#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Datefinder.co.nz - Free Dating Site Pwnd by Fr0664/FCA

Datefinder.co.nz - Free Dating Site Pwnd by Fr0664/FCA

May 05, 2011
Datefinder.co.nz - Free Dating Site Pwnd by Fr0664/FCA Fr0664/FCA hack Datefinder.co.nz and Expose 252 emails/passwords @  https://pastebin.com/W2TDnGUR
Metasploit Framework 3.7.0 Released !

Metasploit Framework 3.7.0 Released !

May 04, 2011
Metasploit Framework 3.7.0 Released ! The Metasploit team has spent the last two months focused on one of the least-visible, but most important pieces of the Metasploit Framework; the session backend. Metasploit 3.7 represents a complete overhaul of how sessions are tracked within the framework and associated with the backend database. This release also significantly improves the staging process for the reverse_tcp stager and Meterpreter session initialization. Shell sessions now hold their output in a ring buffer, which allows us to easily view session history -- even if you don't have a database. This overhaul increases performance in the presence of many sessions and allows for a larger number of concurrent incoming sessions in a more reliable manner. The Metasploit Console can now comfortably handle hundreds of sessions, an especially important consideration when running large-scale social engineering engagements. Several areas of database performance have seen significant i...
SportGFX.COM - World's Largest Sport GFX Community Hacked by PirateAL

SportGFX.COM - World's Largest Sport GFX Community Hacked by PirateAL

May 04, 2011
SportGFX.COM - World's Largest Sport GFX Community Hacked by PirateAL Hacked Site :  SportGFX.C OM Proof: https://www.youtube.com/watch?v=dWV4lUNsWxA Zone-h mirror : https://zone-h.org/mirror/id/13608314
cyber security

Secure your LLMs Against Real-World Threats

websiteWizLLM Security / Artificial Intelligence
LLMs move fast. So do the risks. Get practical, real-world steps to defend against prompt injection, model poisoning, and more.
cyber security

2025 Gartner® MQ Report for Endpoint Protection Platforms (July 2025 Edition)

websiteSentinelOneEndpoint Protection / Unified Security
Compare leading Endpoint Protection vendors and see why SentinelOne is named a 5x Leader
Goal.com Hacked, found to be serving malware !

Goal.com Hacked, found to be serving malware !

May 04, 2011
According to Armorize, soccer news site Goal.com was recently found to be serving malware. "In an analysis of the attack, Armorize researcher Wayne Huang suggests that a hacker specifically targeted and compromised Goal.com through a back-door that allowed the attacker to manipulate the site's content at will," writes threatpost's Brian Donohue. "According to the report, Goal.com was detected on April 27 and 28, 2011 serving up an iframe attack that forwarded visitors to a rogue domain in the .cc top level domain (TLD)," Donohue writes. "That redirect was the first in a chain of events that resulted in the delivery of a known exploit pack, g01pack that targets attacks at the specific operating system and browser version the Goal.com visitor is using. After exploiting the user's browser, further malware, including a Trojan horse program were downloaded to the victim's computer."
PlayStation Network Security Update !

PlayStation Network Security Update !

May 04, 2011
On Tuesday, April 26 Sony shared that some information that was compromised in connection with an illegal and unauthorized intrusion into our network. Once again, Sony'd like to apologize to the many users who were inconvenienced and worried about this situation. Sony want to state this again given the increase in speculation about credit card information being used fraudulently. One report indicated that a group tried to sell millions of credit card numbers back to Sony. To my knowledge there is no truth to this report of a list, or that Sony was offered an opportunity to purchase the list. One other point to clarify is from  this weekend's press conference . While the passwords that were stored were not "encrypted," they were transformed using a cryptographic hash function. There is a difference between these two types of security measures which is why Sony said the passwords had not been encrypted. But I want to be very clear that the passwords were not stored in our databa...
One more Hacker Website Ub3rHakerz.NET Hacked By Shadow008 (PakCyberArmy)

One more Hacker Website Ub3rHakerz.NET Hacked By Shadow008 (PakCyberArmy)

May 04, 2011
One more Hacker Website Ub3rHakerz.NET Hacked By Shadow008 (PakCyberArmy) Sites Hacked :  https://ub3rhakerz.net/ Mirror : https://zone-h.com/mirror/id/13604712
Source Code of Osama FaceBook worm Leaked !

Source Code of Osama FaceBook worm Leaked !

May 04, 2011
Source Code of Osama FaceBook worm Leaked ! Source Code :  https://www.reddit.com/tb/h3mdu
Network access control system PacketFence 2.2 released !

Network access control system PacketFence 2.2 released !

May 04, 2011
PacketFence is a free and open source network access control (NAC) system. It can be used to effectively secure networks - from small to very large heterogeneous networks. PacketFence has been deployed in production environments where thousands of users are involved - on wired and wireless networks. PacketFence provides an impressive list of supported features. Among them, there are: Registration of network components through a captive portal Automatic isolation, if desired, of unwanted devices such as Apple iPod, Sony PlayStation, wireless access points and more Instant stopping of computer worms or virus propagation Blocking of attacks on your servers or other network components Compliance for computers present on your network (software installed, particular configurations, etc.) PacketFence is an unobtrusive solution that works with equipment from many vendors (wired or wireless) such as Cisco, Nortel, Hewlett-Packard, Enterasys, Accton/Edge-corE, 3Com, D-Link, Intel, Dell...
Bhutan Government's hacked with Blind Sqli Injection

Bhutan Government's hacked with Blind Sqli Injection

May 04, 2011
Bhutan Government 's hacked with Blind Sqli Injection Hacked Site : bhutan.gov.bt
Bryantx.gov - City of Bryan Hacked and 175 emails/passwords Exposed By  Fr0664/FCA

Bryantx.gov - City of Bryan Hacked and 175 emails/passwords Exposed By Fr0664/FCA

May 04, 2011
Bryantx.gov - City of Bryan Hacked and 175 emails/passwords Exposed By   Fr0664/FCA Hacker Expose  175 emails/passwords at  https://pastebin.com/weSMwxAi
Tor 0.2.2.25-alpha released - To Toggle, or not to Toggle & The End of Torbutton!

Tor 0.2.2.25-alpha released - To Toggle, or not to Toggle & The End of Torbutton!

May 03, 2011
Tor 0.2.2.25-alpha released - To Toggle, or not to Toggle & The End of Torbutton! Tor 0.2.2.25-alpha fixes many bugs: hidden service clients are more robust, routers no longer overreport their bandwidth, Win7 should crash a little less, and NEWNYM (as used by Vidalia's "new identity" button)now prevents hidden service-related activity from being linkable. It provides more information to Vidalia so you can see if your bridge is working. Also, 0.2.2.25-alpha revamps the Entry/Exit/ExcludeNodes and StrictNodes configuration options to make them more reliable, more understandable, and more regularly applied. If you use those options, please see the revised documentation for them in the manual page. TorButton Modifies to " To Toggle, or not to Toggle " : Read Here Download : https://www.torproject.org/download/download
Assange says Facebook is spying tool for US intelligence !

Assange says Facebook is spying tool for US intelligence !

May 03, 2011
Assange says Facebook is spying tool for US intelligence ! WikiLeaks editor-in-chief Julian Assange has branded Facebook an "appalling spying machine". According to Assange, whose WikiLeaks whistle-blowing site has propelled him into the media limelight, US intelligence services have direct access to records of Facebook users. "Facebook is the most appalling spying machine that's ever been invented," he said in an interview with Russia Today. "Here we have the world's most comprehensive database about people, their relationships, their addresses and locations, their communications with each other - all sitting within the United States and all accessible to US intelligence." Assange claimed that because of the costs involved each time an internet company was asked for access to specific data files, the big companies have built in back doors for officials to help themselves to whatever data they wanted. "Facebook, Google, Yahoo – all these major US organisations - hav...
Expert Insights Articles Videos
Cybersecurity Resources