For the best experience on desktop, install the
Chrome extension
to track your reading on news.ycombinator.com
×
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
history
|
from
register
PromptSpy ushers in the era of Android threats using GenAI
(
welivesecurity.com
)
2 points
by
Cyphase
52 days ago
|
past
|
1 comment
Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass
(
welivesecurity.com
)
6 points
by
akyuu
7 months ago
|
past
TheWizards APT group uses SLAAC spoofing for adversary-in-the-middle attacks
(
welivesecurity.com
)
1 point
by
speckx
11 months ago
|
past
Under the Cloak of UEFI Secure Boot: Introducing CVE-2024-7344
(
welivesecurity.com
)
2 points
by
giantpotato
on Jan 16, 2025
|
past
Bootkitty: Analyzing the first UEFI bootkit for Linux
(
welivesecurity.com
)
183 points
by
doener
on Nov 28, 2024
|
past
|
82 comments
RomCom exploits Firefox and Windows zero days in the wild
(
welivesecurity.com
)
58 points
by
croes
on Nov 28, 2024
|
past
|
28 comments
RomCom exploits Firefox and Windows zero days in the wild
(
welivesecurity.com
)
2 points
by
doener
on Nov 27, 2024
|
past
RomCom exploits Firefox and Windows zero days in the wild
(
welivesecurity.com
)
3 points
by
gnabgib
on Nov 26, 2024
|
past
|
1 comment
Security researchers identify new malware targeting Linux
(
welivesecurity.com
)
135 points
by
heresie-dabord
on Nov 21, 2024
|
past
|
65 comments
European govt air-gapped systems breached using custom malware
(
welivesecurity.com
)
281 points
by
tagyro
on Oct 8, 2024
|
past
|
247 comments
CosmicBeetle joins the ranks of RansomHub affiliates
(
welivesecurity.com
)
1 point
by
based2
on Sept 28, 2024
|
past
NGate Android malware relays NFC traffic to steal cash
(
welivesecurity.com
)
2 points
by
ChrisArchitect
on Aug 23, 2024
|
past
Be careful what you pwish for – Phishing in PWA applications
(
welivesecurity.com
)
3 points
by
rntn
on Aug 21, 2024
|
past
Why scammers want your phone number
(
welivesecurity.com
)
2 points
by
speckx
on Aug 14, 2024
|
past
Ebury is alive but unseen: 400k Linux servers compromised by the Windigo group
(
welivesecurity.com
)
1 point
by
fanf2
on June 25, 2024
|
past
Ebury is alive but unseen: 400k Linux servers compromised
(
welivesecurity.com
)
1 point
by
fanf2
on May 16, 2024
|
past
A pernicious potpourri of Python packages in PyPI
(
welivesecurity.com
)
2 points
by
alexrustic
on Jan 3, 2024
|
past
Who killed Mozi? Finally putting the IoT zombie botnet in its grave
(
welivesecurity.com
)
2 points
by
doener
on Nov 2, 2023
|
past
Mozi botnet disabled using kill switch
(
welivesecurity.com
)
4 points
by
skilled
on Nov 1, 2023
|
past
Can open-source software be secure?
(
welivesecurity.com
)
1 point
by
donutshop
on Oct 1, 2023
|
past
Fake recruiter lured aerospace employee with trojanized coding challenge
(
welivesecurity.com
)
311 points
by
transpute
on Sept 30, 2023
|
past
|
158 comments
Android App Breaking Bad: From legitimate screen recording to file exfiltration
(
welivesecurity.com
)
1 point
by
ari7
on May 25, 2023
|
past
Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack
(
welivesecurity.com
)
2 points
by
richardboegli
on May 2, 2023
|
past
Evasive Panda APT group delivers malware via updates for popular Chinese softwar
(
welivesecurity.com
)
1 point
by
prhrb
on April 27, 2023
|
past
First in-the-wild UEFI bootkit bypassing UEFI Secure Boot
(
welivesecurity.com
)
286 points
by
miles
on March 1, 2023
|
past
|
76 comments
Worok: The Big Picture
(
welivesecurity.com
)
1 point
by
rntn
on Sept 6, 2022
|
past
CloudMensis macOS spyware uses cloud services for C&C
(
welivesecurity.com
)
1 point
by
wgx
on July 22, 2022
|
past
A look at the CloudMensis macOS spyware
(
welivesecurity.com
)
1 point
by
giuliomagnifico
on July 20, 2022
|
past
High‑impact UEFI vulnerabilities discovered in Lenovo consumer laptops
(
welivesecurity.com
)
4 points
by
TheGuyWhoCodes
on April 19, 2022
|
past
Caddy-Wiper – Previously Unknown-Strain Targeting Ukraine
(
welivesecurity.com
)
1 point
by
News-Dog
on March 16, 2022
|
past
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
×
HN For You
Display Mode
Highlight
Top
Only
Debug mode
Sign Out
API Key:
Connect
Create an account
to get your API key.