Hacker News new | past | comments | ask | show | jobs | submit | from login
Operation CuckooBees: Deep-Dive into Stealthy Winnti Techniques (cybereason.com)
1 point by gman83 on May 5, 2022 | past
Cybereason Uncovers Chinese Intellectual Property Theft Operation (cybereason.com)
7 points by JeanMarcS on May 4, 2022 | past
Operation Bearded Barbie: Cyber Espionage Campaign Targeting Israeli Officials (cybereason.com)
2 points by happyopossum on April 6, 2022 | past
Three Chinese Threat Actors Targeting Major Telcos (cybereason.com)
3 points by happyopossum on Aug 3, 2021 | past
REvil/Sodinokibi: The Crown Prince of Ransomware (2019) (cybereason.com)
1 point by genidoi on July 4, 2021 | past
Background on Darkside – the group behind the pipeline ransomware attack (cybereason.com)
3 points by happyopossum on May 10, 2021 | past
Is Cyber Retaliation from Iran Imminent? (cybereason.com)
1 point by alexandreamel on Jan 3, 2020 | past
Prevent Cyberstalking Live Stream W Expert Panel (cybereason.com)
1 point by hackerxbella on Sept 24, 2019 | past
The Newest Variant of the Astaroth Trojan Evades Detection in the Sneakiest Way (cybereason.com)
2 points by ericdanielski on July 10, 2019 | past
Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers (cybereason.com)
1 point by mzs on June 25, 2019 | past | 1 comment
3.5M servers vulnerable to latest attack – patch your exim servers now (cybereason.com)
1 point by hackerxbella on June 13, 2019 | past
EXCEL4.0 Macros – Now with Twice the Bits (cybereason.com)
1 point by hackerxbella on May 15, 2019 | past
TA505 Targets Financial Enterprises Using Lolbins and a New Backdoor Malware (cybereason.com)
2 points by vuln on April 25, 2019 | past
No WIN32_Process Needed – Expanding the WMI Lateral Movement Arsenal (cybereason.com)
1 point by vuln on May 10, 2018 | past
North Korea Is Unlikely to Be Behind the WannaCry Attack (cybereason.com)
4 points by rafaelc on Dec 22, 2017 | past
OSX.Pirrit Mac Adware Part III: The DaVinci Code (cybereason.com)
110 points by EliadEliad on Dec 13, 2017 | past | 23 comments
OS X.Pirrit Mac Adware Part III: The DaVinci Code (cybereason.com)
3 points by DyslexicAtheist on Dec 12, 2017 | past
Siofra, partly-open source tool for scanning all DLLs for hijacking vulns (cybereason.com)
2 points by EliadEliad on Oct 6, 2017 | past
Operation Cobalt Kitty: Analysis of a Large-Scale OceanLotus APT in Asia (cybereason.com)
2 points by EliadEliad on May 24, 2017 | past
Proton.B: What this Mac malware does (cybereason.com)
170 points by open-source-ux on May 13, 2017 | past | 87 comments
OS X.Pirrit the Minds Behind the Malicious Mac Adware (cybereason.com)
2 points by jonespen on July 6, 2016 | past
A New Persistent Attack Methodology Targeting Microsoft OWA (cybereason.com)
2 points by frozenice on Oct 7, 2015 | past | 1 comment
Hacking Team Leak Unleashes Flame-Like Capabilities into the Wild (cybereason.com)
3 points by escapologybb on July 10, 2015 | past

Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: