-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

WAVSEP 1.0.3 – Web Application Vulnerability Scanner Evaluation Project

WAVSEP 1.0.3 – Web Application Vulnerability Scanner Evaluation Project

Sep 16, 2011
WAVSEP   1.0.3 – Web Application Vulnerability Scanner Evaluation Project A vulnerable web application designed to help assessing the features, quality and accuracy of web application vulnerability scanners. This evaluation platform contains a collection of unique vulnerable web pages that can be used to test the various properties of web application scanners. Additional information can be found in the developer's blog . Project WAVSEP currently includes the following test cases: Vulnerabilities: Reflected XSS:   66 test cases, implemented in 64 jsp pages (GET & POST) Error Based SQL Injection: 80 test cases, implemented in 76 jsp pages (GET & POST ) Blind SQL Injection: 46 test cases, implemented in 44 jsp pages (GET & POST ) Time Based SQL Injection: 10 test cases, implemented in 10 jsp pages (GET & POST ) False Positives: 7 different categories of false positive Reflected XSS vulnerabilities (GET & POST ) 10 different categories o...
Balaji Plus Cloud Antivirus Released - Mix of 32 antivirus Engines for ultra Protection

Balaji Plus Cloud Antivirus Released - Mix of 32 antivirus Engines for ultra Protection

Sep 16, 2011
Balaji Plus Cloud Antivirus  Released - Mix of 32 antivirus Engines for ultra Protection Leo Impact Launch World first Antivirus scanning software which protects your PC from viruses, trojans, spyware, rootkits and other malicious programs (zero day exploits) by using 32+ antivirus on cloud. Most of time you can install and use only 2 to 3 antivirus in one system, not more so virus author bypass top antivirus but Balajiplus is Free service by Leo impact Security for Corporate Social Responsibility to protect your digital life using multiple antivirus scanners on cloud. Collective Intelligence, Balaji Antivirus Plus proprietary cloud-scanning technology that automatically collects and processes millions of malware samples, lies at the core of Balaji Cloud Antivirus. In recent comparative tests conducted by both AV-Test.org and AV-Comparatives.org, Balaji Antivirus Security's detection and protection scores rank consistently amongst the top security solutions. Balajiplus Clou...
THC-HYDRA v7.0 new version released for Download

THC-HYDRA v7.0 new version released for Download

Sep 15, 2011
THC-HYDRA v7.0 new version released for Download THC-HYDRA is a very fast network logon cracker which support many different services. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, FreeBSD and OSX. Official change log: New main engine for hydra: better performance, flexibility and stability New option -u – loop around users, not passwords Option -e now also works with -x and -C Added RDP module, domain can be passed as argument Added other_domain option to smb module to test trusted domains Small enhancement for http and http-proxy module for standard ignoring servers Lots of bugfixes, especially with many tasks, multiple targets and restore file Fixes for a few http-form issues Fix smb module NTLM hash use Fixed Firebird module deprecated API call Fixed for dpl4hydra t...
cyber security

5 Cloud Security Risks You Can’t Afford to Ignore

websiteSentinelOneEnterprise Security / Cloud Security
Get expert analysis, attacker insights, and case studies in our 2025 risk report.
cyber security

Red Report 2026: Analysis of 1.1M Malicious Files and 15.5M Actions

websitePicus SecurityAttack Surface / Cloud Security
New research shows 80% of top ATT&CK techniques now target evasion to remain undetected. Get your copy now.
uTorrent & BitTorrent Sites Hacked, Spread Security Shield Malware

uTorrent & BitTorrent Sites Hacked, Spread Security Shield Malware

Sep 14, 2011
uTorrent & BitTorrent Sites Hacked, Spread Security Shield Malware Attackers hijacked two popular Torrent websites "bittorrent.com and utorrent.com" and tampered with their download mechanisms, causing visitors trying to obtain file-sharing software to instead receive malware. The site reported on its blog  that the attack had occurred at around 04:20 Pacific Daylight Time (11:20 GMT) on Tuesday. Initially, the incursion was also thought to have affected the servers of the main BitTorrent site, but further investigation revealed this site had been unaffected by the attack. Once installed, Security Shield delivers false reports that a computer is infected with multiple pieces of malware and prompts the user for payment before claiming to disinfect the machine. The attack affected only users who downloaded and installed software from bittorrent.com and utorrent.com during the hour-and-fifty-minute window that the sites were compromised. Those who installed software pr...
Book : Backtrack 5 Wireless Penetration Testing by Vivek Ramachandran

Book : Backtrack 5 Wireless Penetration Testing by Vivek Ramachandran

Sep 14, 2011
Book : Backtrack 5 Wireless Penetration Testing by Vivek Ramachandran This book will provide a highly technical and in-depth treatment of Wi-Fi security. The emphasis will be to provide the readers with a deep understanding of the principles behind various attacks and not just a quick how-to guide on publicly available tools. We will start our journey with the very basics by dissecting WLAN packet headers with Wireshark, then graduate to the next level by cracking WEP, WPA/WPA2 and then move on to real life challenges like orchestrating Man-in-the-Middle attacks, creating Wi-Fi Honeypots and compromise networks running WPA-Enterprise mechanisms such as PEAP and EAP-TTLS. Even though touted as a Beginner's Guide, this book has something for everyone - from the kiddies to the Ninjas. You can purchase the book from: Global: http://www.amazon.com/BackTrack-Wireless-Penetration-Testing-Beginners/dp/1849515581/ India: http://www.packtpub.com/backtrack-5-wireless-penetration-testi...
McAfee DeepSAFE - Anti-rootkit Security Solution

McAfee DeepSAFE - Anti-rootkit Security Solution

Sep 14, 2011
McAfee DeepSAFE - Anti-rootkit Security Solution McAfee previewed its DeepSAFE hardware-assisted security technology for proactively detecting and preventing stealthy advanced persistent threats (APTs) and malware. The technology, which was co-developed with Intel, sits below the OS, providing the ability to fundamentally change the security game, according to the companies. According to McAfee Labs, more than 1,200 new rootkits per day are detected - equating to 50 per hour every single day. The DeepSAFE technology, which was demonstrated at the Intel Developer Forum in San Francisco, was able to detect and stop a zero-day Agony rootkit from infecting a system in real time. This technology is expected to launch in products later in 2011. Key attributes of McAfee DeepSAFE: Builds the foundation for next-generation hardware-assisted security operating beyond the operating system Provides a trusted view of system events below the operating system Exposes many attacks that are un...
Presidential website president of Bolivia hacked

Presidential website president of Bolivia hacked

Sep 14, 2011
Presidential website president of Bolivia hacked The presidential website of Bolivia presidencia.gob.bo has been hacked. The hack has been carried out by twitter id: @SwichSmoke. The website data has been breached and has been data leaked.Hacker upload the dumps on Pastebin .
Top100 Arena Gaming Sites Network hacked By ACA [Albanian Cyber Army]

Top100 Arena Gaming Sites Network hacked By ACA [Albanian Cyber Army]

Sep 13, 2011
Top100 Arena Gaming Sites Network hacked By ACA [Albanian Cyber Army] Albania hackers have exploited one of the biggest Game Arena site   " Top100 " database using SQL injection attack. They leak the database on mediafire . Hackers belongs from group  ACA [Albanian Cyber Army] .
#Opiran new press release for 23 September by Anonymous Hackers

#Opiran new press release for 23 September by Anonymous Hackers

Sep 13, 2011
#Opiran new press release for 23 September by Anonymous Hackers [Salutation] To the Noble and Brave People of Iran and Syria, [Acknowledge plight] The people of Iran and Syria are still being caged, tortured and murdered. They are ruled by vile leaders, who seek not to protect, but to harm. Leaders who will stop at nothing to keep their power. [Statement of Facts and Outcomes] Iran deserves modern affortable energy and fair elections. The entire world speaks of the treachery of Iran's fraudulous regime. Newly secret US ambassadorial letters, released by WikiLeaks, confirm what you already know. [ irc.iranserv.com #opiran port 6697 ssl ] [Outline Client Condition] The people of Syria are beaten by regime police from Iran. The People of Syria are kept down by the regime of Iran, which backs the will of Assad to remain in power. No matter how many innocent victims fighting for freedom and social justice, this may cost. [Support] Ahmadinejad, Khamenei and Assad know th...
The Security Onion LiveDVD - Download

The Security Onion LiveDVD - Download

Sep 13, 2011
The Security Onion LiveDVD - Download The Security Onion LiveDVD is a bootable DVD that contains software used for installing, configuring, and testing Intrusion Detection Systems. It is based on Xubuntu 10.04 and contains Snort, Suricata, Sguil, Squert, Xplico, nmap, metasploit, Armitage, scapy, hping, netcat, tcpreplay, and many other security tools. Official change log for Security Onion 20110919: The “IDS Rules” menu now has a new entry called “Add Local Rules” which will open /etc/nsm/rules/local.rules for editing using the “mousepad” GUI editor. You can then add any rules that you want to maintain locally (outside of the downloaded VRT or Emerging Threats rulesets). A new menu called “IDS Config” was added with a new menu entry called “Configure IDS engine(s)”. This will list all of the IDS engines on your system and allow you to choose one to configure. It will then open the proper config file for whatever IDS engine you’re running. After you save and close the config f...
Expert Insights Articles Videos
Cybersecurity Resources