1. | | Hunting for Malicious Packages on PyPI (jordan-wright.com) |
|
4 points by jwcrux on Nov 12, 2020 | past
|
2. | | Data Companies Are Watching Me (duo.com) |
|
1 point by jwcrux on July 9, 2020 | past
|
3. | | Protecting Accounts from Credential Stuffing (duo.com) |
|
1 point by jwcrux on March 10, 2020 | past
|
4. | | An Introduction to the Noise Protocol Framework (duo.com) |
|
2 points by jwcrux on March 6, 2020 | past
|
5. | | How to Monitor GitHub for Secrets (duo.com) |
|
1 point by jwcrux on Sept 25, 2019 | past
|
6. | | How Security Keys Store Credentials (duo.com) |
|
3 points by jwcrux on July 16, 2019 | past | 1 comment
|
7. | | Detecting Phishing with SPF Macros (duo.com) |
|
1 point by jwcrux on July 16, 2019 | past
|
8. | | Building Web Servers in Go (getgophish.com) |
|
5 points by jwcrux on Dec 2, 2018 | past
|
9. | | Anatomy of Twitter Bots: Fake Followers (duo.com) |
|
1 point by jwcrux on Oct 23, 2018 | past
|
10. | | Hunting Twitter Bots at Scale (duo.com) |
|
2 points by jwcrux on Aug 15, 2018 | past
|
11. | | Show HN: Purl – Command Line URL Parser (github.com/jordan-wright) |
|
1 point by jwcrux on June 30, 2018 | past | 1 comment
|
12. | | Hunting and Analyzing Phishing Kits at Scale (duo.com) |
|
3 points by jwcrux on Oct 31, 2017 | past
|
13. | | The Realities of Being a FOSS Maintainer (caddy.community) |
|
215 points by jwcrux on Sept 16, 2017 | past | 120 comments
|
14. | | Hunting Malicious npm Packages (duo.com) |
|
2 points by jwcrux on Aug 13, 2017 | past
|
15. | | Hunting for Malicious npm Packages (duo.com) |
|
2 points by jwcrux on Aug 8, 2017 | past
|
16. | | Driving Headless Chrome with Python (duo.com) |
|
1 point by jwcrux on May 23, 2017 | past
|
17. | | Why the MongoDB Ransomware Shouldn't Surprise Anyone (duo.com) |
|
1 point by jwcrux on Jan 16, 2017 | past
|
18. | | Memcached Vulnerable to Remote Code Execution (talosintel.com) |
|
2 points by jwcrux on Nov 1, 2016 | past
|
19. | | The Science of Duo in Space: Part One (duo.com) |
|
1 point by jwcrux on Oct 25, 2016 | past
|
20. | | Redis Instances Are Being Targeted by Fake Ransomware (duo.com) |
|
1 point by jwcrux on Sept 6, 2016 | past
|
21. | | Over 18,000 Redis Instances Targeted by Fake Ransomware (duo.com) |
|
8 points by jwcrux on Aug 31, 2016 | past
|
22. | | LastPass Security Updates (lastpass.com) |
|
2 points by jwcrux on July 28, 2016 | past
|
23. | | Breaking PHP’s Garbage Collection and Unserialize (evonide.com) |
|
3 points by jwcrux on July 25, 2016 | past | 1 comment
|
24. | | Show HN: Insight – A Simple, Completely Free Phishing Assessment (duo.com) |
|
12 points by jwcrux on July 12, 2016 | past | 2 comments
|
25. | | How to Keep Calm and Mitigate a 470 Gbps DDoS Attack (incapsula.com) |
|
1 point by jwcrux on July 1, 2016 | past
|
26. | | Analyzing 4.3M Police Call Records (jordan-wright.com) |
|
1 point by jwcrux on June 23, 2016 | past
|
27. | | Analyzing 5 Years of Police Call Data (jordan-wright.com) |
|
4 points by jwcrux on June 22, 2016 | past
|
28. | | How the Top 5 OEMs Open Your Laptop to Hackers (wired.com) |
|
1 point by jwcrux on May 31, 2016 | past
|
29. | | The Full Story Behind Bloomberg's Attempt to “Unmask” Zero Hedge (zerohedge.com) |
|
2 points by jwcrux on April 29, 2016 | past
|
30. | | “Badlock” Details Have Been Released (badlock.org) |
|
1 point by jwcrux on April 12, 2016 | past
|
|
|
More |