hacking
hacking — my Raindrop.io articles
While some bacteriophages play vital roles in laboratory research, others are bent on sabotage.
BinaryAudit benchmarks AI agents using Ghidra to find backdoors in compiled binaries of real open-source servers, proxies, and network infrastructure.
Allison Nixon had helped arrest dozens of members of The Com — a loose affiliation of online groups responsible for violence and hacking campaigns. Then she became a target.
53.5% of websites have weak SSL setups—leaving attack surfaces exposed and increasing breach risk.
Recent cyberattacks reveal soft targets and harder problems
Just like our roads, bridges, electrical grid and airports will deteriorate without public investment, so will our software infrastructure without action.
As “P4x,” Alejandro Caceres single-handedly disrupted the internet of an entire country. Then he tried to show the US military how it can—and should—adopt his methods.
The company behind the Saflok-brand door locks is offering a fix, but it may take months or years to reach some hotels.
Behind the 1s and 0s, hackers are still people—and their motivations are more nuanced than you might think.
The attackers were in thousands of corporate and government networks. They might still be there now. Behind the scenes of the SolarWinds investigation.
Runa Sandvik has made it her life’s work to protect journalists against cyberattacks. Authoritarian regimes are keeping her in business.
and grab the TSA nofly list along the way
Tools of The Trade, from Hacker News.
We present a novel approach to infiltrate data to air-gapped systems without any additional hardware on-site.
An attack that targeted Apple devices was used to spy on China’s Muslim minority—and US officials claim it was developed at the country’s top hacking competition.
Cybersecurity experts tracing money paid by American businesses to Russian ransomware gangs found it led to one of Moscow’s most prestigious addresses.
The verdict is in! Following 37 nominations whittled down to a shortlist of 15 by a community vote, our panel of experts has conferred and selected the top 10 web hacking techniques of 2017 (and 2016)
International hackers based in Ukraine stole unpublished press releases and passed them to stock traders to reap tremendous profits.