Skip to content
Technology Security Information
  • Home
  • News
  • Security
  • Cyber Security
  • Threats

5 reasons not to “hack back”

Posted on April 9, 2025
Are hacking victims “hacking back”? That question was recently posed in headlines like this one from Bloomberg: FBI Investigating Whether Companies Are Engaged in Revenge Hacking. The Marketplace reporter, Ben Johnson, speculated that 2015 might be the year of “hacking back” when he asked me about revenge hacking.
Posted in Security

Post navigation

Previous: Hacked routers used for paid DDoS attacks
Next: ‘Critical Security Updates’ cancelled for 939 million Android users

Recent Posts

  • LG TVs Get Unremovable Microsoft Copilot App
  • Chinese Spacecraft Got Disturbingly Close to Smashing Into a Starlink Satellite
  • Apple Patches More Zero-Days Used in ‘Sophisticated’ Attack
  • Disney Is Prepping a New Gaston ‘Beauty and the Beast’ Spinoff
  • Microsoft will finally kill obsolete cipher that has wreaked decades of havoc

Recent Comments

No comments to show.

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023

Categories

  • Cyber Security
  • News
  • Security
  • Threats
  • Uncategorized

Related Posts

Weekly Update 429

  • Security

Presently sponsored by: Cyberattacks are guaranteed. Is your recovery? Protect…

  • rooter
  • December 8, 2024
  • 1 min read
  • 0

Automating IT Tasks at Scale with Remote Scripting

  • Security

In today’s complex IT environments, managing a growing network of…

  • rooter
  • July 18, 2025
  • 1 min read
  • 0

Is the Convergence of Artificial Intelligence, Cybersecurity, and Business Success a necessary evil?

  • Security

In today’s business environment, the triad of cybersecurity, artificial intelligence…

  • rooter
  • September 7, 2023
  • 1 min read
  • 0

The Imperative of Threat Hunting for a Mature Security Posture  

  • Security

Threat Hunting has transitioned from being a luxury to a…

  • rooter
  • July 23, 2024
  • 1 min read
  • 0
Copyright © 2025 Technology Security Information Theme: Translucent Blog By Adore Themes.