-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

What is Zeus - Technical paper Zeus by SophosLabs !

What is Zeus - Technical paper Zeus by SophosLabs !

May 21, 2011
What is Zeus - Technical paper Zeus by SophosLabs ! Zeus or Zbot is one of the most notorious and widely-spread information stealing Trojans in existence. Zeus is primarily targeted at financial data theft; its effectiveness has lead to the loss of millions worldwide. The spectrum of those impacted by Zbot infections ranges from individuals who have had their banking details compromised, to large public order departments of prominent western governments. We will explore the various components of the Zeus kit from the Builder through to the configuration file; examine in detail the functionality and behaviour of the Zbot binary; and assess emerging and future trends in the Zeus world. Download Paper : Click Here Download Zeus : Source code of ZeuS Botnet Version: 2.0.8.9
Unknown Exploit Kit (Crimeware) leaked, Available for Download !

Unknown Exploit Kit (Crimeware) leaked, Available for Download !

May 21, 2011
Unknown Exploit Kit  (Crimeware) leaked, Available for Download ! Another New Exploit kit is now in Black Market called Unknown Exploit Kit or Mushroom Exploit Kit  . After The Public Release of Source code of ZeuS Botnet Version : 2.0.8.9 , THN also provide  Crimepack 3.1.3 Exploit kit &   26 more Underground Hacking Exploit Kits  for Download and Research. Now  1st Public Release of Spanish version of   Unknown Exploit Kit is here... This kit offers the following exploits: MDAC, SpreadSheet, SnapShot, Aurora, CSSClip, IEPeers, PDF LibTiff, PDF GetIcon, PDF CollectEmail, JAVA, Shockwave, and AOL. Screenshots : Download Links : http://www.multiupload.com/6U6T4MB7SD Note : The Public Release of these kits are only for Educational and Research Purpose Only. May this help Antivirus and Security Companies to Analyse and develop advance Security wares. Thanks.
Underground Security Forums : Poisonhack.info & Team-xpc.com Hacked by 0p3nH4x !

Underground Security Forums : Poisonhack.info & Team-xpc.com Hacked by 0p3nH4x !

May 21, 2011
Underground Security Forums : Poisonhack.info & Team-xpc.com Hacked by 0p3nH4x ! 0p3nH4x Team of Hackers , Hack two big Underground Security websites :  Poisonhack.info & Team-xpc.com , who call them self as " Security Expert ".  0p3nH4x  hack them and provide all Hack details at  http://pastebin.com/peDbvkXz . Submitted By : 0p3nH4x
cyber security

5 Cloud Security Risks You Can’t Afford to Ignore

websiteSentinelOneEnterprise Security / Cloud Security
Get expert analysis, attacker insights, and case studies in our 2025 risk report.
cyber security

Red Report 2026: Analysis of 1.1M Malicious Files and 15.5M Actions

websitePicus SecurityAttack Surface / Cloud Security
New research shows 80% of top ATT&CK techniques now target evasion to remain undetected. Get your copy now.
Indian Congress Party & Ebay Nepal Websites are vulnerable to Hackers !

Indian Congress Party & Ebay Nepal Websites are vulnerable to Hackers !

May 21, 2011
Indian Congress Party & Ebay Nepal Websites are vulnerable to Hackers ! MaDnI member of Pak Cyber Army found Serious Sql injection vulnerabilities in two famous sites, first is Ebay Nepal sites http://ebay.com.np/ and 2nd is of Indian Congress Party : http://www.congress.org.in  , The Detail of vulnerable links are shown below : 1.)  Ebay Nepal : Target : http://ebay.com.np/index.php?task=cms&id=3 Database : ebaycom_ebay 2.) Indian Congress Party Target : http://www.congress.org.in/new/renunciation-details.php?id=2 Attack Type : SQL Union Injection User :  aiccorg_usr@localhost Database : aiccorg_db
CodeMasters - Gaming Community Compromised, Back-End Users Data Leaked !

CodeMasters - Gaming Community Compromised, Back-End Users Data Leaked !

May 20, 2011
CodeMasters - Gaming Community Compromised, Back-End Users Data Leaked ! CodeMasters - Gaming Community has been hacked by " Kon " . He leak the back-end users login Information as shown below : Technical Details : Encryption: DES(Unix) Method: POST SQLi URL: Not providing Number of member accounts: 2524846 Database version: 4.1.22-max-log
Anonymous leaks PSN SSH Logs, Sony is responsible for Data Theft ?

Anonymous leaks PSN SSH Logs, Sony is responsible for Data Theft ?

May 20, 2011
Anonymous leaks PSN SSH Logs , Sony is responsible for Data Theft ? 1.) On the Sony servers running the highly outdated Open SSH version 4.4. 2.) Current version is 5.7. For those of Sony for encrypted version are used for more than five years several known security holes. 3.) Sony server running in part to the long-outdated software Apache 2.2.10. 4.) Current version is 2.2.17. The version used by Sony is vulnerable to damaging Internet attacks, such as overload attacks (DDOS). Outdated server software may have caused outage Allowing PSN hackers to enter PlayStation Network stealing more than 100 million user data sets from PSN and SOE. Since the allegation itself isn't exactly new, correct, there are new proofs that this rumor is. Report even claims that Sony lies when it comes to the statement of outdated servers. Computer Bild got an excerpt showing log files that proof that Sony was, as of the hacking attack, using very outdated server software, sea...
Indian Premier League | IPLT20 Website Defaced by Tyson_08 and Inferno !

Indian Premier League | IPLT20 Website Defaced by Tyson_08 and Inferno !

May 20, 2011
Indian Premier League | IPLT20 Website Defaced by Tyson_08 and Inferno ! Indian Premier League | IPLT20 Website Has been hacked, and some defaced by Tyson_08 and Inferno Hackers. They wrote a short message on deface page that, They have too many times inform about SQLi Vulnerability in T20 website at  http://www.iplt20.com/ , But none of Authority/Admin take it Seriously. They Put copy of Coding of Index Page at  http://pastebin.com/xn7Fe853  and Mirror of hack is available at  http://www.legend-h.org/mirror/166530/iplt20.com  . 
OpenDNSSEC 1.3.0rc2 new Version released !

OpenDNSSEC 1.3.0rc2 new Version released !

May 20, 2011
OpenDNSSEC 1.3.0rc2 new Version released ! Version 1.3.0rc2 of OpenDNSSEC  Match the names of the signer pidfile and enforcer pidfile. Include check for resign < resalt in ods-kaspcheck. Bugfixes: Bugfix #231: Fix MySQL version check. ods-ksmutil: Update now sends a HUP to the enforcerd. Signer Engine: Fix assertion failure if zone was just added. Signer Engine: Don’t hsm_close() on setup error. Signer Engine: Fix race condition bug when doing a single run. Signer Engine: In case of failure, also mark zone processed (single run). Signer Engine: Don’t leak backup file descriptor. signconf.rnc now allows NSEC3 Iterations of 0 Download the tarball from:  opendnssec-1.3.0rc2.tar.gz
Facebook Prepares to Launch Bug Bounty Program !

Facebook Prepares to Launch Bug Bounty Program !

May 20, 2011
Facebook Prepares to Launch Bug Bounty Program ! Facebook is working on setting up a bug bounty program that would encourage security researchers to discover vulnerabilities on its platform and report them responsibly. Mr. Joe Sullivan, Facebook's chief security officer, told us today at the Hack in the Box Amsterdam 2011 security conference that the company is currently testing such a system and hopes to launch it soon. Vulnerability reward programs are not new. In fact, they've been around since the Netscape era. In 2004 Mozilla introduced a bug bounty system for vulnerabilities discovered in Firefox, then last year Google did the same for Chromium, the open source project behind Google Chrome. However, it was Google that began rewarding vulnerabilities found in its web services first, a move that was mirrored by Mozilla a month later. Facebook has a pretty good relationship with security researchers already and many of them are reporting vulnerabilities to the ...
RKAnalyzer - kernel level rootkit analyzer !

RKAnalyzer - kernel level rootkit analyzer !

May 20, 2011
RKAnalyzer - kernel level rootkit analyzer ! RKAnalyzer is a kernel level rootkit analyzer and defender using Hardware Virtualization Techniques, based on the BitVisor Project(A VMM developed by Tsukuba University and open-sourced under BSD License). It tries to monitor kernel level rootkits' actions and log them. What differs RKAnalyzer with tranditional detection softwares(i.e. Rootkit Revealer, IceSword) is that RKAnalyzer actively intercepts rootkit actions, rather than reacting to rootkit after already infected. Also, RKAnalyzer support analysis mode, which differs from defend mode by presenting a much more transparent environment, in which rootkit would consider itself running without being monitored. How to Use :  http://code.google.com/p/rkanalyzer/wiki/HowToUse Download :  http://rkanalyzer.googlecode.com/svn/
Expert Insights Articles Videos
Cybersecurity Resources