#1 Trusted Cybersecurity News Platform
Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cybersecurity

Hacktivism | Breaking Cybersecurity News | The Hacker News

Category — Hacktivism
Indian Cyber Army Hacks OGRA Website in Retaliation

Indian Cyber Army Hacks OGRA Website in Retaliation

Dec 04, 2010
In a troubling trend of tit-for-tat website defacements, a group of Indian hackers known as the 'Indian Cyber Army' hacked the Oil & Gas Regulatory Authority (OGRA) website [ www.ogra.org.pk ] on Saturday. The website was later restored by the site administrators. The message left on the OGRA page stated that the hack was in response to an attack on over 200 Indian websites by the 'Pakistan Cyber Army'. The message read: "You Have Been Hacked By The 'INDIAN CYBER ARMY'. This Is a Retaliation Of Hacking 'CBI'." Previously, a group of Pakistani hackers, identifying themselves as 'Predators PK,' had hacked over 200 Indian websites. This attack was a form of retaliation for a recent cyber assault on Pakistani sites carried out by the Indian Cyber Army (ICA). Unlike the ICA attack, which was cited as 'revenge for 26/11', the message inserted by the Pakistani hackers did not suggest ideological motivations, but rather pure revenge. Pakistani Hacker's Perspective The Pakist
Moroccan Hacktivists Target Foreign Sites, Sparking International Cyber Conflicts

Moroccan Hacktivists Target Foreign Sites, Sparking International Cyber Conflicts

Oct 31, 2010 Cyber Attack / Hacktivism
Hacktivists are militant hackers attacking sites in Egypt, Morocco, Spain, and Israel. Their screen messages resemble banners used in protests, supporting various political, social, or religious ideologies. Active in Morocco, they often hack sensitive security systems. Behind their computer screens, these hackers meticulously encode and decode IT security systems, seeking the slightest vulnerability to launch attacks. Known as hackers in Morocco, they relentlessly penetrate local and foreign sites. Egypt, Kuwait, and Israel have all fallen victim to their actions. Rise of Hacktivism These hackers are not casual credit card thieves but belong to a new category of activists known as "hacktivists." The Internet fuels this underground movement, but their ideological beliefs keep it alive. "It is the oldest form of hacking. Many developing countries resort to this mode of protest," says Ali El Azzouzi, a Moroccan IT security expert. Recently, Morocco, like many other
Leveraging Wazuh for Zero Trust security

Leveraging Wazuh for Zero Trust security

Nov 05, 2024Network Security / Zero Trust
Zero Trust security changes how organizations handle security by doing away with implicit trust while continuously analyzing and validating access requests. Contrary to perimeter-based security, users within an environment are not automatically trusted upon gaining access. Zero Trust security encourages continuous monitoring of every device and user, which ensures sustained protection after successful user authentication. Why companies adopt Zero Trust security Companies adopt Zero Trust security to protect against complex and increasingly sophisticated cyber threats. This addresses the limitations of traditional, perimeter-based security models, which include no east-west traffic security, the implicit trust of insiders, and lack of adequate visibility.  Traditional vs. Zero Trust security Zero Trust security upgrades an organization's security posture by offering: Improved security posture : Organizations can improve their security posture by continuously gathering data on
Cybersecurity
Expert Insights / Articles Videos
Cybersecurity Resources