Hacker News new | past | comments | ask | show | jobs | submit | from login
Solving NIST Password Complexities: Guidance from a GRC Perspective (trustedsec.com)
2 points by todsacerdoti 3 months ago | past
Console Cowboys: Navigating the Modern Terminal Frontier (trustedsec.com)
3 points by yarapavan 7 months ago | past
Specula – Turning Outlook into a C2 with One Registry Change (trustedsec.com)
1 point by aspenmayer 9 months ago | past | 1 comment
XZ Utils Made Me Paranoid (trustedsec.com)
3 points by ementally 12 months ago | past
XZ Utils Made Me Paranoid (trustedsec.com)
4 points by todsacerdoti 12 months ago | past
A look at a recently patched Microsoft Graph logging bypass (trustedsec.com)
1 point by skilled on April 30, 2024 | past
From Error to Entry: Cracking the Code of Password-Spraying Tools (trustedsec.com)
1 point by furcyd on March 19, 2024 | past
Critical vulnerability in progress MoveIt Transfer (trustedsec.com)
5 points by anigbrowl on June 1, 2023 | past | 1 comment
The Curious Case of the Password Database (trustedsec.com)
2 points by ahamez on Oct 23, 2022 | past
A Brief History of Password Storage, Transmission, & Cracking (2015) (trustedsec.com)
1 point by mooreds on Sept 14, 2022 | past
RisingSun: Decoding Sunburst C2 to Identify Infected Hosts Without Network Telem (trustedsec.com)
1 point by autoditype on Jan 17, 2021 | past
Red Teaming with Cobalt Strike – Not So Obvious Features – TrustedSec (trustedsec.com)
2 points by aburan28 on Aug 28, 2020 | past
Is Zoom’s Lack of End-to-End Encryption a Problem? (trustedsec.com)
2 points by furcyd on April 2, 2020 | past
Attacks on the Rise Through Office 365 (trustedsec.com)
1 point by furcyd on Oct 23, 2019 | past
A Buyer’s Guide to Beginning SDR (trustedsec.com)
2 points by petethomas on Oct 23, 2018 | past
CORS Findings: Another Way to Comprehend (trustedsec.com)
1 point by wolframio on April 6, 2018 | past
Introduction to GPU Password Cracking: Owning the LinkedIn Password Dump (trustedsec.com)
164 points by adamnemecek on June 20, 2016 | past | 74 comments
A Brief History of Password Storage, Transmission, and Cracking (trustedsec.com)
40 points by bootload on June 9, 2015 | past | 4 comments
Shellshock DHCP Remote Code Execution – Proof of Concept (trustedsec.com)
355 points by jeffmcjunkin on Sept 25, 2014 | past | 155 comments
Is the Affordable Health Care Website Secure? Probably not. (trustedsec.com)
2 points by arikrak on Oct 24, 2013 | past

Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: