惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

N
News and Events Feed by Topic
Malwarebytes
Malwarebytes
Threat Intelligence Blog | Flashpoint
Threat Intelligence Blog | Flashpoint
C
Cybersecurity and Infrastructure Security Agency CISA
F
Future of Privacy Forum
C
Cisco Blogs
T
The Exploit Database - CXSecurity.com
A
Arctic Wolf
S
Securelist
K
Kaspersky official blog
S
Schneier on Security
T
ThreatConnect
T
Tenable Blog
Spread Privacy
Spread Privacy
T
True Tiger Recordings
AWS News Blog
AWS News Blog
F
Fox-IT International blog
量子位
T
Threatpost
V
Vulnerabilities – Threatpost
C
CERT Recently Published Vulnerability Notes
Cisco Talos Blog
Cisco Talos Blog
GbyAI
GbyAI
宝玉的分享
宝玉的分享
腾讯CDC
G
Google Developers Blog
aimingoo的专栏
aimingoo的专栏
Cyberwarzone
Cyberwarzone
有赞技术团队
有赞技术团队
S
SegmentFault 最新的问题
OSCHINA 社区最新新闻
OSCHINA 社区最新新闻
V
Visual Studio Blog
U
Unit 42
雷峰网
雷峰网
cs.CV updates on arXiv.org
cs.CV updates on arXiv.org
Simon Willison's Weblog
Simon Willison's Weblog
O
OpenAI News
freeCodeCamp Programming Tutorials: Python, JavaScript, Git & More
The GitHub Blog
The GitHub Blog
The Register - Security
The Register - Security
MyScale Blog
MyScale Blog
小众软件
小众软件
A
About on SuperTechFans
Last Week in AI
Last Week in AI
Y
Y Combinator Blog
博客园 - 三生石上(FineUI控件)
美团技术团队
Google Online Security Blog
Google Online Security Blog
P
Proofpoint News Feed
MongoDB | Blog
MongoDB | Blog

Hacker News - Newest: "AI"

The Race Is on (AI) Google CEO Sundar Pichai says booing graduates will shape AI's future Show HN: TalkTimer, a micro-SaaS run by an AI agent team Trickster's Table Venture Capitalist John Doerr Says AI Is the Biggest Tech 'Tsunami' AI Can’t Care – Dan Moore! GitHub - peterxcli/ccost: Turn local AI coding session logs into a searchable terminal UI with a cost lens. Ask HN: What is your daily AI stack? GitHub - PanzerPeter/Neuro: A programing language for AI Resyl: AI Memory for People - Apps on Google Play AI Chip Component Costs: Memory at 63% | Epoch AI Ask HN: Why do people seem to generally hate AI? Resonance, randomness, and negotiated meaning for AI-assisted tarot divination GitHub - Kind-Computers/quinlight-audio: Audophile-quality MOD music with AI remastering at 32-bit 96 kHz! The Case Against the AI Job Apocalypse AI and the Rise of Just-In-Time Knowledge Work Careers After AI There Is No AI (It's Just People), with Jaron Lanier [video] wolfram-fb0 — AI writes x86_64 asm + eBPF for fractals, in a real VM in your browser Bursting the AI Bubble: Fed Could Take Away the "Who Could Have Known?" Defense AI proves mathematicians wrong I built a free AI travel planner for budget Europe trips Our AI just got even better Integral Intelligence: a Catholic view of the AI debate How to Tame AI’s Voracious Appetite for Energy GitHub - atveit/pi-mojo: A mojo port of the PI AI Agent Toolkit Autotrader – paper trading AI agent for Indian equities The invisible fabric of AI: chips are not a war between two, but a global fabric - zoopa.es Responsible Work with AI The AI Existential Crisis: Western AI Agents Will Win Commerce Legal Ontologies for AI This AI Stock Is the Ultimate Set-It-and-Forget-It Buy for Long-Term Investors AI wealth must benefit the public, South Korea's deputy PM says amid Samsung labor tensions Forget electrons, this breakthrough uses light-matter particles to power AI State Explosion Security Problem in AI-Era Software Supply Chains ShannonBase: The Lightweight Semantic Layer for Enterprise AI SQL AI Content Got Too Real. Now OpenAI and Nvidia Are Using Google’s Watermarking System. - Firethering Karen Hao: AI creating a DESPERATE BASE OF WORKERS with no full-time employment GitHub - barvhaim/llm-learning-path: 🎓 Structured LLM Learning Path — From Zero to Researcher. 8-phase curriculum covering Transformers, pre-training, fine-tuning, alignment, agents, and advanced research. Letting Agents Write Code Without Ratcheting Up Risk Why Every Electronic Product May Need To Be Rebuilt For On-Device AI: The Chip Layer Will Decide The Next Hardware Wave – Easelink Tech Ask HN: I mapped 6,494 AI engines into a taxonomy – anyone else tried this? China behind in LLM race but it can still win in AI, ex-Tencent AI lead says Newsom signs order aimed at tackling AI job displacement How AI is redefining Software Engineering Hiro, AI job matching with real visa sponsorship data (550K jobs) For developers without design skills, how do you leverage AI for front end dev? The Anatomy of AI Power in 2026 | Wayne Research arxiv ‘AI washing’: firms are scrambling to rebrand themselves as tech-focused Clawd Cursor v0.9.7 SpaceX, OpenAI and Anthropic IPOs set to test limits of AI boom Export chats from 11 AI platforms to PDF or Markdown locally From Vibe Coding to AI-Assisted Engineering: Lessons from Real Projects Shannon Got AI This Far. Kolmogorov Shows Where It Stops GitHub - machineswillrise/jagent: AI coding agent in Java GitHub - anatomia-dev/anatomia: Verified AI development. Ship with proof. Joe Rogan accidentally exposed AI in four words [video][12 mins] AI Headshot Generator for Work | Preview before you pay $4.99 one-time, no subscription MAXTOKEN A Unified Framework for Unbounded Output Generation and Repository-Scale Code Understanding The unlikely Vatican-Anthropic relationship that's reshaping AI ethics debate Fashion designer Jeremy Scott gets a huge cheer after ripping up his AI-written commencement speech Sycophantic AI decreases prosocial intentions and promotes dependence GitHub - anasmohiuddinsyed-bit/ai-fix: When a command fails, one word fixes it. AI-powered error fixer for your terminal. AI Governance 2026: I Almost Quit over This Shit (and Why You Might Too) GitHub - sabir-gbs/the-polyglot-protocol: A senior-engineer protocol for polyglot code generation, architecture, testing, security, performance, and agent validation. CodeShot — Beautiful Code Screenshots via API Apple Preparing New 'Gen AI' Website Ahead of WWDC Duolingo's CEO says he backtracked on evaluating AI use in performance reviews AgentLens — Know if your AI features are actually working How Much AI Compute Do Frontier Labs Use? AIBTC Jimmy Carr on Why Everyone Is Wrong About AI [video] Ask HN: Why disparage AI while attributing ideas to AI when written with it? Mercor AI post-training for generalist experts – referral Reid AI - Silicon Valley Video Summit AI Translate All Formats 2026-05-23 — Why reviewing AI-generated code is devilishly hard Verytis AI Model Idle · 인공지능 키우기 GitHub - narekmalk/safedb-mcp: Secure MCP server for safe, read-only DB access by AI agents, with SQL guardrails, table allowlists, PII masking, and audit logs The 5% who operate AI are pulling ahead. Find out where you stand. | PeraByte Labs ORBIT AI Chess Coach — Know Why Every Move Matters AgenticVBench GitHub - ninjahawk/singleton-attractor: Why one dominant intelligence is the inevitable long-run outcome in any competitive recursive-improvement environment. Ask HN: How can you have fun doing corporate dev work in the age of AI tools? AI Mistakes Are Infuriating Gamers as Developers Seek Savings Polish Nobel literature laureate Tokarczuk sparks controversy after admitting using AI The AI Slot Machine is Draining My Creativity Knowledge: You can just build your own AI feed to keep up, without the noise To Understand AI, Think Like A Dragonfly Polsia Raises $30M as Its AI Autonomously Runs 7,600 Businesses AI companies use malware proxies to mount DDoS attacks on web sites AI cost crisis hits tech giants as employee 'tokenmaxxing' backfires — agentic AI eats up to 1000x more tokens than standard AI, sparks corporate pullback at Microsoft, Meta, and Amazon Frello — A small revolt against bloated software CostHawk - Track AI Adoption, Cost, and Rollout Across Your Team AI is changing the internet forever I let an AI agent loose on my network – it owned my supply chain in 12 minutes GitHub - ogulcancelik/herdr: agent multiplexer that lives in your terminal.
NZ at wild frontier of AI superhacking
billybuckwhe · 2026-05-25 · via Hacker News - Newest: "AI"

Padlock on Cyber Security System to convey a sense of secure data and network protection in a modern and technical setting

The rise of artificial intelligence is a growing threat to cyber security Photo: 123RF

New Zealand's cyber watchdog says it is learning from the US companies who are testing superhacking AI models that have sent US banks rushing to plug holes, and sparked briefings with the Department of Homeland Security.

Heavyweight cyber security firm Palo Alto Networks said its tests on the AI model Claude Mythos found it could detect and exploit years-old software flaws so fast and effectively that the company last week issued a couple of dozen security alerts in a single day, when it usually issues only five or so a month.

The National Cyber Security Centre (NCSC) in New Zealand has warned to get ready for "a significant increase in vulnerabilities and incidents".

"The NCSC recognises the risks and opportunities presented by these new tools and is responding with a number of related workstreams," it told RNZ.

It recently briefed 300 local cybersecurity specialists about so-called 'frontier' AI models.

In April, Mythos's creator Anthropic set up what it called Project Glasswing to release the model to a small group of companies and agencies, including the Pentagon, to test if it could threaten systems behind critical infrastructure by exploiting the likes of 'zero-day' vulnerabilities - so-called because they have existed undetected in code from when software was released, leaving developers 'zero days' to prepare a fix.

Some of this small group are outside the US, but New Zealand's NCSC is not in it.

"The NCSC is not part of Glasswing but we are talking regularly with a range of partners and vendors, including some who are involved with Glasswing, so that we can understand the landscape and provide meaningful advice and guidance on the implications of frontier AI," it told RNZ.

The NCSC said it was engaging with tech companies including developers of frontier models and companies that have had access to preview models like Mythos.

Other frontier models being tested in the US include Claude Opus 4.7 and OpenAI's GPT-5.5-Cyber.

Anthropic said Mythos's hacking abilities just emerged - they were not designed-in - and warned the fallout across economies, public safety and national security could be "severe" if the tool were to fall into the wrong hands.

Critics have said this might just all be marketing hype. Other reports suggested the small group's testing was showing Mythos was expert at chaining together lower-risk vulnerabilities - "daisy-chaining" it is called - into a high-risk vulnerability.

Analysts have said Mythos is of a type of new AI that feels different because it is capable of setting loose its own long-running agents that don't need constant human steering.

On 12 May, Reuters reported that US banks were "rushing to plug cyber holes" flagged by Mythos.

The New York Times said China, foreseeing a threat, had asked for access to Mythos but been denied.

Two days later, cybersecurity news website Nextgov said Anthropic executives had given a live demo to a closed-door briefing of a US Homeland Security Committee.

And on 20 May, https://www.politico.com/news/2026/05/20/nsa-cyber-command-ai-task-force-mythos-00930786 Politico reported] that the Pentagon was racing to weaponise frontier models - ironic as it had been freezing Anthropic out in a dispute over weaponising AI. "The initiative ... underscores the Pentagon's concerns about the sudden emergence of private sector-built AI models that can unearth security flaws in digital systems faster than the world's best hackers," Politico said.

The group that has been allowed access to Mythos includes AWS, Cisco, CrowdStrike, Google, JPMorganChase, Microsoft, NVIDIA, Palo Alto Networks, and the Linux Foundation.

Vulnerabilities and mitigants

New Zealand's NCSC sits within the Government Communications Security Bureau (GCSB) spy agency.

It told RNZ that as frontier models improve, "they will change the cyber threat landscape for organisations because of the ability for malicious actors to find and exploit vulnerabilities at unprecedented speed and scale".

Its UK counterpart - also known as the National Cyber Security Centre - told organisations there to prepare for a "vulnerability patch wave".

"Organisations must act now to prepare for a wave of patches that will address decades of technical debt," it said, warning that AI was "showing the ability to exploit this technical debt at scale and at pace across the technology ecosystem. As a result, the NCSC [UK] expect there will be a 'forced correction' to address this technical debt across all types of software, including open source, commercial, proprietary and software as a service."

Anthropic said the big threats existed in this patch-up transition phase, and that long-term advanced models would benefit defenders more.

New Zealand's NCSC echoed that, saying in the medium to long term, frontier AI "offers the promise of more secure software code from the outset and a better software development lifecycle."

It added it was engaged with critical infrastructure providers, tech firms and international government partners to drive resilience and preparedness, and had several times put out guidance.

In summary, the advice to organisations is to:

  • Patch frequently
  • Reduce the "attack surface" and apply defence in depth
  • Review the vulnerability management policies of software and system supply chains.
  • Frequently monitor for potential compromise.

"These are all standard practices, but organisations need to do them more quickly and more consistently," the NCSC said.

The 'patch wave' would not be business as usual.

"As a result of frontier AI products we anticipate organisations need to prepare for a significant increase in vulnerabilities and incidents. We've already started delivering advice to help organisations prepare."

Sign up for Ngā Pitopito Kōrero, a daily newsletter curated by our editors and delivered straight to your inbox every weekday.