Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Once your exploit machine is good enough, you can start using stolen credentials to mine more exploits. This is going to be the new version of malware installing bitcoin miners.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: