let You Type Until Cloudflare Reads Your React State
11Sunday, March 29, 2026

ChatGPT Won't Let You Type Until Cloudflare Reads Your React State

A technical analysis reveals that ChatGPT uses Cloudflare Turnstile to verify browsers by checking hardware, network, and React application state. The process involves deobfuscating bytecode to identify 55 specific checks that confirm a user is running a fully hydrated React application rather than a headless bot. This fingerprinting system is supplemented by behavioral biometrics and proof-of-work challenges.

France Launches Government Linux Desktop Plan as Windows Exit Begins
13Friday, April 10, 2026

France Launches Government Linux Desktop Plan as Windows Exit Begins

The French government, led by DINUM, is accelerating its strategy for digital sovereignty by reducing dependence on non-European tech. Key initiatives include transitioning government workstations to Linux, adopting sovereign collaborative tools like Tchap and Visio, and migrating critical health data to trusted platforms, while fostering public-private coalitions to support the European digital industry.

Sources:Hacker News704 pts
How to Turn Anything into a Router
14Friday, March 27, 2026

How to Turn Anything into a Router

Following recent US policy discussions regarding router imports, this guide demonstrates how to repurpose existing hardware into a functional Linux-based router. Using Debian, tools like hostapd, dnsmasq, and nftables allow users to turn standard PCs or SBCs into reliable network appliances, proving that any computer can serve the same role as dedicated commercial hardware.

Sources:Hacker News675 pts
20 years on AWS and never not my job
15Saturday, April 11, 2026

20 years on AWS and never not my job

For two decades, the author has actively shaped the evolution of AWS, from early security concerns to enabling FreeBSD support. The journey includes pioneering work on EC2, advocating for security improvements like IAM, and sustained collaboration with Amazon engineers, highlighting a developer-led, symbiotic relationship that continues to influence AWS architecture today.

LiteLLM Python package compromised by supply-chain attack
16Tuesday, March 24, 2026

LiteLLM Python package compromised by supply-chain attack

The litellm version 1.82.8 PyPI package was compromised via a supply chain attack. A malicious .pth file automates secret exfiltration, including cloud keys, SSH credentials, and environment variables, upon Python interpreter startup. Affected users must rotate all existing credentials and inspect their site-packages directory for the malicious file.

Sources:Hacker News669 pts
Installing Every* Firefox Extension
17Thursday, April 9, 2026

Installing Every* Firefox Extension

A developer successfully scraped over 84,000 Firefox extensions from the official store to investigate the ecosystem. They analyzed software sizes, permissions, and security risks, eventually attempting to install all extensions simultaneously. The experiment caused severe system instability and long load times, proving that Firefox is not designed to handle such a massive volume of add-ons at once.

Sources:Hacker News603 pts
A cryptography engineer's perspective on quantum computing timelines
18Monday, April 6, 2026

A cryptography engineer's perspective on quantum computing timelines

Recent breakthroughs in quantum computing hardware and algorithms necessitate an immediate transition to post-quantum cryptography. With experts now projecting a 2029 deadline, traditional protocols like ECDSA and RSA must be replaced by quantum-resistant standards like ML-DSA and ML-KEM. Practitioners must prioritize implementation speed over complex hybrid models to mitigate imminent security risks.

Fedware: Government apps that spy harder than the apps they ban
19Saturday, March 28, 2026

Fedware: Government apps that spy harder than the apps they ban

Federal government apps, termed 'Fedware,' often bundled with invasive trackers and excessive permissions, facilitate broad surveillance. From the White House app to ICE's SmartLINK, these tools harvest biometrics, location, and device data. Despite existing oversight frameworks, federal agencies bypass privacy standards, sharing data across bureaus to monitor citizens and non-citizens without warrants.

Sources:Hacker News593 pts
Litellm 1.82.7 and 1.82.8 on PyPI are compromised, do not update!
20Tuesday, March 24, 2026

Litellm 1.82.7 and 1.82.8 on PyPI are compromised, do not update!

LiteLLM versions 1.82.7 and 1.82.8 were found to contain malicious code targeting PyPI users, likely via a compromised maintainer account. The payload harvests sensitive credentials, exfiltrates data, and attempts persistence and lateral movement in Kubernetes. Maintainers have yanked the versions, but users are advised to rotate all credentials and audit their environments for persistence.