Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
How a legitimate Windows driver is being used to take down antivirus processes (securelist.com)
3 points by msephton 33 days ago | past
Code highlighting extension for Cursor AI used for $500k theft (securelist.com)
182 points by Daviey 88 days ago | past | 155 comments
Code highlighting with Cursor AI for $500k (securelist.com)
12 points by ivanjermakov 89 days ago | past | 2 comments
$500K stolen via fake AI coding extension (securelist.com)
20 points by handfuloflight 3 months ago | past | 2 comments
Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain (securelist.com)
5 points by campuscodi 6 months ago | past
The GitVenom campaign: cryptocurrency theft using GitHub (securelist.com)
14 points by miohtama 7 months ago | past | 4 comments
OCR Crypto Stealers in Google Play and App Store (securelist.com)
35 points by shifty1 8 months ago | past | 5 comments
SparkCat Crypto Stealer in Google Play and App Store (securelist.com)
2 points by janandonly 8 months ago | past
Meet the GoldenJackal Advanced Persistent Threat (APT) Group (securelist.com)
2 points by teleforce 12 months ago | past
EastWind campaign: CloudSorcerer attacks on government organizations in Russia (securelist.com)
1 point by croes on Aug 16, 2024 | past
XZ backdoor part 3: Hook analysis (securelist.com)
2 points by strunz on July 3, 2024 | past
XZ backdoor: Hook analysis (securelist.com)
11 points by skilled on June 24, 2024 | past
Analysis of User Password Strength (securelist.com)
2 points by doener on June 21, 2024 | past
Analysis of User Password Strength (securelist.com)
1 point by mikece on June 18, 2024 | past
Bypassing 2FA with phishing and OTP bots (securelist.com)
1 point by skilled on June 11, 2024 | past
Analyzing the security properties of a ZKTeco biometric terminal (securelist.com)
2 points by skilled on June 11, 2024 | past
ShrinkLocker: Turning BitLocker into Ransomware (securelist.com)
1 point by parvenu74 on May 23, 2024 | past
Assessing the Y, and How, of the XZ Utils incident (securelist.com)
2 points by netol on April 24, 2024 | past
SoumniBot: The new Android banker's unique techniques (securelist.com)
2 points by dirtyhippiefree on April 18, 2024 | past
Top web application vulnerabilities in 2021–2023 (securelist.com)
1 point by baalimago on April 16, 2024 | past
XZ backdoor story – Initial analysis (securelist.com)
406 points by kryster on April 12, 2024 | past | 250 comments
Android malware, Android malware and more Android malware (securelist.com)
21 points by mikece on March 20, 2024 | past | 2 comments
Network Tunneling with QEMU (securelist.com)
187 points by rrampage on March 6, 2024 | past | 27 comments
An educational robot security research (securelist.com)
1 point by mikece on Feb 27, 2024 | past
Operation Triangulation: What you get when attack iPhones of researchers (securelist.com)
549 points by ruik on Dec 27, 2023 | past | 399 comments
How to catch a wild triangle (securelist.com)
142 points by mmastrac on Oct 27, 2023 | past | 43 comments
The outstanding stealth of Operation Triangulation (securelist.com)
2 points by nceqs3 on Oct 24, 2023 | past
Free Download Manager backdoored – a possible supply chain attack on Linux (securelist.com)
152 points by donutshop on Sept 12, 2023 | past | 127 comments
Spyware Telegram Mod Distributed via Google Play – Securelist (securelist.com)
1 point by janandonly on Sept 8, 2023 | past | 1 comment
Comprehensive analysis of attack samples exploiting CVE-2023-23397 vulnerability (securelist.com)
2 points by mikece on July 19, 2023 | past

Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: