-
16 votes
-
Have you ever been hacked?
If so, how did it happen, how did it impact you, and what did you do differently?
17 votes -
Comcast Xfinity accounts hacked in widespread 2FA bypass attacks
9 votes -
DIY Blu-Ray laser scanning microscope
3 votes -
During his testimony before the Senate Judiciary Committee, Peiter "Mudge" Zatko claims Twitter only has live production environment that all engineers can access
@Benjamin Powers: Mudge walking through Twitter's construction - they only have live production environment, no test environment.
17 votes -
Hacker jailbreaks control unit that stops farmers repairing their tractors, then runs Doom on it
22 votes -
A stupendously wonderful interview with one of the founders of @ Cafe, an internet cafe that launched just as the internet was coming into the public eye
5 votes -
Hacker took over Taylor Swift, Justin Bieber, Drake, Lil Nas X, Harry Styles, Michael Jackson, The Weekend, and Eminem's YouTube channels, uploading bizarre videos to millions of subscribers
9 votes -
Hackers who broke into NVIDIA's network leak DLSS source code online
19 votes -
Chipmaker Nvidia investigating potential cyberattack
6 votes -
North Korea hacked him. So he took down its internet.
12 votes -
She was a notorious hacker in the '80s - then she disappeared: Searching for Susy Thunder
19 votes -
Here’s how to prevent (and recover from) a Facebook hack
5 votes -
Winning the war on ransomware - The DOJ’s task force is changing the landscape around hackers, but will it be enough?
4 votes -
Hackers are spamming businesses’ receipt printers with ‘antiwork’ manifestos
13 votes -
Locked out of ‘god mode,’ runners are hacking their treadmills
18 votes -
After releasing full database of LGBTQ dating website, Black Shadow hackers leak medical records of 290,000 Israeli patients
9 votes -
Polygon (formerly known as Matic Network) dodges $850M hack, pays record $2M bounty
2 votes -
The entirety of Twitch has reportedly been leaked
42 votes -
Company that routes SMS for all major US carriers was hacked for five years
27 votes -
Sophisticated exploits used to breach fully-patched iPhones of journalists, activists, as detailed by Amnesty International's Security Lab
24 votes -
Swedish Coop supermarkets shut due to US ransomware cyber-attack – the hack targeted Florida-based IT company Kaseya before spreading through corporate networks
8 votes -
NewsBlur Mongo database deleted in ransom attack (and restored)
NewsBlur was down yesterday evening due to its Mongo database getting attacked by a hacker and held for ransom. It’s restored from backup, but there are privacy implications for anyone who had...
NewsBlur was down yesterday evening due to its Mongo database getting attacked by a hacker and held for ransom. It’s restored from backup, but there are privacy implications for anyone who had sensitive private data there. We will likely find out more after the maintainer recovers from a busy night.
There are no good links for this, but it’s being discussed on Hacker News. Since it’s open source, someone described what’s being kept in that database.
(I use NewsBlur, but I don’t think my RSS reading habits are all that sensitive. Others might be in a different situation, though.)
6 votes -
780GB of data, tools, and source code were stolen from EA by purchasing a stolen cookie to get access to the company's Slack and social-engineering an IT Support employee
21 votes -
Supreme Court reins in definition of crime under controversial hacking law
12 votes -
One-fifth of US beef capacity wiped out by JBS cyberattack
28 votes -
The full story of the 2011 hack into RSA Security
5 votes -
How China turned a prize-winning iPhone hack against the Uyghurs
11 votes -
They told their therapists everything. Hackers leaked it all.
15 votes -
A "worst nightmare" cyberattack: The story of the SolarWinds hack
7 votes -
Hacktivism, leaktivism and the future
5 votes -
Hackers break into thousands of security cameras, exposing Tesla, jails, hospitals
16 votes -
At least 30,000 US organizations newly hacked via holes in Microsoft’s email software
19 votes -
Is building a folding iPhone possible? Let's take a closer look at these flexible amoled screens I found on AliExpress
5 votes -
Hackers try to contaminate Florida town's water supply through computer breach
15 votes -
Hackers can trick a Tesla into accelerating by fifty miles per hour
17 votes -
Personal data of 1.4 million Washington state unemployment claimants exposed in hack of state auditor
7 votes -
SolarWinds: New findings from our investigation of SUNBURST
6 votes -
70TB of Parler users’ messages, videos, and posts leaked by security researchers
42 votes -
JetBrains' continuous integration server TeamCity may have been compromised as part of the wide-reaching Russian hack of the US federal government
13 votes -
VMware flaw a vector in SolarWinds breach?
7 votes -
Preliminary analysis of the SolarWinds Orion supply-chain nation-state attack
7 votes -
Dutch researcher claims that he accessed US President Donald Trump's Twitter account by guessing password
21 votes -
Microsoft says it found malicious software in its systems
7 votes -
US Treasury breached by hackers backed by foreign government
20 votes -
I hacked into my own car
7 votes -
Reverse engineering a forgotten 1970s Intel dual core beast: 8271, a new ISA
10 votes -
Company made to change name that could be used for XSS vulnerabilities
11 votes -
Why the extortion of Vastaamo matters far beyond Finland – and how cyber pros are responding
4 votes -
FBI, DHS, HHS warn of imminent, credible ransomware threat against US hospitals
13 votes