For the best experience on desktop, install the
Chrome extension
to track your reading on news.ycombinator.com
×
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
history
|
from
register
Rust for Malware Development
(
bishopfox.com
)
2 points
by
PaulHoule
3 months ago
|
past
Rust for Malware Development
(
bishopfox.com
)
2 points
by
kurhan
4 months ago
|
past
Raink: Use LLMs for Document Ranking
(
bishopfox.com
)
4 points
by
rahimnathwani
on Feb 25, 2025
|
past
Raink: Use LLMs for Document Ranking
(
bishopfox.com
)
1 point
by
noperator
on Jan 14, 2025
|
past
Show HN: Broken Hill: A Productionized GCG Attack Tool for Use Against LLMs
(
bishopfox.com
)
4 points
by
blincoln
on Sept 24, 2024
|
past
|
1 comment
An exploration of JSON interoperability vulnerabilities
(
bishopfox.com
)
2 points
by
fanf2
on Sept 4, 2024
|
past
Don't use pixelation for redacting text (2022)
(
bishopfox.com
)
62 points
by
bookofjoe
on May 20, 2024
|
past
|
51 comments
GWT: Unpatched, Unauthenticated Java Deserialization
(
bishopfox.com
)
1 point
by
blincoln
on Dec 18, 2023
|
past
Bad Pods: Kubernetes Pod Privilege Escalation (2021)
(
bishopfox.com
)
1 point
by
sneakerblack
on Dec 1, 2023
|
past
h2c Smuggling: Request Smuggling via HTTP/2 Cleartext (h2c)
(
bishopfox.com
)
3 points
by
pabs3
on March 4, 2022
|
past
Don't use text pixelation to redact sensitive information
(
bishopfox.com
)
485 points
by
feross
on Feb 15, 2022
|
past
|
163 comments
An Exploration of JSON Interoperability Vulnerabilities
(
bishopfox.com
)
2 points
by
spacebanana7
on Feb 11, 2022
|
past
XMPP: An Under-Appreciated Attack Surface
(
bishopfox.com
)
25 points
by
zaik
on Jan 8, 2022
|
past
|
3 comments
An Intro to Fuzzing (a.k.a. Fuzz Testing)
(
bishopfox.com
)
4 points
by
historynops
on Oct 25, 2021
|
past
IAM Vulnerable – An AWS IAM Privilege Escalation Playground
(
bishopfox.com
)
1 point
by
thinkmassive
on Sept 10, 2021
|
past
You're Doing IoT RNG
(
bishopfox.com
)
3 points
by
gregmac
on Aug 9, 2021
|
past
|
1 comment
Lexss: Bypassing Lexical Parsing Security Controls
(
bishopfox.com
)
16 points
by
todsacerdoti
on June 25, 2021
|
past
|
2 comments
Bad Pods: Kubernetes Pod Privilege Escalation
(
bishopfox.com
)
2 points
by
lateoctober
on April 20, 2021
|
past
An Exploration of JSON Interoperability Vulnerabilities
(
bishopfox.com
)
46 points
by
theBumbleSec
on Feb 26, 2021
|
past
|
14 comments
Lessons Learned on Brute-Forcing RMI-IIOP with RMIScout
(
bishopfox.com
)
1 point
by
bishop_fox
on Dec 8, 2020
|
past
OpenClinic Version 0.8.2 – security advisory
(
bishopfox.com
)
1 point
by
bishop_fox
on Dec 1, 2020
|
past
The Pen Testing Tools We’re Thankful for in 2020
(
bishopfox.com
)
3 points
by
bishop_fox
on Nov 23, 2020
|
past
Diverse Perspectives Offer a Broader Understanding of Your Attack Surface
(
bishopfox.com
)
1 point
by
bishop_fox
on Nov 17, 2020
|
past
Cheating at Online Video Games and What It Can Teach Us About AppSec (Part 3)
(
bishopfox.com
)
1 point
by
bishop_fox
on Nov 10, 2020
|
past
Immuta Version 2.8.2 – Security Advisory
(
bishopfox.com
)
1 point
by
bishop_fox
on Nov 4, 2020
|
past
Cheating at Online Video Games and What It Can Teach Us About AppSec (Part 2)
(
bishopfox.com
)
2 points
by
bishop_fox
on Nov 2, 2020
|
past
Cheating at Online Video Games and What It Can Teach Us About AppSec (Part 1)
(
bishopfox.com
)
1 point
by
bishop_fox
on Oct 29, 2020
|
past
Winston Privacy Version 1.5.4 Disclosure
(
bishopfox.com
)
1 point
by
bishop_fox
on Oct 27, 2020
|
past
Accidentally Secure Is Not Secure: A Case of Three Stooges Syndrome
(
bishopfox.com
)
2 points
by
bishop_fox
on Oct 20, 2020
|
past
How to Keep Your Organization Safe from Social Engineering
(
bishopfox.com
)
2 points
by
bishop_fox
on Oct 13, 2020
|
past
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
×
HN For You
Display Mode
Highlight
Top
Only
Debug mode
Sign Out
API Key:
Connect
Create an account
to get your API key.