#1 Trusted Cybersecurity News Platform
Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cybersecurity

Hacktivism | Breaking Cybersecurity News | The Hacker News

Category — Hacktivism
Indian Cyber Army Hacks OGRA Website in Retaliation

Indian Cyber Army Hacks OGRA Website in Retaliation

Dec 04, 2010
In a troubling trend of tit-for-tat website defacements, a group of Indian hackers known as the 'Indian Cyber Army' hacked the Oil & Gas Regulatory Authority (OGRA) website [ www.ogra.org.pk ] on Saturday. The website was later restored by the site administrators. The message left on the OGRA page stated that the hack was in response to an attack on over 200 Indian websites by the 'Pakistan Cyber Army'. The message read: "You Have Been Hacked By The 'INDIAN CYBER ARMY'. This Is a Retaliation Of Hacking 'CBI'." Previously, a group of Pakistani hackers, identifying themselves as 'Predators PK,' had hacked over 200 Indian websites. This attack was a form of retaliation for a recent cyber assault on Pakistani sites carried out by the Indian Cyber Army (ICA). Unlike the ICA attack, which was cited as 'revenge for 26/11', the message inserted by the Pakistani hackers did not suggest ideological motivations, but rather pure revenge. Pakistani Hacker's Perspective The Pakist
Moroccan Hacktivists Target Foreign Sites, Sparking International Cyber Conflicts

Moroccan Hacktivists Target Foreign Sites, Sparking International Cyber Conflicts

Oct 31, 2010 Cyber Attack / Hacktivism
Hacktivists are militant hackers attacking sites in Egypt, Morocco, Spain, and Israel. Their screen messages resemble banners used in protests, supporting various political, social, or religious ideologies. Active in Morocco, they often hack sensitive security systems. Behind their computer screens, these hackers meticulously encode and decode IT security systems, seeking the slightest vulnerability to launch attacks. Known as hackers in Morocco, they relentlessly penetrate local and foreign sites. Egypt, Kuwait, and Israel have all fallen victim to their actions. Rise of Hacktivism These hackers are not casual credit card thieves but belong to a new category of activists known as "hacktivists." The Internet fuels this underground movement, but their ideological beliefs keep it alive. "It is the oldest form of hacking. Many developing countries resort to this mode of protest," says Ali El Azzouzi, a Moroccan IT security expert. Recently, Morocco, like many other
How to Get Going with CTEM When You Don't Know Where to Start

How to Get Going with CTEM When You Don't Know Where to Start

Oct 04, 2024Vulnerability Management / Security Posture
Continuous Threat Exposure Management (CTEM) is a strategic framework that helps organizations continuously assess and manage cyber risk. It breaks down the complex task of managing security threats into five distinct stages: Scoping, Discovery, Prioritization, Validation, and Mobilization. Each of these stages plays a crucial role in identifying, addressing, and mitigating vulnerabilities - before they can be exploited by attackers.  On paper, CTEM sounds great . But where the rubber meets the road – especially for CTEM neophytes - implementing CTEM can seem overwhelming. The process of putting CTEM principles into practice can look prohibitively complex at first. However, with the right tools and a clear understanding of each stage, CTEM can be an effective method for strengthening your organization's security posture.  That's why I've put together a step-by-step guide on which tools to use for which stage. Want to learn more? Read on… Stage 1: Scoping  When you're defin
Expert Insights / Articles Videos
Cybersecurity Resources