The Hacker News Logo
Subscribe to Newsletter

The Hacker News – Most Popular Cyber Security, Hacking News Site: Metasploit

9 Popular Training Courses to Learn Ethical Hacking Online

9 Popular Training Courses to Learn Ethical Hacking Online

April 19, 2018Exclusive Deals
How to become a Professional Hacker? This is one of the most frequently asked queries we came across on a daily basis. Do you also want...
Critical "Same Origin Policy" Bypass Flaw Found in Samsung Android Browser

Critical "Same Origin Policy" Bypass Flaw Found in Samsung Android Browser

December 29, 2017Mohit Kumar
A critical vulnerability has been discovered in the browser app comes pre-installed on hundreds of millions of Samsung Android devices th...
Newly Uncovered 'MoneyTaker' Hacker Group Stole Millions from U.S. & Russian Banks

Newly Uncovered 'MoneyTaker' Hacker Group Stole Millions from U.S. & Russian Banks

December 11, 2017Swati Khandelwal
Security researchers have uncovered a previously undetected group of Russian-speaking hackers that has silently been targeting Banks, fin...
New “Fileless Malware” Targets Banks and Organizations Spotted in the Wild

New “Fileless Malware” Targets Banks and Organizations Spotted in the Wild

February 08, 2017Swati Khandelwal
More than a hundred banks and financial institutions across the world have been infected with a dangerous sophisticated, memory-based mal...
Researcher releases Free Hacking Tool that Can Steal all Your Secrets from Password Manager

Researcher releases Free Hacking Tool that Can Steal all Your Secrets from Password Manager

November 03, 2015Swati Khandelwal
Unless we are a human supercomputer, remembering a different password for every different site is not an easy task. But to solve thi...
Seagate NAS Zero-Day Vulnerability allows Unauthorized Root Access Remotely

Seagate NAS Zero-Day Vulnerability allows Unauthorized Root Access Remotely

March 01, 2015Swati Khandelwal
Seagate , a popular vendor of hardware solutions, has a critical zero-day vulnerability in its Network Attached Storage (NAS) device softwa...
Hacking Facebook Accounts Using Android 'Same Origin Policy' Vulnerability

Hacking Facebook Accounts Using Android 'Same Origin Policy' Vulnerability

December 29, 2014Wang Wei
A serious security vulnerability has been discovered in the default web browser of the Android OS lower than 4.4 running on a large numb...
CVE-2014-4877: Wget FTP Symlink Attack Vulnerability

CVE-2014-4877: Wget FTP Symlink Attack Vulnerability

October 29, 2014Swati Khandelwal
The open-source Wget application which is most widely used on Linux and Unix systems for retrieving files from the web has found vulner...
Kali Linux "NetHunter" — Turn Your Android Device into Hacking Weapons

Kali Linux "NetHunter" — Turn Your Android Device into Hacking Weapons

September 24, 2014Mohit Kumar
The developers of one of the most advance open source operating system for penetration testing, ' KALI Linux ' have announced ye...
New Android Browser Vulnerability Is a “Privacy Disaster” for 70% Of Android Users

New Android Browser Vulnerability Is a “Privacy Disaster” for 70% Of Android Users

September 16, 2014Mohit Kumar
A Serious vulnerability has been discovered in the Web browser installed by default on a large number (Approximately 70%) of Android dev...
Infosec A-Team to Launch NSA-Proof Invisible Messenger for Whistleblowers

Infosec A-Team to Launch NSA-Proof Invisible Messenger for Whistleblowers

July 04, 2014Swati Khandelwal
If a whistleblower discloses an activity to the public, then there should be a trust-based mechanism that ensure the protection of truth...
Hackers exploiting Router vulnerabilities to hack Bank accounts through DNS Hijacking

Hackers exploiting Router vulnerabilities to hack Bank accounts through DNS Hijacking

February 10, 2014Anonymous
In past months, we have reported about critical vulnerabilities in many wireless Routers including Netgear, Linksys,  TP-LINK, Cisco, A...
CTF365 Capture The Flag - The Next Generation IT Security Training Platform

CTF365 Capture The Flag - The Next Generation IT Security Training Platform

November 11, 2013Anonymous
For years, the Capture the Flag platform has been a common and very popular part of the hacker convention scene. Teams come from all ove...
Metasploit website Hacked just by sending a spoofed DNS change request via Fax to Domain Registrar

Metasploit website Hacked just by sending a spoofed DNS change request via Fax to Domain Registrar

October 11, 2013Mohit Kumar
A group of Pro-Palestine hackers ' KDMS Team ' today has been able to hijack the Metasploit website simply by sending a fax and...
Apple Mac OS X Vulnerability enables Root User to Hackers by resetting the clock

Apple Mac OS X Vulnerability enables Root User to Hackers by resetting the clock

August 30, 2013Mohit Kumar
Do you think, because you’re using an Apple Mac , your data is safe from hackers ? Well, it is not true, there are dozens of security we...
Microsoft to patch Six critical Remote Code Execution vulnerabilities this Tuesday

Microsoft to patch Six critical Remote Code Execution vulnerabilities this Tuesday

July 07, 2013Mohit Kumar
Microsoft has announced   Patch Tuesday for this July Month, with seven bulletins. Out of that, one is important kernel privilege escalatio...
Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication

Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication

May 02, 2013Anonymous
Early 2012 ESET company a mysterious malware, dubbed the Avatar rootkit (Win32/Rootkit.Avatar), advertised in the underground forums by R...
Best Deals

Get Daily News Updates By Email

Join over 500,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.