cover image
How Φ80 Infiltrates Research Labs
14 Mar 2026
asimov.press

While some bacteriophages play vital roles in laboratory research, others are bent on sabotage.

cover image

BinaryAudit benchmarks AI agents using Ghidra to find backdoors in compiled binaries of real open-source servers, proxies, and network infrastructure.

cover image

Allison Nixon had helped arrest dozens of members of The Com — a loose affiliation of online groups responsible for violence and hacking campaigns. Then she became a target.

cover image

53.5% of websites have weak SSL setups—leaving attack surfaces exposed and increasing breach risk.

cover image

Recent cyberattacks reveal soft targets and harder problems

cover image

Just like our roads, bridges, electrical grid and airports will deteriorate without public investment, so will our software infrastructure without action.

cover image

As “P4x,” Alejandro Caceres single-handedly disrupted the internet of an entire country. Then he tried to show the US military how it can—and should—adopt his methods.

cover image

The company behind the Saflok-brand door locks is offering a fix, but it may take months or years to reach some hotels.

cover image

Behind the 1s and 0s, hackers are still people—and their motivations are more nuanced than you might think.

cover image

The attackers were in thousands of corporate and government networks. They might still be there now. Behind the scenes of the SolarWinds investigation.

cover image
The Hacker
21 Apr 2023
cjr.org

Runa Sandvik has made it her life’s work to protect journalists against cyberattacks. Authoritarian regimes are keeping her in business.

cover image

and grab the TSA nofly list along the way

cover image
cjbarber/ToolsOfTheTrade
18 Jul 2022
github.com

Tools of The Trade, from Hacker News.

cover image
Intelligent System Security
12 Feb 2022
intellisec.de

We present a novel approach to infiltrate data to air-gapped systems without any additional hardware on-site.

cover image

An attack that targeted Apple devices was used to spy on China’s Muslim minority—and US officials claim it was developed at the country’s top hacking competition.

cover image

Cybersecurity experts tracing money paid by American businesses to Russian ransomware gangs found it led to one of Moscow’s most prestigious addresses.

cover image
Top 10 Web Hacking Techniques of 2017 | Blog
12 Oct 2018
portswigger.net

The verdict is in! Following 37 nominations whittled down to a shortlist of 15 by a community vote, our panel of experts has conferred and selected the top 10 web hacking techniques of 2017 (and 2016)

cover image

International hackers based in Ukraine stole unpublished press releases and passed them to stock traders to reap tremendous profits.