Feed aggregator

US Sanctions Myanmar Militia Involved in Cyber Scams 

Security Week - Wed, 05/07/2025 - 8:14am

The US has sanctioned Myanmar warlord Saw Chit Thu and his militia for their roles in cyber scams causing billions in losses to American victims.

The post US Sanctions Myanmar Militia Involved in Cyber Scams  appeared first on SecurityWeek.

Categories: SecurityWeek

Show HN: Check how many trees you need to offset your carbon footprint

Hacker News - Wed, 05/07/2025 - 8:08am

Hi everyone!

Last year I posted about my environmental project, but then it didn’t get much attention here. Now, as we’ve made some progress and improved our website a bit using users’ feedback, there is an occasion to give it another chance!

This time I’d like to focus on the feature that allows you to check how many trees are really needed to be planted to offset one’s carbon footprint, based on emissions per capita. It includes trees’ survivability rate, as not every seedling will get a chance to mature. It is often an overlooked factor.

You can also start gradually planting a whole forest and track your impact by choosing your planting plan. As for planting, we restore broadleaf forests with environmental purposes and not industrial plantations.

Since last year, several municipalities have expressed interest in partnering with us, pledging enough land for over 10 million trees for our project, and there is a potential for much more! We’ve also got some subscribers from across the US and the EU. Now we are looking to bring in more people to plant with us, to make it happen in a reasonable timeframe, so I’d immensely appreciate if you decide to join and spread the word!

We’ll be also further developing our app and website.

Here is the link to my previous post: https://news.ycombinator.com/item?id=40284156

Comments URL: https://news.ycombinator.com/item?id=43914637

Points: 1

# Comments: 0

Categories: Hacker News

Ask HN: How do you manage client retainers? Built a tool, curious if useful

Hacker News - Wed, 05/07/2025 - 8:03am

I run an app agency, and over time we ran into a lot of pain managing client retainers.

We have 15+ clients on different setups (some hourly, some fixed monthly) and were juggling Slack, ClickUp, Toggl, Stripe, and email. It became a mess to track hours, assign tasks, and keep clients updated without spending way too much time on manual updates.

We ended up building an internal tool to handle retainer tracking, team assignments, and automated client updates. It saved us a lot of time and improved communication and built trust.

Now I’m wondering if this is just our problem or something others struggle with too.

Would love to hear: • How do you manage retainers or ongoing client work? • What’s been your biggest headache? • Have you found tools that work well, or are you hacking it together with multiple tools?

For context, I set up a public version at retainkit.io

Would love to hear your mind even if you are a freelancer!

Not trying to pitch, just curious if it’s useful beyond our agency.

Thanks!

Comments URL: https://news.ycombinator.com/item?id=43914597

Points: 1

# Comments: 1

Categories: Hacker News

Ask HN: Theory to industry: where do academics fit in?

Hacker News - Wed, 05/07/2025 - 8:02am

I'm a young researcher with a background in abstract physics and mathematics, specializing in areas like probability theory, spectral analysis, network theory, and statistical/quantum mechanics.

I'm considering transitioning to industry, but my coding experience is limited to basic Python. I’m concerned that, with a strong theoretical background but limited engineering skills, I might struggle to find a good fit. Additionally, with the tightening job market, the abundance of remote talent, and the rise of tools like Copilot, I’m wondering how these factors might impact my prospects.

For those who’ve made a similar transition—or who have hired people with this kind of background—how did it go? What roles or paths have worked best for you?

Comments URL: https://news.ycombinator.com/item?id=43914586

Points: 1

# Comments: 1

Categories: Hacker News

How can I get into Thiel fellowship?

Hacker News - Wed, 05/07/2025 - 8:01am

I really want to get into it, i know you don't get because you 'want'. but also, what you think is few of the defining things which highly impact getting you into it?

Comments URL: https://news.ycombinator.com/item?id=43914578

Points: 3

# Comments: 0

Categories: Hacker News

iPhone 16 Pro Long-Term: One Feature Stands Above All Others

CNET Feed - Wed, 05/07/2025 - 8:00am
Apple forged the iPhone 16 series to be the ultimate platform for Apple Intelligence. But over half a year later, the best iPhone 16 Pro features have little to do with AI.
Categories: CNET

Eyeo Color Splitters

Hacker News - Wed, 05/07/2025 - 8:00am

Article URL: https://eyeo-imaging.com/#tech

Comments URL: https://news.ycombinator.com/item?id=43914566

Points: 1

# Comments: 0

Categories: Hacker News

What You Need to Know About Satellite Connectivity in Phones

CNET Feed - Wed, 05/07/2025 - 8:00am
As carriers begin to unveil their own satellite plans, here's everything you need to know whether your phone supports satellite connectivity or is "satellite optimized."
Categories: CNET

CISA Adds Two Known Exploited Vulnerabilities to Catalog

US-Cert Current Activity - Wed, 05/07/2025 - 8:00am

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.

  • CVE-2024-6047 GeoVision Devices OS Command Injection Vulnerability
  • CVE-2024-11120 GeoVision Devices OS Command Injection Vulnerability

These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

Categories: US-CERT Feed

How to Pick the Best Weighted Vest to Torch More Calories During Your Workouts

CNET Feed - Wed, 05/07/2025 - 8:00am
Weighted vests may look like they’re a blast from the past, but their practicality is timeless.
Categories: CNET

Pages