The Hacker News
thehackernews.com
The Hacker News | #1 Trusted Source for Cybersecurity News
The Hacker News is the top cybersecurity news platform, delivering real-time updates, threat intelligence, data breach reports, expert analysis, and actionable insights for infosec professionals and decision-makers.
Vulnerabilities
Explore the latest news, real-world incidents, expert analysis, and trends in Vulnerability — only on The Hacker News, the leading cybersecurity and IT news platform.
Data Breaches
Explore the latest news, real-world incidents, expert analysis, and trends in data breach — only on The Hacker News, the leading cybersecurity and IT news platform.
Cyber Attacks
Explore the latest news, real-world incidents, expert analysis, and trends in Cyber Attack — only on The Hacker News, the leading cybersecurity and IT news platform.
Webinars
Psychology of Social Engineering: Decoding the Mind of a Cyber Attacker · Ever wondered why social engineering works so well? Think Like a Hacker, Defend Like a Pro.
Hacker News
news.ycombinator.com
Hacker News
We cannot provide a description for this page right now
Videos
01:59
New cyberattack by N. Korea-backed hackers infiltrate victims' ...
38:26
How to Eliminate Identity-Based Threats with The Hacker News - YouTube
05:06
AI Is Speeding Up Cybercrime - Threat Wire - YouTube
21:16
An ethical hacker’s tips for staying safe online | Terms of Service ...
06:56
Can Hackers find you? - YouTube
07:15
Former NSA hacker warns of cyberattacks targeting airlines | Fox ...
Ask HN: Does anyone understand how Hacker News works?
What I find strange is that Hacker News feels oddly opaque. I’ve never met anyone who can clearly explain how it works in practice. Not just the rules, but the dynamics: what’s repeatable, what’s luck, and what actually matters · By using the Kevin Bacon-number idea: I can usually get ... More on news.ycombinator.com
How did I get here?
This is categorically incorrect. While the AS path is often the same, the actual peering points are almost always quite different. Most ASes use hot-potato routing - getting packets to the next AS at the closest peering point to the source of the traffic. (And even if cold-potato routing is ... More on news.ycombinator.com
Disrupting the first reported AI-orchestrated cyber espionage campaign
Guardrails in AI are like a $2 luggage padlock on a bicycle in the middle of nowhere. Even a moron, given enough time, and a little dedication, will defeat it. And this is not some kind of inferiority of one AI manufacturer over another. It's inherent to LLMs. More on news.ycombinator.com
Cloudflare outage on November 18, 2025 post mortem
As a visitor to random web pages, I definitely appreciated this—much better than their completely false “checking the security of your connection” message · Also appreciate the honesty here More on news.ycombinator.com
LinkedIn
linkedin.com › company › thehackernews
The Hacker News | LinkedIn
#1 Most trusted publication for ... | The Hacker News : #1 Most trusted publication for breaking cybersecurity and hacking news, insights, and analysis for information security professionals....
Wikipedia
en.wikipedia.org › wiki › Hacker_News
Hacker News - Wikipedia
November 29, 2025 - Hacker News (HN) is an American social news website focusing on computer science and entrepreneurship. It is run by the investment fund and startup incubator Y Combinator. In general, content that can be submitted is defined as "anything that ...
Hacker News
news.ycombinator.com › item
Ask HN: Does anyone understand how Hacker News works? | Hacker News
6 days ago - What I find strange is that Hacker News feels oddly opaque. I’ve never met anyone who can clearly explain how it works in practice. Not just the rules, but the dynamics: what’s repeatable, what’s luck, and what actually matters · By using the Kevin Bacon-number idea: I can usually get ...
CISA
cisa.gov › news-events › alerts › 2025 › 11 › 24 › spyware-allows-cyber-threat-actors-target-users-messaging-applications
Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications | CISA
November 24, 2025 - 2 Unit 42, “LANDFALL: New ...roid-spyware/; and Ravie Lakshmanan, “WhatsApp Patches Zero-Click Exploit Targeting iOS and macOS Devices,” The Hacker News, August 30, 2025, https://thehackernews.com/2025/08/whatsapp-issues-emergency-update-for.html....
Hackread
hackread.com
Hackread – Cybersecurity News, Data Breaches, AI, and More
Risk fragmentation remains one of the most overlooked barriers to effective business performance. It doesn’t show up all at once, but rather… ... A hacker using the alias “Lovely” has leaked what they claim is the personal data of over 2.3 million Wired.com users, a prominent…
Hacker News
news.ycombinator.com › item
How did I get here? | Hacker News
September 23, 2025 - This is categorically incorrect. While the AS path is often the same, the actual peering points are almost always quite different. Most ASes use hot-potato routing - getting packets to the next AS at the closest peering point to the source of the traffic. (And even if cold-potato routing is ...
YouTube
youtube.com › watch
Ex-FBI Official Explains How The FBI Catches Hackers | Cynthia Kaiser #005 - YouTube
In this episode of Private Chat by Cybernews, 20-year FBI cyber intelligence veteran Cynthia Kaiser shares her experience as a daily briefer for both Obama a...
Published November 5, 2025
Hacker News
news.ycombinator.com › item
Disrupting the first reported AI-orchestrated cyber espionage campaign | Hacker News
November 18, 2025 - Guardrails in AI are like a $2 luggage padlock on a bicycle in the middle of nowhere. Even a moron, given enough time, and a little dedication, will defeat it. And this is not some kind of inferiority of one AI manufacturer over another. It's inherent to LLMs.
Reddit
reddit.com › r › hackernews
Hacker News
March 17, 2008 - Why not automate them? https://www.newstatesman.com/business/companies/2023/05/ceos-salaries-expensive-automate-robots · Meta created 'playbook' to fend off pressure to crack down on scammers ... https://www.reuters.com/investigations/meta-created-playbook-fend-off-pressure-crack-down-scammers-documents-show-2025-12-31/ Bot is back! ... Bot is back! Update to https://www.reddit.com/r/hackernews/comments/1pnzpno/bot_broken/
Hacker News
news.ycombinator.com › item
Cloudflare outage on November 18, 2025 post mortem | Hacker News
November 27, 2025 - As a visitor to random web pages, I definitely appreciated this—much better than their completely false “checking the security of your connection” message · Also appreciate the honesty here
Hacker News
news.ycombinator.com › item
52 Year old data tape could contain Unix history | Hacker News
November 16, 2025 - Etc is strange, yeah · But the computer field just shrugs and keeps doing whatever they were doing. Given what the hackers of the 60's and 70's did on crap machines with no resources, you'd think people would want to review what they can teach modern developers
Hacker News
news.ycombinator.com › item
AI Slop vs. OSS Security | Hacker News
October 9, 2025 - I think this is the fundamental problem of LLMs in general. Some of the time looks just enough right to seem legitimate. Luckily the rest of the time it doesn’t · But all of it’s responses definitely seem convincing (as it has been trained to do)
Hacker News
news.ycombinator.com › item
The Hacker’s Manifesto (1986) | Hacker News
November 19, 2025 - Nonetheless, I can't help but admire the rebellious spirit in this article. A lot of human social systems really are conformist and oppressive - high school absolutely included - and I have some respect for people who chafe against it · I guess it would be good to ask, what specifically was ...