#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Understanding The Concept of Bypassing Antivirus,by Internet Security Team

Understanding The Concept of Bypassing Antivirus,by Internet Security Team

May 14, 2011
Understanding The Concept of Bypassing Antivirus ,by Internet Security Team Anti-Virus manufacturers nowadays implements more and more complex functions and algorithms in order to detect the latest and newest viruses along with their variants. There is however simple methods that can be used to by-pass most of these, especially those that doesn't use heuristics and similar techniques at all. Download guide :  https://www.multiupload.com/P8YWVINAIQ Rar file password : thn
Devil shell v1.2  - Php shell with DDoS feature !

Devil shell v1.2 - Php shell with DDoS feature !

May 14, 2011
Devil shell v1.2  - Php shell with DDoS feature !   Features : 1. Design 2. Permission Change of file / Folders 3. Improved DDoS 4. Create Folder 5. Multi uploading 6. Encrypted Title so hard to find by Google.  Download Link https://www.filefactory.com/file/cb4d35e/n/ugdevil.php Username : ugdevil Password : 1234567 For further Query mail me at : ugdevil@gmail.com
PlayStation Network hack launched from Amazon EC2 !

PlayStation Network hack launched from Amazon EC2 !

May 14, 2011
PlayStation Network hack launched from Amazon EC2 ! The hackers who breached the security of Sony's PlayStation network and gained access to sensitive data for 77 million subscribers used Amazon's web services cloud to launch the attack, Bloomberg News reported. The attackers rented a sever from Amazon's EC2 service and penetrated the popular network from there, the news outlet said, citing an unnamed person with knowledge of the matter. The hackers supplied fake information to Amazon. The account has now been closed. Neither Sony nor Amazon commented on the claims. Bloomberg doesn't say how Amazon's cloud service was used to mount the attack. If the report is correct, it wouldn't be the first time it's been used by hackers. Read More
cyber security

The MCP Security Guide for Early Adopters

websiteWizArticles Intelligence / MCP Security
Thousands of MCP servers are already live, but most security teams don't have a clear strategy yet. Get the practical guide to MCP for security teams.
cyber security

How Security Leaders, like Snowflake's CISO, are Securing Unmanaged Devices

websiteBeyond IdentityIdentity Security / Enterprise Protection
Unmanaged devices fuel breaches. Learn 5 ways CISOs secure them without hurting productivity.
China plugging holes in its Great Firewall by disrupting VPN traffic !

China plugging holes in its Great Firewall by disrupting VPN traffic !

May 14, 2011
China plugging holes in its Great Firewall by disrupting VPN traffic ! Chinese internet users suspect that their government is interfering with the method they have been using to tunnel under the "Great Firewall" to prevent them connecting with the outside world. Sites such as search engine Google and news site MSN have become difficult to access, they say. And a number of universities and businesses have begun warning their users not to try to evade the firewall. Since 6 May, a number of users says that internet connections via China Telecom, the largest telephone company, and China Unicom have become "unstable", with intermittent access when trying to access sites in foreign countries using a "virtual private network" (VPN) – a preferred method of evading the blocks put up by China's censors to external sites. Even Apple's app store has been put off-limits by the new blocks, according to reports. The disruption has mainly affected corpor...
LUMS University Database Hacked By Hitcher

LUMS University Database Hacked By Hitcher

May 14, 2011
LUMS University Database Hacked By Hitcher Vulnerable link :   https://www.lums.edu.pk/event_detail.php?id='300 Databases links for student info :   https://pastebin.com/TAYcwPd3 Faculty info : https://pastebin.com/1RpBitHf
Pakistan Telecommunication Company (PTCL) Hacked by lionaneesh, users data compromised

Pakistan Telecommunication Company (PTCL) Hacked by lionaneesh, users data compromised

May 14, 2011
Pakistan Telecommunication Company (PTCL)  Hacked by lionaneesh , users data compromised Hacked site :  https://www.ptcl.com.pk/ Hack Proof by Hacker :  https://pastebin.com/eBTR5d5H
13th Friday, Everything Down : Twitter ,You tube & Blogger !

13th Friday, Everything Down : Twitter ,You tube & Blogger !

May 13, 2011
13th Friday, Everything Down : Twitter ,You tube & Blogger ! Twitter is down and fail whales abound. Some users have experienced problems loading the service since about 1:30 ET. Twitter announced that it is aware of the situation on its status log: " We are currently experiencing site stability issues. There may be intermittent issues loading twitter.com. We're working to fix it as soon as possible ," the post says. We'll continue to update you with more information, as it becomes available. Today Blogger.com was also down from last 48 hours, But Finally, Blogger.com is back !
Critical Flash Player Update to fix 11 Security Holes

Critical Flash Player Update to fix 11 Security Holes

May 13, 2011
Critical Flash Player Update to fix 11 Security Holes Adobe  has released another batch of security updates for its ubiquitous  Flash Player software. This "critical" patch fixes at least 11 vulnerabilities, including one that reports suggest is being exploited in targeted email attacks. In  the advisory  that accompanies this update, Adobe said "there are reports of malware attempting to exploit one of the vulnerabilities, CVE-2011-0627, in the wild via a Flash (.swf) file embedded in a Microsoft Word  (.doc) or  Microsoft Excel  (.xls) file delivered as an email attachment targeting the  Windows  platform. However, to date, Adobe has not obtained a sample that successfully completes an attack." The vulnerabilities exist in Flash  versions 10.2.159.1  and earlier for Windows,  Mac ,  Linux and  Solaris . To learn which version of Flash you have, visit  this link . The new version for most platforms is 10...
Finally, Blogger.com is back !

Finally, Blogger.com is back !

May 13, 2011
Finally, Blogger.com is back ! Blogger.com is back now, Official statement : https://buzz.blogger.com/2011/05/blogger-is-back.html
Hacker getting WordPress Database Dump with Google Query !

Hacker getting WordPress Database Dump with Google Query !

May 13, 2011
Hacker getting WordPress Database Dump with Google Query ! There appear to be multiple WordPress powered sites that are performing an DB->XML dumb of the articles and subsequent pages. The comments section includes originating IP address, datetime, E-Mail address, homepage, etc. These entities are traditionally not exposed to the anonymous Internet via WordPress. Since the XML dump is structured it's quite easy to harvest this data. More alarming is the volume of sites freely exposing this. I'm not certain of the root cause but perhaps it's related to an upgrade procedure. Google is happily indexing and caching these dumps as it appears they're created in the attachment system (URI ?attachment_id=\d+) with an HREF to the actual dump. A simple Google search below will return a multitude of sites. Perhaps someone on the WordPress side can comment on this behavior? Google Query - inurl:uploads ".xml_.txt" wordpress Anoth...
Final Fantasy maker Square Enix hacked, 25,000 email addresses Stolen !

Final Fantasy maker Square Enix hacked, 25,000 email addresses Stolen !

May 13, 2011
Final Fantasy maker Square Enix hacked, 25,000 email addresses Stolen ! Square Enix has confirmed that personal data has been compromised after hackers accessed the Eidos Montreal website. The Deus Ex website was also accessed by the attack from hackers. It's thought that it took place on Wednesday. The publisher's now confirmed that personal data has been compromised. "Square Enix can confirm a group of hackers gained access to parts of our Eidosmontreal.com website as well as two of our product sites. We immediately took the sites offline to assess how this had happened and what had been accessed, then took further measures to increase the security of these and all of our websites, before allowing the sites to go live again," Square Enix said in a statement sent to VG247. However, the company insists that while personal data such as up to 25,000 email addresses and resumes for jobs at Eidos Montreal – of which 350 were accessed – no credit card data was stolen due to the webs...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>