For the best experience on desktop, install the
Chrome extension
to track your reading on news.ycombinator.com
×
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
history
|
from
register
React CVE-2025-55182: Data Exfiltration Techniques and WAF Bypasses Overview
(
wallarm.com
)
2 points
by
stepan_
4 months ago
|
past
MCP vulnerabilities increased by 270% from Q2 to Q3
(
wallarm.com
)
4 points
by
stepan_
5 months ago
|
past
|
1 comment
One PUT Request to Own Tomcat: CVE-2025-24813 RCE Is in the Wild
(
wallarm.com
)
2 points
by
heisenbit
on March 18, 2025
|
past
|
1 comment
Analyzing DeepSeek's System Prompt
(
wallarm.com
)
3 points
by
noch
on Feb 1, 2025
|
past
Analyzing DeepSeek's System Prompt: Jailbreaking Generative AI
(
wallarm.com
)
2 points
by
stepan_
on Jan 31, 2025
|
past
Show HN: Agentless API Attack Surface Management
(
wallarm.com
)
1 point
by
boris_dus
on Sept 6, 2024
|
past
What you need to know about The MOVEit and its impact. Latest
(
wallarm.com
)
2 points
by
stepan_
on June 16, 2023
|
past
A Simple Explanation of What a WebSocket Is
(
wallarm.com
)
2 points
by
jjzhiyuan
on Dec 6, 2022
|
past
OWASP Top-10 2021. Statistics-based proposal
(
wallarm.com
)
3 points
by
wlrm
on Jan 18, 2021
|
past
Cloudflare fixed HTTP/2 vulnerability
(
wallarm.com
)
1 point
by
wlrm
on Oct 17, 2020
|
past
Socket.io zero-day exploited in the wild (CVE-2020-24807)
(
wallarm.com
)
2 points
by
stepan_
on Oct 8, 2020
|
past
|
1 comment
JWT heartbreaker, a Burp extension that finds thousands weak secrets
(
wallarm.com
)
1 point
by
wlrm
on Oct 5, 2020
|
past
Weak JWT secrets you should know
(
wallarm.com
)
2 points
by
wlrm
on Sept 3, 2020
|
past
Blind SSRF Exploitation
(
wallarm.com
)
2 points
by
i_bo0om
on Feb 11, 2020
|
past
New Security Risk: GraphQL Batching Attack
(
wallarm.com
)
2 points
by
wlrm
on Dec 13, 2019
|
past
Race Condition in Web Applications
(
wallarm.com
)
1 point
by
i_bo0om
on Oct 31, 2019
|
past
PHP Remote Code Execution 0-Day Discovered in Real World CTF Exercise
(
wallarm.com
)
1 point
by
Daviey
on Oct 29, 2019
|
past
Machine Learning On-Line Hackathon: Detect Malicious Intent
(
wallarm.com
)
4 points
by
stepan_
on Nov 29, 2018
|
past
Neatly Bypassing Content Security Policy
(
wallarm.com
)
104 points
by
wlrm
on July 12, 2018
|
past
|
36 comments
Neatly bypassing CSP. Why 'unsafe-inline' is almost always a full-fledged XSS
(
wallarm.com
)
3 points
by
i_bo0om
on July 10, 2018
|
past
Neural Architecture Search with Reinforcement Learning Using TensorFlow
(
wallarm.com
)
2 points
by
stepan_
on Dec 18, 2017
|
past
Reflected Cross-Site scripting via HTTP headers in Safari browser
(
wallarm.com
)
2 points
by
i_bo0om
on Dec 14, 2017
|
past
HOWTO: Prevent your secrets being exposed in code repositories
(
wallarm.com
)
2 points
by
stepan_
on Nov 28, 2017
|
past
How to use a single download to remotely steal proprietary files from MacOS
(
wallarm.com
)
2 points
by
tzury
on Aug 6, 2017
|
past
How to use a single download to remotely steal proprietary files from MacOS
(
wallarm.com
)
2 points
by
ingve
on Aug 4, 2017
|
past
How to use a single download to remotely steal proprietary files from MacOS
(
wallarm.com
)
2 points
by
nl5887
on Aug 3, 2017
|
past
Hunting the Files Safari local file reader
(
wallarm.com
)
4 points
by
i_bo0om
on Aug 2, 2017
|
past
New Struts2 Remote Code Execution Exploit Caught in the Wild
(
wallarm.com
)
2 points
by
wlrm
on March 9, 2017
|
past
Neuraldrugs. The idea is to emulate the impact of drugs on a Neural Network
(
wallarm.com
)
3 points
by
wlrm
on Jan 27, 2017
|
past
Show HN: Wallarm – Protect your web apps or APIs with fast Nginx-based instances
(
wallarm.com
)
95 points
by
stepan_
on June 29, 2016
|
past
|
84 comments
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
×
HN For You
Display Mode
Highlight
Top
Only
Debug mode
Sign Out
API Key:
Connect
Create an account
to get your API key.