#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Wireshark 1.5.1 Development Release !

Wireshark 1.5.1 Development Release !

Apr 12, 2011
Wireshark 1.5.1 Development Release ! Wireshark 1.5.1 has been released. Installers for Windows, OS X, and source code are now available. New and Updated Features The following features are new (or have been significantly updated) since version 1.4: Wireshark can import text dumps, similar to text2pcap. You can now view Wireshark's dissector tables (for example the TCP port to dissector mappings) from the main window. TShark can show a specific occurrence of a field when using '-T fields'. Custom columns can show a specific occurrence of a field. You can hide columns in the packet list. Wireshark can now export SMB objects. dftest and randpkt now have manual pages. TShark can now display iSCSI service response times. Dumpcap can now save files with a user-specified group id. Syntax checking is done for capture filters. You can display the compiled BPF code for capture filters in the Capture Options dialog. You can now navigate backwards and forwards through T...
CEH Trainer (Centennial Media Training) Got Hacked !

CEH Trainer (Centennial Media Training) Got Hacked !

Apr 12, 2011
CEH Trainer (Centennial Media Training) Got Hacked ! Hacked site :  https://www.cmtraining.com.au/product.php?prod_id=68
50 government website hacked by Tn-V!Rus and The 077

50 government website hacked by Tn-V!Rus and The 077

Apr 12, 2011
50  government  website hacked by Tn-V!Rus and The 077 Hacked sites :  https://pastebin.com/wmmRF78j
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
cyber security

AI Can Personalize Everything—Except Trust. Here's How to Build It Anyway

websiteTHN WebinarIdentity Management / AI Security
We'll unpack how leading teams are using AI, privacy-first design, and seamless logins to earn user trust and stay ahead in 2025.
71 websites hacked by T0$h!R0 AM!N

71 websites hacked by T0$h!R0 AM!N

Apr 11, 2011
 71 websites hacked by T0$h!R0 AM!N Hacked Sites :  https://pastebin.com/b1FnnMHp
1000 website hacked by bad boy !

1000 website hacked by bad boy !

Apr 11, 2011
1000 website hacked by bad boy ! Hacked Site List :  https://pastebin.com/JTDgcyMV
Barracuda Networks Hacking via SQL Injection !

Barracuda Networks Hacking via SQL Injection !

Apr 11, 2011
Barracuda Networks Hacking via SQL Injection ! Barracuda Networks Inc. combines premises-based gateways and software, virtual appliances, cloud services, and sophisticated remote support to deliver comprehensive content security, data protection and application delivery solutions. The company's expansive product portfolio includes offerings for protection against email, Web and IM threats as well as products that improve application delivery and network access, message archiving, backup and data protection. Barracuda Networks' product portfolio includes: Barracuda Spam & Virus Firewall, Barracuda Web Filter, Barracuda IM Firewall, Barracuda Web Application Firewall, Barracuda SSL VPN, Barracuda Load Balancer, Barracuda Link Balancer, Barracuda Message  Archiver , Barracuda Backup Service, and the  BarracudaWare software portfolio. Combining its own award-winning technology with powerful open source software, Barracuda Networks solutions deliver easy to use, comprehensive...
DUCAT Punjab Best Ethical Hacker Competition

DUCAT Punjab Best Ethical Hacker Competition

Apr 11, 2011
DUCAT Punjab Best Ethical Hacker Competition  Registration :  https://www.dreamtechlabs.com/registration.php Participants are requested to carry their personal laptops with Battery backup.  A Test fees of Rs 100 has to be submitted on the spot. News By :  Vishal Sharma
OllyDbg 2.01 alpha 3 Released !

OllyDbg 2.01 alpha 3 Released !

Apr 11, 2011
OllyDbg 2.01 alpha 3 Released ! A major update with many new features. Here are the most importan t: - Support for multi-monitor configurations - Hardware breakpoints and fast command emulation now co-operate. That is, run trace rund at full speed (up to and exceeding 500000 commands per second) even if there are hardware breakpoints set - Purely conditional breakpoints during run trace are strongly accelerated - Stepping, tracing and execution till selection with hardware breakpoints instead of INT3. Controlled by option   Debugging | Use HW breakpoints for stepping - INT3 and hardware breakpoints allow to declare their location as an entry point and specify call parameters for protocolling - Scan for hidden modules. .NET environment frequently loads modules but does not report them to Debugger - Search window keeps up to 8 last searches in a separate tabs - Option to load .udd information even when path, file name or file checks...
Sqlmap v.0.9 - automatic SQL injection and database takeover tool !

Sqlmap v.0.9 - automatic SQL injection and database takeover tool !

Apr 11, 2011
Sqlmap v.0.9 - automatic SQL injection and database takeover tool ! sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a kick-ass detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections. Change Log : * Rewritten SQL injection detection engine (Bernardo and Miroslav). * Support to directly connect to the database without passing via a SQL injection, -d switch (Bernardo and Miroslav). * Added full support for both time-based blind SQL injection and error-based SQL injection techniques (Bernardo and Miroslav). * Implemented support for SQLite 2 and 3 (Bernardo and Miroslav). * Implemented support for Firebird (Bernardo...
RawCap sniffer for Windows released !

RawCap sniffer for Windows released !

Apr 11, 2011
RawCap sniffer for Windows released We are today proude to announce the release of RawCap, which is a free raw sockets sniffer for Windows. Here are some highlights of why RawCap is a great tool to have in your toolset: Can sniff any interface that has got an IP address, including 127.0.0.1 (localhost/loopback) RawCap.exe is just 17 kB No external libraries or DLL's needed No installation required, just download RawCap.exe and sniff Can sniff most interface types, including WiFi and PPP interfaces Minimal memory and CPU load Reliable and simple to use Usage RawCap takes two arguments; the first argument is the IP address or interface number to sniff from, the second is the path/file to write the captured packets to. C:\Tools>RawCap.exe 192.168.0.23 dumpfile.pcap You can also start RawCap without any arguments, which will leave you with an interactive dialog where you can select NIC and filename: C:\Tools>RawCap.exe Network interfaces: 0. 192.168.0.23 ...
WiFite The WEP/WPA Cracker version r68 released !

WiFite The WEP/WPA Cracker version r68 released !

Apr 10, 2011
WiFite The WEP/WPA Cracker version r68 released ! Designed for Backtrack4 RC1 distribution of Ubuntu. Linux only; no windows or osx support. Purpose : to attack multiple WEP and WPA encrypted networks at the same time. this tool is customizable to be automated with only a few arguments. wifite can be trusted to run without supervision. Feature : this project is available in French: all thanks goto Matt² for his excellent translation! sorts targets by power (in dB); cracks closest access points first automatically deauths clients of hidden networks to decloak SSIDs numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc) customizable settings (timeouts, packets/sec, channel, change mac address, ignore fake-auth, etc) "anonymous" feature; changes MAC to a random address before attacking, then changes back when attacks are complete all WPA handshakes are backed up to wifite.py's current directory smart WPA deauthentic...
Anonymous Plans Sony Boycott on April 16

Anonymous Plans Sony Boycott on April 16

Apr 10, 2011
Anonymous Plans Sony Boycott on April 16 Say you're a hacker trying to cripple a major electronics company for suing its own users: how do you launch a cyberattack without harming the people you're trying to protect? In the case of hactivist group 'Anonymous,' which has spent the week targeting Sony to retaliate against Sony's ongoing lawsuits against PlayStation 3 modifiers, you take it offline. Anonymous is staging a 24-hour, in-store boycott at Sony stores around world on Saturday, April 16. So far over 1,000 people have RSVP'd through Facebook. On Monday, Anonymous launched a DDoS attack on Sony that rendered the PlayStation Network (PSN) inaccessible for most of the day (while an Anonymous offshoot calling itself "SonyRecon" targeted individual Sony employees). But after consumers complained that the takedown was doing more harm than good to gamers, Anonymous reversed the hack and took down the Sony Careers page instead. Sony has remained...
Expert Insights Articles Videos
Cybersecurity Resources