For the best experience on desktop, install the
Chrome extension
to track your reading on news.ycombinator.com
×
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
history
|
from
register
Open Threat Intelligence: AlienVault (AT&T)
(
alienvault.com
)
2 points
by
maxfan8
on Dec 7, 2019
|
past
Emissary Panda Attacks Middle East Government Sharepoint Servers
(
alienvault.com
)
1 point
by
PatrolX
on May 28, 2019
|
past
Sharepoint Vulnerability Exploited in the Wild
(
alienvault.com
)
1 point
by
based2
on May 11, 2019
|
past
A North Korean Monero Cryptocurrency Miner
(
alienvault.com
)
5 points
by
cribbles
on Jan 10, 2018
|
past
How the Vote Hacking Was Done at DefCon25
(
alienvault.com
)
4 points
by
BrainInAJar
on Aug 7, 2017
|
past
How Hackers Manipulate Email to Defraud You and Your Customers
(
alienvault.com
)
2 points
by
dsr12
on June 20, 2017
|
past
MacSpy: OS X RAT as a Service
(
alienvault.com
)
2 points
by
sr2
on June 12, 2017
|
past
The Cybersecurity of Persona 5
(
alienvault.com
)
2 points
by
Capricornucopia
on June 1, 2017
|
past
Open Threat Exchange
(
alienvault.com
)
3 points
by
gyre007
on Feb 28, 2017
|
past
Maximizing the Customer Experience for Training Organizations
(
alienvault.com
)
1 point
by
kungfudoi
on Sept 27, 2016
|
past
Daserf, a Backdoor to Espionage
(
alienvault.com
)
1 point
by
b3h3moth
on Aug 25, 2016
|
past
Open Threat Exchange
(
alienvault.com
)
1 point
by
based2
on May 18, 2016
|
past
Building a Home Lab to Become a Malware Hunter – A Beginner’s Guide
(
alienvault.com
)
210 points
by
adamnemecek
on April 24, 2016
|
past
|
7 comments
Ransomware: PowerWare or PoshCoder? Comparison and Decryption
(
alienvault.com
)
1 point
by
wolframio
on April 6, 2016
|
past
Watering holes exploiting JSONP hijacking to track users in China
(
alienvault.com
)
1 point
by
programmernews3
on June 15, 2015
|
past
OAuth 2.0 as the solution for Three IOT security challenges
(
alienvault.com
)
1 point
by
willow9886
on May 15, 2015
|
past
Threat Intelligence – Beyond the Hype
(
alienvault.com
)
2 points
by
RiskIO
on Jan 22, 2015
|
past
|
1 comment
Shell Shock Exploit Being Used in the Wild
(
alienvault.com
)
1 point
by
saneshark
on Oct 1, 2014
|
past
Attackers abusing IE to enumerate software and detect security products
(
alienvault.com
)
3 points
by
lelf
on July 26, 2014
|
past
Heartbleed is a vulnerability with a CVSS score of only 5.0/10.
(
alienvault.com
)
2 points
by
subudeepak
on May 20, 2014
|
past
The Life of a Security Researcher | AlienVault
(
alienvault.com
)
1 point
by
projuce
on Jan 22, 2014
|
past
Analysis of yesterday's PHP.net exploit
(
alienvault.com
)
52 points
by
martinml
on Oct 25, 2013
|
past
|
13 comments
Ransomware now accepts bitcoin as a payment method
(
alienvault.com
)
1 point
by
lelf
on Oct 18, 2013
|
past
Cyber espionage campaign against the Uyghur community, targeting Mac OSX systems
(
alienvault.com
)
1 point
by
vilgax
on Feb 14, 2013
|
past
New Year New Java Zeroday
(
alienvault.com
)
1 point
by
kevinalexbrown
on Jan 10, 2013
|
past
New Internet Explorer zero day being exploited in the wild
(
alienvault.com
)
2 points
by
wglb
on Sept 17, 2012
|
past
IP Repudiation - crowdsourced malware detection
(
alienvault.com
)
1 point
by
casca
on May 31, 2012
|
past
MS Office exploit that targets MacOS X seen in the wild
(
alienvault.com
)
37 points
by
cooldeal
on March 28, 2012
|
past
|
6 comments
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
×
HN For You
Display Mode
Highlight
Top
Only
Debug mode
Sign Out
API Key:
Connect
Create an account
to get your API key.