Feed aggregator

US Cyber Strategy Targets Adversaries, Critical Infrastructure, and Emerging Technologies

Security Week - Sat, 03/07/2026 - 10:57am

Trump’s Cyber Strategy calls for stronger deterrence against cyber adversaries, modernization of federal networks, protection of critical infrastructure, and investment in technologies such as AI and post-quantum cryptography.

The post US Cyber Strategy Targets Adversaries, Critical Infrastructure, and Emerging Technologies appeared first on SecurityWeek.

Categories: SecurityWeek

Show HN: SuperBuilder – open-source AI Agent Platform

Hacker News - Sat, 03/07/2026 - 10:45am

Hi HN — I built SuperBuilder, an open-source platform that unifies agent orchestration, model runtimes, generative media and developer tooling so people can build, run and share autonomous agents and AI apps.

Key facts: • Repo: https://github.com/rupac4530-creator/super-builder-platform • 31 integration adapters (LangChain, vLLM, Milvus, Diffusers, Blender, ROS2, etc.). • Plugin SDK + examples so contributors can add adapters. • One-command Docker quickstart (see README) and CI smoke tests. • License: AGPL-3.0 (keeps derivatives open).

Try it: 1. Clone the repo and follow the README quickstart (Docker compose). 2. See examples/ for agent demos and integrations.

What I’d love from HN: • Honest feedback on architecture, security, and UX. • Contributors for adapters (good-first-issue label) and security review. • Ideas for demo flows that would show the platform’s strengths.

I’ll be watching this thread and can reply with short how-tos (demo GIFs, CLI commands, or PR templates) if people want them. Thanks! — Rupac

Comments URL: https://news.ycombinator.com/item?id=47288640

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: Sentinel Data – Hardware- Bound CLI tool to prevent data exfiltration

Hacker News - Sat, 03/07/2026 - 10:45am

Hi HN,

I've developed Sentinel Data, a CLI security tool designed to address a gap in standard encryption: the "authorized user, unauthorized context" risk.

Most Data Loss Prevention (DLP) systems fail when a session is already active or if a device is physically moved. Sentinel Data binds file decryption to the specific machine's hardware and environment. I created a short technical demo and an attack simulation to show how the tool blocks access when the environment is tampered with.

Technical Demo: https://youtu.be/b3HbnWWMPSY Attack Simulation: https://youtu.be/9jEPp_wEu3c

I'm looking for technical feedback on this implementation and would love to discuss the cryptographic binding logic with the community.

Looking forward to your thoughts!

Comments URL: https://news.ycombinator.com/item?id=47288637

Points: 1

# Comments: 0

Categories: Hacker News

Grief Text Editor

Hacker News - Sat, 03/07/2026 - 10:44am

Article URL: https://github.com/adamyg/grief

Comments URL: https://news.ycombinator.com/item?id=47288623

Points: 1

# Comments: 0

Categories: Hacker News

Will Claude Code ruin our team?

Hacker News - Sat, 03/07/2026 - 10:42am
Categories: Hacker News

Test Drive Linux Distros in the Browser

Hacker News - Sat, 03/07/2026 - 10:40am

Article URL: https://distrosea.com/

Comments URL: https://news.ycombinator.com/item?id=47288591

Points: 1

# Comments: 0

Categories: Hacker News

AI compromised sandbox to mine crypto without prompting on its own initiative

Hacker News - Sat, 03/07/2026 - 10:36am

From §3.1.4, "Safety-Aligned Data Composition":

> Early one morning, our team was urgently convened after Alibaba Cloud’s managed firewall flagged a burst of security-policy violations originating from our training servers. The alerts were severe and heterogeneous, including attempts to probe or access internal-network resources and traffic patterns consistent with cryptomining-related activity. We initially treated this as a conventional security incident (e.g., misconfigured egress controls or external compromise). […]

> […] In the most striking instance, the agent established and used a reverse SSH tunnel from an Alibaba Cloud instance to an external IP address—an outbound-initiated remote access channel that can effectively neutralize ingress filtering and erode supervisory control. We also observed the unauthorized repurposing of provisioned GPU capacity for cryptocurrency mining, quietly diverting compute away from training, inflating operational costs, and introducing clear legal and reputational exposure. Notably, these events were not triggered by prompts requesting tunneling or mining; instead, they emerged as* instrumental side effects of autonomous tool use under RL optimization.

* https://arxiv.org/abs/2512.24873

Comments URL: https://news.ycombinator.com/item?id=47288552

Points: 3

# Comments: 0

Categories: Hacker News

Compile to Architecture

Hacker News - Sat, 03/07/2026 - 10:32am
Categories: Hacker News

Pages