#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Online dating site eHarmony.com Hacked !

Online dating site eHarmony.com Hacked !

Feb 11, 2011
Online dating giant  eHarmony  has begun urging many users to change their passwords, after being alerted  to a potential security breach of customer information. The individual responsible for all the ruckus is an Argentinian hacker who recently claimed responsibility for a similar breach  at competing e-dating site PlentyOfFish.com . Late last year,  Chris "Ch" Russo , a self-styled "security researcher" from Buenos Aires, told me he'd discovered vulnerabilities in eHarmony's network that allowed him to view passwords and other information on tens of thousands of eHarmony users. Russo first alerted me to his findings in late December, right after he said he first began contacting site administrators about the flaw. At the time, I sent messages to several of the administrative eHarmony e-mail addresses whose passwords Russo said he was able to discover, although I received no response. Russo told me shortly thereafter that he'd hit a brick wall in his researc...
Senior bank manager's account hacked !

Senior bank manager's account hacked !

Feb 11, 2011
JAIPUR: A senior manager of a private bank has registered an FIR against some unidentified persons who allegedly hacked his email ID and sent objectionable emails. The Ashok Nagar police are investigating the matter. SHO, Ashok Nagar and investigating officer of the case Jagmohan said one Brijesh Kumar registered the FIR on Wednesday. "He says that someone hacked his email account and sent mails with pornographic content and other objectionable mails," the officer said. "We have lodged a case under sections of Information Technology Act," the officer added.
Metasploit Framework v3.5.2 latest version download !

Metasploit Framework v3.5.2 latest version download !

Feb 11, 2011
Our favourite exploitation framework – The Metasploit Framework has been updated! We now have Metasploit Framework version 3.5.2! "The Metasploit Framework is a penetration testing toolkit, exploit development platform, and research tool. The framework includes hundreds of working remote exploits for a variety of platforms. Payloads, encoders, and nop slide generators can be mixed and matched with exploit modules to solve almost any exploit-related task." This is the detailed release log: Statistics: * Metasploit now ships with 644 exploit modules and 330 auxiliary modules. * 39 new modules and payloads have been added since the last point release. * 58 tickets were resolved and 331 commits were made since the last point release. New Modules: New Exploits and Auxiliaries: * Apache Tomcat Transfer-Encoding Information Disclosure and DoS * Microsoft IIS FTP Server Encoded Response Overflow Trigger * Apache HTTPD mod_negotiation Filename Bruter * Apache HTTPD mod_negotiatio...
cyber security

SaaS Security Made Simple

websiteAppomniSaaS Security / SSPM
Simplify SaaS security with a vendor checklist, RFP, and expert guidance.
The Hidden Risks of SaaS: Why Built-In Protections Aren't Enough for Modern Data Resilience

The Hidden Risks of SaaS: Why Built-In Protections Aren't Enough for Modern Data Resilience

Jun 26, 2025Data Protection / Compliance
SaaS Adoption is Skyrocketing, Resilience Hasn't Kept Pace SaaS platforms have revolutionized how businesses operate. They simplify collaboration, accelerate deployment, and reduce the overhead of managing infrastructure. But with their rise comes a subtle, dangerous assumption: that the convenience of SaaS extends to resilience. It doesn't. These platforms weren't built with full-scale data protection in mind . Most follow a shared responsibility model — wherein the provider ensures uptime and application security, but the data inside is your responsibility. In a world of hybrid architectures, global teams, and relentless cyber threats, that responsibility is harder than ever to manage. Modern organizations are being stretched across: Hybrid and multi-cloud environments with decentralized data sprawl Complex integration layers between IaaS, SaaS, and legacy systems Expanding regulatory pressure with steeper penalties for noncompliance Escalating ransomware threats and inside...
Leader.ir Next Target by Anonymous at 11.02.2011 at 18.00 !!

Leader.ir Next Target by Anonymous at 11.02.2011 at 18.00 !!

Feb 10, 2011
Leader.ir Next Target by Anonymous at 11.02.2011 at 18.00 !! TARGET: Leader.ir -- 11.02.2011 at 18.00 ( 6 PM ) GMT LOIC:   https://3.ly/77Dy PRESS:   Operation Iran - Press release by Anonymous Hackers ! REASONS:   https://www.youtube.com/watch?v=3_IHeYjiFlY
Rootkit.com database leaked by Anonymous Hackers, Available for Download !

Rootkit.com database leaked by Anonymous Hackers, Available for Download !

Feb 10, 2011
On February 6, 2011, as part of their attack on HBGary , the Anonymous group social engineered administrator of rootkit.com , Jussi Jaakonaho, to gain root access to rootkit.com . The entire MySQL database backup was then released by Anonymous and announced using HBGary's CEO Twitter account, @aaronbarr   : Sup, here's rootkit.com MySQL Backup https://stfu.cc/rootkit_com_mysqlbackup_02_06_11.gz #hbgary #rootkit #anonymous.   The table pic shown is the list of accounts found in rootkit.com MySQL database backup with passwords in cleartext.
Chinese hackers penetrate multinational oil giants !

Chinese hackers penetrate multinational oil giants !

Feb 10, 2011
Hackers in China  are causing havoc among computer systems of five multinational oil and gas companies, according to a new report by McAfee.  Security outfits have warned that this type of attack could get lot worse as multinationals continue to prod the Chinese government.  McAfee said in its  Night Dragon whitepaper  that hackers have stolen bidding plans and other critical proprietary information. This can be used to detrimental effect and give competitors an advantage.  It could not name the five petrochemical and oil companies as it says they are clients. George Kurtz, CTO, said in a  blog post : "We have strong evidence suggesting that the attackers were based in China. The tools, techniques, and network activities used in these attacks originate primarily in China. These tools are widely available on the Chinese Web forums and tend to be used extensively by Chinese hacker groups." He warns that well-coordinated, targeted attacks such a...
Operation Italy Press Release : Anonymous Hackers will Soon strike again !

Operation Italy Press Release : Anonymous Hackers will Soon strike again !

Feb 10, 2011
Operation Italy Press Release : Anonymous Hackers will Soon strike again ! Operation Italy part2 - Target: Surprise : Join #opitaly the 13/02/2011 at 12 GMT PM Attention Please: citizens of the world Anonymous will soon strike again. We are determined to continue our protest. Anonymous represent the voice of the people,and that voice has clearly spoken against the current Italian government. Italian people deserve something better than faggot Berlusconi and his political class. The ruling political party in Italy stand against everything that Anonymous consider worthwhile freedom of expression,freedom of press,and a freely accessible and uncensored internet being only some of those universally granted rights. We also request the removal of the ban against thepiratebay.org and the deletion of the infamous Bondi/SIAE tax on digital storage. ,We are not willing to set deadlines for our protest;it will endure until all our requests ...
School site hacked and replaced with porn webpages !

School site hacked and replaced with porn webpages !

Feb 10, 2011
A LOCAL secondary school's website was allegedly hacked and replaced with a pornographic site according to  a post in citizen journalism website Stomp. Stomper John, seeking a potential school for his son entering secondary school next year, visited the website of Junyuan Secondary School for more information on Wednesday evening after recommendations from friends that it was a good school. Upon logging into www.junyuansec.net , a pornographic site greeted him. He said the website had been hacked into and replaced with the pornographic site. 'What shocked me more was that the school did not do anything about it and let it remain this way,' he says. He added: 'It was like this the entire evening and I hope that the school will do something about it asap as it will tarnish the school's reputation.' An page error notification appeared when StraitsTimes.com tried to access the link on Thursday afternoon. The school's principal, Lee Lai Yong, told Straits...
The Iphone can be hacked in 6 minutes !

The Iphone can be hacked in 6 minutes !

Feb 10, 2011
INSECURITY RESEARCHERS have busted an Iphone's encryption protection in just six minutes to gain access to passwords. Boffins at the Fraunhofer Institute for Secure Information Technology (SIT) in Germany devised the hack. The researchers did the tests to demonstrate that passwords aren't secure on Iphones that have been lost. They obviously had a point to prove and weren't happy with just hacking Apple's shoddy security encryption in six minutes. Within the allotted time, the team also managed to retrieve most of the passwords stored on the Iphone, accessing personal data that could be used to get into bank accounts. What's great about this hack is that the team spends some time in its report tellng us that it renders the Iphone completely vulnerable as a business tool. It could even make a company's network security vulnerable as well. The flaw affects all Ithings with the latest firmware and the team didn't even have to break the more complicated 256...
Operation Iran - Press release by Anonymous Hackers !

Operation Iran - Press release by Anonymous Hackers !

Feb 10, 2011
Just Now Anonymous Hackers Release a Press Note For  citizens of Iran Given Below :-  O most respectable and honorable citizens of Iran - the cradle of civilization, You express yourself, and we're listening. We have not forgotten. Protestants who were imprisoned, beaten, to bloggers who have been censored, citizens who were executed for criticizing the regime, you are truly loyal citizens of your country. A new dawn appears to you and your country will be free from the chains of oppression, tyranny and torture.   You can finally exhale and take a new breath of air that will fill you with strength, wisdom and freedom. Anonymous supports you and accompany you on this path of liberation of body and mind of all Iranian citizens. You, we are Anonymous, and do not fear the repressive regimes. They know us, but we can not stop. They fear us, and remain helpless to what will be unleashed against them. Many of them are afraid of you, that's why for so long, they ens...
Secret plan to kill Wikileaks with FUD leaked !

Secret plan to kill Wikileaks with FUD leaked !

Feb 10, 2011
Three security consulting firm with links to intelligence agencies of the United States to cook up to dirty tricks campaign late last year in favor of Wikileaks to destroy its perceived weaknesses, reads the draft published in the organization of information 'which claimed to be from the conspirators. Around December 3 was believed to be a consultant for defense contractors in the United States palantíri Technologies, Technology Berico HBGary and suggested lawyers desperate Bank of America union, which would ruin the site informants' uses a divide and conquer approach. The conspirators called a war of disinformation to "feed the confrontation between groups of fuel, which include a loss of false documents" call failed ", the creation of" concern for the safety of the infrastructure, "Wikileaks hackers to discover that respondents were to kill the project "and a media campaign to highlight the" radical and irresponsible nature of Wikileaks...
Expert Insights Articles Videos
Cybersecurity Resources