#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News

Operation KKK | Breaking Cybersecurity News | The Hacker News

Category — Operation KKK
Anonymous Group Leaks Identities of 1000 KKK Members

Anonymous Group Leaks Identities of 1000 KKK Members

Nov 06, 2015
The online hacktivist group Anonymous has followed through on its promise to disclose the identities of hundreds of Ku Klux Klan members. On Monday, Anonymous vowed to release the full info dump of about  1,000 alleged Ku Klux Klan members with a chosen date of 5th of this November. As promised, Anonymous posted a link to a Pastebin account with the names, aliases, Google Plus profiles, Facebook accounts and other identifying information of roughly 1,000 individuals the group believes are members of the Ku Klux Klan. The hackers behind the leak tweeted a link to a Pastebin on a Twitter account, Operation KKK ( @Operation_KKK ) believed to be controlled by them. Ku Klux Klan (KKK) is classified as a White Supremacist Racist group by the Anti-Defamation League and the Southern Poverty Law Center, allegedly having total 5,000 to 8,000 members. "We hope Operation KKK will, in part, spark a bit of constructive dialogue about race, racism, racial terror and fr
Anonymous Hackers to Leak 1000 of KKK Members Details on Million Mask March (Nov 5, 2015)

Anonymous Hackers to Leak 1000 of KKK Members Details on Million Mask March (Nov 5, 2015)

Nov 03, 2015
The Online Hacktivist group Anonymous announced it plans to reveal the identities of about 1,000 Ku Klux Klan (KKK) members on 5th November , the day of the Global Protest movement known as the Million Mask March. Million Mask March , where protesters don Guy Fawkes masks in hundreds of cities around the world, and march together against the corrupt Governments and corporations. Ku Klux Klan (KKK) is classified as a White Supremacist Racist group by the Anti-Defamation League and the Southern Poverty Law Center, allegedly having total 5,000 to 8,000 members. It was founded after the Civil War by former Confederate soldiers to fight against the reforms imposed by the North during Reconstruction. " We've gained access to yet another KKK Twitter account. Using the info obtained, we will be revealing about 1000 Klan member identities. ", Anonymous Hackers tweeted last week. The list of 1000 KKK Members, to be released on 5th November, apparently includes the
Cyber Story Time: The Boy Who Cried "Secure!"

Cyber Story Time: The Boy Who Cried "Secure!"

Nov 21, 2024Threat Detection / Pentesting
As a relatively new security category, many security operators and executives I've met have asked us "What are these Automated Security Validation (ASV) tools?" We've covered that pretty extensively in the past, so today, instead of covering the " What is ASV?" I wanted to address the " Why ASV?" question. In this article, we'll cover some common use cases and misconceptions of how people misuse and misunderstand ASV tools daily (because that's a lot more fun). To kick things off, there's no place to start like the beginning. Automated security validation tools are designed to provide continuous, real-time assessment of an organization's cybersecurity defenses. These tools are continuous and use exploitation to validate defenses like EDR, NDR, and WAFs. They're more in-depth than vulnerability scanners because they use tactics and techniques that you'll see in manual penetration tests. Vulnerability scanners won't relay hashes or combine vulnerabilities to further attacks, whic
Expert Insights / Articles Videos
Cybersecurity Resources