Hacker Newsnew | past | comments | ask | show | jobs | submit | jwcrux's submissionslogin
1.Hunting for Malicious Packages on PyPI (jordan-wright.com)
4 points by jwcrux on Nov 12, 2020 | past
2.Data Companies Are Watching Me (duo.com)
1 point by jwcrux on July 9, 2020 | past
3.Protecting Accounts from Credential Stuffing (duo.com)
1 point by jwcrux on March 10, 2020 | past
4.An Introduction to the Noise Protocol Framework (duo.com)
2 points by jwcrux on March 6, 2020 | past
5.How to Monitor GitHub for Secrets (duo.com)
1 point by jwcrux on Sept 25, 2019 | past
6.How Security Keys Store Credentials (duo.com)
3 points by jwcrux on July 16, 2019 | past | 1 comment
7.Detecting Phishing with SPF Macros (duo.com)
1 point by jwcrux on July 16, 2019 | past
8.Building Web Servers in Go (getgophish.com)
5 points by jwcrux on Dec 2, 2018 | past
9.Anatomy of Twitter Bots: Fake Followers (duo.com)
1 point by jwcrux on Oct 23, 2018 | past
10.Hunting Twitter Bots at Scale (duo.com)
2 points by jwcrux on Aug 15, 2018 | past
11.Show HN: Purl – Command Line URL Parser (github.com/jordan-wright)
1 point by jwcrux on June 30, 2018 | past | 1 comment
12.Hunting and Analyzing Phishing Kits at Scale (duo.com)
3 points by jwcrux on Oct 31, 2017 | past
13.The Realities of Being a FOSS Maintainer (caddy.community)
215 points by jwcrux on Sept 16, 2017 | past | 120 comments
14.Hunting Malicious npm Packages (duo.com)
2 points by jwcrux on Aug 13, 2017 | past
15.Hunting for Malicious npm Packages (duo.com)
2 points by jwcrux on Aug 8, 2017 | past
16.Driving Headless Chrome with Python (duo.com)
1 point by jwcrux on May 23, 2017 | past
17.Why the MongoDB Ransomware Shouldn't Surprise Anyone (duo.com)
1 point by jwcrux on Jan 16, 2017 | past
18.Memcached Vulnerable to Remote Code Execution (talosintel.com)
2 points by jwcrux on Nov 1, 2016 | past
19.The Science of Duo in Space: Part One (duo.com)
1 point by jwcrux on Oct 25, 2016 | past
20.Redis Instances Are Being Targeted by Fake Ransomware (duo.com)
1 point by jwcrux on Sept 6, 2016 | past
21.Over 18,000 Redis Instances Targeted by Fake Ransomware (duo.com)
8 points by jwcrux on Aug 31, 2016 | past
22.LastPass Security Updates (lastpass.com)
2 points by jwcrux on July 28, 2016 | past
23.Breaking PHP’s Garbage Collection and Unserialize (evonide.com)
3 points by jwcrux on July 25, 2016 | past | 1 comment
24.Show HN: Insight – A Simple, Completely Free Phishing Assessment (duo.com)
12 points by jwcrux on July 12, 2016 | past | 2 comments
25.How to Keep Calm and Mitigate a 470 Gbps DDoS Attack (incapsula.com)
1 point by jwcrux on July 1, 2016 | past
26.Analyzing 4.3M Police Call Records (jordan-wright.com)
1 point by jwcrux on June 23, 2016 | past
27.Analyzing 5 Years of Police Call Data (jordan-wright.com)
4 points by jwcrux on June 22, 2016 | past
28.How the Top 5 OEMs Open Your Laptop to Hackers (wired.com)
1 point by jwcrux on May 31, 2016 | past
29.The Full Story Behind Bloomberg's Attempt to “Unmask” Zero Hedge (zerohedge.com)
2 points by jwcrux on April 29, 2016 | past
30.“Badlock” Details Have Been Released (badlock.org)
1 point by jwcrux on April 12, 2016 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: