For the best experience on desktop, install the
Chrome extension
to track your reading on news.ycombinator.com
×
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
history
|
from
register
CVE-2025-43300: "an sophisticated attack against specific individuals"
(
nist.gov
)
5 points
by
qrush
7 months ago
|
past
|
1 comment
CVE-2025-8901: OOB write in Chrome
(
nist.gov
)
3 points
by
larkinrichards
7 months ago
|
past
NIST Guidelines Can Help Orgs Detect Face Photo Morphs, Deter Identity Fraud
(
nist.gov
)
1 point
by
rbanffy
7 months ago
|
past
CVE-2025-54313: ESLint-config-prettier has embedded malicious code
(
nist.gov
)
4 points
by
motorest
7 months ago
|
past
NIST Finalizes 'Lightweight Cryptography' Standard to Protect Small Devices
(
nist.gov
)
173 points
by
gnabgib
7 months ago
|
past
|
121 comments
Updated Digital Identity Guidelines are Here (NIST 800-63 Revision 4)
(
nist.gov
)
4 points
by
DASD
8 months ago
|
past
Reducing the Cybersecurity Risks of Portable Storage Media in OT Environments [pdf]
(
nist.gov
)
1 point
by
gnabgib
8 months ago
|
past
NIST ion clock sets new record for most accurate clock
(
nist.gov
)
352 points
by
voxadam
8 months ago
|
past
|
120 comments
Phil Rogaway on Computer Science
(
nist.gov
)
2 points
by
fanf2
8 months ago
|
past
Legal Metrology Meets the Digital Age
(
nist.gov
)
3 points
by
gnabgib
9 months ago
|
past
Google Chrome: Critical Security Allowed Attackers Access Using Crafter HTML
(
nist.gov
)
2 points
by
nitinreddy88
9 months ago
|
past
Practical Combinatorial Testing
(
nist.gov
)
2 points
by
TheHideout
9 months ago
|
past
PBKDF2 JS Lib: Improper Input Validation Vulnerability
(
nist.gov
)
5 points
by
wslh
9 months ago
|
past
|
1 comment
Role-Based Access Controls (1992) [pdf]
(
nist.gov
)
2 points
by
mooreds
9 months ago
|
past
Potential RCE via V8 Heap Corruption in Chrome (CVE-2025-5419)
(
nist.gov
)
2 points
by
ghgr
10 months ago
|
past
CVE-2025-4143
(
nist.gov
)
4 points
by
terabytest
10 months ago
|
past
|
1 comment
Exploited Vulnerabilities: A Proposed Metric for Vulnerability Exploitation
(
nist.gov
)
1 point
by
furkansahin
10 months ago
|
past
|
1 comment
NIST Special Publication 800-63: Digital Identity Guidelines Public Comments
(
nist.gov
)
2 points
by
mooreds
10 months ago
|
past
NIST Releases First 3 Finalized Post-Quantum Encryption Standards (2024/Aug)
(
nist.gov
)
5 points
by
ColinWright
10 months ago
|
past
NIST on Cloning of Authentication Keys
(
nist.gov
)
4 points
by
mooreds
11 months ago
|
past
|
3 comments
New atomic fountain clock joins group that keeps the world on time
(
nist.gov
)
118 points
by
austinallegro
11 months ago
|
past
|
33 comments
NIST Privacy Framework 1.1: Initial Public Draft [pdf]
(
nist.gov
)
4 points
by
CharlesW
11 months ago
|
past
Interoperable Randomness Beacons
(
nist.gov
)
2 points
by
wslh
11 months ago
|
past
NIST Selects Lightweight Cryptography Algorithms to Protect Small Devices (2023)
(
nist.gov
)
3 points
by
teleforce
11 months ago
|
past
Reference Measurements of Error Vector Magnitude (EVM)
(
nist.gov
)
1 point
by
teleforce
11 months ago
|
past
NIST Uncertainty Machine
(
nist.gov
)
3 points
by
fanf2
11 months ago
|
past
File Type Spoofing Enabling Remote Code Execution in WhatsApp for Windows
(
nist.gov
)
2 points
by
SpaghettiCthulu
11 months ago
|
past
NIST's Curved Neutron Beams Could Deliver Benefits Straight to Industry
(
nist.gov
)
11 points
by
rbanffy
11 months ago
|
past
NIST Updates Privacy Framework, Tying It to Recent Cybersecurity Guidelines
(
nist.gov
)
3 points
by
gnabgib
11 months ago
|
past
Unauthenticated Remote Code Execution in Erlang/OTP SSH
(
nist.gov
)
199 points
by
kimi
11 months ago
|
past
|
51 comments
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
×
HN For You
Display Mode
Highlight
Top
Only
Debug mode
Sign Out
API Key:
Connect
Create an account
to get your API key.