#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Operation Libya (#OPLIBYA) - Anonymous Press Release for Free citizens of the world !

Operation Libya (#OPLIBYA) - Anonymous Press Release for Free citizens of the world !

Feb 22, 2011
Operation Libya (#OPLIBYA) - Anonymous Press Release for Free citizens of the world ! NOTE :  One More Press Released By Anonymous Hackers on there official site/Facebook/Twitter. We are Publishing This news, just as the Media of "Hacking Field" . These is No relation b/w 'The Hacker News' & 'Anonymous Hackers'. Free citizens of the world: For a long time the people of Libya have suffered under the madness of their leader, Muammar Abu Minya al-Gaddafi, and his government.  For too long, the people of Libya have suffered in silence.  With the recent riots in Tunisia and Egypt, the fear is gone by the Arabs throughout the region.  It 'not to spend more time in silence. Anonymous is trying to bring its support to the courageous people of Libya.  Anonymous says his involvement with this release for a common goal.  We, the people will not be silent as dictators shoot their citizens.  We, the people will not remain passive while the power...
Anonymous Hackers message to LunarPages for removing personal page of Libyan dictator Colonel Muammar al-Gadaffi !

Anonymous Hackers message to LunarPages for removing personal page of Libyan dictator Colonel Muammar al-Gadaffi !

Feb 22, 2011
Anonymous Hackers message to LunarPages   for removing  personal page of Libyan dictator Colonel Muammar al-Gadaffi ! NOTE :  One More Press Released By Anonymous Hackers on there official site/Facebook/Twitter. We are Publishing This news, just as the Media of "Hacking Field" . These is No relation b/w 'The Hacker News' & 'Anonymous Hackers'. Dear LunarPages, This is Anonymous. We're here to inform you that you are hosting the personal homepage of Libyan dictator Colonel Muammar al-Gadaffi. We, and the rest of the internet, find this behaviour unacceptable especially in light of the current genocide being waged on the people of Libya. We therefore request that you cease doing business with him. We ask you kindly to remove algathafi.org from the internet. We wish you no harm, but we do not believe that it is good neither for you nor anyone else that algathafi.org remains available. By inadvertently supporting him your business sends a message of ...
Database of banking recruitment website Efinancialcareers-gulf.com hacked !

Database of banking recruitment website Efinancialcareers-gulf.com hacked !

Feb 22, 2011
The database of global banking recruitment website  efinancialcareers-gulf.com  has been hacked, according to the former CEO of Credit Suisse Private Bank Australia, Nick Kalikajaros. The British company that has Australian operations believed its registered users' names, email addresses, registered countries and encrypted passwords were accessed during the breach. Kalikajaros claimed the website operator's managing director, James Bennett, issued a warning and apology to its customers over the weekend. "We are not immune from illegal attempts to access and extract information, as is the case with many organizations which maintain large information databases. Although we constantly review and improve our security features, unfortunately on this occasion, some information was taken, for which we offer our full apology," Bennett was reported to have said. Neither eFinancialCareers.com nor its parent, New York Stock Exchange listed Dice Holdings, Inc. have releas...
cyber security

Free Tool: Help Desk Verification Codes

websitePush SecurityThreat Detection / Identity Security
Get secure, rotating codes in employee browsers to verify their identity and stop Scattered Spider breaches.
Between Buzz and Reality: The CTEM Conversation We All Need

Between Buzz and Reality: The CTEM Conversation We All Need

Jun 24, 2025Threat Exposure Management
I had the honor of hosting the first episode of the Xposure Podcast live from Xposure Summit 2025. And I couldn't have asked for a better kickoff panel: three cybersecurity leaders who don't just talk security, they live it. Let me introduce them. Alex Delay , CISO at IDB Bank, knows what it means to defend a highly regulated environment. Ben Mead , Director of Cybersecurity at Avidity Biosciences, brings a forward-thinking security perspective that reflects the innovation behind Avidity's targeted RNA therapeutics. Last but not least, Michael Francess , Director of Cybersecurity Advanced Threat at Wyndham Hotels and Resorts, leads the charge in protecting the franchise. Each brought a unique vantage point to a common challenge: applying Continuous Threat Exposure Management (CTEM) to complex production environments. Gartner made waves in 2023 with a bold prediction: organizations that prioritize CTEM will be three times less likely to be breached by 2026. But here's the kicker -...
Voice of America (VOA) website hacked by Iranian Cyber Army !

Voice of America (VOA) website hacked by Iranian Cyber Army !

Feb 22, 2011
Iranian computer hackers on Monday hijacked the website of the Voice of America, replacing its Internet home page with a banner bearing an Iranian flag and an image of an AK-47 assault rifle. The group called on Secretary of State Hillary Clinton to "hear the voice of oppressed nations." The banner stated that "we have proven that we can." The message called on the United States to "stop interfering in Islamic countries." It then listed more 90 websites of VOA it claimed has also been hacked. A State Department spokesman could not be reached for comment. An administration official said the group identified with the banner is known as the Iranian Cyber Army. VOA operates a global network of news and information outlets that reflect official U.S. foreign policies. It broadcasts, through radio, television and the Internet to scores of nations around the world. Little is known about the group. It was credited with hacking and defacing Twitter in December 2009, replacing the...
Lohchab Network Private Limited (India) Hacked by TriCk (TeaMp0isoN - ZHC)

Lohchab Network Private Limited (India) Hacked by TriCk (TeaMp0isoN - ZHC)

Feb 21, 2011
Lohchab Network Private Limited (India) Hacked by TriCk (TeaMp0isoN - ZHC) Link :    https://lohchab.in/ Mirror :  https://zone-h.org/mirror/id/13096395
Richard Kirk hacked into more than 300 eBay users' e-mail & PayPal accounts !

Richard Kirk hacked into more than 300 eBay users' e-mail & PayPal accounts !

Feb 21, 2011
Richard Kirk Kirk hacked into more than 300 eBay users' e-mail accounts after cracking their passwords. He then was able to steal money from his victims' usually secure PayPal accounts. He transferred money from PayPal into hundreds of his own accounts, and then used the stolen cash to buy valuable items, including gold bars. On Friday he was jailed for three and a half years for fraud and theft committed between 2008 and 2010. Nottingham Crown Court heard he stole more than £180,000 from his victims to buy gold jewellery, gold bullion bars and a Mitsubishi Shogun car on eBay. Victims were mainly individual account holders from Mansfield, Nottingham, Australia and Sweden. One account belonged to a special school in the North West for children with a short life expectancy. Kirk used the school's website, which sold memorabilia, to sell gold bars. After he agreed a sale of £3,000, the gold was never sent to the buyer. "Richard Kirk is a professional eBa...
Anonymous Apologize for their Kindness & Effort, Anonymous Press Release 20 Feb,2011 (Must Read) !

Anonymous Apologize for their Kindness & Effort, Anonymous Press Release 20 Feb,2011 (Must Read) !

Feb 21, 2011
Anonymous Apologize for their Kindness & Effort,   Anonymous Press Release 20 Feb,2011 (Must Read) ! NOTE :  One More Press Released By Anonymous Hackers on there official site/Facebook/Twitter. We are Publishing This news, just as the Media of "Hacking Field" . These is No relation b/w 'The Hacker News' & 'Anonymous Hackers'. The Complete Message Written by them is as given Following : Ladies and gentlemen around the world, We are writing to you today to inform you of a great realization that has come to fruition throughout the ranks of Anonymous. It is a sad revelation indeed that Anonymous, as a whole, has turned into nothing more than trolls trolling on trolls. It is due to that fact, and the recent outburst and outcry on the Westboro Baptist Church that select members within the group are apologizing for our brethren’s outbursts. We realize that many in the media and across the globe have followed our group, our legion of comrades in hopes tha...
Devil Shell v1.1 [new Release] Download !

Devil Shell v1.1 [new Release] Download !

Feb 21, 2011
Devil Shell v1.1 [new Release] Download ! Nice to share next version of shell with all of you with new features * DDoS * Information area [server ip,server port,etc] * Design new * Download any File * Remove some Bugs Comming Soon in Next Version * Mail Bomb * SQL Query You can Download at :Download Devil Shell v1.1 *Note: Only for testing purpose awl are work properly but still will do more updates sooner but enjoy this version secure fast and reliable only for hacknuts members Shell Username: ugdevil Shell Password: 1234567  download link  https://www.filefactory.com/file/b581cff/n/ugdevil.rar Archie Password is : hacknuts News Source :  UNDERGROUND DEVIL
Six ways your phone can be illegally tapped !

Six ways your phone can be illegally tapped !

Feb 20, 2011
Phone tapping in India has become a national concern with a leading operator revealing that at peak there are upto 100 phone tapping requests a day. In India there are ten major operators, at a conservative average of 50 taps a day per operator, there would be 182,000 authorized phone taps each year.  Not a significant number for a country of 500 million cell phones considering the real need to tap corrupt officials, drug dealers, suspected terrorists, mafia and other antisocial elements. To meet this requirement over 2000 such phone tapping equipment was imported by private security agencies, large businesses besides police and government agencies. Since phone taps are authorized only by the government, it is quite probable that some of the equipment in private hands is being used illegally for spying on politicians and businessmen.  There are six ways in which modern phone systems can be illegally tapped for corporate espionage and spying: 1)   Use of Over the Air t...
Anonymous Hackers warn Westboro Church - Stop now or else !

Anonymous Hackers warn Westboro Church - Stop now or else !

Feb 20, 2011
A group of hacktivists acting under the banner, " Anonymous ," has warned a church with a controversial history that unspoken retribution will follow it continues its practice of inflammatory protests. In an open letter to the Westboro Baptist Church, Anonymous has put the anti-gay, fundamentalist church on notice that "the damage incurred will be irreversible," and that "neither your institution nor your congregation will ever be able to fully recover." The Westboro Baptist Church is led by Rev. Fred Phelps. It has drawn particular attention for carrying out anti-gay protests at funerals of military servicemen with signs celebrating the deaths of the soldiers with signs like " God Hates the USA " or " Thank God for 9/11. " The group operates a  website  with the URL godhatesfags.com. In its letter, Anonymous wrote the following: Open Letter to Westboro Baptist Church AN OPEN LETTER FROM ANONYMOUS February 16, 2011 TO THE CONGREGAN...
Atrix 4G Hacked Before You Can Even Buy It !

Atrix 4G Hacked Before You Can Even Buy It !

Feb 20, 2011
Following in the steps of the HTC Evo before it, the Motorola Atrix 4G has been hacked to give root privileges before the phone is even available to buy. In more evidence that Android hackers are frequently out-pacing the creators of the phones themselves, the third post in the xda-developers thread where the root was announced was a half-sarcastic "why did it take so long?" Right now, this is more of an academic achievement than a practical one for two reasons. First, the actual steps to obtain root privileges haven't even been released to the public. Second, there is still a good chance that one of the main draws of rooted phones, custom ROMs, will be difficult to install thanks to an encrypted and locked bootloader. While rooting your phone is highly discouraged (as it's likely to cause an increased security risk, break all kinds of terms of service and make your carrier very unhappy) the speed of this announcement is nothing short of astounding. If the amount o...
Microsoft confirms Windows BROWSER protocol zero-day !

Microsoft confirms Windows BROWSER protocol zero-day !

Feb 20, 2011
A security researcher has released proof-of-concept code for an unpatched security vulnerability affecting all versions of Windows, prompting a warning from Microsoft that remote code execution attacks are theoretically possible. Details on the vulnerability were released on the Full Disclosure mailing list earlier this week and Microsoft followed up with two separate blog posts discussing the ramifications of the problem and suggesting workarounds until a patch can be created and released. According to Microsoft's Mark Wodrich, the vulnerability was identified in the BROWSER protocol and although all versions of Windows are vulnerable, the issue is more likely to affect server systems running as the Primary Domain Controller (PDC). "In environments following best practices, the BROWSER protocol should be blocked at the edge firewalls thus limiting attacks to the local network," Wodrich said. Wodrich provided technical confirmation of the buffer overrun vulnerability and expla...
Expert Insights Articles Videos
Cybersecurity Resources