Hacker News new | past | comments | ask | show | jobs | submit | from login
EastWind campaign: CloudSorcerer attacks on government organizations in Russia (securelist.com)
1 point by croes 49 days ago | past
XZ backdoor part 3: Hook analysis (securelist.com)
2 points by strunz 3 months ago | past
XZ backdoor: Hook analysis (securelist.com)
11 points by skilled 3 months ago | past
Analysis of User Password Strength (securelist.com)
2 points by doener 3 months ago | past
Analysis of User Password Strength (securelist.com)
1 point by mikece 3 months ago | past
Bypassing 2FA with phishing and OTP bots (securelist.com)
1 point by skilled 3 months ago | past
Analyzing the security properties of a ZKTeco biometric terminal (securelist.com)
2 points by skilled 3 months ago | past
ShrinkLocker: Turning BitLocker into Ransomware (securelist.com)
1 point by parvenu74 4 months ago | past
Assessing the Y, and How, of the XZ Utils incident (securelist.com)
2 points by netol 5 months ago | past
SoumniBot: The new Android banker's unique techniques (securelist.com)
2 points by dirtyhippiefree 5 months ago | past
Top web application vulnerabilities in 2021–2023 (securelist.com)
1 point by baalimago 5 months ago | past
XZ backdoor story – Initial analysis (securelist.com)
406 points by kryster 5 months ago | past | 250 comments
Android malware, Android malware and more Android malware (securelist.com)
21 points by mikece 6 months ago | past | 2 comments
Network Tunneling with QEMU (securelist.com)
187 points by rrampage 7 months ago | past | 27 comments
An educational robot security research (securelist.com)
1 point by mikece 7 months ago | past
Operation Triangulation: What you get when attack iPhones of researchers (securelist.com)
549 points by ruik 9 months ago | past | 399 comments
How to catch a wild triangle (securelist.com)
142 points by mmastrac 11 months ago | past | 43 comments
The outstanding stealth of Operation Triangulation (securelist.com)
2 points by nceqs3 11 months ago | past
Free Download Manager backdoored – a possible supply chain attack on Linux (securelist.com)
152 points by donutshop on Sept 12, 2023 | past | 127 comments
Spyware Telegram Mod Distributed via Google Play – Securelist (securelist.com)
1 point by janandonly on Sept 8, 2023 | past | 1 comment
Comprehensive analysis of attack samples exploiting CVE-2023-23397 vulnerability (securelist.com)
2 points by mikece on July 19, 2023 | past
Dissecting TriangleDB, a Triangulation spyware implant (securelist.com)
1 point by techsolomon on June 22, 2023 | past
Operation Triangulation: iOS devices targeted with previously unknown malware (securelist.com)
1 point by jc_811 on June 2, 2023 | past
Operation Triangulation: iOS devices targeted with previously unknown malware (securelist.com)
150 points by fortran77 on June 1, 2023 | past | 31 comments
Bad magic: new APT found in the area of Russo-Ukrainian conflict (securelist.com)
2 points by unripe_syntax on March 21, 2023 | past | 2 comments
The mobile malware threat landscape in 2022 (securelist.com)
1 point by mikece on Feb 27, 2023 | past
Come to the dark side: hunting IT professionals on the dark web (securelist.com)
2 points by CKMo on Jan 31, 2023 | past
Come to the dark side: hunting IT professionals on the dark web (securelist.com)
3 points by dangle1 on Jan 30, 2023 | past
Privacy Predictions 2023 (securelist.com)
1 point by amalinovic on Nov 28, 2022 | past
Crimeware and Financial Cyberthreats in 2023 (securelist.com)
1 point by DocFeind on Nov 22, 2022 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: