#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

25 Website Hacked By Xen0n (Bangladeshi Hacker)

25 Website Hacked By Xen0n (Bangladeshi Hacker)

Mar 21, 2011
25 Website Hacked By Xen0n (Bangladeshi Hacker) Hacked Site List :  https://pastebin.com/B50GsN7Q News Source :  Xen0n (Bangladeshi Hacker)
Jesse William McGraw , Clinic Hacker Gets 9 Year Sentence !

Jesse William McGraw , Clinic Hacker Gets 9 Year Sentence !

Mar 21, 2011
Jesse William McGraw , Clinic Hacker Gets 9 Year Sentence ! A former security guard at a Dallas medical office has been sentenced to more than nine years in prison in a hacking case that drew national attention because the hacker posted video of the crimes on YouTube. Jesse William McGraw was sentenced on charges that he broke into computers and installed malicious code while working the night shift in 2009 at North Central Medical Plaza, which houses a surgery center and medical offices. McGraw pleaded guilty to the hacking charges in May 2010; he has been in custody since his arrest in June 2009. McGraw was sentenced to 110 months in prison on each of the two counts, to be served concurrently, according to the U.S. Attorney for the Northern District of Texas. He was also ordered to make restitution to the occupants of the medical plaza, which include W.B. Carrell Memorial Clinic, the North Central Surgery Center and the Cirrus Group. McGraw, who went by the moniker "Gho...
70 Wordpress blogs HaCkeD By The 077 ( Hamdi HaCker ) Tunisian HaCker !

70 Wordpress blogs HaCkeD By The 077 ( Hamdi HaCker ) Tunisian HaCker !

Mar 21, 2011
70 Wordpress blogs HaCkeD By The 077 ( Hamdi HaCker ) Tunisian HaCker ! Hacked Wordpress Blogs :  https://pastebin.com/wqFjwCs2
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
The Unusual Suspect: Git Repos

The Unusual Suspect: Git Repos

Jul 14, 2025Secrets Management / SaaS Security
While phishing and ransomware dominate headlines, another critical risk quietly persists across most enterprises: exposed Git repositories leaking sensitive data. A risk that silently creates shadow access into core systems Git is the backbone of modern software development, hosting millions of repositories and serving thousands of organizations worldwide. Yet, amid the daily hustle of shipping code, developers may inadvertently leave behind API keys, tokens, or passwords in configuration files and code files, effectively handing attackers the keys to the kingdom. This isn't just about poor hygiene; it's a systemic and growing supply chain risk. As cyber threats become more sophisticated, so do compliance requirements. Security frameworks like NIS2, SOC2, and ISO 27001 now demand proof that software delivery pipelines are hardened and third-party risk is controlled. The message is clear: securing your Git repositories is no longer optional, it's essential. Below, we look at the ris...
10 Websites hacked by Cyberhunterxx !

10 Websites hacked by Cyberhunterxx !

Mar 21, 2011
10 Websites hacked by Cyberhunterxx ! Hacked sites List :  https://pastebin.com/EJkmySFK
10 Argentina WebSite HaCkeD By The 077 ( Hamdi HaCker ) Tunisian HaCker

10 Argentina WebSite HaCkeD By The 077 ( Hamdi HaCker ) Tunisian HaCker

Mar 21, 2011
  10 Argentina WebSite HaCkeD By The 077 ( Hamdi HaCker ) Tunisian HaCker Hacked Sites :  https://pastebin.com/2eGKSAiD
30 more Website Has Been Hacked By Dinelson Us

30 more Website Has Been Hacked By Dinelson Us

Mar 21, 2011
30 more Website Has Been Hacked By Dinelson Us Hacked sites :  https://pastebin.com/pfw04vZj News Source :  Freed
THN Poll : WikiLeaks will win Nobel Peace Prize ?

THN Poll : WikiLeaks will win Nobel Peace Prize ?

Mar 21, 2011
WikiLeaks is among the 241 Nobel Peace Prize nominees this year. The nominees come from 53 organizations and are greater in number than in any previous year. Read More Here . Nobel-watcher and Peace Research Institute Oslo Director Kristian Berg Harpviken says he is not surprised WikiLeaks has been nominated and he expects it will receive more than one vote. " WikiLeaks has been on top of the international news headlines for the last 12 months," he said. "It is also something very new in more ways than just bringing interesting news. It is, in fact, newsworthy in and of itself as a phenomenon. It is an interesting and many ways challenging candidate in its own right. " We did a online Poll voting on this issue and the Results are as shown Below : These 241 nominations will be considered by the Nobel Committee, which will create a short list of nominees. The Nobel Peace Prize is awarded by a committee of five people chosen by the Norwegian parliament presi...
DB Audit v4.2.29 all-in-one database security and auditing solution !

DB Audit v4.2.29 all-in-one database security and auditing solution !

Mar 21, 2011
DB Audit v4.2.29 all-in-one database security and auditing solution ! . DB Audit Expert is a professional all-in-one database security and auditing solution for Oracle, Sybase, DB2, MySQL and Microsoft SQL Server. DB Audit Expert enables database and system administrators, security administrators, auditors and operators to track and analyze any database activity including database security, access and usage, data creation, change or deletion. What makes DB Audit really unique is its built-in support for multiple auditing methods giving you the flexibility to choose the best fit for your database security requirements. Key Benefits Improves system security and ensures system accountability. Captures both regular and "back-door" access to audited database systems. Features centralized security and auditing control of multiple database systems from a single location providing ease of management. Features unified auditing graphical interface that shortens the learning curve and is ...
ESET Nod32 Romania Hacked !

ESET Nod32 Romania Hacked !

Mar 21, 2011
Today guy from InSecurity.Ro  named  sway1990  found again a critical vulnerability (MySQL Injection) in their website. Some extracted informations : Version – ( 5.1.41-3ubuntu12.10 ) Main DB – ( c1eset ) HostName – ( web.axelsoft.ro ) User – ( c1eset@localhost ) DataBases : information_schema c1eset Tables of main db : concurs country eventsro joom_banner joom_bannerclient joom_bannertrack joom_categories joom_components joom_contact_details joom_content … joom_core_log_searches joom_groups, joom_jce_extensions joom_jce_groups … joom_users joom_weblinks jos__sessions jos_banner … A dministrator Account: username =admin password =51f9a6e361a03aee324bcc73fe8ab4a5:xt69awFsqAyvglBMcbtvq9HopIAnQ1jF email =emil@nod32.ro usertype =Super Administrator News Source : Kai Farmer
Wufeng County Procuratorat (China Government) website Hacked !

Wufeng County Procuratorat (China Government) website Hacked !

Mar 21, 2011
Wufeng County Procuratorat ( China Government ) website Hacked ! Hacked site :  https://www.wufeng.jcy.gov.cn/ News Source : Kai Farmer
Cross Site Scripting (XSS) vulnerability in Google Search Engine !

Cross Site Scripting (XSS) vulnerability in Google Search Engine !

Mar 20, 2011
Cross Site Scripting (XSS) vulnerability in Google Search Engine ! Vulnerabile Link :  https://www.google.com/custom?hl=en&cof=L%3Ahttps%3A%2F%2Flh5.googleusercontent.com%2F_bCYQxIvMQ2U%2FTRMT2a-UiQI%2FAAAAAAAAAYU%2FWXKFKDTesOs%2Fs640%2Fhackernews.jpg%3BBGC%3A%231f1f1f%3B&q=http%3A%2F%2Fwww.thehackernews.com%2F&btnG=Search
Stuxnet Worm Revealed – Installation, Injection and Mitigation !

Stuxnet Worm Revealed – Installation, Injection and Mitigation !

Mar 20, 2011
In the videos below, Joel Langill deconstructs each part of the worm to show it in action. In the second video you'll see the best practices that InfoSec Institute uses (we have a training course dedicated to SCADA control systems which includes a robust Stuxnet lab) to mitigate this type of infection and security breach. Part 1: Introduction, Installation, and Injection Part 2: Mitigation & Prevention The Stuxnet worm has generated a lot of media attention and coverage for some of it's features as well as targets. The complexity not normal for malware that we've witnessed, and consists of attacks against three different systems: Windows Infection Step7 Infection PLC Infection If you'd like to know more about Stuxnet & SCADA security, attend our SCADA Security Boot Camp. Leave a comment below if you have a specific instruction or ideas of what you'd like to learn in any follow-up or explanations of this video. News Source : Infosecinstitute.com
Expert Insights Articles Videos
Cybersecurity Resources