
Women breaking the kernel
As hacking matured, curiosity gave way to rigour. The underground began to intersect with academia, security research labs, and vendor

As hacking matured, curiosity gave way to rigour. The underground began to intersect with academia, security research labs, and vendor

When computers became networked, hacking changed shape. The phone lines were still there, but now they carried data, identities, and

They moved from espionage to physical disruption. Their operations have affected national power grids, critical infrastructure, and global supply chains.

APT29 is a cyber unit that operates behind the world’s most powerful governments. Their intrusions rarely make headlines because, unlike

Few threat actors have shaped modern geopolitics as Fancy Bear. Operating in the shadows but influencing events on a global

Long before the internet existed, hackers explored a different kind of network, the global phone system. These early explorers, known

If you google famous real life hackers, you will come up with names like Kevin Mitnick, Albert Gonzales, Adrian Lamo.

At the beginning of December 2025, some of the members of the Lazarus group were caught on camera while conducting

Long before laptops and cloud computing became part of everyday life, a small gathering in a Silicon Valley garage changed
Articles you can enjoy without specific knowledge
Start learning new topics from their basic concepts
Get into the nitty-gritty of things with advanced topics
Crack your knuckles and get ready on your terminal
PID Perspectives is migrating to European Servers. Please, let us know if you experience a slow response or technical issues.