Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
pjc50
6 days ago
|
parent
|
context
|
favorite
| on:
The coming industrialisation of exploit generation...
Once your exploit machine is good enough, you can start using stolen credentials to mine more exploits. This is going to be the new version of malware installing bitcoin miners.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: