#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Get the Free Newsletter
SaaS Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Epsilon's (Marketing services firm) Customer Lists of Major Brands Compromised !

Epsilon's (Marketing services firm) Customer Lists of Major Brands Compromised !

Apr 02, 2011
Epsilon' s (Marketing services firm) Customer Lists of Major Brands Compromised ! Due to the growing list of brands disclosing that they have been compromised as a result of this breach, I'm going to go ahead and tag this as a massive breach. And I only expect it to get bigger as more announcements come out from Epsilon customers. Read More :  https://bit.ly/hGrQz2
Comodo hacker claim no relation to Iranian Cyber Army !

Comodo hacker claim no relation to Iranian Cyber Army !

Apr 02, 2011
Comodo hacker claim no relation to Iranian Cyber Army ! The alleged hacker of Comodo stepped forward this weekend to explain how he generated bogus SSL certificates for login.skype.com, mail.google.com, login.live.com and other popular internet websites. His story is that he was able to compromise Comodo's partner GlobalTrust.it and InstantSSL.it. Both sites are currently "under construction." He brags how he decided to bring down the SSL root certificate system and began by attacking the RSA algorithm, but when he found the vulnerabilities in these websites he decided on that approach. On that point I would have to agree with him, as hacking the RSA algorithm seems a significantly more difficult challenge, but the text of his "manifesto" is so full of bravado it is difficult to even read. While he is Iranian, he claims no association with the "Iranian Cyber Army" and insists he is simply a hacker with a 1000 times the knowledge and experienc
Making Sense of Operational Technology Attacks: The Past, Present, and Future

Making Sense of Operational Technology Attacks: The Past, Present, and Future

Mar 21, 2024Operational Technology / SCADA Security
When you read reports about cyber-attacks affecting operational technology (OT), it's easy to get caught up in the hype and assume every single one is sophisticated. But are OT environments all over the world really besieged by a constant barrage of complex cyber-attacks? Answering that would require breaking down the different types of OT cyber-attacks and then looking back on all the historical attacks to see how those types compare.  The Types of OT Cyber-Attacks Over the past few decades, there has been a growing awareness of the need for improved cybersecurity practices in IT's lesser-known counterpart, OT. In fact, the lines of what constitutes a cyber-attack on OT have never been well defined, and if anything, they have further blurred over time. Therefore, we'd like to begin this post with a discussion around the ways in which cyber-attacks can either target or just simply impact OT, and why it might be important for us to make the distinction going forward. Figure 1 The Pu
Operation #Payback Next target #OpSony by #Anonymous

Operation #Payback Next target #OpSony by #Anonymous

Apr 02, 2011
Operation #Payback Next target #OpSony by # Anonymous Anonymous Next Press Release as follows : Dear ######## SONY, Congratulations! You are now receiving the attention of Anonymous. Your recent legal actions against fellow internet citizens, GeoHot and Graf_Chokolo have been deemed an unforgivable offense against free speech and internet freedom, primary sources of free lulz (and you know how we feel about lulz.) You have abused the judicial system in an attempt to censor information about how your products work. You have victimized your own customers merely for possessing and sharing information, and continue to target those who seek this information. In doing so you have violated the privacy of thousands of innocent people who only sought the free distribution of information. Your suppression of this information is motivated by corporate greed and the desire for complete control over the actions of individuals who purchase and use your products, at least when those actio
cyber security

Automated remediation solutions are crucial for security

websiteWing SecurityShadow IT / SaaS Security
Especially when it comes to securing employees' SaaS usage, don't settle for a longer to-do list. Auto-remediation is key to achieving SaaS security.
Inside Story : How RSA was got hacked !

Inside Story : How RSA was got hacked !

Apr 02, 2011
Inside Story : How RSA was got hacked ! The hack last month at RSA Security has been shrouded in mystery. How did a hacker manage to infiltrate one of the world's top computer-security companies? And could the data that was stolen be used to impair its SecurID products, which are used by 40 million businesses that are trying to keep their own networks safe from intruders? The division of the EMC Corporation is staying mum about what exactly was stolen from its computer systems, aside from that is was data related to SecurID. But on Friday RSA shed some light on the nature of the attack. In a blog post titled "Anatomy of an Attack," the company's head of new technologies, Uri Rivner, described a three-stage operation that was similar to several other recent prominent attacks on technology companies, including a 2009 attack on Google that it said originated in China. In the attack on RSA, the attacker sent "phishing" e-mails with the subject line "2011 Recruitment Plan" to two
Pradesh Today Hacked (Indian news website) Hacked By ZHC & TeaMp0isoN

Pradesh Today Hacked (Indian news website) Hacked By ZHC & TeaMp0isoN

Apr 02, 2011
Pradesh Today Hacked (Indian news website) Hacked By ZHC & TeaMp0isoN Hacked sites : Site 1: pradeshtoday.com https://www.pradeshtoday.com/uploads/trick/index.html Mirror:   https://zone-h.org/mirror/id/13373307 Site 2: pradeshtoday.in https://www.pradeshtoday.in/uploads/index.html Mirror:  https://zone-h.org/mirror/id/13373117
Vulnerability in Facebook Email feature Exposed !

Vulnerability in Facebook Email feature Exposed !

Apr 02, 2011
Vulnerability in Facebook Email feature Exposed ! This time Facebook username feature is Vulnerable. After Facebook applications, now Facebook username feature can be used to do on Facebook profiles. Not only spam's but this bug can be used to post illegitimate messages to Facebook users from their friends or either from unknown people without the consent of sender Total Exposure : Knowledge of Facebook id and associated registered email address are the key elements to launch the exploit i.e., to postage of factitious messages on behalf of target user. Other than posting messages, spams are equally potential through this vulnerability. Scenario: To effectively launch the attack the minimum scenario consist on the following : Target username of Facebook user1 (xxxx@facebook.com) and an email id of another Facebook user2 (any email,that used to register the facebook account). To launch the attack an attacker can post fictitious private messages on behalf of target user2 to th
315 more Website Has Been Hacked By Dinelson US

315 more Website Has Been Hacked By Dinelson US

Apr 02, 2011
315 more Website Has Been Hacked By Dinelson US Hacked sites list :  https://pastebin.com/4CvVMPTz
50 Wesbsites Hacked By ahmdosa Hacker

50 Wesbsites Hacked By ahmdosa Hacker

Apr 02, 2011
50 Wesbsites Hacked By Ahmdosa Hacker Hacked sites :  https://pastebin.com/XE254JRC
April Fool Hack : Innobuzz (Ethical Hacking Training Institute) hacked

April Fool Hack : Innobuzz (Ethical Hacking Training Institute) hacked

Apr 02, 2011
April Fool Hack : Innobuzz (Ethical Hacking Training Institute) hacked The site was self Defaced by Innobuzz for making April Fool to all  ;-)
'The Hacker News' Magazine - Anonymous Edition - Issue 01 - April,2011 Download now !

'The Hacker News' Magazine - Anonymous Edition - Issue 01 - April,2011 Download now !

Apr 01, 2011
' The Hacker News ' Magazine - Anonymous Edition - Issue 01 - April,2011 Download now ! Link :  https://theevilhackerz.com/magazine-01-low.pdf 'The Hacker News' Magazine contacts : Mohit Kumar, Editor in Chief Email -  thehackernews@gmail.com Facebook Profile -   https://www.facebook.com/unix.root Twitter Profile -  https://twitter.com/TheHackersNews Facebook Page -  https://www.facebook.com/thehackernew
Cybersecurity Resources