Advertised sites are not endorsed by us. They may be
unsafe, untrustworthy, or illegal in your jurisdiction.
Press release
Submit a press release here.
How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Stephen Hawking
DDoS Attacks
Posts Tagged ‘Isohunt’
Most Recent
Read More
January 30, 2015

The World No Longer Needs The Pirate Bay to Return: We Can Do it Ourselves

Late last year, The Pirate Bay servers were raided by Swedish police and taken offline for longer than most expected. During the downtime, alternatives emerged and people began to move on from the salty cove of their piracy haven and onto other avenues – hopefully seeding their hearts out after taking in their fill.

Read More
January 7, 2015

The Pirate Bay Posts Countdown Clock Spurring Theories of Comeback, But Does It Really Need One?

On Dec. 9, 2014, the Pirate Bay’s data center was raided by the Swedish police, prompting the site to go offline for the entire month. In the meantime, Isohunt worked to build a version of the Old Pirate Bay while also releasing an easy-to-follow guide for anyone to create their own version of the Pirate Bay if they wish.

Read More
December 27, 2014

The Pirate Bay is ‘Back,’ Open-Source and Looking At Decentralization

The Jolly Roger is flying high again now that the Pirate Bay is back online… in a sense.

When the Pirate Bay servers were taken down, there was an immediate backlash and retaliation from both the hacking community and torrent community. While the hacker group Anonymous targeted police officer’s personal information, Isohunt was busy working on bringing the Pirate Bay back to life.

Isohunt launched a copy of the Pirate Bay shortly after the official site was taken down, but it wasn’t stopping there. They’ve now debuted the Open Bay, a site that lets any person create their own Pirate Bay by following four simple steps.

We, the team that brought you and [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University