Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
twox2
on Nov 17, 2020
|
parent
|
context
|
favorite
| on:
Twitter names famed hacker 'Mudge' as head of secu...
At the end of the day most compromises that aren't state sponsored happen using low-tech methods like sim-swapping and spear phishing.
bawolff
on Nov 17, 2020
[–]
Honestly, that's the high tech end of what happens.
Most compromises are credential stuffing.
twox2
on Nov 18, 2020
|
parent
[–]
Yeah, for sure. It's bizarre that it's not standard practice to just blocklist previously used credentials from already documented leaks.
Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: