#1 Trusted Cybersecurity News Platform
Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cybersecurity

Operation Payback | Breaking Cybersecurity News | The Hacker News

Category — Operation Payback
Anonymous Clarifies Its Identity and Mission in Recent Statement

Anonymous Clarifies Its Identity and Mission in Recent Statement

Dec 11, 2010
On December 10, 2010, Anonymous released a press statement to clarify its identity and objectives. Who is Anonymous? Anonymous, often misunderstood, is not a conventional group. Instead, it is an internet gathering without formal structure. Both Anonymous and the media acknowledge the perceived internal disagreements within the group. However, this does not imply a failure in their command structure. The decentralized nature of Anonymous is based on shared ideas rather than hierarchical directives. Unique in its form, Anonymous learns through trial and error. The collective is now working on better communication of core values to its members. They also aim to inform the public and media about their identity and principles. Contrary to popular belief, Anonymous is not a group of hackers. Members are average internet citizens driven by frustration over daily injustices. They do not seek to steal personal information or credit card details, nor do they intend to attack critical infras
Anonymous Targets WikiLeaks Critics in Operation Payback Campaign

Anonymous Targets WikiLeaks Critics in Operation Payback Campaign

Dec 11, 2010
Do you support WikiLeaks? Are you angry at critics trying to suppress it? Maybe you're considering joining online protests to shut down the websites of its opponents. Don't. A group of vigilantes named Anonymous has turned their Operation Payback campaign, previously targeting antipiracy organizations, on PayPal, Visa, MasterCard, Senator Joe Lieberman, Sarah Palin, and others who have criticized WikiLeaks or stopped doing business with the document-sharing project. The fallout from WikiLeaks has reached a fever pitch since the site began releasing diplomatic cables last month, causing embarrassment for U.S. diplomatic efforts. Launching denial-of-service (DOS) attacks against target websites to send a message and disrupt their operations is the modern-day equivalent of walking the picket line with a sign. However, the electronic version is illegal. "Participating in a botnet with the intention of shutting down a website violates the Computer Fraud and Abuse Act,"
Shining a Light on Shadow Apps: The Invisible Gateway to SaaS Data Breaches

Shining a Light on Shadow Apps: The Invisible Gateway to SaaS Data Breaches

Sep 10, 2024SaaS Security / Risk Management
Shadow apps, a segment of Shadow IT, are SaaS applications purchased without the knowledge of the security team. While these applications may be legitimate, they operate within the blind spots of the corporate security team and expose the company to attackers.  Shadow apps may include instances of software that the company is already using. For example, a dev team may onboard their own instance of GitHub to keep their work separate from other developers. They might justify the purchase by noting that GitHub is an approved application, as it is already in use by other teams. However, since the new instance is used outside of the security team's view, it lacks governance. It may store sensitive corporate data and not have essential protections like MFA enabled, SSO enforced, or it could suffer from weak access controls. These misconfigurations can easily lead to risks like stolen source code and other issues. Types of Shadow Apps  Shadow apps can be categorized based on their interac
Hackers Target MasterCard and Visa in Support of WikiLeaks

Hackers Target MasterCard and Visa in Support of WikiLeaks

Dec 09, 2010
Hackers rushed to defend WikiLeaks on Wednesday, launching attacks on MasterCard, Visa, Swedish prosecutors, a Swiss bank, and others who acted against the site and its jailed founder, Julian Assange. Internet "hacktivists" under the banner "Operation Payback" claimed responsibility in a Twitter message for causing severe technological problems on MasterCard's website. MasterCard had recently severed ties with WikiLeaks. Although MasterCard acknowledged a disruption in its Secure Code system for verifying online payments, spokesman James Issokson assured that consumers could still use their credit cards securely. Later on Wednesday, Visa's website also became inaccessible. These online attacks are part of a broader wave of support for WikiLeaks sweeping the Internet. Twitter was flooded with messages of solidarity for the group, while its Facebook page reached 1 million fans. However, late Wednesday, Operation Payback itself faced difficulties as many of i
cyber security

DevOps Security Best Practices

websiteWizDevOps / Secure Coding
Develop securely from code to cloud with this DevOps Security Cheat Sheet from Wiz. Take a deep dive into secure coding, infrastructure security, and vigilant monitoring and response.
Expert Insights / Articles Videos
Cybersecurity Resources