For the best experience on desktop, install the
Chrome extension
to track your reading on news.ycombinator.com
×
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
history
|
from
register
Coruna: The framework used in Operation Triangulation
(
securelist.com
)
2 points
by
miohtama
10 days ago
|
past
|
discuss
Notepad++ supply chain attack breakdown
(
securelist.com
)
384 points
by
natebc
61 days ago
|
past
|
192 comments
How a legitimate Windows driver is being used to take down antivirus processes
(
securelist.com
)
3 points
by
msephton
6 months ago
|
past
Code highlighting extension for Cursor AI used for $500k theft
(
securelist.com
)
182 points
by
Daviey
8 months ago
|
past
|
155 comments
Code highlighting with Cursor AI for $500k
(
securelist.com
)
12 points
by
ivanjermakov
8 months ago
|
past
|
2 comments
$500K stolen via fake AI coding extension
(
securelist.com
)
20 points
by
handfuloflight
8 months ago
|
past
|
2 comments
Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain
(
securelist.com
)
5 points
by
campuscodi
on March 26, 2025
|
past
The GitVenom campaign: cryptocurrency theft using GitHub
(
securelist.com
)
14 points
by
miohtama
on Feb 26, 2025
|
past
|
4 comments
OCR Crypto Stealers in Google Play and App Store
(
securelist.com
)
35 points
by
shifty1
on Feb 5, 2025
|
past
|
5 comments
SparkCat Crypto Stealer in Google Play and App Store
(
securelist.com
)
2 points
by
janandonly
on Feb 5, 2025
|
past
Meet the GoldenJackal Advanced Persistent Threat (APT) Group
(
securelist.com
)
2 points
by
teleforce
on Oct 13, 2024
|
past
EastWind campaign: CloudSorcerer attacks on government organizations in Russia
(
securelist.com
)
1 point
by
croes
on Aug 16, 2024
|
past
XZ backdoor part 3: Hook analysis
(
securelist.com
)
2 points
by
strunz
on July 3, 2024
|
past
XZ backdoor: Hook analysis
(
securelist.com
)
11 points
by
skilled
on June 24, 2024
|
past
Analysis of User Password Strength
(
securelist.com
)
2 points
by
doener
on June 21, 2024
|
past
Analysis of User Password Strength
(
securelist.com
)
1 point
by
mikece
on June 18, 2024
|
past
Bypassing 2FA with phishing and OTP bots
(
securelist.com
)
1 point
by
skilled
on June 11, 2024
|
past
Analyzing the security properties of a ZKTeco biometric terminal
(
securelist.com
)
2 points
by
skilled
on June 11, 2024
|
past
ShrinkLocker: Turning BitLocker into Ransomware
(
securelist.com
)
1 point
by
parvenu74
on May 23, 2024
|
past
Assessing the Y, and How, of the XZ Utils incident
(
securelist.com
)
2 points
by
netol
on April 24, 2024
|
past
SoumniBot: The new Android banker's unique techniques
(
securelist.com
)
2 points
by
dirtyhippiefree
on April 18, 2024
|
past
Top web application vulnerabilities in 2021–2023
(
securelist.com
)
1 point
by
baalimago
on April 16, 2024
|
past
XZ backdoor story – Initial analysis
(
securelist.com
)
406 points
by
kryster
on April 12, 2024
|
past
|
250 comments
Android malware, Android malware and more Android malware
(
securelist.com
)
21 points
by
mikece
on March 20, 2024
|
past
|
2 comments
Network Tunneling with QEMU
(
securelist.com
)
187 points
by
rrampage
on March 6, 2024
|
past
|
27 comments
An educational robot security research
(
securelist.com
)
1 point
by
mikece
on Feb 27, 2024
|
past
Operation Triangulation: What you get when attack iPhones of researchers
(
securelist.com
)
549 points
by
ruik
on Dec 27, 2023
|
past
|
399 comments
How to catch a wild triangle
(
securelist.com
)
142 points
by
mmastrac
on Oct 27, 2023
|
past
|
43 comments
The outstanding stealth of Operation Triangulation
(
securelist.com
)
2 points
by
nceqs3
on Oct 24, 2023
|
past
Free Download Manager backdoored – a possible supply chain attack on Linux
(
securelist.com
)
152 points
by
donutshop
on Sept 12, 2023
|
past
|
127 comments
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
×
HN For You
Display Mode
Highlight
Top
Only
Debug mode
Sign Out
API Key:
Connect
Create an account
to get your API key.