Next.js and the corrupt middleware: the authorizing artifact ~comp security programming Article 2349 words, published Mar 18 2025 20 votes
Big day for crypto goes south in a hurry after a giant hack ~finance cryptocurrency Article 1054 words, published Feb 22 2025 33 votes
A Signal update fends off a phishing technique used in Russian espionage ~tech google Article 607 words 33 votes
On hackers, hackers, and hilarious misunderstandings ~humanities.languages Article 340 words, published Jan 30 2025 11 votes
8 million requests later, we made the SolarWinds supply chain attack look amateur ~comp security.cyber Article 10 411 words, published Feb 4 2025 10 votes
Anyone have ideas about how to fit this third party driver board into a 2021 (m1) imac? (link to board) ~comp Article 651 words 4 votes
Unique 0-click deanonymization attack targeting Signal, Discord and hundreds of platform ~comp security.cyber privacy Link 50 votes
Candy Crush, Tinder, MyFitnessPal: See the thousands of apps hijacked to spy on your location ~tech privacy security Article 1891 words 65 votes
US Treasury says its computers were hacked by a Chinese 'threat actor' in a 'major incident' ~finance Article 384 words 45 votes
More US telcos confirm Salt Typhoon breaches as White House weighs in ~tech security.cyber Article 813 words 20 votes
US officials urge Americans to use encrypted apps amid unprecedented cyberattack ~tech security.cyber Article 756 words 50 votes
Misogynist hacker who threatened the wrong woman (hacker) and found out ~comp security.cyber Link 23 votes
Top US senator calls Salt Typhoon ‘worst telecom hack in our nation’s history’ ~tech security.cyber Article 1307 words 37 votes
Anti-abortion group accused of electronically intercepting patients’ exchanges with clinic ~health healthcare Article 1448 words 18 votes
Hackers take control of robot vacuums in multiple US cities, yell racial slurs ~tech security.cyber privacy Article 1155 words 37 votes
More people than ever are trying to hack the US government--and they love it ~tech security.cyber Article 328 words 11 votes
Crook made millions by breaking into execs’ Office365 inboxes, US law enforcement says ~finance business Article 724 words 9 votes
SS7: A mobile network operator protocol with scary vulnerabilities ~tech privacy security Video 31:55 29 votes
Chinese government hackers penetrate US internet providers to spy ~tech internet security.cyber Article 794 words 17 votes
The gigantic and unregulated power plants in the cloud ~tech security.cyber Article 2240 words 12 votes
A hacker ‘ghost’ network is quietly spreading malware on GitHub ~tech security.cyber Article 533 words 21 votes
Weak security defaults enabled Squarespace Domains hijacks of former Google Domains accounts ~tech security.cyber google.domains Article 729 words 19 votes
AT&T says criminals stole phone records of ‘nearly all’ US customers in new data breach ~tech security.cyber privacy Article 709 words 26 votes
Hackers target AI users with malicious stable diffusion tool on Github to protest 'art theft' ~tech Article 605 words 17 votes
Significant cyber incidents | Strategic technologies program ~comp security.cyber Article 8881 words 1 vote
Hundreds of thousands of US internet routers destroyed in newly discovered 2023 hack ~tech internet security.cyber Article 517 words 23 votes
All Santander staff and 'thirty million' customers in Spain, Chile and Uruguay hacked ~tech security.cyber Article 447 words 22 votes
British Library on why it kept it real in communication about ransomware attack ~tech security.cyber Article 953 words 9 votes
Cyber security: A pre-war reality check ~tech security.cyber microsoft amazon google Article 6976 words, published May 14 2024 34 votes
London Drugs closes stores until further notice due to cyberattack ~tech security.cyber Article 348 words 22 votes
To make sure grandmas like his don't get conned, he scams the scammers ~tech social media Article 1624 words 25 votes
San Francisco city leaders look to bring back emergency sirens by end of 2024 ~enviro Article 487 words, published Sep 6 2023 8 votes
Hackers found a way to open any of three million hotel keycard locks in seconds ~tech security Article 638 words, published Mar 21 2024 42 votes
Hackers can read private AI-assistant chats even though they’re encrypted ~tech security.cyber Article 639 words, published Mar 14 2024 20 votes
Journalist Tim Burke faces charges under the US Computer Fraud and Abuse Act ~tech Article 965 words, published Feb 23 2024 27 votes
Canada declares Flipper Zero public enemy No. 1 in car-theft crackdown ~transport Article 629 words 27 votes
MIT PhD student hacks Apple Vision Pro days after release, reveals potential jailbreaks and malware threats ~tech security apple.vision pro Article 353 words 19 votes
A startup allegedly ‘Hacked the World.’ Then came the censorship—and now the backlash ~tech Article 1765 words 27 votes