@anon
sign up
@anon
sign up
pull down to refresh
STAC6451 Hackers Attacking Microsoft SQL Servers to Compromise Organizations
cybersecuritynews.com/microsoft-sql-servers-compromise-organizations/
0 sats
\
0 comments
\
@ch0k1
9 Aug 2024
news
related
Sunday Survey: Who are the most dangerous enemies of Bitcoin?
2350 sats
\
20 comments
\
@jimmysong
3 Mar 2024
bitcoin
Putin's Trader: How Russian hackers stole millions from U.S. investors
www.cnbc.com/2024/08/01/putins-trader-how-russian-hackers-stole-millions-from-us-investors.html
1541 sats
\
19 comments
\
@siggy47
2 Aug 2024
econ
He Investigates the Internet’s Most Vicious Hackers—From a Secret Location
archive.is/um1hv
364 sats
\
0 comments
\
@StillStackinAfterAllTheseYears
8 Dec 2024
security
Hackers, Hackers on the Wall... (Bloomberg, Matt Levine)
www.bloomberg.com/opinion/newsletters/2025-05-15/coinbase-got-hacked-a-little
570 sats
\
3 comments
\
@denlillaapan
15 May
econ
The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind
www.wired.com/story/jia-tan-xz-backdoor/
523 sats
\
2 comments
\
@ch0k1
3 Apr 2024
security
Namibia ransomware: Sensitive data leaked after telecoms firm hacked
www.bbc.co.uk/news/articles/ce3l509e6x7o
329 sats
\
1 comment
\
@ch0k1
17 Dec 2024
security
Cryptocurrency APT Intelligence: Unveiling Lazarus Group’s Intrusion Techniques
slowmist.medium.com/cryptocurrency-apt-intelligence-unveiling-lazarus-groups-intrusion-techniques-a1a6efda7d34
544 sats
\
9 comments
\
@megaptera
24 Feb
security
Black Basta ransomware group is imperiling critical infrastructure, groups warn
arstechnica.com/security/2024/05/black-basta-ransomware-group-is-imperiling-critical-infrastructure-groups-warn/
250 sats
\
3 comments
\
@DEADBEEF
14 May 2024
security
Dell API abused to steal 49 million customer records in data breach
www.bleepingcomputer.com/news/security/dell-api-abused-to-steal-49-million-customer-records-in-data-breach/
308 sats
\
6 comments
\
@DEADBEEF
12 May 2024
security
The London office where swinging pendulums keep cyber threats at bay
www.ianvisits.co.uk/articles/inside-the-london-office-where-swinging-pendulums-keep-cyber-threats-at-bay-71054/
267 sats
\
1 comment
\
@hn
21 Mar 2024
tech
International investigation disrupts the world’s most harmful cyber crime group
www.nationalcrimeagency.gov.uk/news/nca-leads-international-investigation-targeting-worlds-most-harmful-ransomware-group
117 sats
\
0 comments
\
@Gian
8 Jun 2024
security
Why Microsoft is a national security threat
www.theregister.com/2024/04/21/microsoft_national_security_risk/
153 sats
\
10 comments
\
@ch0k1
23 Apr 2024
security
Ukraine Is the First “Hacker’s War”
spectrum.ieee.org/ukraine-hackers-war
220 sats
\
1 comment
\
@RideandSmile
19 Apr 2024
security
DARPA tries a simple but profound concept to improve cybersecurity
federalnewsnetwork.com/cybersecurity/2024/11/darpa-tries-a-simple-but-profound-concept-to-improve-cybersecurity/
128 sats
\
0 comments
\
@ch0k1
23 Nov 2024
security
The South African hacker who built a multi-million-dollar security company
mybroadband.co.za/news/security/541295-the-south-african-hacker-who-built-a-multi-million-dollar-security-company.html
196 sats
\
0 comments
\
@ch0k1
20 Jun 2024
news
Oracle Tells Clients of Second Recent Hack, Log-In Data Stolen
www.bloomberg.com/news/articles/2025-04-02/oracle-tells-clients-of-second-recent-hack-log-in-data-stolen
116 sats
\
0 comments
\
@Coinsreporter
3 Apr
security
Thousands of Linux Systems Infected By Stealthy Malware Since 2021
arstechnica.com/security/2024/10/persistent-stealthy-linux-malware-has-infected-thousands-since-2021/
150 sats
\
0 comments
\
@0xbitcoiner
4 Oct 2024
security
New Ymir Ransomware Exploits Memory for Stealthy Attacks On Corporate Networks
thehackernews.com/2024/11/new-ymir-ransomware-exploits-memory-for.html
182 sats
\
0 comments
\
@ch0k1
12 Nov 2024
security
Chinese organizations are being hit by Cobalt Strike malware from within China
www.techradar.com/pro/security/chinese-organizations-are-being-hit-by-cobalt-strike-malware-from-within-china
311 sats
\
2 comments
\
@ch0k1
4 Sep 2024
news
Ryan Montgomery | Capabilities of Hackers, Tools Hackers use
m.youtube.com/watch?v=9x7LKoutoVE
81 sats
\
0 comments
\
@jakoyoh629
2 Mar
security
Hackers impersonate U.S. government agencies in BEC attacks
www.bleepingcomputer.com/news/security/hackers-impersonate-us-government-agencies-in-bec-attacks/
45 sats
\
0 comments
\
@ch0k1
8 Mar 2024
security
more