Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
Foundations of Metrology (1981) [pdf]
(
nist.gov
)
3 points
by
nill0
1 day ago
|
past
|
discuss
CVE-2025-55182: pre-auth remote code execution in React Server Components
(
nist.gov
)
5 points
by
janandonly
6 days ago
|
past
|
discuss
What Time Is It on Mars? NIST Physicists Have the Answer
(
nist.gov
)
3 points
by
geox
7 days ago
|
past
|
1 comment
CVE-2025-66021: in OWASP Java HTML Sanitizer
(
nist.gov
)
1 point
by
malviyamukul
14 days ago
|
past
|
1 comment
Notepad++ Flagged in National Vulnerability Database
(
nist.gov
)
2 points
by
carodgers
14 days ago
|
past
|
1 comment
Cryptographic Standards and Guidelines
(
nist.gov
)
2 points
by
jonbaer
19 days ago
|
past
Radical CS (2023) [pdf]
(
nist.gov
)
5 points
by
zdw
20 days ago
|
past
NIST Randomness Beacon Shut Down
(
nist.gov
)
7 points
by
ireflect
29 days ago
|
past
|
1 comment
ASP.NET Security Feature Bypass Vulnerability
(
nist.gov
)
92 points
by
zeraye
56 days ago
|
past
|
55 comments
Caisi (NIST) Evaluation of DeepSeek AI Models Finds Shortcomings and Risks
(
nist.gov
)
5 points
by
tomrod
70 days ago
|
past
Transition to Post-Quantum Cryptography Standards [pdf]
(
nist.gov
)
2 points
by
mooreds
88 days ago
|
past
NIST Revises Security & Privacy Control Catalog for Software Updates & Patches
(
nist.gov
)
3 points
by
StatsAreFun
3 months ago
|
past
CVE-2025-43300: "an sophisticated attack against specific individuals"
(
nist.gov
)
5 points
by
qrush
3 months ago
|
past
|
1 comment
CVE-2025-8901: OOB write in Chrome
(
nist.gov
)
3 points
by
larkinrichards
3 months ago
|
past
NIST Guidelines Can Help Orgs Detect Face Photo Morphs, Deter Identity Fraud
(
nist.gov
)
1 point
by
rbanffy
3 months ago
|
past
CVE-2025-54313: ESLint-config-prettier has embedded malicious code
(
nist.gov
)
4 points
by
motorest
3 months ago
|
past
NIST Finalizes 'Lightweight Cryptography' Standard to Protect Small Devices
(
nist.gov
)
173 points
by
gnabgib
3 months ago
|
past
|
121 comments
Updated Digital Identity Guidelines are Here (NIST 800-63 Revision 4)
(
nist.gov
)
4 points
by
DASD
4 months ago
|
past
Reducing the Cybersecurity Risks of Portable Storage Media in OT Environments [pdf]
(
nist.gov
)
1 point
by
gnabgib
4 months ago
|
past
NIST ion clock sets new record for most accurate clock
(
nist.gov
)
352 points
by
voxadam
4 months ago
|
past
|
120 comments
Phil Rogaway on Computer Science
(
nist.gov
)
2 points
by
fanf2
4 months ago
|
past
Legal Metrology Meets the Digital Age
(
nist.gov
)
3 points
by
gnabgib
5 months ago
|
past
Google Chrome: Critical Security Allowed Attackers Access Using Crafter HTML
(
nist.gov
)
2 points
by
nitinreddy88
5 months ago
|
past
Practical Combinatorial Testing
(
nist.gov
)
2 points
by
TheHideout
5 months ago
|
past
PBKDF2 JS Lib: Improper Input Validation Vulnerability
(
nist.gov
)
5 points
by
wslh
5 months ago
|
past
|
1 comment
Role-Based Access Controls (1992) [pdf]
(
nist.gov
)
2 points
by
mooreds
6 months ago
|
past
Potential RCE via V8 Heap Corruption in Chrome (CVE-2025-5419)
(
nist.gov
)
2 points
by
ghgr
6 months ago
|
past
CVE-2025-4143
(
nist.gov
)
4 points
by
terabytest
6 months ago
|
past
|
1 comment
Exploited Vulnerabilities: A Proposed Metric for Vulnerability Exploitation
(
nist.gov
)
1 point
by
furkansahin
6 months ago
|
past
|
1 comment
NIST Special Publication 800-63: Digital Identity Guidelines Public Comments
(
nist.gov
)
2 points
by
mooreds
6 months ago
|
past
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: