-
19 votes
-
Here’s how to prevent (and recover from) a Facebook hack
5 votes -
Adventures of putting 16 GB of RAM in a motherboard that doesn’t support it
7 votes -
Winning the war on ransomware - The DOJ’s task force is changing the landscape around hackers, but will it be enough?
4 votes -
Hackers are spamming businesses’ receipt printers with ‘antiwork’ manifestos
13 votes -
Locked out of ‘god mode,’ runners are hacking their treadmills
18 votes -
How the world's first USB-C iPhone was born
10 votes -
After releasing full database of LGBTQ dating website, Black Shadow hackers leak medical records of 290,000 Israeli patients
9 votes -
New York Times journalist Ben Hubbard hacked with Pegasus after reporting on previous hacking attempts
8 votes -
Polygon (formerly known as Matic Network) dodges $850M hack, pays record $2M bounty
2 votes -
The entirety of Twitch has reportedly been leaked
42 votes -
Company that routes SMS for all major US carriers was hacked for five years
27 votes -
Introduction to Cross-Site Scripting (XSS)
4 votes -
Sophisticated exploits used to breach fully-patched iPhones of journalists, activists, as detailed by Amnesty International's Security Lab
24 votes -
Swedish Coop supermarkets shut due to US ransomware cyber-attack – the hack targeted Florida-based IT company Kaseya before spreading through corporate networks
8 votes -
Using John the Ripper To Crack Password Hashes
3 votes -
NewsBlur Mongo database deleted in ransom attack (and restored)
NewsBlur was down yesterday evening due to its Mongo database getting attacked by a hacker and held for ransom. It’s restored from backup, but there are privacy implications for anyone who had...
NewsBlur was down yesterday evening due to its Mongo database getting attacked by a hacker and held for ransom. It’s restored from backup, but there are privacy implications for anyone who had sensitive private data there. We will likely find out more after the maintainer recovers from a busy night.
There are no good links for this, but it’s being discussed on Hacker News. Since it’s open source, someone described what’s being kept in that database.
(I use NewsBlur, but I don’t think my RSS reading habits are all that sensitive. Others might be in a different situation, though.)
6 votes -
780GB of data, tools, and source code were stolen from EA by purchasing a stolen cookie to get access to the company's Slack and social-engineering an IT Support employee
21 votes -
Supreme Court reins in definition of crime under controversial hacking law
12 votes -
One-fifth of US beef capacity wiped out by JBS cyberattack
28 votes -
How China turned a prize-winning iPhone hack against the Uyghurs
11 votes -
They told their therapists everything. Hackers leaked it all.
15 votes -
$7.5B in stolen Bitcoin from 2016 Bitfinex hack has just been moved
@Mr. Whale: WTF! $7.5 Billion In Stolen #Bitcoin from the 2016 Bitfinex Hack has just been moved for the first time in 5 years. pic.twitter.com/WJJ3smY8dc
12 votes -
DDOS question/curiosity
Non-comp person here; is there a record for longest period of time a DDOS attack occurred on a website? Would it be possible to forcibly keep a site offline for an extended length of time with a...
Non-comp person here; is there a record for longest period of time a DDOS attack occurred on a website? Would it be possible to forcibly keep a site offline for an extended length of time with a continuous DDOS attack?
7 votes -
Hacktivism, leaktivism and the future
5 votes -
Hackers break into thousands of security cameras, exposing Tesla, jails, hospitals
16 votes -
At least 30,000 US organizations newly hacked via holes in Microsoft’s email software
19 votes -
Is building a folding iPhone possible? Let's take a closer look at these flexible amoled screens I found on AliExpress
5 votes -
DSP on the ESP32 With Faust
3 votes -
Hackers try to contaminate Florida town's water supply through computer breach
15 votes -
Hackers can trick a Tesla into accelerating by fifty miles per hour
17 votes -
Google Dorks Explained : How hackers get access to sensitive data using only Google search queries
7 votes -
How To Use Nmap: A Beginner’s Guide
4 votes -
Overthewire: Learn Hacking By Playing Games
9 votes -
SolarWinds: New findings from our investigation of SUNBURST
6 votes -
70TB of Parler users’ messages, videos, and posts leaked by security researchers
42 votes -
Ticketmaster admits it hacked rival company before it went out of business
17 votes -
How police are “breaking phone encryption”
21 votes -
VMware flaw a vector in SolarWinds breach?
7 votes -
Preliminary analysis of the SolarWinds Orion supply-chain nation-state attack
7 votes -
Dutch researcher claims that he accessed US President Donald Trump's Twitter account by guessing password
21 votes -
Microsoft says it found malicious software in its systems
7 votes -
US Treasury breached by hackers backed by foreign government
20 votes -
The 2020 SANS holiday hack challenge is live!
4 votes -
I hacked into my own car
7 votes -
Reverse engineering a forgotten 1970s Intel dual core beast: 8271, a new ISA
10 votes -
Company made to change name that could be used for XSS vulnerabilities
11 votes -
Why the extortion of Vastaamo matters far beyond Finland – and how cyber pros are responding
4 votes -
FBI, DHS, HHS warn of imminent, credible ransomware threat against US hospitals
13 votes -
Finland's interior minister summoned an emergency meeting after patient records at a private Finnish psychotherapy center were accessed by hackers
5 votes