#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

4chan hacked | Breaking Cybersecurity News | The Hacker News

"4chan Hacked", Most Popular Image-Bulletin Board Compromised

"4chan Hacked", Most Popular Image-Bulletin Board Compromised

Apr 30, 2014
The founder of 4chan , Christopher Poole , aka "moot" has confirmed few hours ago, in a blog post that the popular image-based bulletin board was hacked. The attacker gained access to the administrative functions and successfully hacked into one of 4chan's database by exploiting a website's software vulnerability last week. The motive behind the hack was to expose the posting habits of a specific user the attacker didn't like, moot wrote. It is believed that the software vulnerability allowed the attacker to hack into only the image-board moderation panels, and some tables in the 4chan back-end database . According to the blog post, the way hacker extracted the information from its database, 4chan knows the " detailed logs of what was accessed", which indicate that the "primarily moderator account names " and their "credentials" were targeted and compromised by the hacker. " Due to the way the intruder extracted information from the database, we have detailed logs of wh
Hacker ‘Cosmo the God’ Sentenced and Banned from Internet for Six Years

Hacker 'Cosmo the God' Sentenced and Banned from Internet for Six Years

Nov 10, 2012
A 15-year-old  UG Nazi hacker  going by the name of Cosmo or Cosmo the God  was sentenced in juvenile court on Wednesday with terms for six years without any computers or Internet, until his 21st birthday. During these 6 years, he'll need approval from his parole officer to access the internet. Wired report that hacker resides in Long Beach, California, and began as a politicized group that opposed SOPA, took down a bevy of websites this year, including those for NASDAQ, CIA.gov, and UFC.com. It redirected 4Chan's DNS to point to its own Twitter feed. Hacker pled guilty to more than a few felonies, with charges ranging from credit card fraud to online impersonation. The probation that Cosmo agreed to as part of his plea limits his use of the internet to solely educational purposes, and all use will be supervised. As part of the hacker group UGNazi, he was able to gain access to accounts on sites including Amazon, PayPal, Microsoft, Netflix, and many more. He is prohibited from
Code Keepers: Mastering Non-Human Identity Management

Code Keepers: Mastering Non-Human Identity Management

Apr 12, 2024DevSecOps / Identity Management
Identities now transcend human boundaries. Within each line of code and every API call lies a non-human identity. These entities act as programmatic access keys, enabling authentication and facilitating interactions among systems and services, which are essential for every API call, database query, or storage account access. As we depend on multi-factor authentication and passwords to safeguard human identities, a pressing question arises: How do we guarantee the security and integrity of these non-human counterparts? How do we authenticate, authorize, and regulate access for entities devoid of life but crucial for the functioning of critical systems? Let's break it down. The challenge Imagine a cloud-native application as a bustling metropolis of tiny neighborhoods known as microservices, all neatly packed into containers. These microservices function akin to diligent worker bees, each diligently performing its designated task, be it processing data, verifying credentials, or
Cybersecurity Resources