Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Octopus-Rex. Evolution of a multi task Botnet (thisissecurity.net)
2 points by benkow_ on Oct 28, 2016 | past
Heap based overflow exploitation use case – The macabre dance of memory chunks (thisissecurity.net)
2 points by benkow_ on Sept 19, 2016 | past
From website-locker to DDoS: Rex (thisissecurity.net)
1 point by benkow_ on Aug 17, 2016 | past
Gamarue loves malicious JavaScript too – A deep look inside a recent campaign (thisissecurity.net)
10 points by benkow_ on April 12, 2016 | past
Let’s ride with TeslaCrypt (thisissecurity.net)
2 points by mtalbi on March 2, 2016 | past
Hackers do the Haka – Advanced packet and stream manipulation language (thisissecurity.net)
92 points by mtalbi on Nov 24, 2015 | past | 11 comments
Why we can execute JavaScript through Rundll32 (thisissecurity.net)
9 points by fla on Aug 21, 2014 | past | 1 comment

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: