#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Oracle to release 73 security vulnerabilities security patch update !

Oracle to release 73 security vulnerabilities security patch update !

Apr 15, 2011
Oracle to release 73 security vulnerabilities security patch update ! Oracle plans to release a large number of security patches for its various software products next week, including six bug-fixes for its flagship database software. All told, there will be 73 security vulnerabilities fixed across Oracle's various product lines. Oracle releases patches quarterly for all of its software, except the Java virtual machine, in a set of patches it calls the Critical Patch Update (CPU). Next week's CPU is due on Tuesday. There are nine fixes set for Oracle Fusion middleware, 14 for the PeopleSoft Suite and eight for the JD Edwards Suite. Two of the database flaws are considered critical, meaning they "may be exploited over a network without the need for a username and password," Oracle said in a statement posted to its website . The updates are set to come one week after Microsoft issued one of the largest collections of security patches it has ever issued. They a...
THC-Amap v5.3 - application protocol detection Released , Download Now !

THC-Amap v5.3 - application protocol detection Released , Download Now !

Apr 15, 2011
THC-Amap v5.3 - application protocol detection Released , Download Now ! Amap was innovative - the first tool to perform application protocol detection. Then a better approach was implemented into nmap, this and the large user base of nmap made amap pretty much obsolete. So today, I recommend to rather use nmap -sV for application fingerprinting rather than amap (although in some circumstances amap will yield better results, but these are rare). Still, after 5 years there is an update to amap. The reason for this is IPv6. nmap still does not have a good IPv6 support, e.g. UDP port scanning is not possible. Hence for this v5.3 release in April 2011 that enhances amap to perform better UDP IPv6 support (before only application fingerprinting did work here, now the port scanning feature works too). amap-5.3.tar.gz
Phoenix exploit kit 2.5 leaked, Download Now !

Phoenix exploit kit 2.5 leaked, Download Now !

Apr 15, 2011
Phoenix exploit kit 2.5 leaked, Download Now ! Phoenix exploit kit 2.5 has been leaked . Now U can dowload from given link..  At below here is a some define about Phoenix Exploit Kit. The Phoenix Exploit Kit is a good example of exploit packs used to exploit vulnerable software on the computers of unsuspecting Internet users. Often, cybercriminals drive traffic to the exploit kit by compromising legitimate sites and by inserting iframes that point to the exploit kit or by poisoning search engine results that take users to the exploit kit. When users land on a page injected with the exploit kit, it detects the user's Web browser and OS version then attempts to exploit either the browser or a browser plug-in. The latest version of the Phoenix Exploit Kit currently has payloads for nine different system configurations, including:     * XPIE7: Internet Explorer 7 and either Windows XP, Windows XP SP2, or Windows 2003     * VISTA...
cyber security

New Whitepaper: The Evolution of Phishing Attacks

websitePush SecurityIdentity Attacks / Phishing
Why is phishing still so effective? Learn about modern phishing techniques and how to counteract them.
cyber security

Key Essentials to Modern SaaS Data Resilience

websiteVeeam SoftwareSaaS Security / Data Protection
Read this guide to learn exactly what today's organizations need to stay protected, compliant, and in control
Pakistan president's website hacking case adjourned !

Pakistan president's website hacking case adjourned !

Apr 14, 2011
Pakistan president 's website hacking case adjourned ! A court here has adjourned the case of a man who hacked into the Pakistan president's website and uploaded material defaming Asif Ali Zardari. Additional Sessions Judge Tanveer Meer Wednesday adjourned the cyber crime case, reported the Daily Times. According to Federal Investigation Agency (FIA) enquiry, the hacker, Shahbaz Khan, had the username ADIL/Th3-penetrator and defaced the website www.president-of-pakistan.com and uploaded material defaming Zardari and the country. Khan was arrested and he told investigators that the president's website was hacked by some international hackers. He claimed he had added the following lines: " THIS SITE GOT HACKED BY ADIL WHERE IS YOUR SECURITY? HUH DON'T TELL ME TO STOP!" THANKS 2= FBI, MASTERMIND, SALMAN, EJA2SALAM PK, CODE5, SHER, SAIF "
WordPress.Com Hacked, Hacker root the Server !

WordPress.Com Hacked, Hacker root the Server !

Apr 13, 2011
WordPress.Com Hacked, Hacker  Root the Server ! The parent company that operates WordPress, made an announcement this morning that it has hacked, resulting what the company said was a low-level (root) break-in to several of their servers. The company warned that potentially anything on those servers could have been revealed to the attackers, including client source code. WordPress founder, Matt Mullenweg made the following announcement in a blog post this moring. Read here We have been diligently reviewing logs and records about the break-in to determine the extent of the information exposed, and re-securing avenues used to gain access. We presume our source code was exposed and copied. While much of our code is Open Source, there are sensitive bits of our and our partners' code. Beyond that, however, it appears information disclosed was limited. Based on what we've found, we don't have any specific suggestions for our users beyond reiterating these security fund...
Apollohospitals.com is vulnerable to SQL injection !

Apollohospitals.com is vulnerable to SQL injection !

Apr 13, 2011
Apollohospitals.com is vulnerable to SQL injection Found and Submitted By : Zero Cool
Supreme Court of Canada vulnerable to non prsistance xss attack !

Supreme Court of Canada vulnerable to non prsistance xss attack !

Apr 13, 2011
Supreme Court of Canada vulnerable to xss attack ! Vunl Link :  https://sr.scc-csc.gc.ca/ search?client=SCC-CSC&site= Internet&output=xml_no_dtd& proxystylesheet=SCC-CSC&hl=en& oe=latin1&ie=latin1&q=%3E%22% 3E%3CMARQUEE%3EHACKED+BY+ZERO+ COOL%3C%2FMARQUEE%3E&btnG= Search Found n Submitted by : Zero Cool
Main Advertising vulnerable to SQLI by lionaneesh !

Main Advertising vulnerable to SQLI by lionaneesh !

Apr 13, 2011
Main Advertising vulnerable to SQLI by lionaneesh ! One of the best advertising companies in the world which is even used by megaupload is vulnerable to SQLi.   What I can do [Power]:- Loinaneesh found a database in which the hits to a particular link was entered (this is most probably used for counting the revenue). I can change and increase or decrease the ad revenue of a particular site. Target: https://click1.mainadv.com/ad.asp?id=%Inject_Here%609 DATABASE :  MSSQL 2005 Method: GET DATABASE : portals DATABASE : PDATAortals Table Name Columns Formats domain_new Categories domains bannersImp1 sampleAPP bannersImp change articleGroups t_jiaozhu specialTables TablesLinks tabella1 Gestionale contents Luckypot ...
ESET NOD32 releases Antivirus for Linux 4 !

ESET NOD32 releases Antivirus for Linux 4 !

Apr 13, 2011
ESET NOD32 releases Antivirus for Linux 4 ! ESET announced the availability of ESET NOD32 Antivirus 4 Business Edition for Linux Desktop and ESET NOD32 Antivirus 4 for Linux. ESET NOD32 Antivirus 4 for Linux offers protection against cross-platform and emerging threats, enhancing the security of Linux platforms. The scanning engine automatically detects and cleans malicious code, including threats designed for Windows and Mac based systems. ESET NOD32 Antivirus 4 Business Edition for Linux Desktop includes ESET Remote Administrator, which provides IT administrators with a management console to control an entire network from a single screen — supporting tens or thousands of heterogeneous computers. Key benefits and features: Detection and proactive cross-platform protection  – Advanced heuristics technology delivers real-time, proactive protection from malware, hacker attacks and exploits. Product protects against Linux, Windows and Mac malware Small system footprint ...
Malaysiakini - Malaysia's Most Popular News Website Shutdown's after cyber attack !

Malaysiakini - Malaysia's Most Popular News Website Shutdown's after cyber attack !

Apr 13, 2011
Malaysiakini - Malaysia's Most Popular News Website Shutdown's after cyber attack ! It has been reported that Malaysia's most popular news website Malaysiakini ( https://www.malaysiakini.com ) has been hit by cyber attack from 11 AM afternoon shutting the website down. The attack created a stir when the website stopped working just before the Sarawak election, making the website inaccessible to the readers. The attack has been diagnosed as Denial-of-service attack which is considered to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Denial-of-service attacks are considered violations of the IAB's Internet proper use policy, and also violate the acceptable use policies of virtually all Internet service providers. They also commonly constitute violations of the laws of individual nations. According to the technical team, the cyber attack has resulted in  swarming the Malaysiakini servers...
French Hacker Arrested After Bragging on TV !

French Hacker Arrested After Bragging on TV !

Apr 13, 2011
A French hacker who boasted on TV about hacking into the network of an important defense contractor was arrested and charged with unauthorized access to a computer system, data theft and organized fraud. The hacker appeared on the France 2 television programme "Complément d'enquête" (Further investigation) where he claimed to have hacked into computers belonging to the French Army and Thales Group, an IT contractor for the aerospace, defense and security industries. After the programme aired, the company filed a complaint, claiming the hacker stole confidential information from its internal network. The man, identified in only as Carl, was arrested on April 7 in Paris. When inspecting his computer, police found the details of hundreds of credit cards and bank accounts. The hacker admitted selling the information on underground websites, as well as using them to make fraudulent purchases for himself and others. This led to additional charges of organized fraud bei...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>