The hottest Hacking Substack posts right now

And their main takeaways
Category
Top Technology Topics
DeFi Education 419 implied HN points 25 Jun 24
  1. Using the Tenderly Simulator can help you identify fake transactions in the crypto space. It's a useful tool to double-check if a transaction is legitimate or a scam.
  2. Recently, a security issue caused many wallets to be drained and led to scam notifications being sent out. This highlights the importance of security measures in crypto wallets.
  3. It's always a good idea to review security practices regularly to protect your crypto assets. Staying informed can help prevent falling victim to scams.
Distributed Email of Secrets 531 implied HN points 13 Feb 25
  1. A large data leak called LexipolLeaks contains policy manuals from over 8,500 police agencies in the U.S. This information helps the public see what rules their local police follow.
  2. The leak was carried out by a group of hackers who believe there should be more scrutiny on police practices. They targeted Lexipol because of its significant role in creating police policies.
  3. Not all police departments share their policy manuals online. This leak provides a way for people to access manuals that were previously unavailable to the public.
DeFi Education 519 implied HN points 29 May 24
  1. Be careful with your personal information online. Don't share your phone number or email on social platforms like Twitter/X.
  2. Stay updated on security issues, especially if using popular apps. Recent hacks show that accounts can be easily compromised.
  3. There are new updates in DeFi, so keep an eye out for announcements like points farming that can benefit you.
Rings of Saturn 43 implied HN points 08 Jan 25
  1. Segagaga, a Sega RPG, has two hidden debug menus that can be accessed using cheat codes or patches. This makes the game more interactive for players who enjoy exploring its features.
  2. The first debug menu allows players to adjust game statistics, view sprites, and test sound and movie clips. It provides a way to experiment with different elements of the game.
  3. The second debug menu lets players access various game functions directly, including scenarios and mini-games. This menu simplifies navigation and enhances the gaming experience.
Get a weekly roundup of the best Substack posts, by hacker news affinity:
Rings of Saturn 43 implied HN points 04 Jan 25
  1. Games like Grandia Digital Museum have hidden debug modes that let players access special features. You can enable these modes by changing settings in the game's files.
  2. Shinsetsu Samurai Spirits Bushido Retsuden allows players to activate a debug menu with a patch. This lets them test backgrounds and other game elements easily.
  3. In Marica: Shinjitsu no Sekai, players can unlock a debug screen using a specific cheat code. This screen offers more control and allows visiting different game locations.
Rod’s Blog 456 implied HN points 18 Jan 24
  1. Jon and Sofia successfully identified and captured the teenage threat actors behind a financial breach using KQL queries and OSINT techniques.
  2. The threat actors were operating from a suburban house in Seattle, Washington, and were quickly apprehended by authorities, leading to the recovery of the funds.
  3. Despite the success, Jon remains suspicious about the involvement of the Night Princess hacker group, hinting at a potential unresolved mystery for the next chapter.
Vigilainte Newsletter 5 HN points 18 Sep 24
  1. The recent explosions of Hezbollah pagers might be due to a cyberattack, which raises concerns about security. Experts believe these devices could have been compromised before they were even delivered.
  2. There are two main theories: either explosives were included in the pagers or they were hacked to cause overheating. The second option is tricky because hacking multiple devices is quite difficult.
  3. This incident highlights a bigger issue: all communication devices can have weaknesses. It's really important to use good security measures and encryption to keep sensitive information safe.
Rings of Saturn 58 implied HN points 27 Nov 24
  1. A new ROM hack lets Sonic replace NiGHTS in Christmas NiGHTS, allowing him to fly and battle Gillwing. This change brings a fresh experience to fans of the game.
  2. The hack includes custom tweaks, like enabling Sonic to have paraloop trails and using his signature spin attack instead of NiGHTS's drill dash. These updates improve gameplay by making it feel more like a traditional Sonic experience.
  3. Players can quickly access the Sonic present by modifying the game's startup code. This makes it easier for fans to jump right into the action without navigating through menus.
DeFi Education 439 implied HN points 29 Nov 23
  1. Check your DeFi transactions carefully before approving them to avoid losing funds. Malicious attacks can trick you into giving away your money.
  2. Frontend attacks can make trusted websites seem normal but steal your crypto. Always be cautious when interacting with these sites.
  3. Even experienced users can fall victim to these hacks, so it's important to stay informed and learn how to protect your assets.
Thái | Hacker | Kỹ sư tin tặc 1517 implied HN points 12 Jul 22
  1. Solving cybercrime cases during a pandemic can be challenging but rewarding, leading to new ideas and career advancements.
  2. Investigating cyber incidents requires thinking like a hacker to anticipate their next moves and gather crucial evidence.
  3. Learning from mistakes and conducting thorough investigations are crucial in cybersecurity to prevent future attacks and uncover hidden clues.
Natto Thoughts 79 implied HN points 27 Mar 24
  1. Chinese hacker groups have historically displayed poor operations security, making mistakes and leaving evidence, despite successfully targeting critical infrastructure.
  2. The leaked i-SOON documents reveal the extensive involvement of private cyber security companies in China, indicating the government's reliance on external expertise.
  3. The effectiveness of the 'name-and-shame' strategy in compelling or deterring behavior of exposed Chinese threat actors appears limited, as seen with cases like Chengdu 404 and Goldsun.
Natto Thoughts 219 implied HN points 27 Oct 23
  1. A lawsuit revealed potential business ties between Chengdu 404 linked to APT41 and Sichuan i-SOON, shedding light on the ecosystem of IT companies in which these hackers operate.
  2. Sichuan i-SOON has strong connections with universities, offers training programs, and possesses qualifications to work for state security, raising questions about its potential involvement in APT activities.
  3. The similarities between Sichuan i-SOON and Chengdu 404, along with i-SOON's capabilities in surveillance-related technologies, suggest a possible link to APT41 activities and other Chinese APT groups like RedHotel/Earth Lusca.
Metacurity 39 implied HN points 01 Feb 24
  1. The US government disrupted a dangerous Chinese hacking operation known as Volt Typhoon by taking over and wiping infected routers.
  2. Senior officials expressed concern over Beijing's attempts to infiltrate US networks for potential cyberattacks on critical infrastructure.
  3. The operation was part of efforts to prevent future cyberattacks, particularly around potential conflicts like the one involving Taiwan.
Metacurity 39 implied HN points 22 Jan 24
  1. Russian hacking group MidnightBlizzard, also known as Nobelium, breached Microsoft networks and stole emails from executives and employees.
  2. The breach was detected in November but Microsoft began notifying affected staff in January.
  3. Hackers used a password spray attack on an old test account to access multiple email streams.
Fight to Repair 59 implied HN points 17 Aug 23
  1. Security researchers hacked Tesla's seat-warmers to challenge paywalls for features, showcasing vehicle owners' tech skills
  2. Attempts to jailbreak devices demonstrate the growing demand to free devices from vendor constraints, empowering users to reclaim control
  3. Companies face backlash for using software to restrict features, leading to calls for legislation to prevent device disabling and the creation of repair barriers
Thái | Hacker | Kỹ sư tin tặc 119 implied HN points 28 Jul 22
  1. The author will be participating in various events in Vietnam in August 2022, connecting with students and presenting on hacking and defending Vietnamese banks.
  2. There will be a Real World Crypto Day event organized, featuring cryptography experts and discussions on cryptography.
  3. The author humorously mentions creating a new title for himself and hints at organizing an event in Saigon, showcasing a playful approach to self-promotion.
Reboot 32 implied HN points 24 Feb 24
  1. Jailbreaking iPhones was a way to explore the full potential of Apple devices beyond the limitations set by the company.
  2. Jailbreaking in China was not only common but essential for accessing features like multilingual support and blocking spam calls.
  3. Through jailbreaking, individuals found a way to challenge authority, explore political subversiveness, and open up to alternative possibilities.
Natto Thoughts 19 implied HN points 30 Jun 23
  1. The German television miniseries 'The Billion Dollar Code' on Netflix captures the excitement of early hacker culture.
  2. Distributed denial-of-service (DDoS) attacks are evolving in sophistication and targeting new entities, posing significant cyber risks.
  3. China's potential support for Ukraine in reclaiming disputed territories, like Crimea, signifies a shift in geopolitical dynamics and requires careful observation.
Fight to Repair 19 implied HN points 10 Feb 23
  1. ChuxMan successfully hacked his washing machine to fix it after the manufacturer refused to share firmware information, showcasing the challenges consumers face in repairing home appliances.
  2. Enforcement is crucial in ensuring the right to repair, as highlighted by the ChuxMan incident where legislation alone was not enough to facilitate repairs.
  3. The link between software access and repair restrictions is evident in various cases, such as Apple intentionally slowing down iPhones and John Deere using software locks to impede repairs.
Fight to Repair 39 implied HN points 09 Aug 22
  1. DEF CON is a significant hacking conference where cybersecurity community discusses important topics and works towards a more secure future.
  2. The right to repair movement is gaining traction and challenging monopolies on service and repair by big corporations, promoting a circular economy and enhancing security and privacy protections.
  3. Other discussions at DEF CON also focus on the importance of medical device repair and the need for patients to have the ability to modify and improve their own technology.
Fight to Repair 19 implied HN points 27 Jul 22
  1. Audible's dominant market position and DRM policies can significantly impact authors and readers, limiting choices and control over audiobooks.
  2. Planned obsolescence in products not only affects consumers financially but also has environmental consequences, highlighting the need for sustainable choices.
  3. The monopolistic role of middlemen in commerce, like Amazon or Google, can lead to unfair practices and the need for more equitable transactions.
Thái | Hacker | Kỹ sư tin tặc 39 implied HN points 07 Sep 20
  1. Your choices have consequences - Hieupc faced 7 years in prison for his actions, showing the importance of making responsible decisions.
  2. Second chances matter - Hieupc is grateful for the opportunity to turn his life around after leaving prison, emphasizing the importance of giving people a chance to make positive contributions.
  3. Youthful mistakes can lead to valuable lessons - Hieupc's story serves as a cautionary tale about the dangers of misguided actions in one's youth and the potential for redemption.
Thái | Hacker | Kỹ sư tin tặc 19 implied HN points 02 Jan 20
  1. Harvard Kennedy School invites high-ranking leaders from Vietnam to discuss national governance policies with Harvard professors and experts annually.
  2. Addressing cybersecurity challenges in Vietnam requires raising awareness about vulnerabilities, such as high-profile breaches in banking and government sectors.
  3. Ongoing cybersecurity incidents in Vietnam point to the need for improved data protection measures and compliance with cybersecurity laws.
Thái | Hacker | Kỹ sư tin tặc 39 implied HN points 21 May 10
  1. Capture-the-Flag (CTF) is an intellectual sport for hackers, focusing on attacking and defending computer networks. It requires diverse skills like programming, system administration, and cryptography.
  2. CTF competitions like DEF CON CTF are intense, reflecting real-world hacking scenarios and emphasizing teamwork and high-level skills.
  3. CTF events test participants' technical abilities and require physical and mental endurance due to continuous challenges, making them a valuable learning and networking opportunity for cybersecurity enthusiasts.
Phoenix Substack 1 HN point 20 Mar 23
  1. Chameleon is an advanced cybersecurity solution designed to detect and respond to malicious activity in real-time by changing the attack surface of the system.
  2. The system, created by programmer Akira Nakamura, uses mature integrations with security products and heat maps to stay ahead of evolving threats.
  3. Chameleon successfully thwarted a skilled hacker named Ghost by constantly adapting and deploying a black ICE program to stop him.
Thái | Hacker | Kỹ sư tin tặc 39 implied HN points 25 Sep 07
  1. Be cautious about sharing personal information online, as skilled individuals can use social engineering techniques to gather detailed information about you.
  2. Utilize advanced Google search operators like 'site:' and 'filetype:' to refine your search results and find specific information within websites or file types.
  3. To protect yourself from being exploited through Google, learn about techniques like using a robots.txt file to control which parts of your website are indexed by search engines.
Thái | Hacker | Kỹ sư tin tặc 19 implied HN points 12 Nov 06
  1. The incident of Huyremy, known as 'hacker number 1 in Vietnam,' sparked a heated debate in the IT community regarding the evidence presented by C15 and Huyremy's denial.
  2. The legal aspect highlights the responsibility of the owner of the computer and internet connection used in the cyber crime incident, emphasizing the need to provide evidence to prove innocence.
  3. C15 demonstrated expertise in computer forensics, raising doubts about Huyremy's claim of being a top hacker due to the evidence left behind.
Seriously Risky Business 0 implied HN points 06 Apr 23
  1. The UK's National Cyber Force aims to disrupt adversary behavior by exploiting their reliance on digital technology.
  2. Offensive cyber operations by the NCF focus on cognitive effects and disrupting adversary systems over a period.
  3. The response to the 3CX supply chain attack was quicker compared to past breaches, showing improvement in addressing cyber threats.
Seriously Risky Business 0 implied HN points 30 Mar 23
  1. A proposal for a US Cyber Force as a 7th branch of the armed services is being considered, but there are concerns about the necessity and impact of such a move.
  2. Biden's executive order on spyware aims to restrict commercial spyware use by the US government, formalizing existing practices, and working in conjunction with legislative initiatives.
  3. The UK's NHS released a cyber security strategy focusing on collaboration, risk management, and learning from past cyber incidents, addressing challenges like limited cyber workforce and legacy technology.