[{"title":"Patterns (YC S21) is hiring devs to help us build the Figma for data","description":"<a href="https://news.ycombinator.com/item?id=33037398">Comments</a>","link":"https://www.patterns.app/","comments":"https://news.ycombinator.com/item?id=33037398","updated_at":"2022-09-30T17:00:16+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33037398","link_host":"www.patterns.app","from":"hackernews"},{"title":"Hurricane Ian damages in Southeast estimated at $100B to $120B","description":"<a href="https://news.ycombinator.com/item?id=33037354">Comments</a>","link":"https://www.bondbuyer.com/news/hurricane-ian-damages-in-southeast-estimated-at-100b-to-120b","comments":"https://news.ycombinator.com/item?id=33037354","updated_at":"2022-09-30T16:57:05+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33037354","link_host":"www.bondbuyer.com","from":"hackernews"},{"title":"Microsoft bakes a VPN into Edge and turns it on","description":"<a href="https://news.ycombinator.com/item?id=33037171">Comments</a>","link":"https://adguard-vpn.com/en/blog/vpn-built-browser-microsoft.html","comments":"https://news.ycombinator.com/item?id=33037171","updated_at":"2022-09-30T16:44:16+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33037171","link_host":"adguardvpn.com","from":"hackernews"},{"title":"Neovim 0.8 Released","description":"<a href="https://news.ycombinator.com/item?id=33037151">Comments</a>","link":"https://github.com/neovim/neovim/releases/tag/v0.8.0","comments":"https://news.ycombinator.com/item?id=33037151","updated_at":"2022-09-30T16:42:31+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33037151","link_host":"github.com","from":"hackernews"},{"title":"Deepfake Bruce Willis may be the next Hollywood star, and he’s OK with that","description":"Tech will allow Willis' doppelgänger to continue working despite language disorder diagnosis.","link":"https://arstechnica.com/?p=1885857","comments":"https://arstechnica.com/?p=1885857","updated_at":"2022-09-30T16:35:13+00:00","link_to_comments":"https://arstechnica.com/?p=1885857","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Medtronic's MiniMed 600 insulin pumps potentially at risk of compromise","description":"<a href="https://news.ycombinator.com/item?id=33036977">Comments</a>","link":"https://www.medtronicdiabetes.com/customer-support/product-and-service-updates/notice19-letter","comments":"https://news.ycombinator.com/item?id=33036977","updated_at":"2022-09-30T16:29:34+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33036977","link_host":"www.medtronicdiabetes.com","from":"hackernews"},{"title":"Data salaries at FAANG companies in 2022","description":"<a href="https://news.ycombinator.com/item?id=33036807">Comments</a>","link":"https://medium.com/@mikldd/data-salaries-at-faang-companies-in-2022-29d5b56b2428","comments":"https://news.ycombinator.com/item?id=33036807","updated_at":"2022-09-30T16:12:45+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33036807","link_host":"medium.com","from":"hackernews"},{"title":"Ask HN: Just received spam to an address only used at Amazon?","description":"<a href="https://news.ycombinator.com/item?id=33036782">Comments</a>","link":"https://news.ycombinator.com/item?id=33036782","comments":"https://news.ycombinator.com/item?id=33036782","updated_at":"2022-09-30T16:10:53+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33036782","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"Ask HN: Microsoft SmartScreen is destroying our business","description":"<a href="https://news.ycombinator.com/item?id=33036748">Comments</a>","link":"https://news.ycombinator.com/item?id=33036748","comments":"https://news.ycombinator.com/item?id=33036748","updated_at":"2022-09-30T16:07:45+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33036748","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"US expected to publish Privacy Shield executive order next week","description":"<a href="https://news.ycombinator.com/item?id=33036744">Comments</a>","link":"https://www.politico.eu/article/us-expected-to-publish-privacy-shield-executive-order-next-week/","comments":"https://news.ycombinator.com/item?id=33036744","updated_at":"2022-09-30T16:07:33+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33036744","link_host":"www.politico.eu","from":"hackernews"},{"title":"Facebook Freeloads Off Newspapers. This Plan Might Stop It","description":"<a href="https://news.ycombinator.com/item?id=33036714">Comments</a>","link":"https://www.wired.com/story/facebook-freeloads-off-newspapers-this-plan-might-stop-it/","comments":"https://news.ycombinator.com/item?id=33036714","updated_at":"2022-09-30T16:05:54+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33036714","link_host":"www.wired.com","from":"hackernews"},{"title":"FCC Approves 5 Year Satellite Deorbiting Rule","description":"<a href="https://news.ycombinator.com/item?id=33036383">Comments</a>","link":"https://payloadspace.com/fcc-approves-5-year-satellite-deorbiting-rule/","comments":"https://news.ycombinator.com/item?id=33036383","updated_at":"2022-09-30T15:41:27+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33036383","link_host":"payloadspace.com","from":"hackernews"},{"title":"Mystery hackers are “hyperjacking” targets for insidious spying","description":"After decades of warnings, group figured out how to hijack virtualization software.","link":"https://arstechnica.com/?p=1885873","comments":"https://arstechnica.com/?p=1885873","updated_at":"2022-09-30T15:22:12+00:00","link_to_comments":"https://arstechnica.com/?p=1885873","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Chernobyl black frogs reveal evolution in action","description":"<a href="https://news.ycombinator.com/item?id=33035998">Comments</a>","link":"https://phys.org/news/2022-09-chernobyl-black-frogs-reveal-evolution.html","comments":"https://news.ycombinator.com/item?id=33035998","updated_at":"2022-09-30T15:15:32+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33035998","link_host":"phys.org","from":"hackernews"},{"title":"Querying Postgres Tables Directly from DuckDB","description":"<a href="https://news.ycombinator.com/item?id=33035803">Comments</a>","link":"https://duckdb.org/2022/09/30/postgres-scanner.html","comments":"https://news.ycombinator.com/item?id=33035803","updated_at":"2022-09-30T14:59:55+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33035803","link_host":"duckdb.org","from":"hackernews"},{"title":"Ask HN: HN people who write meaningful software, how did you learn to program?","description":"<a href="https://news.ycombinator.com/item?id=33035576">Comments</a>","link":"https://news.ycombinator.com/item?id=33035576","comments":"https://news.ycombinator.com/item?id=33035576","updated_at":"2022-09-30T14:44:09+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33035576","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"New Malware Families Found Targeting VMware ESXi Hypervisors","description":"Threat actors have been found deploying never-before-seen post-compromise implants in VMware's virtualization software to seize control of infected systems and evade detection.\nGoogle's Mandiant threat intelligence division referred to it as a "novel malware ecosystem" that impacts VMware ESXi, Linux vCenter servers, and Windows virtual machines, allowing attackers to maintain persistent access","link":"https://thehackernews.com/2022/09/new-malware-families-found-targeting.html","comments":"https://thehackernews.com/2022/09/new-malware-families-found-targeting.html","updated_at":"2022-09-30T14:42:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/new-malware-families-found-targeting.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"GitHub Action Transcription","description":"<a href="https://news.ycombinator.com/item?id=33035369">Comments</a>","link":"https://github.com/simonw/action-transcription-demo","comments":"https://news.ycombinator.com/item?id=33035369","updated_at":"2022-09-30T14:31:29+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33035369","link_host":"github.com","from":"hackernews"},{"title":"OpenStreepMap 2012 vs. 2022","description":"<a href="https://news.ycombinator.com/item?id=33034631">Comments</a>","link":"https://2012.osmz.ru/#15/40.7822/-73.9685","comments":"https://news.ycombinator.com/item?id=33034631","updated_at":"2022-09-30T13:34:13+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33034631","link_host":"2012.osmz.ru","from":"hackernews"},{"title":"Select * from cloud","description":"<a href="https://news.ycombinator.com/item?id=33034351">Comments</a>","link":"https://steampipe.io/","comments":"https://news.ycombinator.com/item?id=33034351","updated_at":"2022-09-30T13:08:10+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33034351","link_host":"steampipe.io","from":"hackernews"},{"title":"Voxel versions of classic paintings","description":"https://www.behance.net/gallery/153784385/Classic-Paintings-voxel-versions","link":"https://www.designernews.co/stories/127002-voxel-versions-of-classic-paintings","comments":"https://www.designernews.co/stories/127002-voxel-versions-of-classic-paintings","updated_at":"2022-09-30T12:39:02+00:00","link_to_comments":"https://www.designernews.co/stories/127002-voxel-versions-of-classic-paintings","link_host":"www.behance.net","from":"designernews"},{"title":"Cyber Attacks Against Middle East Governments Hide Malware in Windows logo","description":"An espionage-focused threat actor has been observed using a steganographic trick to conceal a previously undocumented backdoor in a Windows logo in its attacks against Middle Eastern governments.\nBroadcom's Symantec Threat Hunter Team attributed the updated tooling to a hacking group it tracks under the name Witchetty, which is also known as LookingFrog, a subgroup operating under the TA410","link":"https://thehackernews.com/2022/09/cyber-attacks-against-middle-east.html","comments":"https://thehackernews.com/2022/09/cyber-attacks-against-middle-east.html","updated_at":"2022-09-30T11:52:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/cyber-attacks-against-middle-east.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"We worked for 4 months to build a port for Stadia and today we finished it","description":"<a href="https://news.ycombinator.com/item?id=33033416">Comments</a>","link":"https://old.reddit.com/r/gamedev/comments/xrkpmf/horrible_night_with_stadia_we_worked_for_45/","comments":"https://news.ycombinator.com/item?id=33033416","updated_at":"2022-09-30T11:13:47+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33033416","link_host":"old.reddit.com","from":"hackernews"},{"title":"A call to reconsider memory address-space isolation in Linux","description":"<a href="https://news.ycombinator.com/item?id=33033366">Comments</a>","link":"https://lwn.net/SubscriberLink/909469/95386a9171af0b46/","comments":"https://news.ycombinator.com/item?id=33033366","updated_at":"2022-09-30T11:03:47+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33033366","link_host":"lwn.net","from":"hackernews"},{"title":"Show HN: Red Goose – Convert your website to mobile app","description":"<a href="https://news.ycombinator.com/item?id=33033129">Comments</a>","link":"https://news.ycombinator.com/item?id=33033129","comments":"https://news.ycombinator.com/item?id=33033129","updated_at":"2022-09-30T10:28:42+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33033129","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"New Malware Campaign Targeting Job Seekers with Cobalt Strike Beacons","description":"A social engineering campaign leveraging job-themed lures is weaponizing a years-old remote code execution flaw in Microsoft Office to deploy Cobalt Strike beacons on compromised hosts.\n"The payload discovered is a leaked version of a Cobalt Strike beacon," Cisco Talos researchers Chetan Raghuprasad and Vanja Svajcer said in a new analysis published Wednesday.\n"The beacon configuration contains","link":"https://thehackernews.com/2022/09/new-malware-campaign-targeting-job.html","comments":"https://thehackernews.com/2022/09/new-malware-campaign-targeting-job.html","updated_at":"2022-09-30T10:20:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/new-malware-campaign-targeting-job.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Why Organisations Need Both EDR and NDR for Complete Network Protection","description":"Endpoint devices like desktops, laptops, and mobile phones enable users to connect to enterprise networks and use their resources for their day-to-day work. However, they also expand the attack surface and make the organisation vulnerable to malicious cyberattacks and data breaches.\nWhy Modern Organisations Need EDR\nAccording to the 2020 global risk report by Ponemon Institute, smartphones,","link":"https://thehackernews.com/2022/09/why-organisations-need-both-edr-and-ndr.html","comments":"https://thehackernews.com/2022/09/why-organisations-need-both-edr-and-ndr.html","updated_at":"2022-09-30T10:10:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/why-organisations-need-both-edr-and-ndr.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Reducing logging cost by two orders of magnitude using CLP","description":"<a href="https://news.ycombinator.com/item?id=33032996">Comments</a>","link":"https://www.uber.com/blog/reducing-logging-cost-by-two-orders-of-magnitude-using-clp/","comments":"https://news.ycombinator.com/item?id=33032996","updated_at":"2022-09-30T10:08:53+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33032996","link_host":"www.uber.com","from":"hackernews"},{"title":"North Korean Hackers Weaponizing Open-Source Software in Latest Cyber Attacks","description":"A "highly operational, destructive, and sophisticated nation-state activity group" with ties to North Korea has been weaponizing open source software in their social engineering campaigns aimed at companies around the world since June 2022.\nMicrosoft's threat intelligence teams, alongside LinkedIn Threat Prevention and Defense, attributed the intrusions with high confidence to Zinc, which is","link":"https://thehackernews.com/2022/09/north-korean-hackers-weaponizing-open.html","comments":"https://thehackernews.com/2022/09/north-korean-hackers-weaponizing-open.html","updated_at":"2022-09-30T10:02:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/north-korean-hackers-weaponizing-open.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"A step-by-step guide to our solar system’s demise","description":"<a href="https://news.ycombinator.com/item?id=33032873">Comments</a>","link":"https://nautil.us/a-step-by-step-guide-to-our-solar-systems-demise-239245/","comments":"https://news.ycombinator.com/item?id=33032873","updated_at":"2022-09-30T09:43:56+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33032873","link_host":"nautil.us","from":"hackernews"},{"title":"New integer types I’d like to see","description":"<a href="https://news.ycombinator.com/item?id=33032802">Comments</a>","link":"https://www.foonathan.net/2022/09/new-integer-types/","comments":"https://news.ycombinator.com/item?id=33032802","updated_at":"2022-09-30T09:30:05+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33032802","link_host":"www.foonathan.net","from":"hackernews"},{"title":"Microsoft Confirms 2 New Exchange Zero-Day Flaws Being Used in the Wild","description":"Microsoft officially disclosed it investigating two zero-day security vulnerabilities impacting Exchange Server 2013, 2016, and 2019 following reports of in-the-wild exploitation.\n"The first vulnerability, identified as CVE-2022-41040, is a Server-Side Request Forgery (SSRF) vulnerability, while the second, identified as CVE-2022-41082, allows remote code execution (RCE) when PowerShell is","link":"https://thehackernews.com/2022/09/microsoft-confirms-2-new-exchange-zero.html","comments":"https://thehackernews.com/2022/09/microsoft-confirms-2-new-exchange-zero.html","updated_at":"2022-09-30T09:01:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/microsoft-confirms-2-new-exchange-zero.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"DreamFusion: Text-to-3D using 2D Diffusion","description":"https://www.aidemos.info/dreamfusion-text-to-3d-using-2d-diffusion/","link":"https://www.designernews.co/stories/126998-dreamfusion-textto3d-using-2d-diffusion","comments":"https://www.designernews.co/stories/126998-dreamfusion-textto3d-using-2d-diffusion","updated_at":"2022-09-30T08:43:46+00:00","link_to_comments":"https://www.designernews.co/stories/126998-dreamfusion-textto3d-using-2d-diffusion","link_host":"www.aidemos.info","from":"designernews"},{"title":"What is No-Code? The Best Tools to Get Started","description":"https://designmodo.com/no-code/","link":"https://www.designernews.co/stories/126995-what-is-nocode-the-best-tools-to-get-started","comments":"https://www.designernews.co/stories/126995-what-is-nocode-the-best-tools-to-get-started","updated_at":"2022-09-30T07:32:23+00:00","link_to_comments":"https://www.designernews.co/stories/126995-what-is-nocode-the-best-tools-to-get-started","link_host":"designmodo.com","from":"designernews"},{"title":"Introduction to the Theory of Programming Languages (1991)","description":"<a href="https://news.ycombinator.com/item?id=33031724">Comments</a>","link":"https://bertrandmeyer.com/2022/09/28/introduction-theory-programming-languages-full-book-now-freely-available/","comments":"https://news.ycombinator.com/item?id=33031724","updated_at":"2022-09-30T06:42:13+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33031724","link_host":"bertrandmeyer.com","from":"hackernews"},{"title":"WARNING: New Unpatched Microsoft Exchange Zero-Day Under Active Exploitation","description":"Security researchers are warning of previously undisclosed flaws in fully patched Microsoft Exchange servers being exploited by malicious actors in real-world attacks to achieve remote code execution on affected systems.\nThat's according to Vietnamese cybersecurity company GTSC, which discovered the shortcomings as part of its security monitoring and incident response efforts in August 2022.\nThe","link":"https://thehackernews.com/2022/09/warning-new-unpatched-microsoft.html","comments":"https://thehackernews.com/2022/09/warning-new-unpatched-microsoft.html","updated_at":"2022-09-30T04:25:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/warning-new-unpatched-microsoft.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Go Micro: a standard library for distributed systems development","description":"<a href="https://news.ycombinator.com/item?id=33030611">Comments</a>","link":"https://github.com/go-micro/go-micro","comments":"https://news.ycombinator.com/item?id=33030611","updated_at":"2022-09-30T03:38:13+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33030611","link_host":"github.com","from":"hackernews"},{"title":"Numerous orgs hacked after installing weaponized open source apps","description":"PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and muPDF/Subliminal Recording all targeted.","link":"https://arstechnica.com/?p=1885758","comments":"https://arstechnica.com/?p=1885758","updated_at":"2022-09-29T22:06:48+00:00","link_to_comments":"https://arstechnica.com/?p=1885758","link_host":"arstechnica.com","from":"arssecurity"},{"title":"DreamFusion: Text-to-3D using 2D Diffusion","description":"<a href="https://news.ycombinator.com/item?id=33025446">Comments</a>","link":"https://dreamfusion3d.github.io","comments":"https://news.ycombinator.com/item?id=33025446","updated_at":"2022-09-29T18:57:24+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33025446","link_host":"dreamfusion3d.github.io","from":"hackernews"},{"title":"Meta announces Make-A-Video, which generates video from text","description":"Using a text description or an existing image, Make-A-Video can render video on demand.","link":"https://arstechnica.com/?p=1885529","comments":"https://arstechnica.com/?p=1885529","updated_at":"2022-09-29T15:39:01+00:00","link_to_comments":"https://arstechnica.com/?p=1885529","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Brazilian Prilex Hackers Resurfaced With Sophisticated Point-of-Sale Malware","description":"A Brazilian threat actor known as Prilex has resurfaced after a year-long operational hiatus with an advanced and complex malware to steal money by means of fraudulent transactions.\n"The Prilex group has shown a high level of knowledge about credit and debit card transactions, and how software used for payment processing works," Kaspersky researchers said. "This enables the attackers to keep","link":"https://thehackernews.com/2022/09/brazilian-prilex-hackers-resurfaced.html","comments":"https://thehackernews.com/2022/09/brazilian-prilex-hackers-resurfaced.html","updated_at":"2022-09-29T14:15:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/brazilian-prilex-hackers-resurfaced.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Obscure election will decide the fate of the open internet","description":"<a href="https://news.ycombinator.com/item?id=33019711">Comments</a>","link":"https://www.washingtonpost.com/opinions/2022/09/28/un-international-telecommunication-union-election/","comments":"https://news.ycombinator.com/item?id=33019711","updated_at":"2022-09-29T12:37:24+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33019711","link_host":"www.washingtonpost.com","from":"hackernews"},{"title":"Looped Square Or ⌘","description":"<a href="https://news.ycombinator.com/item?id=33019565">Comments</a>","link":"https://en.wikipedia.org/wiki/Command_key","comments":"https://news.ycombinator.com/item?id=33019565","updated_at":"2022-09-29T12:23:30+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33019565","link_host":"en.wikipedia.org","from":"hackernews"},{"title":"Researchers Uncover Covert Attack Campaign Targeting Military Contractors","description":"A new covert attack campaign singled out multiple military and weapons contractor companies with spear-phishing emails to trigger a multi-stage infection process designed to deploy an unknown payload on compromised machines.\nThe highly-targeted intrusions, dubbed STEEP#MAVERICK by Securonix, also targeted a strategic supplier to the F-35 Lightning II fighter aircraft.\n"The attack was carried out","link":"https://thehackernews.com/2022/09/researchers-uncover-covert-attack.html","comments":"https://thehackernews.com/2022/09/researchers-uncover-covert-attack.html","updated_at":"2022-09-29T12:00:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/researchers-uncover-covert-attack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Five Steps to Mitigate the Risk of Credential Exposure","description":"Every year, billions of credentials appear online, be it on the dark web, clear web, paste sites, or in data dumps shared by cybercriminals. These credentials are often used for account takeover attacks, exposing organizations to breaches, ransomware, and data theft. \nWhile CISOs are aware of growing identity threats and have multiple tools in their arsenal to help reduce the potential risk, the","link":"https://thehackernews.com/2022/09/five-steps-to-mitigate-risk-of.html","comments":"https://thehackernews.com/2022/09/five-steps-to-mitigate-risk-of.html","updated_at":"2022-09-29T11:45:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/five-steps-to-mitigate-risk-of.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Swachh City Platform Suffers Data Breach Leaking 16 Million User Records","description":"A threat actor by the name of LeakBase has shared a database containing personal information allegedly affecting 16 million users of Swachh City, an Indian complaint redressal platform.\nLeaked details include usernames, email addresses, password hashes, mobile numbers, one-time passwords, last logged-in times, and IP addresses, among others, according to a report shared by security firm CloudSEK","link":"https://thehackernews.com/2022/09/swachh-city-platform-suffers-data.html","comments":"https://thehackernews.com/2022/09/swachh-city-platform-suffers-data.html","updated_at":"2022-09-29T10:12:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/swachh-city-platform-suffers-data.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hackers Aid Protests Against Iranian Government with Proxies, Leaks and Hacks","description":"Several hacktivist groups are using Telegram and other tools to aid anti-government protests in Iran to bypass regime censorship restrictions amid ongoing unrest in the country following the death of Mahsa Amini in custody.\n"Key activities are data leaking and selling, including officials' phone numbers and emails, and maps of sensitive locations," Israeli cybersecurity firm Check Point said in","link":"https://thehackernews.com/2022/09/hackers-aid-protests-against-iranian.html","comments":"https://thehackernews.com/2022/09/hackers-aid-protests-against-iranian.html","updated_at":"2022-09-29T09:56:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/hackers-aid-protests-against-iranian.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Operational process automation for Design Agencies","description":"https://microgoals.so/","link":"https://www.designernews.co/stories/126982-operational-process-automation-for-design-agencies","comments":"https://www.designernews.co/stories/126982-operational-process-automation-for-design-agencies","updated_at":"2022-09-29T08:14:51+00:00","link_to_comments":"https://www.designernews.co/stories/126982-operational-process-automation-for-design-agencies","link_host":"microgoals.so","from":"designernews"},{"title":"Peep: The Network Auralizer","description":"<a href="https://news.ycombinator.com/item?id=33017337">Comments</a>","link":"https://peep.sourceforge.net/intro.html","comments":"https://news.ycombinator.com/item?id=33017337","updated_at":"2022-09-29T06:58:54+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33017337","link_host":"peep.sourceforge.net","from":"hackernews"},{"title":"Intel announces new FPGA families","description":"<a href="https://news.ycombinator.com/item?id=33017160">Comments</a>","link":"https://fpgaer.tech/?p=561","comments":"https://news.ycombinator.com/item?id=33017160","updated_at":"2022-09-29T06:29:59+00:00","link_to_comments":"https://news.ycombinator.com/item?id=33017160","link_host":"fpgaer.tech","from":"hackernews"},{"title":"Never-before-seen malware has infected hundreds of Linux and Windows devices","description":"Small office routers? FreeBSD machines? Enterprise servers? Chaos infects them all.","link":"https://arstechnica.com/?p=1885478","comments":"https://arstechnica.com/?p=1885478","updated_at":"2022-09-28T23:48:03+00:00","link_to_comments":"https://arstechnica.com/?p=1885478","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Cloudflare’s CAPTCHA replacement lacks crosswalks, checkboxes, Google","description":"Cloud giant says its verification tool doesn't challenge or profile users.","link":"https://arstechnica.com/?p=1885349","comments":"https://arstechnica.com/?p=1885349","updated_at":"2022-09-28T20:00:18+00:00","link_to_comments":"https://arstechnica.com/?p=1885349","link_host":"arstechnica.com","from":"arssecurity"},{"title":"DALL-E image generator is now open to everyone","description":"DALL-E launched frenzy of image synthesis development but was invitation-only until now.","link":"https://arstechnica.com/?p=1885259","comments":"https://arstechnica.com/?p=1885259","updated_at":"2022-09-28T17:33:13+00:00","link_to_comments":"https://arstechnica.com/?p=1885259","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Google Fiber touts 20Gbps download speed in test, promises eventual 100Gbps","description":"Google Fiber test delivered 20.2Gbps downloads to exec's home in Kansas City.","link":"https://arstechnica.com/?p=1885247","comments":"https://arstechnica.com/?p=1885247","updated_at":"2022-09-28T17:25:19+00:00","link_to_comments":"https://arstechnica.com/?p=1885247","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Serious vulnerabilities in Matrix’s end-to-end encryption have been patched","description":"Previously overlooked flaws allow malicious homeservers to decrypt and spoof messages.","link":"https://arstechnica.com/?p=1885111","comments":"https://arstechnica.com/?p=1885111","updated_at":"2022-09-28T16:00:27+00:00","link_to_comments":"https://arstechnica.com/?p=1885111","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Researchers Warn of New Go-based Malware Targeting Windows and Linux Systems","description":"A new, multi-functional Go-based malware dubbed Chaos has been rapidly growing in volume in recent months to ensnare a wide range of Windows, Linux, small office/home office (SOHO) routers, and enterprise servers into its botnet.\n"Chaos functionality includes the ability to enumerate the host environment, run remote shell commands, load additional modules, automatically propagate through","link":"https://thehackernews.com/2022/09/researchers-warn-of-new-go-based.html","comments":"https://thehackernews.com/2022/09/researchers-warn-of-new-go-based.html","updated_at":"2022-09-28T14:00:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/researchers-warn-of-new-go-based.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Houses Of - A travel, photography and design passion project showcasing charismatic houses around the world","description":"https://housesof.world","link":"https://www.designernews.co/stories/126976-houses-of--a-travel-photography-and-design-passion-project-showcasing-charismatic-houses-around-the-world","comments":"https://www.designernews.co/stories/126976-houses-of--a-travel-photography-and-design-passion-project-showcasing-charismatic-houses-around-the-world","updated_at":"2022-09-28T13:25:32+00:00","link_to_comments":"https://www.designernews.co/stories/126976-houses-of--a-travel-photography-and-design-passion-project-showcasing-charismatic-houses-around-the-world","link_host":"housesof.world","from":"designernews"},{"title":"Cyber Criminals Using Quantum Builder Sold on Dark Web to Deliver Agent Tesla Malware","description":"A recently discovered malware builder called Quantum Builder is being used to deliver the Agent Tesla remote access trojan (RAT).\n"This campaign features enhancements and a shift toward LNK (Windows shortcut) files when compared to similar attacks in the past," Zscaler ThreatLabz researchers Niraj Shivtarkar and Avinash Kumar said in a Tuesday write-up.\n<!--adsense-->\nSold on the dark web for €","link":"https://thehackernews.com/2022/09/cyber-criminals-using-quantum-builder.html","comments":"https://thehackernews.com/2022/09/cyber-criminals-using-quantum-builder.html","updated_at":"2022-09-28T12:36:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/cyber-criminals-using-quantum-builder.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Improve your security posture with Wazuh, a free and open source XDR","description":"Organizations struggle to find ways to keep a good security posture. This is because it is difficult to create secure system policies and find the right tools that help achieve a good posture. In many cases, organizations work with tools that do not integrate with each other and are expensive to purchase and maintain.\nSecurity posture management is a term used to describe the process of","link":"https://thehackernews.com/2022/09/improve-your-security-posture-with.html","comments":"https://thehackernews.com/2022/09/improve-your-security-posture-with.html","updated_at":"2022-09-28T12:15:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/improve-your-security-posture-with.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"We interviewed Linux OS through an AI bot to discover its secrets","description":"In the world's first operating system interview, Linux tells all about Windows, Torvalds, and its favorite distro.","link":"https://arstechnica.com/?p=1884615","comments":"https://arstechnica.com/?p=1884615","updated_at":"2022-09-28T11:00:08+00:00","link_to_comments":"https://arstechnica.com/?p=1884615","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Hackers Using PowerPoint Mouseover Trick to Infect System with Malware","description":"The Russian state-sponsored threat actor known as APT28 has been found leveraging a new code execution method that makes use of mouse movement in decoy Microsoft PowerPoint documents to deploy malware.\nThe technique "is designed to be triggered when the user starts the presentation mode and moves the mouse," cybersecurity firm Cluster25 said in a technical report. "The code execution runs a","link":"https://thehackernews.com/2022/09/hackers-using-powerpoint-mouseover.html","comments":"https://thehackernews.com/2022/09/hackers-using-powerpoint-mouseover.html","updated_at":"2022-09-28T10:09:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/hackers-using-powerpoint-mouseover.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Facebook Shuts Down Covert Political 'Influence Operations' from Russia and China","description":"Meta Platforms on Tuesday disclosed it took steps to dismantle two covert influence operations originating from China and Russia for engaging in coordinated inauthentic behavior (CIB) so as to manipulate public debate.\nWhile the Chinese operation sets its sights on the U.S. and the Czech Republic, the Russian network primarily targeted Germany, France, Italy, Ukraine and the U.K. with themes","link":"https://thehackernews.com/2022/09/facebook-shuts-down-covert-political.html","comments":"https://thehackernews.com/2022/09/facebook-shuts-down-covert-political.html","updated_at":"2022-09-28T08:45:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/facebook-shuts-down-covert-political.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Critical WhatsApp Bugs Could Have Let Attackers Hack Devices Remotely","description":"WhatsApp has released security updates to address two flaws in its messaging app for Android and iOS that could lead to remote code execution on vulnerable devices.\nOne of them concerns CVE-2022-36934 (CVSS score: 9.8), a critical integer overflow vulnerability in WhatsApp that results in the execution of arbitrary code simply by establishing a video call.\nThe issue impacts the WhatsApp and","link":"https://thehackernews.com/2022/09/critical-whatsapp-bugs-could-have-let.html","comments":"https://thehackernews.com/2022/09/critical-whatsapp-bugs-could-have-let.html","updated_at":"2022-09-28T05:03:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/critical-whatsapp-bugs-could-have-let.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Better than JPEG? Researcher discovers that Stable Diffusion can compress images","description":"Lossy compression bypasses text-to-image portions of Stable Diffusion with interesting results.","link":"https://arstechnica.com/?p=1882929","comments":"https://arstechnica.com/?p=1882929","updated_at":"2022-09-27T20:59:25+00:00","link_to_comments":"https://arstechnica.com/?p=1882929","link_host":"arstechnica.com","from":"arssecurity"},{"title":" 7 Non Technical Interview Questions To Evaluate The Candidate","description":"https://ralabs.org/7-non-tech-questions-for-software-developers/","link":"https://www.designernews.co/stories/126964--7-non-technical-interview-questions-to-evaluate-the-candidate","comments":"https://www.designernews.co/stories/126964--7-non-technical-interview-questions-to-evaluate-the-candidate","updated_at":"2022-09-27T14:21:43+00:00","link_to_comments":"https://www.designernews.co/stories/126964--7-non-technical-interview-questions-to-evaluate-the-candidate","link_host":"ralabs.org","from":"designernews"},{"title":"Ukraine Says Russia Planning Massive Cyberattacks on its Critical Infrastructures","description":"The Ukrainian government on Monday warned of "massive cyberattacks" by Russia targeting critical infrastructure facilities located in the country and that of its allies.\nThe attacks are said to be targeting the energy sector, the Main Directorate of Intelligence of the Ministry of Defense of Ukraine (GUR) said.\n"By the cyberattacks, the enemy will try to increase the effect of missile strikes on","link":"https://thehackernews.com/2022/09/ukraine-says-russia-planning-massive.html","comments":"https://thehackernews.com/2022/09/ukraine-says-russia-planning-massive.html","updated_at":"2022-09-27T13:54:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/ukraine-says-russia-planning-massive.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Apps can pose bigger security, privacy threat based on where you download them","description":"Same app, different risks if you download it in, say, Tunisia rather than in Germany.","link":"https://arstechnica.com/?p=1884773","comments":"https://arstechnica.com/?p=1884773","updated_at":"2022-09-27T13:53:58+00:00","link_to_comments":"https://arstechnica.com/?p=1884773","link_host":"arstechnica.com","from":"arssecurity"},{"title":"New NullMixer Malware Campaign Stealing Users' Payment Data and Credentials","description":"Cybercriminals are continuing to prey on users searching for cracked software by directing them to fraudulent websites hosting weaponized installers that deploy malware called NullMixer on compromised systems.\n"When a user extracts and executes NullMixer, it drops a number of malware files to the compromised machine," cybersecurity firm Kaspersky said in a Monday report. "It drops a wide variety","link":"https://thehackernews.com/2022/09/new-nullmixer-malware-campaign-stealing.html","comments":"https://thehackernews.com/2022/09/new-nullmixer-malware-campaign-stealing.html","updated_at":"2022-09-27T13:19:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/new-nullmixer-malware-campaign-stealing.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Experts Uncover 85 Apps with 13 Million Downloads Involved in Ad Fraud Scheme","description":"As many as 75 apps on Google Play and 10 on Apple App Store have been discovered engaging in ad fraud as part of an ongoing campaign that commenced in 2019.\nThe latest iteration, dubbed Scylla by Online fraud-prevention firm HUMAN Security, follows similar attack waves in August 2019 and late 2020 that go by the codename Poseidon and Charybdis, respectively.\nPrior to their removal from the app","link":"https://thehackernews.com/2022/09/experts-uncover-85-apps-with-13-million.html","comments":"https://thehackernews.com/2022/09/experts-uncover-85-apps-with-13-million.html","updated_at":"2022-09-27T12:04:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/experts-uncover-85-apps-with-13-million.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Why Continuous Security Testing is a Must for Organizations Today","description":"The global cybersecurity market is flourishing. Experts at Gartner predict that the end-user spending for the information security and risk management market will grow from $172.5 billion in 2022 to $267.3 billion in 2026. \nOne big area of spending includes the art of putting cybersecurity defenses under pressure, commonly known as security testing. MarketsandMarkets forecasts the global","link":"https://thehackernews.com/2022/09/why-continuous-security-testing-is-must.html","comments":"https://thehackernews.com/2022/09/why-continuous-security-testing-is-must.html","updated_at":"2022-09-27T11:39:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/why-continuous-security-testing-is-must.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"North Korea's Lazarus Hackers Targeting macOS Users Interested in Crypto Jobs","description":"The infamous Lazarus Group has continued its pattern of leveraging unsolicited job opportunities to deploy malware targeting Apple's macOS operating system.\nIn the latest variant of the campaign observed by cybersecurity company SentinelOne last week, decoy documents advertising positions for the Singapore-based cryptocurrency exchange firm Crypto[.]com have been used to mount the attacks.\nThe","link":"https://thehackernews.com/2022/09/north-koreas-lazarus-hackers-targeting.html","comments":"https://thehackernews.com/2022/09/north-koreas-lazarus-hackers-targeting.html","updated_at":"2022-09-27T09:46:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/north-koreas-lazarus-hackers-targeting.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hacker Behind Optus Breach Releases 10,200 Customer Records in Extortion Scheme","description":"The Australian Federal Police (AFP) on Monday disclosed it's working to gather "crucial evidence" and that it's collaborating with overseas law enforcement authorities following the hack of telecom provider Optus.\n"Operation Hurricane has been launched to identify the criminals behind the alleged breach and to help shield Australians from identity fraud," the AFP said in a statement.\nThe","link":"https://thehackernews.com/2022/09/hacker-behind-optus-breach-releases.html","comments":"https://thehackernews.com/2022/09/hacker-behind-optus-breach-releases.html","updated_at":"2022-09-27T06:14:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/hacker-behind-optus-breach-releases.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"BeReal: 5 Ways the Anti-Social Media App is Changing the Game","description":"https://raw.studio/blog/5-ways-bereal-the-anti-social-media-app-is-changing-the-game/","link":"https://www.designernews.co/stories/126960-bereal-5-ways-the-antisocial-media-app-is-changing-the-game","comments":"https://www.designernews.co/stories/126960-bereal-5-ways-the-antisocial-media-app-is-changing-the-game","updated_at":"2022-09-26T22:36:50+00:00","link_to_comments":"https://www.designernews.co/stories/126960-bereal-5-ways-the-antisocial-media-app-is-changing-the-game","link_host":"raw.studio","from":"designernews"},{"title":"Russia plans “massive cyberattacks” on critical infrastructure, Ukraine warns","description":"Distributed denial-of-service attacks are also likely to increase, advisory says.","link":"https://arstechnica.com/?p=1884593","comments":"https://arstechnica.com/?p=1884593","updated_at":"2022-09-26T19:14:57+00:00","link_to_comments":"https://arstechnica.com/?p=1884593","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Darth Vader’s voice will be AI-generated from now on","description":"Using Respeecher, Vader will live on as a cloned voice effect performed by another actor.","link":"https://arstechnica.com/?p=1884407","comments":"https://arstechnica.com/?p=1884407","updated_at":"2022-09-26T15:21:43+00:00","link_to_comments":"https://arstechnica.com/?p=1884407","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Researchers Identify 3 Hacktivist Groups Supporting Russian Interests","description":"At least three alleged hacktivist groups working in support of Russian interests are likely doing so in collaboration with state-sponsored cyber threat actors, according to Mandiant.\nThe Google-owned threat intelligence and incident response firm said with moderate confidence that "moderators of the purported hacktivist Telegram channels 'XakNet Team,' 'Infoccentr,' and 'CyberArmyofRussia_Reborn","link":"https://thehackernews.com/2022/09/researchers-identify-3-hacktivist.html","comments":"https://thehackernews.com/2022/09/researchers-identify-3-hacktivist.html","updated_at":"2022-09-26T14:33:00+00:00","link_to_comments":"https://thehackernews.com/2022/09/researchers-identify-3-hacktivist.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Visual Hierarchy Guide: 7 steps to clean design","description":"https://ralabs.org/visual-hierarchy-guide-7-steps-to-clean-design/?utm_source=designernews.co&utm_medium=post&utm_campaign=content_distr","link":"https://www.designernews.co/stories/126952-visual-hierarchy-guide-7-steps-to-clean-design","comments":"https://www.designernews.co/stories/126952-visual-hierarchy-guide-7-steps-to-clean-design","updated_at":"2022-09-26T10:57:27+00:00","link_to_comments":"https://www.designernews.co/stories/126952-visual-hierarchy-guide-7-steps-to-clean-design","link_host":"ralabs.org","from":"designernews"},{"title":"NES games remastered with Stable Diffusion img2img","description":"https://www.aidemos.info/nes-games-remastered-with-stable-diffusion-img2img/","link":"https://www.designernews.co/stories/126949-nes-games-remastered-with-stable-diffusion-img2img","comments":"https://www.designernews.co/stories/126949-nes-games-remastered-with-stable-diffusion-img2img","updated_at":"2022-09-26T09:47:33+00:00","link_to_comments":"https://www.designernews.co/stories/126949-nes-games-remastered-with-stable-diffusion-img2img","link_host":"www.aidemos.info","from":"designernews"},{"title":"What Is Design Thinking? Definition, Process And Examples","description":"https://marketsplash.com/design-thinking/","link":"https://www.designernews.co/stories/126933-what-is-design-thinking-definition-process-and-examples","comments":"https://www.designernews.co/stories/126933-what-is-design-thinking-definition-process-and-examples","updated_at":"2022-09-23T21:27:01+00:00","link_to_comments":"https://www.designernews.co/stories/126933-what-is-design-thinking-definition-process-and-examples","link_host":"marketsplash.com","from":"designernews"},{"title":"How 3 hours of inaction from Amazon cost cryptocurrency holders $235,000","description":"For 2nd time in 4 years, Amazon loses control of its IP space in BGP hijacking.","link":"https://arstechnica.com/?p=1884070","comments":"https://arstechnica.com/?p=1884070","updated_at":"2022-09-23T18:04:11+00:00","link_to_comments":"https://arstechnica.com/?p=1884070","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Starlink is getting a lot slower as more people use it, speed tests show","description":"Starlink capacity limits hit users—SpaceX says more satellites will make it faster.","link":"https://arstechnica.com/?p=1884083","comments":"https://arstechnica.com/?p=1884083","updated_at":"2022-09-23T17:57:20+00:00","link_to_comments":"https://arstechnica.com/?p=1884083","link_host":"arstechnica.com","from":"arssecurity"},{"title":"The Future Of Design Is Open Source, Thanks To Figma","description":"https://prototypr.io/post/future-design-open-source-figma","link":"https://www.designernews.co/stories/126924-the-future-of-design-is-open-source-thanks-to-figma","comments":"https://www.designernews.co/stories/126924-the-future-of-design-is-open-source-thanks-to-figma","updated_at":"2022-09-23T10:37:51+00:00","link_to_comments":"https://www.designernews.co/stories/126924-the-future-of-design-is-open-source-thanks-to-figma","link_host":"prototypr.io","from":"designernews"},{"title":"Will Adobe ruin Figma?","description":"https://www.youtube.com/watch?v=PAvqyFvE9Hk","link":"https://www.designernews.co/stories/126919-will-adobe-ruin-figma","comments":"https://www.designernews.co/stories/126919-will-adobe-ruin-figma","updated_at":"2022-09-23T09:23:10+00:00","link_to_comments":"https://www.designernews.co/stories/126919-will-adobe-ruin-figma","link_host":"www.youtube.com","from":"designernews"},{"title":"Artist receives first known US copyright registration for latent diffusion AI art","description":"Registration of AI-assisted comic comes amid fierce online debate about AI art ethics.","link":"https://arstechnica.com/?p=1883867","comments":"https://arstechnica.com/?p=1883867","updated_at":"2022-09-22T21:38:04+00:00","link_to_comments":"https://arstechnica.com/?p=1883867","link_host":"arstechnica.com","from":"arssecurity"},{"title":"AI model from OpenAI automatically recognizes speech and translates it to English","description":""Whisper" open source model may become a building block in future speech-to-text apps.","link":"https://arstechnica.com/?p=1883524","comments":"https://arstechnica.com/?p=1883524","updated_at":"2022-09-22T16:48:28+00:00","link_to_comments":"https://arstechnica.com/?p=1883524","link_host":"arstechnica.com","from":"arssecurity"},{"title":"What is video proofing and online proofing for designers?","description":"https://krock.io/blog/features/what-is-video-proofing/","link":"https://www.designernews.co/stories/126904-what-is-video-proofing-and-online-proofing-for-designers","comments":"https://www.designernews.co/stories/126904-what-is-video-proofing-and-online-proofing-for-designers","updated_at":"2022-09-22T15:00:38+00:00","link_to_comments":"https://www.designernews.co/stories/126904-what-is-video-proofing-and-online-proofing-for-designers","link_host":"krock.io","from":"designernews"},{"title":"Fearing copyright issues, Getty Images bans AI-generated artwork","description":"Getty sidesteps potential legal problems from unresolved rights and ethics issues.","link":"https://arstechnica.com/?p=1883513","comments":"https://arstechnica.com/?p=1883513","updated_at":"2022-09-21T22:32:35+00:00","link_to_comments":"https://arstechnica.com/?p=1883513","link_host":"arstechnica.com","from":"arssecurity"},{"title":"The record-setting DDoSes keep coming, with no end in sight","description":"As DDoSes continue to innovate, their attacks grow ever bigger.","link":"https://arstechnica.com/?p=1883481","comments":"https://arstechnica.com/?p=1883481","updated_at":"2022-09-21T19:15:20+00:00","link_to_comments":"https://arstechnica.com/?p=1883481","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Run Stable Diffusion AI on Low-End Device & Tablet","description":"https://vagon.io/blog/run-stable-diffusion-ai-on-low-end-device/","link":"https://www.designernews.co/stories/126854-run-stable-diffusion-ai-on-lowend-device--tablet","comments":"https://www.designernews.co/stories/126854-run-stable-diffusion-ai-on-lowend-device--tablet","updated_at":"2022-09-21T13:24:26+00:00","link_to_comments":"https://www.designernews.co/stories/126854-run-stable-diffusion-ai-on-lowend-device--tablet","link_host":"vagon.io","from":"designernews"},{"title":"The Principles and Laws of UX Design – Why Every Designer Should Know Them","description":"https://www.peppersquare.com/blog/the-principles-and-laws-of-ux-design-why-every-designer-should-know-them/","link":"https://www.designernews.co/stories/126832-the-principles-and-laws-of-ux-design--why-every-designer-should-know-them","comments":"https://www.designernews.co/stories/126832-the-principles-and-laws-of-ux-design--why-every-designer-should-know-them","updated_at":"2022-09-20T09:58:52+00:00","link_to_comments":"https://www.designernews.co/stories/126832-the-principles-and-laws-of-ux-design--why-every-designer-should-know-them","link_host":"www.peppersquare.com","from":"designernews"},{"title":"Instaprice - the pricing calculator for freelance projects","description":"https://instaprice.app/","link":"https://www.designernews.co/stories/126820-instaprice--the-pricing-calculator-for-freelance-projects","comments":"https://www.designernews.co/stories/126820-instaprice--the-pricing-calculator-for-freelance-projects","updated_at":"2022-09-19T15:52:29+00:00","link_to_comments":"https://www.designernews.co/stories/126820-instaprice--the-pricing-calculator-for-freelance-projects","link_host":"instaprice.app","from":"designernews"},{"title":"All Together Festival by Bank of Ireland had awesome visual this year. Check it out.","description":"https://www.owlillustration.com/2022/09/16/bank-of-ireland-key-visual-for-all-together-festival/","link":"https://www.designernews.co/stories/126805-all-together-festival-by-bank-of-ireland-had-awesome-visual-this-year-check-it-out","comments":"https://www.designernews.co/stories/126805-all-together-festival-by-bank-of-ireland-had-awesome-visual-this-year-check-it-out","updated_at":"2022-09-19T10:19:51+00:00","link_to_comments":"https://www.designernews.co/stories/126805-all-together-festival-by-bank-of-ireland-had-awesome-visual-this-year-check-it-out","link_host":"www.owlillustration.com","from":"designernews"},{"title":"Show DN: I made 7,000+ images with DALL-E 2 to create a reference/inspiration table","description":"https://generrated.com/","link":"https://www.designernews.co/stories/126795-show-dn-i-made-7000-images-with-dalle-2-to-create-a-referenceinspiration-table","comments":"https://www.designernews.co/stories/126795-show-dn-i-made-7000-images-with-dalle-2-to-create-a-referenceinspiration-table","updated_at":"2022-09-18T14:50:41+00:00","link_to_comments":"https://www.designernews.co/stories/126795-show-dn-i-made-7000-images-with-dalle-2-to-create-a-referenceinspiration-table","link_host":"generrated.com","from":"designernews"},{"title":"New Bravorizer Figma Plugin!","description":"https://www.figma.com/community/plugin/1149380850484102424/Bravorizer","link":"https://www.designernews.co/stories/126786-new-bravorizer-figma-plugin","comments":"https://www.designernews.co/stories/126786-new-bravorizer-figma-plugin","updated_at":"2022-09-16T14:18:12+00:00","link_to_comments":"https://www.designernews.co/stories/126786-new-bravorizer-figma-plugin","link_host":"www.figma.com","from":"designernews"},{"title":"A book about Product Design Psychology?","description":"https://www.productdesignpsychology.com/","link":"https://www.designernews.co/stories/126783-a-book-about-product-design-psychology","comments":"https://www.designernews.co/stories/126783-a-book-about-product-design-psychology","updated_at":"2022-09-16T13:26:06+00:00","link_to_comments":"https://www.designernews.co/stories/126783-a-book-about-product-design-psychology","link_host":"www.productdesignpsychology.com","from":"designernews"},{"title":"Making a Comic Book Page with Midjourney AI","description":"https://www.aidemos.info/making-a-comic-page-with-midjourney-ai/","link":"https://www.designernews.co/stories/126782-making-a-comic-book-page-with-midjourney-ai","comments":"https://www.designernews.co/stories/126782-making-a-comic-book-page-with-midjourney-ai","updated_at":"2022-09-16T12:55:42+00:00","link_to_comments":"https://www.designernews.co/stories/126782-making-a-comic-book-page-with-midjourney-ai","link_host":"www.aidemos.info","from":"designernews"},{"title":"Wanna Organize your UX Research Visually?","description":"https://www.youtube.com/watch?v=N_n4ezyip4M","link":"https://www.designernews.co/stories/126771-wanna-organize-your-ux-research-visually","comments":"https://www.designernews.co/stories/126771-wanna-organize-your-ux-research-visually","updated_at":"2022-09-16T08:56:47+00:00","link_to_comments":"https://www.designernews.co/stories/126771-wanna-organize-your-ux-research-visually","link_host":"www.youtube.com","from":"designernews"},{"title":"Adobe acquires Figma, cue the memes :P","description":"https://prototypr.io/post/adobe-figma-meme","link":"https://www.designernews.co/stories/126757-adobe-acquires-figma-cue-the-memes-p","comments":"https://www.designernews.co/stories/126757-adobe-acquires-figma-cue-the-memes-p","updated_at":"2022-09-15T17:17:12+00:00","link_to_comments":"https://www.designernews.co/stories/126757-adobe-acquires-figma-cue-the-memes-p","link_host":"prototypr.io","from":"designernews"},{"title":"The end of product copy errors in production. Connect the design process with the codebase ⚡️","description":"https://www.frontitude.com/blog/introducing-frontitudes-first-developer-integration","link":"https://www.designernews.co/stories/126734-the-end-of-product-copy-errors-in-production-connect-the-design-process-with-the-codebase-","comments":"https://www.designernews.co/stories/126734-the-end-of-product-copy-errors-in-production-connect-the-design-process-with-the-codebase-","updated_at":"2022-09-15T07:14:56+00:00","link_to_comments":"https://www.designernews.co/stories/126734-the-end-of-product-copy-errors-in-production-connect-the-design-process-with-the-codebase-","link_host":"www.frontitude.com","from":"designernews"},{"title":"Today we are in Product Hunt with Bravo Studio 3.11 apps for work!","description":"https://www.producthunt.com/posts/bravo-studio-3-11","link":"https://www.designernews.co/stories/126719-today-we-are-in-product-hunt-with-bravo-studio-311-apps--for-work","comments":"https://www.designernews.co/stories/126719-today-we-are-in-product-hunt-with-bravo-studio-311-apps--for-work","updated_at":"2022-09-14T13:49:23+00:00","link_to_comments":"https://www.designernews.co/stories/126719-today-we-are-in-product-hunt-with-bravo-studio-311-apps--for-work","link_host":"www.producthunt.com","from":"designernews"}]