Category: Blog

A project to test FreeBSD on laptops

The FreeBSD Foundation has launched a FreeBSD Laptop Testing Project, part of an initiative to improve laptop support and enhance the FreeBSD user experience. The project aims to gather information on FreeBSD compatibility with various hardware found in modern laptops, allowing for a realistic understanding of existing issues and identifying priority areas for improvement. […]

Release of miracle-wm 0.9, a compositing manager based on Wayland and Mir

Matthew Kosarek, a developer from Canonical, has released the miracle-wm 0.9 compositing manager, which uses the Wayland protocol and Mir compositing manager components. Miracle-wm supports tiling of windows, similar to the i3 and Sway projects. Waybar can be used as a panel. The project code is written in C++ and is distributed under the GPLv3 license. […]

For the first time in history, astronauts orbiting the Moon contacted the crew of the ISS orbiting Earth.

During the Apollo lunar flights, astronauts could only communicate with NASA Mission Control. But the Artemis II mission changed everything—for the first time, astronauts on board the spacecraft could communicate with someone outside of Mission Control. For the first time in history, the Orion crew directly contacted their colleagues on the ISS, including some acquaintances from […]

The Russian orbital station is expected to be fully operational by 2034.

At the "Team of the Future" forum held during Space Week 2026, Vladimir Kozhevnikov, the project's chief designer and deputy general designer at RSC Energia, announced that the full configuration of the Russian Orbital Station (ROS) would be completed in orbit by 2034. Earlier, in February 2026, First Deputy Prime Minister Denis Manturov announced that the ROS would begin deployment in 2028. According to him, […]

Microsoft blocked a VeraCrypt account without explanation, disrupting the release of updates for the popular Windows ransomware.

Microsoft has blocked an account associated with VeraCrypt, a popular and long-standing encryption software, casting doubt on future updates for Windows, according to VeraCrypt developer Mounir Idrassi. He claims he received no emails or prior warnings from Microsoft, and believes the company's support responses were generated by a neural network. The software […]

Microsoft has blocked accounts used to certify VeraCrypt and WireGuard releases.

The author of the VeraCrypt disk encryption system has warned users that Microsoft has blocked his account, which he uses to digitally sign VeraCrypt builds for Windows. This has made it impossible to publish a new release of VeraCrypt for Windows. Furthermore, the key used to sign the latest release of VeraCrypt 1.26.24 expires in June, after which the VeraCrypt driver will be blocked by the [unclear] mode.

The US-Iran ceasefire has sent Asian chipmakers' stocks soaring.

Until recently, major players in the Asian semiconductor industry urged their governments to prioritize building natural gas and helium reserves. Shipments of these raw materials through the Strait of Hormuz were suspended due to military action in the region, but a two-week ceasefire between the US and Iran raised hopes for an improvement in the industry, after which prices in Asia began to […]

Skoda has created a mechanical bicycle bell that can cut through active noise-cancelling headphones.

Urban environments require a variety of road users to coexist, and in recent years, pedestrians have become increasingly vulnerable to acoustic isolation from the outside world, thanks to headphones with active noise-cancelling technology. Skoda has developed a mechanical bicycle bell whose signal penetrates even such barriers. Skoda's history with bicycles is precisely tied to the bicycle industry, so the initiative to develop a unique […]

Anthropic announced Claude Mythos, an AI model capable of creating working exploits.

Anthropic announced the Glasswing project, which will provide access to a preliminary version of its Claude Mythos AI model for identifying vulnerabilities and improving the security of critical software. Project participants include the Linux Foundation, Amazon Web Services, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorganChase, Microsoft, NVIDIA, and Palo Alto Networks. Invitations to participate […]

A researcher leaked the code for a Windows exploit in response to Microsoft's inaction.

A security researcher has released the code for a zero-day exploit for Windows, dubbed BlueHammer. The drastic move stemmed from a dispute between the researcher and the Microsoft Security Response Center (MSRC) over how the information he provided was handled. The researcher, who goes by the pseudonym Chaotic Eclipse, posted the exploit code on GitHub on April 3. The author expressed disappointment with MSRC management's handling of the information he provided […]

Anthropic has opened limited access to the Claude Mythos Preview model, which autonomously searches for holes in software and has already found thousands of vulnerabilities.

Anthropic has opened limited access to its new AI model, Mythos, designed to find critical vulnerabilities and counter cyberthreats. The tool will be available only to select corporations, as its hacking capabilities have been deemed too dangerous for public release. According to The Wall Street Journal, a preliminary version of the neural network will be available to approximately 50 companies and organizations supporting critical IT infrastructure, including […]