Hacker News new | past | comments | ask | show | jobs | submit | from login
Security researchers identify new malware targeting Linux (welivesecurity.com)
124 points by heresie-dabord 16 hours ago | past | 54 comments
European govt air-gapped systems breached using custom malware (welivesecurity.com)
281 points by tagyro 44 days ago | past | 247 comments
CosmicBeetle joins the ranks of RansomHub affiliates (welivesecurity.com)
1 point by based2 55 days ago | past
NGate Android malware relays NFC traffic to steal cash (welivesecurity.com)
2 points by ChrisArchitect 3 months ago | past
Be careful what you pwish for – Phishing in PWA applications (welivesecurity.com)
3 points by rntn 3 months ago | past
Why scammers want your phone number (welivesecurity.com)
2 points by speckx 3 months ago | past
Ebury is alive but unseen: 400k Linux servers compromised by the Windigo group (welivesecurity.com)
1 point by fanf2 4 months ago | past
Ebury is alive but unseen: 400k Linux servers compromised (welivesecurity.com)
1 point by fanf2 6 months ago | past
A pernicious potpourri of Python packages in PyPI (welivesecurity.com)
2 points by alexrustic 10 months ago | past
Who killed Mozi? Finally putting the IoT zombie botnet in its grave (welivesecurity.com)
2 points by doener on Nov 2, 2023 | past
Mozi botnet disabled using kill switch (welivesecurity.com)
4 points by skilled on Nov 1, 2023 | past
Can open-source software be secure? (welivesecurity.com)
1 point by donutshop on Oct 1, 2023 | past
Fake recruiter lured aerospace employee with trojanized coding challenge (welivesecurity.com)
311 points by transpute on Sept 30, 2023 | past | 158 comments
Android App Breaking Bad: From legitimate screen recording to file exfiltration (welivesecurity.com)
1 point by ari7 on May 25, 2023 | past
Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack (welivesecurity.com)
2 points by richardboegli on May 2, 2023 | past
Evasive Panda APT group delivers malware via updates for popular Chinese softwar (welivesecurity.com)
1 point by prhrb on April 27, 2023 | past
First in-the-wild UEFI bootkit bypassing UEFI Secure Boot (welivesecurity.com)
286 points by miles on March 1, 2023 | past | 76 comments
Worok: The Big Picture (welivesecurity.com)
1 point by rntn on Sept 6, 2022 | past
CloudMensis macOS spyware uses cloud services for C&C (welivesecurity.com)
1 point by wgx on July 22, 2022 | past
A look at the CloudMensis macOS spyware (welivesecurity.com)
1 point by giuliomagnifico on July 20, 2022 | past
High‑impact UEFI vulnerabilities discovered in Lenovo consumer laptops (welivesecurity.com)
4 points by TheGuyWhoCodes on April 19, 2022 | past
Caddy-Wiper – Previously Unknown-Strain Targeting Ukraine (welivesecurity.com)
1 point by News-Dog on March 16, 2022 | past
IsaacWiper and HermeticWizard: New Wiper and Worm Targeting Ukraine (welivesecurity.com)
1 point by News-Dog on March 2, 2022 | past
Watering hole deploys new macOS malware, DazzleSpy, in Asia (welivesecurity.com)
4 points by mzs on Jan 25, 2022 | past
Jumping the Air Gap: 15 Years of Nation-State Effort [pdf] (welivesecurity.com)
70 points by shishy on Dec 10, 2021 | past | 40 comments
Jumping the Air Gap: 15 Years of Nation-State Effort [pdf] (welivesecurity.com)
1 point by shishy on Dec 3, 2021 | past
Jumping the air gap: 15 years of nation‑state effort (welivesecurity.com)
5 points by miles on Dec 3, 2021 | past
Malware bypassing air-gaps and how to defend networks (welivesecurity.com)
2 points by lknik on Dec 2, 2021 | past
Jumping the air gap: 15 years of nation-state effort [pdf] (welivesecurity.com)
5 points by todsacerdoti on Dec 2, 2021 | past
Strategic web compromises in the Middle East with a pinch of Candiru (welivesecurity.com)
2 points by colinprince on Nov 17, 2021 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: