#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

German Police & Sony Raids on Hacker's Home !

German Police & Sony Raids on Hacker's Home !

Feb 27, 2011
Sony has stepped up their game in Germany. Early this week, the home of German hacker "graf_chokolo," known in real life as Alexander Egorenkov, was raided by a Sony representative backed up by local police. Sony seized Egorenkov's computer equipment and PS3 consoles as evidence in an upcoming court case. Within a half hour after breaking the raid on his blog, Egorenkov had uploaded all of his hacking progress to various sites on the internet for other hackers to work on. From Egorenkov's blog: "Guys, SONY was today at my home with police and got all my stuff and accounts. So be careful from now on. Guys, I don't joke, it's serious. And to prove it, I kept my word and uploaded all my ...stuff. Upload it everywhere so SONY couldn't remove it easily. Grab it guys, it contains lots of knowledge... [links omitted] It contains just everything I know." It showed up on several sites, such as PS3Crunch, who willingly linked to the files. The site was then hi...
Team Nuts Admin's official site Defaced By Lucky (Indishell)

Team Nuts Admin's official site Defaced By Lucky (Indishell)

Feb 27, 2011
Team Nuts Admin's official site Defaced By Lucky (Indishell) Last Night the Indian Hacking Group Team Nuts Admin : Mack 's official website  https://mayankyadav.in/  Got Defaced By Another Indian Hacking Group ' Indishell ' Admin ' Lucky '. As from last some years in Pakistan two biggest hacking groups ' Pakbugs ' & ' PCA ' are fighting with each other for Proving Them self stronger and best than others, So Now In India this gonna happen ... Two Indian Hacking Groups ' Indishell ' & ' Team Nuts ' having the same Problems with each other. Today ' Indishell ' do the First attack via hacking ' Mack ' website , Who knows how long this Pride war continue... But Really These Acts Can't Proof some 'worst' or 'best' . Because No one  is secure in this world... Recently Ankit Fadia was got hacked, Even Indishell was also got hacked by Pak hackers , Also the biggest U.S based Security Firms o...
TeaMp0isoN Shell - Private Build [BETA] - v0.1 Download !

TeaMp0isoN Shell - Private Build [BETA] - v0.1 Download !

Feb 26, 2011
TeaMp0isoN Shell - Private Build [BETA] - v0.1 Download ! [ Features ] - Mass Defacement Tool - Safe Mode Bypass - Open_Basedir Bypass - Fixed SQL managed - FTP Brute Force Tool - Fully Undetected Downlaod : [Link Removed]-  Reason: Backdoor News Source : TeaMp0isoN 
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
Between Buzz and Reality: The CTEM Conversation We All Need

Between Buzz and Reality: The CTEM Conversation We All Need

Jun 24, 2025Threat Exposure Management
I had the honor of hosting the first episode of the Xposure Podcast live from Xposure Summit 2025. And I couldn't have asked for a better kickoff panel: three cybersecurity leaders who don't just talk security, they live it. Let me introduce them. Alex Delay , CISO at IDB Bank, knows what it means to defend a highly regulated environment. Ben Mead , Director of Cybersecurity at Avidity Biosciences, brings a forward-thinking security perspective that reflects the innovation behind Avidity's targeted RNA therapeutics. Last but not least, Michael Francess , Director of Cybersecurity Advanced Threat at Wyndham Hotels and Resorts, leads the charge in protecting the franchise. Each brought a unique vantage point to a common challenge: applying Continuous Threat Exposure Management (CTEM) to complex production environments. Gartner made waves in 2023 with a bold prediction: organizations that prioritize CTEM will be three times less likely to be breached by 2026. But here's the kicker -...
Press Release : #OpWisconsin (Operation Wisconsin) by Anonymous Hackers !

Press Release : #OpWisconsin (Operation Wisconsin) by Anonymous Hackers !

Feb 26, 2011
Press Release : #OpWisconsin (Operation Wisconsin) by Anonymous Hackers ! Disclaimer : We are not associated with Anonymous/Hackers Group,This news and Press Release are openly published by Anonymous on their website/facebook/twitter . In 24 hours, Its 2nd Press Release By Anonymous Hackers.., This time they are announcing " Operation Wisconsin ". Exact wording of Press Release are as given below : Dear Citizens of the United States of America, It has come to our attention that the brothers, David and Charles Koch--the billionaire owners of Koch Industries--have long attempted to usurp American Democracy. Their actions to undermine the legitimate political process in Wisconsin are the final straw. Starting today we fight back. Koch Industries, and oligarchs like them, have most recently started to manipulate the political agenda in Wisconsin. Governor Walker's union-busting budget plan contains a clause that went nearly un-noticed. This claus...
Press Release - Who are Anonymous & What Anonymous represents !

Press Release - Who are Anonymous & What Anonymous represents !

Feb 26, 2011
Just now, Anonymous hackers Release a new press note for the people of world. The words are as given below : Dear Citizens of the World. There has been some confusion among the media about who/what anonymous is/represents.  There have also been questions asked about the input from Anonymous during the current global revolution. Anonymous is an online pool of consciousness, sometimes we create a force towards a similar direction which could manifest in revolution. Anonymous has NO leader.  We are one.  We are many.  One does not speak for many. Many do not speak for all.  No one speaks for all. We come from all walks of life. All age, race, sex, places.  We have no ideologies. We have every ideology imaginable. We have no goals.  We have every goal imaginable.  To understand Anonymous would be to understand our universe.  Anonymous can not be labelled, blamed or made a scapegoat. To blame Anonymous would be to blame the citizens of ...
Chip.in - Technology Magazine website Hacked by TriCk & Assasin (ZHC & TeaMp0isoN)

Chip.in - Technology Magazine website Hacked by TriCk & Assasin (ZHC & TeaMp0isoN)

Feb 26, 2011
Chip.in - Technology Magazine website Hacked by TriCk & Assasin (ZHC & TeaMp0isoN) Link :  https://www.chip.in/forums/ Mirror :  https://mirror-az.com/mirror/?id=12689 News Source : TriCk & Assasin (ZHC & TeaMp0isoN)
BlackHole RAT : Mac OS X backdoor Trojan !

BlackHole RAT : Mac OS X backdoor Trojan !

Feb 26, 2011
' BlackHole ' is the latest remote administration tool (RAT) and is available both in Windows and Mac. Hacktool such RAT employs client-server program that communicates to its victim's machine through its trojan server. The server application is installed on the victim while the client application is on the managing side. The version suggest that ' BlackHole ' is currently in its early stage. However, the author seems to start showcasing the following functionalities: Remote execution of shell commands. Opens webpage using user's default browser. Sends a message which is displayed on the victims screen. Creates a text file. It is capable to perform shutdown, restart and sleep operation. It is capable to request for admin privileges. Here is an excerpt from the default text that is displayed in the full screen window with the reboot button: "I am a Trojan Horse, so i have infected your Mac Computer. I know, most people think Macs can't be infected, but look, you ARE I...
Motorola Xoom Gets Hacked In Under An Hour after Release !

Motorola Xoom Gets Hacked In Under An Hour after Release !

Feb 26, 2011
Despite just being released on February 24th, the Motorola Xoom has become the newest victim of developer rooting, and it took less than two hours to do it. Xeriouxly. The best part? The Clockwork Recovery running on it means that other developers can now create their own custom ROMs to hack whatever they want onto the tablet. Clockwork Recovery, also known as ClockworkMod, is a recovery console used on rooted Android Google devices, mainly using for flashing custom ROMs. It can make and restore backups, and it fairly straightforward to install too. The root was done by coder " Koushi ", pretty much as soon as he got his copy of the device home. In a blog post, he explained how he managed to get the custom root running so quickly. He got Clockwork Recovery running by building up a recovery (which he will not release yet due to the SD slot being non-functional at the moment) via  AOSP 's kernel and then using a ROM manager to get Superuser on the Xoom. He has a...
Indian United Nations & Football Association website's XSS  Vulnerabilities found by TriCk (TeaMp0isoN)

Indian United Nations & Football Association website's XSS Vulnerabilities found by TriCk (TeaMp0isoN)

Feb 26, 2011
Indian United Nations & Football Association website's XSS  Vulnerabilities found by TriCk (TeaMp0isoN) 1.) The FA (The Football Association) XSS Vulnerability - TriCk - TeaMp0isoN Link : Click Here 2.) Indian United Nations XSS Vulnerability - TriCk - TeaMp0isoN Link : Click Here News Source : TriCk - TeaMp0isoN | Via Email
Hackers Could Exploit Federal Government Shutdown !

Hackers Could Exploit Federal Government Shutdown !

Feb 25, 2011
The federal government's list of emergency network security personnel has not been updated in 15 years, putting national security at high risk if a shutdown takes place on March 4. The possible government shutdown scheduled for March 4, 2011 could trigger a cyberwar emergency. If non-essential government employees end up being furloughed in early March, the federal government's computer systems will be run by a shortlist of critical-need employees. One major problem: The federal government's list of critical-need computer security employees has not been updated in over 15 years. According to the influential Nextgov website, the government's emergency call-up IT security list was last updated in 1995, ahead of the last federal government shutdown. "In 1995, we already had that decided," said Hord Tipton, a former Interior Department chief information officer who was Bureau of Land Management assistant director for resource use and protection during the ...
Xss venerability in 'The Times of India' website Found by Rahul Roshan !

Xss venerability in 'The Times of India' website Found by Rahul Roshan !

Feb 25, 2011
Xss venerability in ' The Times of India ' website Found by Rahul Roshan ! Link : Click Here
Extreme Exploits : Advanced Defenses Against Hardcore Hacks Ebook Download !

Extreme Exploits : Advanced Defenses Against Hardcore Hacks Ebook Download !

Feb 25, 2011
Extreme Exploits : Advanced Defenses Against Hardcore Hacks Ebook Download ! This cutting-edge volume takes network security professionals to the next level in protecting networks and web sites. Never-before-published advanced security techniques and concise explanations of core Internet infrastructure explain how to defend against devastating vulnerabilities in systems and the underlying network. With the authors' winning methodology for attack profiling and the theatre of war concept, you'll learn how to architect and prepare your network for threats that don't yet exist. By explaining specific in-depth technologies in use by not only the attackers, but also inside the applications they target, this book enables the reader to make better use of the tools available today, and to design new tools, techniques, and operational policies for the future. Download : Click Here
Expert Insights Articles Videos
Cybersecurity Resources