Hacker News new | past | comments | ask | show | jobs | submit | from login
Bootkitty: Analyzing the first UEFI bootkit for Linux (welivesecurity.com)
172 points by doener 1 day ago | past | 77 comments
RomCom exploits Firefox and Windows zero days in the wild (welivesecurity.com)
58 points by croes 2 days ago | past | 28 comments
RomCom exploits Firefox and Windows zero days in the wild (welivesecurity.com)
2 points by doener 2 days ago | past | discuss
RomCom exploits Firefox and Windows zero days in the wild (welivesecurity.com)
3 points by gnabgib 3 days ago | past | 1 comment
Security researchers identify new malware targeting Linux (welivesecurity.com)
135 points by heresie-dabord 8 days ago | past | 65 comments
European govt air-gapped systems breached using custom malware (welivesecurity.com)
281 points by tagyro 52 days ago | past | 247 comments
CosmicBeetle joins the ranks of RansomHub affiliates (welivesecurity.com)
1 point by based2 62 days ago | past
NGate Android malware relays NFC traffic to steal cash (welivesecurity.com)
2 points by ChrisArchitect 3 months ago | past
Be careful what you pwish for – Phishing in PWA applications (welivesecurity.com)
3 points by rntn 3 months ago | past
Why scammers want your phone number (welivesecurity.com)
2 points by speckx 3 months ago | past
Ebury is alive but unseen: 400k Linux servers compromised by the Windigo group (welivesecurity.com)
1 point by fanf2 5 months ago | past
Ebury is alive but unseen: 400k Linux servers compromised (welivesecurity.com)
1 point by fanf2 6 months ago | past
A pernicious potpourri of Python packages in PyPI (welivesecurity.com)
2 points by alexrustic 11 months ago | past
Who killed Mozi? Finally putting the IoT zombie botnet in its grave (welivesecurity.com)
2 points by doener on Nov 2, 2023 | past
Mozi botnet disabled using kill switch (welivesecurity.com)
4 points by skilled on Nov 1, 2023 | past
Can open-source software be secure? (welivesecurity.com)
1 point by donutshop on Oct 1, 2023 | past
Fake recruiter lured aerospace employee with trojanized coding challenge (welivesecurity.com)
311 points by transpute on Sept 30, 2023 | past | 158 comments
Android App Breaking Bad: From legitimate screen recording to file exfiltration (welivesecurity.com)
1 point by ari7 on May 25, 2023 | past
Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack (welivesecurity.com)
2 points by richardboegli on May 2, 2023 | past
Evasive Panda APT group delivers malware via updates for popular Chinese softwar (welivesecurity.com)
1 point by prhrb on April 27, 2023 | past
First in-the-wild UEFI bootkit bypassing UEFI Secure Boot (welivesecurity.com)
286 points by miles on March 1, 2023 | past | 76 comments
Worok: The Big Picture (welivesecurity.com)
1 point by rntn on Sept 6, 2022 | past
CloudMensis macOS spyware uses cloud services for C&C (welivesecurity.com)
1 point by wgx on July 22, 2022 | past
A look at the CloudMensis macOS spyware (welivesecurity.com)
1 point by giuliomagnifico on July 20, 2022 | past
High‑impact UEFI vulnerabilities discovered in Lenovo consumer laptops (welivesecurity.com)
4 points by TheGuyWhoCodes on April 19, 2022 | past
Caddy-Wiper – Previously Unknown-Strain Targeting Ukraine (welivesecurity.com)
1 point by News-Dog on March 16, 2022 | past
IsaacWiper and HermeticWizard: New Wiper and Worm Targeting Ukraine (welivesecurity.com)
1 point by News-Dog on March 2, 2022 | past
Watering hole deploys new macOS malware, DazzleSpy, in Asia (welivesecurity.com)
4 points by mzs on Jan 25, 2022 | past
Jumping the Air Gap: 15 Years of Nation-State Effort [pdf] (welivesecurity.com)
70 points by shishy on Dec 10, 2021 | past | 40 comments
Jumping the Air Gap: 15 Years of Nation-State Effort [pdf] (welivesecurity.com)
1 point by shishy on Dec 3, 2021 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: