| 1. | | Hunting for Malicious Packages on PyPI (jordan-wright.com) |
| 4 points by jwcrux on Nov 12, 2020 | past |
|
| 2. | | Data Companies Are Watching Me (duo.com) |
| 1 point by jwcrux on July 9, 2020 | past |
|
| 3. | | Protecting Accounts from Credential Stuffing (duo.com) |
| 1 point by jwcrux on March 10, 2020 | past |
|
| 4. | | An Introduction to the Noise Protocol Framework (duo.com) |
| 2 points by jwcrux on March 6, 2020 | past |
|
| 5. | | How to Monitor GitHub for Secrets (duo.com) |
| 1 point by jwcrux on Sept 25, 2019 | past |
|
| 6. | | How Security Keys Store Credentials (duo.com) |
| 3 points by jwcrux on July 16, 2019 | past | 1 comment |
|
| 7. | | Detecting Phishing with SPF Macros (duo.com) |
| 1 point by jwcrux on July 16, 2019 | past |
|
| 8. | | Building Web Servers in Go (getgophish.com) |
| 5 points by jwcrux on Dec 2, 2018 | past |
|
| 9. | | Anatomy of Twitter Bots: Fake Followers (duo.com) |
| 1 point by jwcrux on Oct 23, 2018 | past |
|
| 10. | | Hunting Twitter Bots at Scale (duo.com) |
| 2 points by jwcrux on Aug 15, 2018 | past |
|
| 11. | | Show HN: Purl – Command Line URL Parser (github.com/jordan-wright) |
| 1 point by jwcrux on June 30, 2018 | past | 1 comment |
|
| 12. | | Hunting and Analyzing Phishing Kits at Scale (duo.com) |
| 3 points by jwcrux on Oct 31, 2017 | past |
|
| 13. | | The Realities of Being a FOSS Maintainer (caddy.community) |
| 215 points by jwcrux on Sept 16, 2017 | past | 120 comments |
|
| 14. | | Hunting Malicious npm Packages (duo.com) |
| 2 points by jwcrux on Aug 13, 2017 | past |
|
| 15. | | Hunting for Malicious npm Packages (duo.com) |
| 2 points by jwcrux on Aug 8, 2017 | past |
|
| 16. | | Driving Headless Chrome with Python (duo.com) |
| 1 point by jwcrux on May 23, 2017 | past |
|
| 17. | | Why the MongoDB Ransomware Shouldn't Surprise Anyone (duo.com) |
| 1 point by jwcrux on Jan 16, 2017 | past |
|
| 18. | | Memcached Vulnerable to Remote Code Execution (talosintel.com) |
| 2 points by jwcrux on Nov 1, 2016 | past |
|
| 19. | | The Science of Duo in Space: Part One (duo.com) |
| 1 point by jwcrux on Oct 25, 2016 | past |
|
| 20. | | Redis Instances Are Being Targeted by Fake Ransomware (duo.com) |
| 1 point by jwcrux on Sept 6, 2016 | past |
|
| 21. | | Over 18,000 Redis Instances Targeted by Fake Ransomware (duo.com) |
| 8 points by jwcrux on Aug 31, 2016 | past |
|
| 22. | | LastPass Security Updates (lastpass.com) |
| 2 points by jwcrux on July 28, 2016 | past |
|
| 23. | | Breaking PHP’s Garbage Collection and Unserialize (evonide.com) |
| 3 points by jwcrux on July 25, 2016 | past | 1 comment |
|
| 24. | | Show HN: Insight – A Simple, Completely Free Phishing Assessment (duo.com) |
| 12 points by jwcrux on July 12, 2016 | past | 2 comments |
|
| 25. | | How to Keep Calm and Mitigate a 470 Gbps DDoS Attack (incapsula.com) |
| 1 point by jwcrux on July 1, 2016 | past |
|
| 26. | | Analyzing 4.3M Police Call Records (jordan-wright.com) |
| 1 point by jwcrux on June 23, 2016 | past |
|
| 27. | | Analyzing 5 Years of Police Call Data (jordan-wright.com) |
| 4 points by jwcrux on June 22, 2016 | past |
|
| 28. | | How the Top 5 OEMs Open Your Laptop to Hackers (wired.com) |
| 1 point by jwcrux on May 31, 2016 | past |
|
| 29. | | The Full Story Behind Bloomberg's Attempt to “Unmask” Zero Hedge (zerohedge.com) |
| 2 points by jwcrux on April 29, 2016 | past |
|
| 30. | | “Badlock” Details Have Been Released (badlock.org) |
| 1 point by jwcrux on April 12, 2016 | past |
|
|
| More |