#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

ethical hacking training | Breaking Cybersecurity News | The Hacker News

Facebook Hacking - Student jailed for eight months

Facebook Hacking - Student jailed for eight months

Feb 20, 2012
Facebook Hacking - Student jailed for eight months 26-year-old Glenn Steven Mangham, a student in the UK, has been sentenced to eight months in prison for hacking into Facebook from his bedroom at his parents house. Facebook spent $200,000 (£126,400) dealing with Mangham's crime, which triggered a "concerted, time-consuming and costly investigation. Glenn Mangham, 26, admitted to infiltrating the website between April and May of last year. Apparently no user details were taken, as he went straight for "invaluable" intellectual property instead. Facebook alerted the authorities last May after they discovered the breach. The FBI took care of the rest, tracing it all back to the UK address. He found his way in by hacking into the account of a Facebook employee. Facebook operates a bug bounty program in which it pays ethical hackers up to $US 500 for quietly disclosing vulnerabilities. According to reports of Mangham's court appearances, the software development student cl
Book Review : Defense against the Black Arts

Book Review : Defense against the Black Arts

Jan 20, 2012
Book Review : Defense against the Black Arts How Hackers Do What They Do and How to Protect against It Ben Rothke  write a review of a   new book on hacking " Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It ". Authors are Jesse Varsalone, Matthew Mcfadden, Michael Schearer and Sean Morrissey. " If there ever was a book that should not be judged by its title, Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It, is that book. Even if one uses the definition in The New Hackers Dictionary of 'a collection of arcane, unpublished, and (by implication) mostly ad-hoc techniques developed for a particular application or systems area', that really does not describe this book. The truth is that hacking is none of the above. If anything, it is a process that is far from mysterious, but rather aether to describe. With that, the book does a good job of providing the reader with the information ne
GenAI: A New Headache for SaaS Security Teams

GenAI: A New Headache for SaaS Security Teams

Apr 17, 2024SaaS Security / AI Governance
The introduction of Open AI's ChatGPT was a defining moment for the software industry, touching off a GenAI race with its November 2022 release. SaaS vendors are now rushing to upgrade tools with enhanced productivity capabilities that are driven by generative AI. Among a wide range of uses, GenAI tools make it easier for developers to build software, assist sales teams in mundane email writing, help marketers produce unique content at low cost, and enable teams and creatives to brainstorm new ideas.  Recent significant GenAI product launches include Microsoft 365 Copilot, GitHub Copilot, and Salesforce Einstein GPT. Notably, these GenAI tools from leading SaaS providers are paid enhancements, a clear sign that no SaaS provider will want to miss out on cashing in on the GenAI transformation. Google will soon launch its SGE "Search Generative Experience" platform for premium AI-generated summaries rather than a list of websites.  At this pace, it's just a matter of a short time befo
Nullcon GOA 2012 - International Security Conference

Nullcon GOA 2012 - International Security Conference

Nov 30, 2011
Nullcon GOA 2012 - International Security Conference The open security community is a registered non-profit society and by far the largest security community in India with more than 2000 members comprising of information security professionals, ethical hackers and law enforcement professionals that focuses on Infosec research and assisting Govt. and private organizations with cyber security issues. null has 7 chapters through out India - Pune, Bangalore, Mumbai, Hyderabad, Delhi, Chennai and Bhopal, interacting with around 5000-6000 people by various activities like monthly meets, security camps, workshops, talks at various events & organizations and executing security projects. Our portal https://null.co.in provides free information on security research, responsible vulnerability disclosure, open source security software project, white papers, presentations, monthly chapter meets. We see that currently there is a disconnect between the Govt. agencies and private organizations
cyber security

Today's Top 4 Identity Threat Exposures: Where To Find Them and How To Stop Them

websiteSilverfortIdentity Protection / Attack Surface
Explore the first ever threat report 100% focused on the prevalence of identity security gaps you may not be aware of.
The Hacker News Magazine - Anniversary Edition - November Issue 06

The Hacker News Magazine - Anniversary Edition - November Issue 06

Nov 02, 2011
The Hacker News Magazine - Anniversary Edition  - November Issue 06 In November of 2010 the team at The Hacker News finally achieved our ultimate goal of launching an online News Portal and Magazine addressing the tricky and complicated world of hackers and hacking. In our first year The Hacker News made our fair shares of mistakes, typical of first-time publishers, but our successes have been innumerable and The Hacker News has reached many of it goals in this often hectic and exciting  first year. The Hacker News was fortunate enough to have assembled a dedicated and professional team that intrinsically understood that it is not enough to hope to succeed; you have to plan to succeed. And I am grateful to each and every one of these talent people that understood this concept and helped implement it daily to help insure our success. As the mainstream media often denigrates computer hackers as nothing more than digital pranksters, we at The Hacker News believe that many of these
The Hacker News (THN) 1st Anniversary Celebration

The Hacker News (THN) 1st Anniversary Celebration

Nov 01, 2011
The Hacker News (THN) 1st Anniversary Celebration It has been a wonderful "HACK" filled year as we disseminated security and hacking information around the world. We are grateful for our loyal readership and welcome new readers and contributors. Let's face it. Hacking isn't going away and growing security concerns are an issue we all need to stay on top of. Being informed about the latest and newest in security measures and the work of hackers to break into these means is a global issue with tremendous consequences. Hacking and security violations affect us all. Not only big corporations which store your information but the health and welfare of your personal PC's. The Hacker news has tracked the events of the last year and we are amazed and the talent and finesse of techy people who can break into the most complicated and sophisticated systems. You can depend on us for breaking news in the area of computer security. Keep reading and keep checking our daily web news. In c
Hcon’s Security Testing Framework (Hcon STF) v0.1beta

Hcon's Security Testing Framework (Hcon STF) v0.1beta

Oct 14, 2011
Hcon's Security Testing Framework (Hcon STF) v0.1beta After the first demo of Hfox, many people asked about a Chromium based framework for penetration testing/ethical hacking.  After 3 months of work and research, and some input from AJ, the following tool has been developed for the arsenal of Hcon's tools: Specifications 1.         Based on Chromium Source (iron build) version 14. 2.         Works for ever need of hacking/penetration testing such as recon, enumeration, social engineering, exploitation, vulnerability assessment, anonymity, mobile tools, and reporting. 3.         More secure and tracking free from Google and Stable than other Chromium-based builds. 4.         Over 100 tools integrated with easy-to-use interface. 5.         Tested and heavily modified tools with suggestions contributed by professional penetration testers, web developers and security researchers. 6.         Free and open source software. 7.         Totally portable (no need to install).  You can car
Global CyberLympics - Middle East & India Championships 11-12 October at Gitex 2011 Dubai

Global CyberLympics - Middle East & India Championships 11-12 October at Gitex 2011 Dubai

Sep 20, 2011
The Europe Championships of the Global CyberLympics has just concluded! It is now time to crown new CHAMPIONS for the Middle East & India Regional ! About the Global CyberLympics: The Global CyberLympics ( www.cyberlympics.org ) is the world's first international team ethical hacking championships, and will be held from September onwards across six continents. It is endorsed by the U.N.'s cybersecurity executing arm – IMPACT - and the EC-Council is sponsoring over $400,000 worth of prizes. Regional championships will be held in various locations across different continents, and co-hosted with reputable IT/information security conferences and tradeshows, as follows: North America (Eastern) | Hacker Halted USA – Miami, USA North America (Western) | TakeDownCon – Las Vegas, USA South America | H2HC – Sao Paolo, Brazil Europe | Hacktivity – Budapest, Hungary Middle East & India | GITEX – Dubai, UAE Asia Pacific | Hacker Halted APAC – Kuala Lumpur, Malaysia Africa | TakeD
BackBox Linux 2 released

BackBox Linux 2 released

Sep 04, 2011
BackBox Linux 2 released The BackBox team is proud to announce the release of BackBox. Linux 2.BackBox 2 features the following upstream components: Ubuntu 11.04, Linux Kernel 2.6.38 and Xfce 4.8. BackBox is an Ubuntu-based distribution developed to perform penetration tests and security assessments. It is designed to be fast and easy to use. It provides a minimal yet complete desktop environment, thanks to its own software repositories, which are always updated to the latest stable versions of the most often used and best-known ethical hacking tools. What's new System upgrade Performance boost New look and feel Improved start menu Bug fixing Hacking tools new or updated Three new section: Vulnerabilty Assessment, Forensic Analysis and VoIP Analysis Much, much more! System requirements 32-bit or 64-bit processor 256 MB of system memory (RAM) 2 GB of disk space for installation Graphics card capable of 800×600 resolution DVD-ROM drive or USB port Download BackBox
Matriux Krypton security distribution Released

Matriux Krypton security distribution Released

Aug 15, 2011
Matriux Krypton security distribution Released The Matriux is a fully featured security distribution consisting of a bunch of powerful, open source and free tools that can be used for various purposes including, but not limited to, penetration testing, ethical hacking, system and network administration, cyber forensics investigations, security testing, vulnerability analysis, and much more. It is a distribution designed for security enthusiasts and professionals, although it can be used normally as your default desktop system. With Matriux, you can turn any system into a powerful penetration testing toolkit, without having to install any software into your hardisk. Matriux is designed to run from a Live environment like a CD / DVD or USB stick or it can easily be installed to your hard disk in a few steps. Matriux also includes a set of computer forensics and data recovery tools that can be used for forensic analysis and investigations and data retrieval. Current features Matriu
Joomla Canada website defaced by Group Hp-Hack

Joomla Canada website defaced by Group Hp-Hack

Aug 13, 2011
Joomla Canada website defaced by Group Hp-Hack Saudi Arabia Hackers with name " Group Hp-Hack " Deface the website of  Joomla Canada . In addition to this , They also hack and deface another domain " https://www.ethicalhackingcourses.com/ " - Hacker get Hacked .
EC-Council is launching "CyberLympics" - Olympic games for Cyber Security

EC-Council is launching "CyberLympics" - Olympic games for Cyber Security

Aug 08, 2011
EC-Council is launching " CyberLympics " - Olympic games for Cyber Security Global CyberLympics is conceptualized and organized by EC-Council. The goal of the CyberLympics is to raise awareness towards increased education and ethics in information security. The mission of the Global CyberLympics is Unifying Global Cyber Defense through the Games. EC-Council's Global CyberLympics , the world's first ethical hacking championship will be held this September across six continents. The Global CyberLympics is endorsed by the U.N.'s cybersecurity executing arm. The mission behind the games is to foster better cooperation and communication on cybersecurity issues among countries. Global CyberLympics is a series of ethical hacking games comprised of both offensive and defensive security challenges that will take place starting from September across six continents. Teams will vie for regional championships, followed by a global hacking championship round to determine the world's b
BackBox - Linux distribution based website Hacked

BackBox - Linux distribution based website Hacked

Aug 04, 2011
BackBox - Linux distribution based website Hacked BackBox is a Linux distribution based on Ubuntu Lucid 10.04 LTS developed to perform penetration tests and security assessments. Designed to be fast, easy to use and to provide a minimal yet complete desktop environment thanks to its own software repositories always been updated to the last stable version of the most known and used ethical hacking tools. Two Days back backbox linux website got hacked by Emperor Hacking Team and 3 subdomains named ' Forum.backbox.org ' & ' wiki.backbox.org ' & ' rafaelle.backbox.org ' also got defaced. mirror link1:  https://zone-h.org/mirror/id/ 14521377   www.backbox.org mirror link2:  https://zone-h.org/mirror/id/ 14521376 forum.backbox.org mirror link3:  https://zone-h.org/mirror/id/ 14521386 raffaele.backbox.org
Double nibble URI decoding XSS Vulnerability on EC Council website

Double nibble URI decoding XSS Vulnerability on EC Council website

Jun 28, 2011
Double nibble URI decoding XSS Vulnerability on   EC Council website What EC Council is ? They offers certifications in certified ethical hacker ceh, Computer Security, network security, internet security program and computer forensics and penetration testing. Information Security, Ethical Hacking, Computer Forensics, Advanced Penetration Testing, Application Security, Disaster Recovery and other critical Information Security Topics and Security Courses. XSS POC : Link : Click Here Submitted By :  Nulled Byte
Pakistan Cyber Army (PCA) owner SHAK Exposed By Indishell (Indian Hackers)

Pakistan Cyber Army (PCA) owner SHAK Exposed By Indishell (Indian Hackers)

May 16, 2011
Pakistan Cyber Army (PCA) owner SHAK Exposed By Indishell (Indian Hackers) Few Days Before , Pakistan Cyber Army got hacked by Indian Cyber Army (Indishell) , and Indishell Got whole Database of PCA site. They Explore the stuff and Got the Real Identity of PCA member, who was continuously hacking the thousands of Indian websites and Servers Daily. In Nov, 2010 CBI  was also hacked by some Pakistan hackers. Lets See What Indishell Got from Their Database Dump : 1.) On Private Message PCA admin Shak is asking for 8000 PKR to Teach Hacking Course (ECH). His Name and Bank details are below -- Name : Bilal Yaqoob Place:- Karachi, Sindhi Country :- Pakistan His Bank or what ever the payment details here are they ID card Number : 35202-1555072-9 PayMent GateWay :- easy paise Mobile number :-03324681620 (U PHONE) Studying in punjab university 2.) Adil, Member of PCA team was arrested (according to Pakistan Govt) ,in case of Cyber attack on Pakistan President Website. But In
Appin Hacked - Ethical Hacking Training institute hacked again

Appin Hacked - Ethical Hacking Training institute hacked again

May 16, 2011
Once again Appin tech. hacked,this time TIC GROUP hack their one more site, Have a look : Hacked Domain: https://appinonline.com Mirror :  https://mirror.sec-t.net/defacements/?id=26044
Ethical Hacking Services - Appin Security hacked By 133t Indian h4x0rs !

Ethical Hacking Services - Appin Security hacked By 133t Indian h4x0rs !

May 10, 2011
Ethical Hacking Services - Appin Security hacked By 133t Indian h4x0rs ! Hacked Site 1. :  https://appinlabs.com Mirror 1. :  https://legend-h.org/mirror/157460/appinlabs.com Hacked Site 2. :  https://blog.appinonline.com Mirror 2. :  https://legend-h.org/mirror/158222/blog.appinonline.com
Live Hacking DVD v1.3 Beta - Download !

Live Hacking DVD v1.3 Beta - Download !

Apr 29, 2011
Live Hacking DVD v1.3 Beta - Download ! Live Hacking DVD is a new Linux distribution packed with tools and utilities for ethical hacking, penetration testing and countermeasure verification. Based on Ubuntu this 'Live CD" runs directly from the DVD and doesn't require installation on your hard-drive. Once booted you can use the included tools to test, check, ethically hack and perform penetration tests on your own network to make sure that it is secure from outside intruders. As well as the standard Linux networking tools like ping, wget, curl, telnet and ssh, the Live Hacking DVD has tools for DNS enumeration and reconnaissance as well as utilities for foot-printing, password cracking and network sniffing. It also has programs for spoofing and a set of wireless networking utilities. The Live Hacking DVD is designed for ethical computer hacking, meaning that it contains the tools and utilities you need to test and hack your own network but using the tools and techniques that mor
Calling All Hackers - Grand Prize in Sunshine State “Hacktacular” Challenge !

Calling All Hackers - Grand Prize in Sunshine State "Hacktacular" Challenge !

Apr 17, 2011
Calling All Hackers - Grand Prize in Sunshine State " Hacktacular " Challenge ! Calling all hackers: Data Analyzers, LLC (www.datanalyzers.com) in Orlando, Florida, is hosting the Sunshine State "Hacktacular" Challenge with a big prize for the top competitor – a full-time job with benefits and relocation allowance if you move to Orlando. Data Analyzers has an immediate job opening for a junior data recovery engineer. The four-year old firm specializes in data recovery, computer forensics and ethical hacking, and has enough corporate clients to keep its engineers working overtime to meet deadlines. Trouble is, very few people in the U.S. possess the skills to qualify. No two data recovery problems are ever the same, and security safeguards are evolving almost as fast as hacking technology. "Data recovery skills are so specialized that typical 'help wanted' ads, even at colleges and universities that offer graduate degrees in computer sciences, don't do the job," said An
DUCAT Punjab Best Ethical Hacker Competition Website hacked by lionaneesh !

DUCAT Punjab Best Ethical Hacker Competition Website hacked by lionaneesh !

Apr 12, 2011
DUCAT Punjab Best Ethical Hacker  Competition Website hacked by  lionaneesh   ! DUCAT have announce Hacking Competition, Read Here  , But today " lionaneesh " an Indian Hacker hack into there site and show all security Holes. With the help of "lionaneesh" & THN , The site is now fixed :) Hack Proof :
April Fool Hack : Innobuzz (Ethical Hacking Training Institute) hacked

April Fool Hack : Innobuzz (Ethical Hacking Training Institute) hacked

Apr 02, 2011
April Fool Hack : Innobuzz (Ethical Hacking Training Institute) hacked The site was self Defaced by Innobuzz for making April Fool to all  ;-)
Cybersecurity Resources