#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

WordPress.Com Hacked, Hacker root the Server !

WordPress.Com Hacked, Hacker root the Server !

Apr 13, 2011
WordPress.Com Hacked, Hacker  Root the Server ! The parent company that operates WordPress, made an announcement this morning that it has hacked, resulting what the company said was a low-level (root) break-in to several of their servers. The company warned that potentially anything on those servers could have been revealed to the attackers, including client source code. WordPress founder, Matt Mullenweg made the following announcement in a blog post this moring. Read here We have been diligently reviewing logs and records about the break-in to determine the extent of the information exposed, and re-securing avenues used to gain access. We presume our source code was exposed and copied. While much of our code is Open Source, there are sensitive bits of our and our partners' code. Beyond that, however, it appears information disclosed was limited. Based on what we've found, we don't have any specific suggestions for our users beyond reiterating these security fund...
Apollohospitals.com is vulnerable to SQL injection !

Apollohospitals.com is vulnerable to SQL injection !

Apr 13, 2011
Apollohospitals.com is vulnerable to SQL injection Found and Submitted By : Zero Cool
Supreme Court of Canada vulnerable to non prsistance xss attack !

Supreme Court of Canada vulnerable to non prsistance xss attack !

Apr 13, 2011
Supreme Court of Canada vulnerable to xss attack ! Vunl Link :  https://sr.scc-csc.gc.ca/ search?client=SCC-CSC&site= Internet&output=xml_no_dtd& proxystylesheet=SCC-CSC&hl=en& oe=latin1&ie=latin1&q=%3E%22% 3E%3CMARQUEE%3EHACKED+BY+ZERO+ COOL%3C%2FMARQUEE%3E&btnG= Search Found n Submitted by : Zero Cool
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
cyber security

AI Can Personalize Everything—Except Trust. Here's How to Build It Anyway

websiteTHN WebinarIdentity Management / AI Security
We'll unpack how leading teams are using AI, privacy-first design, and seamless logins to earn user trust and stay ahead in 2025.
Main Advertising vulnerable to SQLI by lionaneesh !

Main Advertising vulnerable to SQLI by lionaneesh !

Apr 13, 2011
Main Advertising vulnerable to SQLI by lionaneesh ! One of the best advertising companies in the world which is even used by megaupload is vulnerable to SQLi.   What I can do [Power]:- Loinaneesh found a database in which the hits to a particular link was entered (this is most probably used for counting the revenue). I can change and increase or decrease the ad revenue of a particular site. Target: https://click1.mainadv.com/ad.asp?id=%Inject_Here%609 DATABASE :  MSSQL 2005 Method: GET DATABASE : portals DATABASE : PDATAortals Table Name Columns Formats domain_new Categories domains bannersImp1 sampleAPP bannersImp change articleGroups t_jiaozhu specialTables TablesLinks tabella1 Gestionale contents Luckypot ...
ESET NOD32 releases Antivirus for Linux 4 !

ESET NOD32 releases Antivirus for Linux 4 !

Apr 13, 2011
ESET NOD32 releases Antivirus for Linux 4 ! ESET announced the availability of ESET NOD32 Antivirus 4 Business Edition for Linux Desktop and ESET NOD32 Antivirus 4 for Linux. ESET NOD32 Antivirus 4 for Linux offers protection against cross-platform and emerging threats, enhancing the security of Linux platforms. The scanning engine automatically detects and cleans malicious code, including threats designed for Windows and Mac based systems. ESET NOD32 Antivirus 4 Business Edition for Linux Desktop includes ESET Remote Administrator, which provides IT administrators with a management console to control an entire network from a single screen — supporting tens or thousands of heterogeneous computers. Key benefits and features: Detection and proactive cross-platform protection  – Advanced heuristics technology delivers real-time, proactive protection from malware, hacker attacks and exploits. Product protects against Linux, Windows and Mac malware Small system footprint ...
Malaysiakini - Malaysia's Most Popular News Website Shutdown's after cyber attack !

Malaysiakini - Malaysia's Most Popular News Website Shutdown's after cyber attack !

Apr 13, 2011
Malaysiakini - Malaysia's Most Popular News Website Shutdown's after cyber attack ! It has been reported that Malaysia's most popular news website Malaysiakini ( https://www.malaysiakini.com ) has been hit by cyber attack from 11 AM afternoon shutting the website down. The attack created a stir when the website stopped working just before the Sarawak election, making the website inaccessible to the readers. The attack has been diagnosed as Denial-of-service attack which is considered to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Denial-of-service attacks are considered violations of the IAB's Internet proper use policy, and also violate the acceptable use policies of virtually all Internet service providers. They also commonly constitute violations of the laws of individual nations. According to the technical team, the cyber attack has resulted in  swarming the Malaysiakini servers...
French Hacker Arrested After Bragging on TV !

French Hacker Arrested After Bragging on TV !

Apr 13, 2011
A French hacker who boasted on TV about hacking into the network of an important defense contractor was arrested and charged with unauthorized access to a computer system, data theft and organized fraud. The hacker appeared on the France 2 television programme "Complément d'enquête" (Further investigation) where he claimed to have hacked into computers belonging to the French Army and Thales Group, an IT contractor for the aerospace, defense and security industries. After the programme aired, the company filed a complaint, claiming the hacker stole confidential information from its internal network. The man, identified in only as Carl, was arrested on April 7 in Paris. When inspecting his computer, police found the details of hundreds of credit cards and bank accounts. The hacker admitted selling the information on underground websites, as well as using them to make fraudulent purchases for himself and others. This led to additional charges of organized fraud bei...
BackTrack 5 will also be for Motorola Xoom !

BackTrack 5 will also be for Motorola Xoom !

Apr 13, 2011
In the past few days offensive-security have been toying with some Motorola hardware, and have managed to get a basic build of BackTrack 5 (+ toolchain) on a Motorola Xoom. The possibilities look exciting as offensive-security are slowly building several experimental arm packages. offensive-security team does not have much experience with the Android OS nor ARM hardware, but so far – so good. offensive-security will not promise an ARM release on May 10th, as this new "experiment" was not planned in any way – but we'll do our best. As of now, offensive-security have got a modified version of an Ubuntu 10.04 ARM image, chrooted on a Motorola Xoom. The tablet is running a modified, overclockable kernel (from 1.0 to 1.5 GHz). The chrooted BackTrack environment is running a VNC server, from which you can connect from the tablet itself. When run locally from the Xoom tablet, the VNC session does not lag, and the touch keyboard and touchscreen are very workable. As expected from a chr...
DUCAT Punjab Best Ethical Hacker Competition Website hacked by lionaneesh !

DUCAT Punjab Best Ethical Hacker Competition Website hacked by lionaneesh !

Apr 12, 2011
DUCAT Punjab Best Ethical Hacker  Competition Website hacked by  lionaneesh   ! DUCAT have announce Hacking Competition, Read Here  , But today " lionaneesh " an Indian Hacker hack into there site and show all security Holes. With the help of "lionaneesh" & THN , The site is now fixed :) Hack Proof :
Tell us how you did it, Pakistan court to hackers !

Tell us how you did it, Pakistan court to hackers !

Apr 12, 2011
Tell us how you did it, Pakistan court to hackers ! Hackers would be granted bail if they taught judges how to do the job, Pakistan's Supreme Court said in a lighter vein as it heard the bail plea of two teenagers who had broken into the Supreme Court website last year. The Supreme Court then granted bail to the two teenagers who are accused of hacking its official website and placing derogatory material about judiciary and the chief justice on it, Dawn reported Tuesday. The bench, comprising Justices Asif Saeed Khan Khosa and Amir Hani Muslim, was headed by Justice Javed Iqbal. The judges said the hackers had done a " brilliant job ". Their counsel Iftikhar Hussain Gilani promptly said they had not hacked the site. To which, the judges asked Gilani why he was not ready to accept praise for the hackers. They then said in a lighter vein they would grant bail on the condition that the accused taught them how to do such a job. The judges, however, observed that i...
Expert Insights Articles Videos
Cybersecurity Resources