Posts

I'm a grad student writing a paper on the role of hacking as digital insurrectionary anarchism

Vista machine with a forgotten password and family photos stuck on it

DeepNet update — you can now build firewalls, set honeypot traps, and recover confiscated tools

Unauthenticated RCE in Langflow (145K GitHub stars) - one HTTP POST, arbitrary Python execution, exploited 20 hours after disclosure with no public PoC

Navia Data Breach Impacts 2.7 Million

How a Typosquatted Domain and a Fake Version Tag Turned Trivy Into a Credential Stealer

Bugcrowd is garbage

Remotely Controlling TV

Win10 - Printer - Hack or Automatic User Authentication

Notepad exploit explained - kinda

Is there a way to track who harassed me from a fake number?

Mixed feelings when discovering an 8.0 vulnerability that has been patched since...

quindi scribd e risuscitato?

Fuite de données : plus de 60 000 agents de l’État français potentiellement exposés

Ideas for trolling persistent attackers

NEUROBLAST : A HyperCard CyberPunk Zine (Emulated on a playable Vintage Mac Program)

How to Deploy a Dark Web Website (Tor Hidden Service) | Educational Tutorial

Is it possible to get infected by windows virus in linux

Opinions on the Zynq7020 SDR development board?

ndpspoof updated to v0.0.3, now with auto configuration

Microsoft’s ‘unhackable’ Xbox One has been hacked

GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers

At 15, Jonathan James (aka "c0mrade") became the first juvenile ever jailed for hacking.

North Korean Hackers Try to Steal Crypto Via Deepfake Zoom Call

OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration

Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware

FBI Investigating After Malware Found Lurking in Steam PC Games

Data Leaked, What now?

Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit

Esp_Ghost vs Marauder

Hacking like it's 1989. (in an alternate Japanese version of 1989...maybe)

Researchers Trick Perplexity's Comet AI Browser Into Phishing Scam in Under Four Minutes

BitLocker encrypted drive with pin

US judiciary to fast-track court records system upgrade after hacking

Can’t see a contact’s profile picture anymore—restricted or just removed?

status of BLE scanning for axois devices

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

How We Hacked McKinsey's AI Platform

Is oscp certification worth it for career wise?

Got a pop up that said "Go Client, asking authorisation for remote desk access" and I'm scared this was a ransomware attempt and wondering if it has something to do with Lenovo Go Central App ?

Luraoh

ShadowCrew

Microsoft account be hacked

Chinese Hackers Targeted Brazil's Telecoms for Years

MasterHacker Scan even more everything

FBI investigating ‘suspicious’ cyber activities on critical surveillance network

Jeffrey Epstine's email is registered on these websites...

Ransomware Has Created an Entire Industry of Cybercrime Response

How I reverse engineered a phishing campaign's multiple layers of obfuscation

New LexisNexis Data Breach Confirmed After Hackers Leak Files

Inspired by Sombra from Ow. Not trolling.

How often do money transfers specifically exploit text messages synced to computer?

hunger rush pos compromised and I just received this as a victim

searching for email in the database breached files So how do you guys search for a specific email or list or emails in those giant vault?

A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals

2,863 Google API keys on public websites now silently authenticate to Gemini. One developer was billed $82,314 in 48 hours. Google's initial response: "Intended Behavior."

Hacking News Feed

A new world… vibe coding is now just coding.

Is it possible to hack a Miko 2

The Internet Was 25 Days Away From Disaster and No One Knew

TextNow