Hacker News new | comments | show | ask | jobs | submit | from login
What are botnets downloading? (securelist.com)
1 point by charlysl 42 days ago | past | web
Satellite Turla: APT Command and Control in the Sky (2015) (securelist.com)
1 point by auslander 73 days ago | past | web
Calisto Trojan for macOS: the first member of the Proton malware family? (securelist.com)
1 point by ckdiii 89 days ago | past | web
Operation Parliament, who is doing what? (securelist.com)
1 point by kushti 6 months ago | past | web
Potent malware that hid for six years spread through routers (securelist.com)
203 points by jonbaer 7 months ago | past | web | 63 comments
Somebody’s watching When cameras are more than just ‘smart’ (securelist.com)
1 point by ge0rg 7 months ago | past | web
How to break a smart home, again (securelist.com)
108 points by kushti 7 months ago | past | web | 75 comments
[flagged] Telegram Remote Code Execution Zero-Day Vulnerability (securelist.com)
43 points by geektips 8 months ago | past | web | 16 comments
How not to use a driver to execute code with kernel privileges (securelist.com)
3 points by DiabloD3 8 months ago | past | web
Newly discovered Android malware contains never-seen surveillance features (securelist.com)
1 point by thg 8 months ago | past | web
Skygofree: Following in the footsteps of HackingTeam (securelist.com)
1 point by DiabloD3 8 months ago | past | web
Skygofree: Following in the footsteps of HackingTeam (securelist.com)
4 points by r3bl 9 months ago | past | web
Android commercial spyware (2017) (securelist.com)
1 point by detaro 9 months ago | past | web
Silence – a new Trojan attacking financial organizations (securelist.com)
2 points by beefhash 11 months ago | past | web
When fourth-party collection becomes attribution hell [pdf] (securelist.com)
22 points by nkurz on Oct 16, 2017 | past | web | 2 comments
Absolute Computrace Revisited (2014) (securelist.com)
1 point by platinumrad on Oct 10, 2017 | past | web
When fourth-party collection becomes attribution hell [pdf] (securelist.com)
1 point by nkurz on Oct 5, 2017 | past | web
An (un)documented [Microsoft] Word feature abused by attackers (securelist.com)
2 points by pferde on Sept 19, 2017 | past | web
Why Economic Incentive May Lead to the Failure of Bitcoin (securelist.com)
3 points by kushti on Sept 7, 2017 | past | web
Introducing WhiteBear (securelist.com)
31 points by sandmansandine on Aug 30, 2017 | past | web | 2 comments
ShadowPad in corporate networks (securelist.com)
1 point by andreasley on Aug 17, 2017 | past | web
ShadowPad in corporate networks (securelist.com)
1 point by daenney on Aug 16, 2017 | past | web
ExPetr/Petya/NotPetya Is a Wiper, Not Ransomware (securelist.com)
2 points by dpflan on June 29, 2017 | past | web
WannaCry mistakes that can help you restore files after infection (securelist.com)
1 point by dsr12 on June 2, 2017 | past | web
WannaCry and Lazarus Group (securelist.com)
1 point by mzs on May 16, 2017 | past | web
WannaCry and Lazarus Group – the missing link? (securelist.com)
4 points by doener on May 15, 2017 | past | web
WannaCry ransomware used in widespread attacks all over the world (securelist.com)
5 points by sajal83 on May 12, 2017 | past | web
Lazarus Under the Hood (securelist.com)
2 points by yammesicka on Apr 5, 2017 | past | web
Fileless attacks against enterprise networks (securelist.com)
1 point by spaceboy on Feb 11, 2017 | past | web
Fileless attacks against enterprise networks (securelist.com)
1 point by ghosh on Feb 10, 2017 | past | web
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: