🌐
The Hacker News
thehackernews.com
The Hacker News | #1 Trusted Source for Cybersecurity News
The Hacker News is the top cybersecurity news platform, delivering real-time updates, threat intelligence, data breach reports, expert analysis, and actionable insights for infosec professionals and decision-makers.
Vulnerabilities
Explore the latest news, real-world incidents, expert analysis, and trends in Vulnerability — only on The Hacker News, the leading cybersecurity and IT news platform.
Data Breaches
Explore the latest news, real-world incidents, expert analysis, and trends in data breach — only on The Hacker News, the leading cybersecurity and IT news platform.
Cyber Attacks
Explore the latest news, real-world incidents, expert analysis, and trends in Cyber Attack — only on The Hacker News, the leading cybersecurity and IT news platform.
 Webinars
Psychology of Social Engineering: Decoding the Mind of a Cyber Attacker · Ever wondered why social engineering works so well? Think Like a Hacker, Defend Like a Pro.

social news website

Hacker News (HN) is an American social news website focusing on computer science and entrepreneurship. It is run by the investment fund and startup incubator Y Combinator. In general, content that can … Wikipedia
Factsheet
Type of site News aggregator
Available in English
Factsheet
Type of site News aggregator
Available in English
🌐
Hacker News
news.ycombinator.com
Hacker News
We cannot provide a description for this page right now
Discussions

Ask HN: Does anyone understand how Hacker News works?
What I find strange is that Hacker News feels oddly opaque. I’ve never met anyone who can clearly explain how it works in practice. Not just the rules, but the dynamics: what’s repeatable, what’s luck, and what actually matters · By using the Kevin Bacon-number idea: I can usually get ... More on news.ycombinator.com
🌐 news.ycombinator.com
231
171
6 days ago
How did I get here?
This is categorically incorrect. While the AS path is often the same, the actual peering points are almost always quite different. Most ASes use hot-potato routing - getting packets to the next AS at the closest peering point to the source of the traffic. (And even if cold-potato routing is ... More on news.ycombinator.com
🌐 news.ycombinator.com
65
406
September 23, 2025
Disrupting the first reported AI-orchestrated cyber espionage campaign
Guardrails in AI are like a $2 luggage padlock on a bicycle in the middle of nowhere. Even a moron, given enough time, and a little dedication, will defeat it. And this is not some kind of inferiority of one AI manufacturer over another. It's inherent to LLMs. More on news.ycombinator.com
🌐 news.ycombinator.com
284
376
November 18, 2025
Cloudflare outage on November 18, 2025 post mortem
As a visitor to random web pages, I definitely appreciated this—much better than their completely false “checking the security of your connection” message · Also appreciate the honesty here More on news.ycombinator.com
🌐 news.ycombinator.com
916
1465
November 27, 2025
🌐
LinkedIn
linkedin.com › company › thehackernews
The Hacker News | LinkedIn
#1 Most trusted publication for ... | The Hacker News : #1 Most trusted publication for breaking cybersecurity and hacking news, insights, and analysis for information security professionals....
🌐
Facebook
facebook.com › thehackernews
The Hacker News | Facebook
The Hacker News. 1,877,557 likes · 9,088 talking about this. #1 Most trusted source for cybersecurity news, insights & analysis — driving action for those who lead and secure.
🌐
Wikipedia
en.wikipedia.org › wiki › Hacker_News
Hacker News - Wikipedia
November 29, 2025 - Hacker News (HN) is an American social news website focusing on computer science and entrepreneurship. It is run by the investment fund and startup incubator Y Combinator. In general, content that can be submitted is defined as "anything that ...
🌐
Instagram
instagram.com › thehackernews
The Hacker News (@thehackernews) • Instagram photos and videos
147K Followers, 2 Following, 1,271 Posts - The Hacker News (@thehackernews) on Instagram: "Most trusted source for cybersecurity news, insights, and analysis — built for defenders and trusted by decision-makers."
Find elsewhere
🌐
X
x.com › TheHackersNews
The Hacker News (@TheHackersNews) / X
October 29, 2010 - Read the full story ↓Show more ... A new botnet called RondoDox is attacking unpatched XWiki servers through a critical bug (CVE-2025-24893, score 9.8). Hackers are using it to spread crypto miners and ...
🌐
Hacker News
news.ycombinator.com › item
Ask HN: Does anyone understand how Hacker News works? | Hacker News
6 days ago - What I find strange is that Hacker News feels oddly opaque. I’ve never met anyone who can clearly explain how it works in practice. Not just the rules, but the dynamics: what’s repeatable, what’s luck, and what actually matters · By using the Kevin Bacon-number idea: I can usually get ...
🌐
CISA
cisa.gov › news-events › alerts › 2025 › 11 › 24 › spyware-allows-cyber-threat-actors-target-users-messaging-applications
​​Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications​ | CISA
November 24, 2025 - 2 Unit 42, “LANDFALL: New ...roid-spyware/; and Ravie Lakshmanan, “WhatsApp Patches Zero-Click Exploit Targeting iOS and macOS Devices,” The Hacker News, August 30, 2025, https://thehackernews.com/2025/08/whatsapp-issues-emergency-update-for.html....
🌐
Hackread
hackread.com
Hackread – Cybersecurity News, Data Breaches, AI, and More
Risk fragmentation remains one of the most overlooked barriers to effective business performance. It doesn’t show up all at once, but rather… ... A hacker using the alias “Lovely” has leaked what they claim is the personal data of over 2.3 million Wired.com users, a prominent…
🌐
Hacker News
news.ycombinator.com › item
How did I get here? | Hacker News
September 23, 2025 - This is categorically incorrect. While the AS path is often the same, the actual peering points are almost always quite different. Most ASes use hot-potato routing - getting packets to the next AS at the closest peering point to the source of the traffic. (And even if cold-potato routing is ...
🌐
YouTube
youtube.com › c › thehackernews
The Hacker News - YouTube
The #1 trusted source for cybersecurity news, insights, and analysis — built for defenders and trusted by decision-maker.
🌐
YouTube
youtube.com › watch
Ex-FBI Official Explains How The FBI Catches Hackers | Cynthia Kaiser #005 - YouTube
In this episode of Private Chat by Cybernews, 20-year FBI cyber intelligence veteran Cynthia Kaiser shares her experience as a daily briefer for both Obama a...
Published   November 5, 2025
🌐
Hacker News
news.ycombinator.com › item
Disrupting the first reported AI-orchestrated cyber espionage campaign | Hacker News
November 18, 2025 - Guardrails in AI are like a $2 luggage padlock on a bicycle in the middle of nowhere. Even a moron, given enough time, and a little dedication, will defeat it. And this is not some kind of inferiority of one AI manufacturer over another. It's inherent to LLMs.
🌐
Reddit
reddit.com › r › hackernews
Hacker News
March 17, 2008 - Why not automate them? https://www.newstatesman.com/business/companies/2023/05/ceos-salaries-expensive-automate-robots · Meta created 'playbook' to fend off pressure to crack down on scammers ... https://www.reuters.com/investigations/meta-created-playbook-fend-off-pressure-crack-down-scammers-documents-show-2025-12-31/ Bot is back! ... Bot is back! Update to https://www.reddit.com/r/hackernews/comments/1pnzpno/bot_broken/
🌐
Hacker News
news.ycombinator.com › item
Cloudflare outage on November 18, 2025 post mortem | Hacker News
November 27, 2025 - As a visitor to random web pages, I definitely appreciated this—much better than their completely false “checking the security of your connection” message · Also appreciate the honesty here
🌐
Reuters
reuters.com › technology › cybersecurity
Cybersecurity | Latest Cyber Security News | Reuters
2 days ago - WorldcategoryRussian defense firms targeted by hackers using AI, other tactics · December 19, 2025 · WorldcategoryUK government was hacked in October, minister confirms · December 19, 2025 · BusinesscategoryBlackBerry lifts lower end of annual revenue forecast on cybersecurity demand ·
🌐
Hacker News
news.ycombinator.com › item
52 Year old data tape could contain Unix history | Hacker News
November 16, 2025 - Etc is strange, yeah · But the computer field just shrugs and keeps doing whatever they were doing. Given what the hackers of the 60's and 70's did on crap machines with no resources, you'd think people would want to review what they can teach modern developers
🌐
Hacker News
news.ycombinator.com › item
AI Slop vs. OSS Security | Hacker News
October 9, 2025 - I think this is the fundamental problem of LLMs in general. Some of the time looks just enough right to seem legitimate. Luckily the rest of the time it doesn’t · But all of it’s responses definitely seem convincing (as it has been trained to do)
🌐
Hacker News
news.ycombinator.com › item
The Hacker’s Manifesto (1986) | Hacker News
November 19, 2025 - Nonetheless, I can't help but admire the rebellious spirit in this article. A lot of human social systems really are conformist and oppressive - high school absolutely included - and I have some respect for people who chafe against it · I guess it would be good to ask, what specifically was ...