Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

At the end of the day most compromises that aren't state sponsored happen using low-tech methods like sim-swapping and spear phishing.


Honestly, that's the high tech end of what happens.

Most compromises are credential stuffing.


Yeah, for sure. It's bizarre that it's not standard practice to just blocklist previously used credentials from already documented leaks.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: