#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

CMR Collage Bangalore Website Hacked by lionaneesh

CMR Collage Bangalore Website Hacked by lionaneesh

Apr 23, 2011
CMR Collage  Bangalore Website Hacked by  lionaneesh Hack Proof: Hacked site :  https://www.cmredu.com
PlayStation Network Hacked, Information leaked !

PlayStation Network Hacked, Information leaked !

Apr 23, 2011
PlayStation Network Hacked, Information leaked ! Update :  [THN] The Hacker News Exclusive Report on Sony 3rd Attack Issue ! While the PlayStation Network is down, a lot of gamers are curious as to what have been the reasons to this outrageous downtime. Today, Media Molecule said that the PSN is once again, hacked. According to the post that Media Molecule posted today, the PSN is hacked and it warned users not to enter any personal information including credit card, etc until the PSN website says it's okay. Here's what Media Molecule posted: The PSN is still down because of a hack and will remain out of service for another while yet (worst-case scenario would be 1 or 2 more days). DO NOT enter ANY personal information (credit card information etc.) until the PSN website says its OK. Even once the PSN website says it's OK, please wait at least 2 hours to make sure it's a legitimate announcement. But for the moment, you should be patient and don't worry about it. As wha...
10 Site Hacked by Mr.D4NG3R

10 Site Hacked by Mr.D4NG3R

Apr 23, 2011
10 Site Hacked by Mr.D4NG3R Hacked sites list + Mirrors :   https://pastebin.com/dCApyUDa
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
The Unusual Suspect: Git Repos

The Unusual Suspect: Git Repos

Jul 14, 2025Secrets Management / SaaS Security
While phishing and ransomware dominate headlines, another critical risk quietly persists across most enterprises: exposed Git repositories leaking sensitive data. A risk that silently creates shadow access into core systems Git is the backbone of modern software development, hosting millions of repositories and serving thousands of organizations worldwide. Yet, amid the daily hustle of shipping code, developers may inadvertently leave behind API keys, tokens, or passwords in configuration files and code files, effectively handing attackers the keys to the kingdom. This isn't just about poor hygiene; it's a systemic and growing supply chain risk. As cyber threats become more sophisticated, so do compliance requirements. Security frameworks like NIS2, SOC2, and ISO 27001 now demand proof that software delivery pipelines are hardened and third-party risk is controlled. The message is clear: securing your Git repositories is no longer optional, it's essential. Below, we look at the ris...
Facebook hacker posts stolen pics on porn site !

Facebook hacker posts stolen pics on porn site !

Apr 23, 2011
Facebook hacker posts stolen pics on porn site ! A 26-year-old man faces 13 felony charges after being accused of hacking into Facebook accounts, stealing photos of young women and posting them on porn sites, reports the Kansas City Star. Along with content belonging to the 13 young women (ages 17 to 25), Timothy P. Noirjean is accused of victimizing, investigators found 92 folders on his computer containing names or photos of women, as well as 235 email addresses with security information. Noirjean confessed to accessing more than 100 Facebook accounts, and told police he was unaware that it's a crime. The shocking thing here isn't that there are predators on the Internet, that Noirjean claims ignorance of the law, that police arrested Noirjean in his parents' basement (which, according to the report, they totally did) or that young ladies of today have porn-worthy photos of themselves in unencrypted files on their computers. It's that Noirjean carried out his crime...
Cyberhackers.org - Hacked by GriAdamlar (Turkish Hackers Group)

Cyberhackers.org - Hacked by GriAdamlar (Turkish Hackers Group)

Apr 23, 2011
Cyberhackers.org - Hacked by GriAdamlar (Turkish Hackers Group) Hacked site : https://www.cyberhackers.org Mirrors https://zone-h.org/mirror/id/13526679 https://zero-h.com/mirror/id/65782
Hacker pleads after busted with 675K stolen cards

Hacker pleads after busted with 675K stolen cards

Apr 22, 2011
A Georgia man has pleaded guilty to fraud and identity theft after authorities found him in possession of more than 675,000 credit card numbers, some of which he obtained by hacking into business networks Rogelio Hackett Jr., 26, pleaded guilty on Thursday to one count each of access device fraud and aggravated identity theft after authorities executed a search warrant at his home and discovered the card numbers, used to conduct fraudulent transactions totaling more than $36 million, on his computers and storage devices. According to the indictment, authorities hunted Hackett down after monitoring his activity in internet relay chat (IRC) rooms and on underground forums, where he sold stolen card numbers, usually at $20 to $25 each to buyers around the world. He used the proceeds to make high-end purchases, such as a 2001 BMW X5 and a pair of $450 Louis Vuitton shoes. In addition, Hackett was charged with obtaining devices used to create counterfeit credit cards. According to p...
U.S. federal lab linked to Stuxnet breached !

U.S. federal lab linked to Stuxnet breached !

Apr 22, 2011
A federally funded U.S. lab that is suspected to have been involved in finding the vulnerabilities in Siemens SCADA systems used by the Stuxnet worm has shut down the Internet connection for its employees following the discovery of a breach into the facility's systems. The Oak Ridge National Laboratory - located in Tennessee and funded by the U.S. Department of Energy - is known for performing classified and unclassified research for federal agencies and departments on issues crucial for national security. Among other things, the lab also does cybersecurity research on malware, vulnerabilities and phishing. It is somewhat ironic, then, that the breach was the result of two employees falling for a malicious email containing a link to a page that exploited a remote-code execution vulnerability in the Internet Explorer browser. According to Wired, the email was sent to about 530 lab employees, of which 57 believed that the email was coming from the institution's human resour...
Pakistan Air Force Server Hacked by Code Breaker/Lucky (Indishell)

Pakistan Air Force Server Hacked by Code Breaker/Lucky (Indishell)

Apr 22, 2011
Pakistan Air Force Server Hacked by Code Breaker/Lucky (Indishell) Indishell, group of some Indian Hackers hacked PAF (Pakistan Air Force) server with 8 more server in LAN. They claimed that all those 8 more servers were in LAN with that PAF server. Here's a screenshot of RDP.  'Code Breaker' claims to have backed up all the data using remote desktop protocols. Source
FBI cracks International Bot Network !

FBI cracks International Bot Network !

Apr 22, 2011
FBI cracks International Bot Network ! The Department of Justice and FBI declared that it has cracked a network of hackers, who have infected almost 2 million computers with a harmful "bot" program, Coreflood that steals private and monetary data from computers. Identified as a "bot" network- as the malware can be managed distantly like a robot- it compromises machines with a software program called Coreflood, which downloads itself by finding out the vulnerability in systems, that are running Windows operating systems. The legal actions are the key components of the "most complete and inclusive enforcement action ever taken by the U.S. authorities to put out of action an international botnet", as per the statement from the Department of Justice, reports cnet News on April 13, 2011. As per a request from a temporary restraining order that was granted, it's the first time USA law enforcement has taken consent from a court for controlling a botne...
Cyber jihadists could use Stuxnet worm to attack the west !

Cyber jihadists could use Stuxnet worm to attack the west !

Apr 22, 2011
Cyber jihadists could use Stuxnet worm to attack the west ! ACCORDING TO Mikko Hypponen , F-Secure's chief security researcher, there has been a revolution in malware with Stuxnet. " The worst case scenario is that Al-Qaeda or another organisation could gain access to this type of knowledge and information, and make use of it to launch attacks on critical infrastructure – like blow up nuclear power plants or do something to our food chain. "
McAfee study  - India is fourth lowest in security adoption !

McAfee study - India is fourth lowest in security adoption !

Apr 22, 2011
McAfee study  - India is fourth lowest in security adoption ! McAfee and the Center for Strategic and International Studies (CSIS) revealed the findings from a global report 'In the Dark, Crucial Industries Confront Cyber attacks' that reflects the cost and impact of cyber attacks on critical infrastructures. Critical infrastructure refers to computer systems of vital economic assets such as power grids, railways, nuclear energy plants, etc. that make strong targets for criminal threats, industrial espionage and politically motivated sabotage. According to the report findings, India ranked fourth in terms of lowest levels of security adoption after Brazil, France and Mexico, adopting only half as many security measures as leading countries such as China, Italy and Japan. Concurrently, China and Japan were also among the countries with the highest confidence levels in the ability of current laws to prevent or deter attacks in their countries. The report states that currently ...
50 new Scada threats discovered, Another stuxnet in making ?

50 new Scada threats discovered, Another stuxnet in making ?

Apr 22, 2011
Scada systems are found in a variety of industrial plants ranging from water and waste treatment to food and pharmaceuticals and even nuclear power plants.Their scurity of these systems is getting worse and is big concern today. Application security management firm Idappcom reported 52 new threats in March targeted at supervisory control and data acquisition (Scada) systems of the sort hit by the infamous Stuxnet worm. "We quickly realised this was too much of a significant blip to be an anomaly. It may be an indicator towards a worrying trend," said Haywood.Our records go back to 2004 and I've never recorded any sort of significant blip on the radar in an area like this previously." said Tony Haywood, chief technology officer at Idappcom. Some of the xploits founded arecausing DOS (Denial Of Service), bringing system to halt. Scada systems are often at greater risk because they are connected to legacy operating systems such as Windows 95 for which there are no service packs or autom...
Expert Insights Articles Videos
Cybersecurity Resources