#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

LastPass Forces Users to Change Master Passwords Following Suspicious Activity

LastPass Forces Users to Change Master Passwords Following Suspicious Activity

May 05, 2011
LastPass, one of the most popular cloud-based password management services, is forcing users to change their master passwords as a precaution after it discovered an unauthorized data transfer out of its network. In a post on its blog the company explains, in sufficient detail, what prompted this measure, why it was the best course of action and what it means for users. On May 3, the company detected larger than normal outbound traffic and immediately launched an internal audit to determine the source. Such transfers have been detected before, but each time the origin was determined to be an employee or an automated script. "In this case, we couldn't find that root cause. After delving into the anomaly we found a similar but smaller matching traffic anomaly from one of our databases in the opposite direction. "Because we can't account for this anomaly either, we're going to be paranoid and assume the worst: that the data we stored in the database was some...
BackTrack 4: Assuring Security by Penetration Testing

BackTrack 4: Assuring Security by Penetration Testing

May 05, 2011
BackTrack 4  : Assuring Security by Penetration Testing Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide professional guidelines and recommendations to you. The book is designed in a simple and intuitive manner, which allows you to explore the whole BackTrack testing process or study parts of it individually. If you are an IT security professional or network administrator who has a basic knowledge of Unix/Linux operating systems including awareness of information security factors, and you want to use BackTrack for penetration testing, then this book is for you.  Download :  https://shrta.com/files/0ZYSOJBV/BackTrack-4-Assuring-Security-by-Penetration-Testing.zip Or https://www.multiupload.com/ZCV9Q3WO4X
Gloriousindia.com database hacked by DrGr4vity, 1000 users data compromised

Gloriousindia.com database hacked by DrGr4vity, 1000 users data compromised

May 05, 2011
Gloriousindia.com database hacked by DrGr4vity , 1000 users data compromised Compromised User Data Leaked at https://docs.google.com/document/d/1NwQNGeFTb3z3QcFwT4vHNvPUv3uLyro8zQ556Oq_wRY/edit?hl=en
cyber security

New Whitepaper: The Evolution of Phishing Attacks

websitePush SecurityIdentity Attacks / Phishing
Why is phishing still so effective? Learn about modern phishing techniques and how to counteract them.
cyber security

Key Essentials to Modern SaaS Data Resilience

websiteVeeam SoftwareSaaS Security / Data Protection
Read this guide to learn exactly what today's organizations need to stay protected, compliant, and in control
Banglarmela.org Hacked By EvilSoul

Banglarmela.org Hacked By EvilSoul

May 05, 2011
Banglarmela.org Hacked By EvilSoul Hacked Site : Banglarmela.org
Datefinder.co.nz - Free Dating Site Pwnd by Fr0664/FCA

Datefinder.co.nz - Free Dating Site Pwnd by Fr0664/FCA

May 05, 2011
Datefinder.co.nz - Free Dating Site Pwnd by Fr0664/FCA Fr0664/FCA hack Datefinder.co.nz and Expose 252 emails/passwords @  https://pastebin.com/W2TDnGUR
Metasploit Framework 3.7.0 Released !

Metasploit Framework 3.7.0 Released !

May 04, 2011
Metasploit Framework 3.7.0 Released ! The Metasploit team has spent the last two months focused on one of the least-visible, but most important pieces of the Metasploit Framework; the session backend. Metasploit 3.7 represents a complete overhaul of how sessions are tracked within the framework and associated with the backend database. This release also significantly improves the staging process for the reverse_tcp stager and Meterpreter session initialization. Shell sessions now hold their output in a ring buffer, which allows us to easily view session history -- even if you don't have a database. This overhaul increases performance in the presence of many sessions and allows for a larger number of concurrent incoming sessions in a more reliable manner. The Metasploit Console can now comfortably handle hundreds of sessions, an especially important consideration when running large-scale social engineering engagements. Several areas of database performance have seen significant i...
SportGFX.COM - World's Largest Sport GFX Community Hacked by PirateAL

SportGFX.COM - World's Largest Sport GFX Community Hacked by PirateAL

May 04, 2011
SportGFX.COM - World's Largest Sport GFX Community Hacked by PirateAL Hacked Site :  SportGFX.C OM Proof: https://www.youtube.com/watch?v=dWV4lUNsWxA Zone-h mirror : https://zone-h.org/mirror/id/13608314
Goal.com Hacked, found to be serving malware !

Goal.com Hacked, found to be serving malware !

May 04, 2011
According to Armorize, soccer news site Goal.com was recently found to be serving malware. "In an analysis of the attack, Armorize researcher Wayne Huang suggests that a hacker specifically targeted and compromised Goal.com through a back-door that allowed the attacker to manipulate the site's content at will," writes threatpost's Brian Donohue. "According to the report, Goal.com was detected on April 27 and 28, 2011 serving up an iframe attack that forwarded visitors to a rogue domain in the .cc top level domain (TLD)," Donohue writes. "That redirect was the first in a chain of events that resulted in the delivery of a known exploit pack, g01pack that targets attacks at the specific operating system and browser version the Goal.com visitor is using. After exploiting the user's browser, further malware, including a Trojan horse program were downloaded to the victim's computer."
PlayStation Network Security Update !

PlayStation Network Security Update !

May 04, 2011
On Tuesday, April 26 Sony shared that some information that was compromised in connection with an illegal and unauthorized intrusion into our network. Once again, Sony'd like to apologize to the many users who were inconvenienced and worried about this situation. Sony want to state this again given the increase in speculation about credit card information being used fraudulently. One report indicated that a group tried to sell millions of credit card numbers back to Sony. To my knowledge there is no truth to this report of a list, or that Sony was offered an opportunity to purchase the list. One other point to clarify is from  this weekend's press conference . While the passwords that were stored were not "encrypted," they were transformed using a cryptographic hash function. There is a difference between these two types of security measures which is why Sony said the passwords had not been encrypted. But I want to be very clear that the passwords were not stored in our databa...
One more Hacker Website Ub3rHakerz.NET Hacked By Shadow008 (PakCyberArmy)

One more Hacker Website Ub3rHakerz.NET Hacked By Shadow008 (PakCyberArmy)

May 04, 2011
One more Hacker Website Ub3rHakerz.NET Hacked By Shadow008 (PakCyberArmy) Sites Hacked :  https://ub3rhakerz.net/ Mirror : https://zone-h.com/mirror/id/13604712
Source Code of Osama FaceBook worm Leaked !

Source Code of Osama FaceBook worm Leaked !

May 04, 2011
Source Code of Osama FaceBook worm Leaked ! Source Code :  https://www.reddit.com/tb/h3mdu
Expert Insights Articles Videos
Cybersecurity Resources
//]]>