#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Google users targeted by hackers !

Google users targeted by hackers !

Mar 14, 2011
Google has warned of politically motivated and targeted attacks against users of its services. According to the company, the attackers are also targeting the users of another undisclosed social network. In a blog posting, the Google security team says that the exploit is based on a security hole in a Windows DLL for rendering MHTML (MIME Encapsulation of Aggregate HTML) which has been known for some time. All versions of Windows are reportedly affected. Google and Microsoft say they are working to solve the problem. Until a solution has been found, Google service users have been advised to install a hot fix supplied by Microsoft. The hot fix can reportedly block the attack until an official patch becomes available. Google also said that it has deployed various server-side defences to make the vulnerability harder to exploit. However, the company added that this is not a tenable long-term solution, and that it can't be guaranteed to be fully reliable or comprehensive. News Source :...
Indianmicrofinance.com Defaced By HEX786 !

Indianmicrofinance.com Defaced By HEX786 !

Mar 14, 2011
Indianmicrofinance.com Defaced By HEX786 ! Hacked Site :  www.indianmicrofinance.com Mirror :   https://mirror-az.com/mirror/?id=14910 News Source : HEX786
China Government Site Hacked By Team Grey Hat !

China Government Site Hacked By Team Grey Hat !

Mar 14, 2011
China Government Site Hacked By Team Grey Hat ! Hacked Site :  www.jssjj.gov.cn News Source : Napster 
cyber security

10 Best Practices for Building a Resilient, Always-On Compliance Program

websiteXM CyberCyber Resilience / Compliance
Download XM Cyber's handbook to learn 10 essential best practices for creating a robust, always-on compliance program.
cyber security

Maximize the Security Tools You Already Have

websitePrelude SecuritySecurity Control Validation
Hone your EDR, identity, vuln, and email platforms against the threats that matter with a 14-day trial.
17 websites Hacked by Angel 4k4 4d0r4b13

17 websites Hacked by Angel 4k4 4d0r4b13

Mar 14, 2011
17 websites Hacked by Angel 4k4 4d0r4b13  Hacked sites :  https://pastie.org/1670234  
#OperationLeakS by Anonymous Hacker leaks Bank of America Emails !

#OperationLeakS by Anonymous Hacker leaks Bank of America Emails !

Mar 14, 2011
OperationLeakS by Anonymous Hacker leaks Bank of America Emails ! We may soon find out whether it's possible to shame one of the big U.S. banks by exposing its mortgage missteps. A series of  messages  on Twitter Sunday evening promised the release of emails supposedly documenting "fraud and corruption" at Bank of America (BAC). The post, from the anonymous @OperationLeakS handle, said "leaked emails" from the bank would be posted at 5 a.m. London time, which is 1 a.m. in New York. The release will come three and a half months after Wikileaks founder Julian Assange breezily promised to "take down a bank or two" by releasing "either tens or hundreds of thousands of documents." Assange likened the documents to the ones that prosecutors used in bringing top executives of failed energy trader Enron to justice. The bank didn't immediately respond to a request for comment. The document dump, billed in the Twitter posts as " Blac...
Blogger.com vulnerability, Gaining Administrative Privileges on any Account !

Blogger.com vulnerability, Gaining Administrative Privileges on any Account !

Mar 13, 2011
Blogger.com vulnerability, Gaining Administrative Privileges on any Account ! In the last 2 months, Nir.Goldshlager  participated in Google reward program and found some High, Serious vulnerabilities. The vulnerability that  Nir.Goldshlager  want to share first, Is a critical vulnerability in Blogger (Google Service). That vulnerability could be used by an attacker to get administrator privilege over any blogger account (Permission Issue). Here are the details regarding the issue in Blogger service, Nir.Goldshlager found a HTTP Parameter Pollution vulnerability in Blogger that allow an attacker to add himself as an administrator on the victim's blogger account, Technical details: Here are the steps for getting admin control permissions over any blogger accounts. 1.) The attacker Use the invite author options in blogger (add authors): Vulnerability location: POST /add-authors.do HTTP/1.1 Request: security_token=attackertoken&blog...
Website critical of Myanmar regime hacked by unknown Hackers !

Website critical of Myanmar regime hacked by unknown Hackers !

Mar 13, 2011
A Thailand-based news website critical of Myanmar's military government says it has been hacked by unknown attackers who posted fake articles on it. The Irrawaddy website is run by exiled  Myanmar  journalists. It said on its home page Sunday that it was trying to fix the problem and prevent further attacks. The Irrawaddy's coverage of Myanmar has included exclusive photos of secret military missions to North Korea . It has been the target of several denial-of-service attacks that are meant to make the site unreachable. The fake articles concerned an alleged feud between Irrawaddy's editor and pro-democracy icon Aung San Suu Kyi , and the purported death of a popular singer.
10 Websites hacked by Xen0n (Bangladesh Cyber Army)

10 Websites hacked by Xen0n (Bangladesh Cyber Army)

Mar 13, 2011
10 Websites hacked by Xen0n (Bangladesh Cyber Army) Hacked Sites : https://lizzieshotel.com/BCA.html https://ziaresources.com/BCA.html https://www.gianairltd.com/BCA.html https://roydigital.com/BCA.html https://www.apollwnios.gr/BCA.html https://lefemmecafe.com/BCA.html https://uccoss.com/BCA.html https://www.jvp-gracac.hr/BCA.html https://www.newma.net/BCA.html https://mafiamediagroup.com/BCA.html News Source : Xen0n (Bangladesh Cyber Army)
Host-Extract - Host/IP Pattern Extractor Tool !

Host-Extract - Host/IP Pattern Extractor Tool !

Mar 13, 2011
Host-Extract - Host/IP Pattern Extractor Tool ! This little ruby script tries to extract all IP/Host patterns in page response of a given URL and JavaScript/CSS files of that URL. With it, you can quickly identify internal IPs/Hostnames, development IPs/ports, cdn, load balancers, additional attack entries related to your target that are revealed in inline js, css, html comment areas and js/css files. This is unlike web crawler which looks for new links only in anchor tags (<a) or the like. In some cases, host-extract may give you false positives when there are some words like - main-site_ver_10.2.1.3.swf. With -v option, you can ask the tool to output html view-source snippets for each IP/Domain extracted. This will shorten your manual analysis time. Please go to https://host-extract.googlecode.com/ for more info. Download/Update ============== svn co https://host-extract.googlecode.com/svn/trunk/ host-extract Tutorial Wiki ========== Sebastien Damaye from aldeid.com h...
Inbox.com Cross Site Scripting (XSS) vulnerability !

Inbox.com Cross Site Scripting (XSS) vulnerability !

Mar 13, 2011
Inbox.com Cross Site Scripting ( XSS ) vulnerability ! Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application. The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes. Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in...
Pentagon tightens computer security in wake of WikiLeaks breach !

Pentagon tightens computer security in wake of WikiLeaks breach !

Mar 13, 2011
Top defense and intelligence officials reiterated their commitment to information-sharing at a Senate hearing Thursday, even as they outlined new safeguards to prevent a repeat of the WikiLeaks breach that has led to the release of thousands of classified military reports and diplomatic cables. The Defense Department, for example, is striving to proceed with needed protections "without reverting to pre-9/11 stovepipes," Chief Information Officer Teresa Takai told the Senate Homeland Security and Governmental Affairs Committee. To stop unauthorized downloading of files to CDs, the department has disabled the "write" function on almost 90 percent of some 220,000 computers with access to the Secret Internet Protocol Router Network, or SIPRNet, she said. The Pentagon is also beefing up information security training while tightening log-in access to SIPRNet machines through the use of "smart cards" in place of unwieldy password systems. At the Office of t...
Former employee held for hacking server of BPO unit in Hyderabad !

Former employee held for hacking server of BPO unit in Hyderabad !

Mar 13, 2011
A former software professional on Saturday was arrested for allegedly hacking the server of a city-based BPO company, where he previously worked, police said. The hacker identified as Shaik Mahammad Ghouse Bhasa allegedly secured unauthorised access to the computer systems of M/s IVOICE Network Private Limited in Hyderabad, which provides BPO services to Singapore-based Networks Pte Ltd for VoIP services and caused Rs6 lakh loss to the BPO firm, they said. He was arrested by the cyber crimes cell of Andhra Pradesh crime investigation department (CID), CID's additional superintendent (cyber crimes) U Ram Mohan said. On a complaint filed by the BPO's managing director Balu Visveswar that their server was hacked and several PINs, which are used for making VoIP calls were created by unknown persons, the cyber crime police station of CID registered a case under relevant sections of Information Technology besides for cheating and took up investigations, he said. During the co...
Expert Insights Articles Videos
Cybersecurity Resources