#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Hacked Irish Website RecruitIreland.com Exposes The User Names, Addresses !

Hacked Irish Website RecruitIreland.com Exposes The User Names, Addresses !

Feb 10, 2011
Employment search site RecruitIreland.com opened its doors, after the security breach that exposed the names and email addresses. The site, which aims to add 350 new users every day and mail a newsletter to 170,000 registered candidates, said that some customers have received spam that tried to recruit mules to transfer funds in the name of swindlers, said Sophos. The breach came to light late on Tuesday and brought the site to be taken for about seven hours. "Obviously, it's a horrible situation RecruitIreland web site and its users were vulnerable to protect" the message of Sophos' Blog Naked Security said. "Unanswered questions asked for sensitive information was not considered properly (it was the encryption is used?), And how it was possible for hackers to steal valuable information." The company said only that the cause of the violation - probably an "error code" - had been identified and that the "particular problem has been solv...
Maruti CEO’s email hacked, two Nigerians detained for hacking !

Maruti CEO's email hacked, two Nigerians detained for hacking !

Feb 10, 2011
The Gurgaon badge accept bedfast two Nigerians for hacking into the email of auto above Maruti Suzuki's managing administrator and arch controlling administrator (CEO) Shinzo Nakanishi and sending affected job offers to aspirants. According to sources, the badge accept asked the suspects to accouter capacity of their coffer accounts. "They accept accounts in ICICI coffer and we accept asked them to accord us transaction details," said a chief badge officer. "We accept bedfast the accused but several formalities charge to be accomplished afore they are formally arrested. We accept accounting to the Nigerian embassy," the administrator said. The Nigerians were fleecing believing job aspirants of their money by sending counterfeit action letters. The victims were told to drop money alignment from Rs 6,000 to Rs 60,000. The exact cardinal of victims is not yet known, said a badge official. The badge had beforehand articular a Nigerian woman whose authorization was acclimated to acce...
Facebook accounts of four Missouri state legislators hacked !

Facebook accounts of four Missouri state legislators hacked !

Feb 10, 2011
Internet hackers are targeting Missouri accompaniment assembly and their staff, and no one knows absolutely how or why. Since the aldermanic affair started Jan. 5, bristles bodies on the Abode ancillary of the Capitol accept appear their Facebook accounts actuality hacked: three Republican legislators, one Democratic administrator and one Republican staffer. It is the best concentrated, boundless adventurous of hacking contest the Abode has seen. "If the letters are true, this is a fasten in what we've accomplished in the past," said Adam Crumbliss, the Abode clerk. "We're audition added about it than we anytime have." Though no exact annual has been established, the instances of hacking point to a potentially broad computer aegis hole: A free, accessible wireless arrangement for Abode visitors and legislators serves as a basic acceptable mat for hackers, aegis experts say. Anniversary of the bristles contempo hacking victims had acclimated the arran...
cyber security

SaaS Security Made Simple

websiteAppomniSaaS Security / SSPM
Simplify SaaS security with a vendor checklist, RFP, and expert guidance.
The Hidden Risks of SaaS: Why Built-In Protections Aren't Enough for Modern Data Resilience

The Hidden Risks of SaaS: Why Built-In Protections Aren't Enough for Modern Data Resilience

Jun 26, 2025Data Protection / Compliance
SaaS Adoption is Skyrocketing, Resilience Hasn't Kept Pace SaaS platforms have revolutionized how businesses operate. They simplify collaboration, accelerate deployment, and reduce the overhead of managing infrastructure. But with their rise comes a subtle, dangerous assumption: that the convenience of SaaS extends to resilience. It doesn't. These platforms weren't built with full-scale data protection in mind . Most follow a shared responsibility model — wherein the provider ensures uptime and application security, but the data inside is your responsibility. In a world of hybrid architectures, global teams, and relentless cyber threats, that responsibility is harder than ever to manage. Modern organizations are being stretched across: Hybrid and multi-cloud environments with decentralized data sprawl Complex integration layers between IaaS, SaaS, and legacy systems Expanding regulatory pressure with steeper penalties for noncompliance Escalating ransomware threats and inside...
More than 3,000 may accept been victims of phone hacking !

More than 3,000 may accept been victims of phone hacking !

Feb 10, 2011
Up to 3,000 bodies who may accept been victims of the phone-hacking aspersion will be contacted by police, it has emerged. Officers plan to address to abstracts from politics, showbusiness and action whose names were begin at the bounds of a clandestine detective confined over the scam. The added across of the assay was appear afterwards Scotland Yard said it had articular an bearding cardinal of abeyant fresh victims. Meanwhile, above agent prime abbot Lord Prescott said he was told by badge that they had 'significant fresh evidence' apropos to his affirmation that he had been targeted. Sources said fresh advice reveals that up to 20 people, told in the aboriginal 2005 assay that there was little or no advice apropos to them, are now anticipation to accept been targeted by the Account Of The World. Last night the Duchess of York, became the most recent high-profile amount to affirmation she was a victim of buzz hacking. Sarah Ferguson said she believed her voicemail letter...
Yahoo! Announces Hack U™ Spring 2011 Series !

Yahoo! Announces Hack U™ Spring 2011 Series !

Feb 09, 2011
Yahoo! is proud to announce the Hack U™ Spring 2011 calendar of events. Join Yahoo! web experts for a week of learning, hacking and fun! You'll hear interesting tech talks, hacking tips and lessons, and get hands-on coding workshops where you'll work with cutting-edge technology. The week's events will culminate with our University Hack Day competition—a day-long festival of coding, camaraderie, demos, awards, food, music and jollity (it's a real word, look it up). It's not about perfect code, just your creativity, a cool idea and a working prototype. You'll have access to tons of APIs and tools in the Yahoo! Developer Network (check out YQL, the YUI Library, Flickr and BOSS just to name a few). No rules or limitations - just show up and hack for your opportunity to win cool prizes, a spot in the gallery, street cred and the chance to represent your school at the University Hack Showdown in California. This is your shot to develop something that will revolutionize the industry, mak...
Egyptian censor-busting website hacked !

Egyptian censor-busting website hacked !

Feb 09, 2011
A Morocco-based website advised to accord Egyptians the adeptness to get about their government's jamming of Internet sites was brought bottomward on Friday by a adult cyber-attack, the website's managing administrator said. "Someone got into the armpit about four o'clock this morning and destroyed its agency of admission to the all-around web," Francesco Landogna said. The site, Wall5, had set up a apparition aperture which baffled the basic barriers put up by Egyptian authorities back the alpha of the massive demonstrations adjoin President Hosni Mubarak two weeks ago. Landogna said that the cardinal of downloads of Wall5's censorship-busting affairs had exceeded 200,000 by backward Thursday. Algerian as able-bodied as Egyptian subscribers accept acclimated it. Rejecting a adventitious advance by hackers, he said, "These were bodies with adult accoutrement who got into the server and ashore it." Landogna said it was absurd to acquaint area the advance had appear from, but h...
All India Architects Website hacked by XrosFerZ (XrosFerZ Hacking Unit)

All India Architects Website hacked by XrosFerZ (XrosFerZ Hacking Unit)

Feb 09, 2011
All India Architects Website hacked by XrosFerZ (XrosFerZ Hacking Unit) Link :  https://www.allindiaarchitects.com/
Infiltrate 2011 - Information security Event !

Infiltrate 2011 - Information security Event !

Feb 09, 2011
Infiltrate is a deep technical security conference that will focus entirely on offensive technical issues. It will be the single-most important event for those who are focused on the technical aspects of offensive security issues. No policy or high-level presentations, just hard-core thought provoking technical meat. World-renowned researchers focused on the latest technical issues will do the presentations – demonstrating techniques you can't learn about anywhere else. In order to keep Infiltrate accessible, we are limiting attendance to 100 attendees. In addition to two days of seminars, Immunity is also offering training both before and after the event. Both Immunity's most popular class "Unethical Hacking" and a new offering, the Immunity Master Class are available. This is the only venue where these classes are offered to the public. Event details Event: Infiltrate 2011 Date: 16 April-17 April 2011 Location: National Hotel in South Beach, Florida, USA. Organizer: Immunit...
Nullcon 2011 - Information security Event !

Nullcon 2011 - Information security Event !

Feb 09, 2011
Nullcon the open security community is back with the second edition of nullcon Goa, an international security conference. The event provides cutting edge research in information security in a vendor neutral environment Event details Event: nullcon 2011 Date: 25 February-26 February 2011 Location: The RETREAT by Zuri 5 Star Resort Pedda, Uttor Doxi, Varca, Salcete Goa 403 721 INDIA Tel.: +91 832 6697 272 Fax: +91 832 6697 282 Organizer: Null
OpenDNS 2010 Report : Web Content Filtering and Phishing !
Hackers Insert Rogue Content on Al Jazeera Arabic Website !

Hackers Insert Rogue Content on Al Jazeera Arabic Website !

Feb 09, 2011
Al-Jazeera said that hackers have managed to bring the rogue content to some of its Arabic website for ads aimed at discrediting the objectivity of its coverage of Egyptian protests. "Hackers have managed to bring the portion of the advertising instead ajjazeera.net distort the network news coverage in Egypt," Al Jazeera announced yesterday. The message was posted thugs an ad in the top of the home page for a limited time and play "together to overthrow Egypt." Al Jazeera is one of the news networks, with the most extensive live coverage of the turmoil in Egypt, although the government to withdraw its license and closed its office in Cairo. Network of suppliers and corespondents have risked their personal safety, remaining between democracy demonstrators, including violent clashes in government loyalists. Egyptian officials are not happy with the network showing the number of anti-government demonstrators, accusing him of bias in its reports. Meanwhile...
Malware Exploding, Especially On Mobile Devices !

Malware Exploding, Especially On Mobile Devices !

Feb 09, 2011
Mobile malware is growing, and Adobe is the main vector of attack, according to new figures from security firm McAfee, which were published on Tuesday. Cybercriminals are adopting strategies to benefit from a more mobile device users in the report, McAfee Threat Report: Fourth Quarter 2010 applications. The number of pieces of new mobile malware in 2010 increased 46 percent compared to 2009. The report also revealed that 20 million new pieces of malware in 2010 - almost 55,000 new threats every day. "Our Q4 Threat Report shows that cyber criminals are watching what is popular and what will have the greatest impact from the least effort," said Vincent Weafer, senior vice president of McAfee Labs. As more consumers use mobile devices and tablets in their daily lives and work, cybercriminals have quoted, say the researchers. Accordingly, botnet attacks targeting mobile devices are expected to increase. In the fourth quarter include some of the most active threat bots know...
Expert Insights Articles Videos
Cybersecurity Resources