{"users":[{"id":2,"username":"robinhood1995","name":"slingblade","avatar_template":"/letter_avatar_proxy/v4/letter/r/48db29/{size}.png","admin":true,"moderator":true,"trust_level":1}],"primary_groups":[],"flair_groups":[],"topic_list":{"can_create_topic":false,"more_topics_url":"/c/rss/70?page=1","per_page":30,"top_tags":[],"topics":[{"fancy_title":"About the RSS category","fancy_title_localized":false,"locale":null,"id":21560,"title":"About the RSS category","slug":"about-the-rss-category","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2025-12-18T23:39:13.018Z","last_posted_at":"2025-12-18T23:39:13.056Z","bumped":true,"bumped_at":"2025-12-18T23:39:13.018Z","archetype":"regular","unseen":false,"pinned":true,"unpinned":null,"excerpt":"This category and its sub categories are from RSS pulls that most of the members use on a daily basis.","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":1,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":70,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)","fancy_title_localized":false,"locale":null,"id":23057,"title":"Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)","slug":"shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-08T12:16:13.797Z","last_posted_at":"2026-04-08T12:16:13.885Z","bumped":true,"bumped_at":"2026-04-08T12:16:13.885Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":52,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"The Claude Code source code leak: Takeaways for cybersecurity pros","fancy_title_localized":false,"locale":null,"id":23056,"title":"The Claude Code source code leak: Takeaways for cybersecurity pros","slug":"the-claude-code-source-code-leak-takeaways-for-cybersecurity-pros","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-08T10:40:51.595Z","last_posted_at":"2026-04-08T10:40:51.906Z","bumped":true,"bumped_at":"2026-04-08T10:40:51.906Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":58,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Anthropic&rsquo;s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems","fancy_title_localized":false,"locale":null,"id":23055,"title":"Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems","slug":"anthropics-claude-mythos-finds-thousands-of-zero-day-flaws-across-major-systems","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-08T10:40:50.768Z","last_posted_at":"2026-04-08T10:40:51.066Z","bumped":true,"bumped_at":"2026-04-08T10:40:51.066Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":52,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Microsoft rolls out fix for broken Windows Start Menu search","fancy_title_localized":false,"locale":null,"id":23054,"title":"Microsoft rolls out fix for broken Windows Start Menu search","slug":"microsoft-rolls-out-fix-for-broken-windows-start-menu-search","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-08T09:10:49.934Z","last_posted_at":"2026-04-08T09:10:50.004Z","bumped":true,"bumped_at":"2026-04-08T09:10:50.004Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":71,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab","fancy_title_localized":false,"locale":null,"id":23053,"title":"Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab","slug":"germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":"//forums.thehomestack.io/uploads/default/original/1X/81a48ee5f6f21d1ad3ab9b6829c9e58ca19d3ac8.jpeg","created_at":"2026-04-08T09:10:40.520Z","last_posted_at":"2026-04-08T09:10:40.582Z","bumped":true,"bumped_at":"2026-04-08T09:10:40.582Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":50,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Russia Hacked Routers to Steal Microsoft Office Tokens","fancy_title_localized":false,"locale":null,"id":23052,"title":"Russia Hacked Routers to Steal Microsoft Office Tokens","slug":"russia-hacked-routers-to-steal-microsoft-office-tokens","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":"//forums.thehomestack.io/uploads/default/original/1X/786c2caa26a0d894291c605d339fbe30ab2aee97.jpeg","created_at":"2026-04-08T09:10:40.207Z","last_posted_at":"2026-04-08T09:10:40.350Z","bumped":true,"bumped_at":"2026-04-08T09:10:40.350Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":50,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs","fancy_title_localized":false,"locale":null,"id":23051,"title":"Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs","slug":"iran-linked-hackers-disrupt-u-s-critical-infrastructure-by-targeting-internet-exposed-plcs","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-08T08:36:06.855Z","last_posted_at":"2026-04-08T08:36:06.955Z","bumped":true,"bumped_at":"2026-04-08T08:36:06.955Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":52,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust","fancy_title_localized":false,"locale":null,"id":23050,"title":"N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust","slug":"n-korean-hackers-spread-1-700-malicious-packages-across-npm-pypi-go-rust","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-08T08:36:06.605Z","last_posted_at":"2026-04-08T08:36:06.706Z","bumped":true,"bumped_at":"2026-04-08T08:36:06.706Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":52,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"FBI: Americans lost a record $21 billion to cybercrime last year","fancy_title_localized":false,"locale":null,"id":23049,"title":"FBI: Americans lost a record $21 billion to cybercrime last year","slug":"fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-08T02:25:15.627Z","last_posted_at":"2026-04-08T02:25:15.745Z","bumped":true,"bumped_at":"2026-04-08T02:25:15.745Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":71,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Hackers exploit critical flaw in Ninja Forms WordPress plugin","fancy_title_localized":false,"locale":null,"id":23048,"title":"Hackers exploit critical flaw in Ninja Forms WordPress plugin","slug":"hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-08T02:25:15.371Z","last_posted_at":"2026-04-08T02:25:15.468Z","bumped":true,"bumped_at":"2026-04-08T02:25:15.468Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":71,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Snowflake customers hit in data theft attacks after SaaS integrator breach","fancy_title_localized":false,"locale":null,"id":23047,"title":"Snowflake customers hit in data theft attacks after SaaS integrator breach","slug":"snowflake-customers-hit-in-data-theft-attacks-after-saas-integrator-breach","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-07T20:09:35.196Z","last_posted_at":"2026-04-07T20:09:35.287Z","bumped":true,"bumped_at":"2026-04-07T20:09:35.287Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":71,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Max severity Flowise RCE vulnerability now exploited in attacks","fancy_title_localized":false,"locale":null,"id":23046,"title":"Max severity Flowise RCE vulnerability now exploited in attacks","slug":"max-severity-flowise-rce-vulnerability-now-exploited-in-attacks","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-07T19:08:47.166Z","last_posted_at":"2026-04-07T19:08:47.238Z","bumped":true,"bumped_at":"2026-04-07T19:08:47.238Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":71,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"US warns of Iranian hackers targeting critical infrastructure","fancy_title_localized":false,"locale":null,"id":23045,"title":"US warns of Iranian hackers targeting critical infrastructure","slug":"us-warns-of-iranian-hackers-targeting-critical-infrastructure","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-07T19:08:46.915Z","last_posted_at":"2026-04-07T19:08:47.001Z","bumped":true,"bumped_at":"2026-04-07T19:08:47.001Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":71,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign","fancy_title_localized":false,"locale":null,"id":23044,"title":"Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign","slug":"russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-07T18:04:21.587Z","last_posted_at":"2026-04-07T18:04:21.666Z","bumped":true,"bumped_at":"2026-04-07T18:04:21.666Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":52,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins","fancy_title_localized":false,"locale":null,"id":23043,"title":"Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins","slug":"authorities-disrupt-router-dns-hijacks-used-to-steal-microsoft-365-logins","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-07T15:59:44.392Z","last_posted_at":"2026-04-07T15:59:44.465Z","bumped":true,"bumped_at":"2026-04-07T15:59:44.465Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":71,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access","fancy_title_localized":false,"locale":null,"id":23042,"title":"Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access","slug":"docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-07T15:59:39.753Z","last_posted_at":"2026-04-07T15:59:39.841Z","bumped":true,"bumped_at":"2026-04-07T15:59:39.841Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":52,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Why Your Automated Pentesting Tool Just Hit a Wall","fancy_title_localized":false,"locale":null,"id":23041,"title":"Why Your Automated Pentesting Tool Just Hit a Wall","slug":"why-your-automated-pentesting-tool-just-hit-a-wall","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-07T14:59:18.486Z","last_posted_at":"2026-04-07T14:59:18.580Z","bumped":true,"bumped_at":"2026-04-07T14:59:18.580Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":71,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"How to Get Started with Raspberry Pi (Complete Beginner&rsquo;s Guide)","fancy_title_localized":false,"locale":null,"id":23040,"title":"How to Get Started with Raspberry Pi (Complete Beginner's Guide)","slug":"how-to-get-started-with-raspberry-pi-complete-beginners-guide","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":"//forums.thehomestack.io/uploads/default/original/1X/e68f6a6f1749add334154df5afddbf1285422ca9.jpeg","created_at":"2026-04-07T14:29:17.089Z","last_posted_at":"2026-04-07T14:29:17.172Z","bumped":true,"bumped_at":"2026-04-07T14:29:17.172Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":61,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"The Hidden Cost of Recurring Credential Incidents","fancy_title_localized":false,"locale":null,"id":23039,"title":"The Hidden Cost of Recurring Credential Incidents","slug":"the-hidden-cost-of-recurring-credential-incidents","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-07T13:59:05.060Z","last_posted_at":"2026-04-07T13:59:05.124Z","bumped":true,"bumped_at":"2026-04-07T13:59:05.124Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":52,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk","fancy_title_localized":false,"locale":null,"id":23038,"title":"[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk","slug":"webinar-how-to-close-identity-gaps-in-2026-before-ai-exploits-enterprise-risk","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-07T13:59:04.873Z","last_posted_at":"2026-04-07T13:59:04.933Z","bumped":true,"bumped_at":"2026-04-07T13:59:04.933Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":52,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign","fancy_title_localized":false,"locale":null,"id":23037,"title":"Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign","slug":"over-1-000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-07T13:59:04.671Z","last_posted_at":"2026-04-07T13:59:04.747Z","bumped":true,"bumped_at":"2026-04-07T13:59:04.747Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":52,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Code Risk Intelligence: Securing AI Coding at Scale in Real Time","fancy_title_localized":false,"locale":null,"id":23036,"title":"Code Risk Intelligence: Securing AI Coding at Scale in Real Time","slug":"code-risk-intelligence-securing-ai-coding-at-scale-in-real-time","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":"//forums.thehomestack.io/uploads/default/original/1X/9b9221edf8ebca17fc2be89f94e38de4cf069898.jpeg","created_at":"2026-04-07T11:49:55.614Z","last_posted_at":"2026-04-07T11:49:55.821Z","bumped":true,"bumped_at":"2026-04-07T11:49:55.821Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":58,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips","fancy_title_localized":false,"locale":null,"id":23035,"title":"New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips","slug":"new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-07T10:05:25.455Z","last_posted_at":"2026-04-07T10:05:25.544Z","bumped":true,"bumped_at":"2026-04-07T10:05:25.544Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":52,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware","fancy_title_localized":false,"locale":null,"id":23034,"title":"China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware","slug":"china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-07T07:55:36.753Z","last_posted_at":"2026-04-07T07:55:36.950Z","bumped":true,"bumped_at":"2026-04-07T07:55:36.950Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":52,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed","fancy_title_localized":false,"locale":null,"id":23033,"title":"Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed","slug":"flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12-000-instances-exposed","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-07T07:21:18.631Z","last_posted_at":"2026-04-07T07:21:18.765Z","bumped":true,"bumped_at":"2026-04-07T07:21:18.765Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":52,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"New GPUBreach attack enables system takeover via GPU rowhammer","fancy_title_localized":false,"locale":null,"id":23032,"title":"New GPUBreach attack enables system takeover via GPU rowhammer","slug":"new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-07T01:05:34.947Z","last_posted_at":"2026-04-07T01:05:35.033Z","bumped":true,"bumped_at":"2026-04-07T01:05:35.033Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":71,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"German authorities identify REvil and GandCrab ransomware bosses","fancy_title_localized":false,"locale":null,"id":23031,"title":"German authorities identify REvil and GandCrab ransomware bosses","slug":"german-authorities-identify-revil-and-gandcrab-ransomware-bosses","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-07T01:05:34.664Z","last_posted_at":"2026-04-07T01:05:34.752Z","bumped":true,"bumped_at":"2026-04-07T01:05:34.752Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":71,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Why your NEW computer is SLOWER than your OLD computer! By a Retired Microsoft Engineer","fancy_title_localized":false,"locale":null,"id":23030,"title":"Why your NEW computer is SLOWER than your OLD computer! By a Retired Microsoft Engineer","slug":"why-your-new-computer-is-slower-than-your-old-computer-by-a-retired-microsoft-engineer","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":"//forums.thehomestack.io/uploads/default/original/1X/402325f7906b82c194163832bec8b6b2df008d8c.jpeg","created_at":"2026-04-06T23:00:13.878Z","last_posted_at":"2026-04-06T23:00:14.082Z","bumped":true,"bumped_at":"2026-04-06T23:00:14.082Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":57,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Microsoft links Medusa ransomware affiliate to zero-day attacks","fancy_title_localized":false,"locale":null,"id":23029,"title":"Microsoft links Medusa ransomware affiliate to zero-day attacks","slug":"microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":null,"created_at":"2026-04-06T20:25:48.721Z","last_posted_at":"2026-04-06T20:25:48.807Z","bumped":true,"bumped_at":"2026-04-06T20:25:48.807Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":0,"like_count":0,"has_summary":false,"last_poster_username":"robinhood1995","category_id":71,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]}]}}