#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Updated : 3rd Plan to Hit Sony, Another Sony Information Leak !

Updated : 3rd Plan to Hit Sony, Another Sony Information Leak !

May 05, 2011
Updated : 3rd Plan to Hit Sony , Another Sony Information Leak ! Update :  [THN] The Hacker News Exclusive Report on Sony 3rd Attack Issue  ! An Anonymous Email provide 'THE HACKER NEWS' some Links from sony FTP, that may lead to another big HIT to sony's Network. That mail shows that some more hackers are planning to give 3RD big HIT to sony soon.... How knows how much it worth, But keep eyes open ;-) Update -- Have a Look to these links : https://products.sel.sony.com/ cgi-bin/semi/get_datasheet.cgi https://products.sel.sony.com/ cgi-bin/wishlist https://products.sel.sony.com/ shared/santa/dbs/sweepstake. xls Alternate links :  https://pastebin.com/pdBgSBBD https://pastebin.com/H9XRfQbD https://pastebin.com/6BG4k1vk Note : Sony Have Remove all above links/Files after our post, so check Alternate links. UPDATE : Downlaod 'The Hacker News' Magazine (May 2011)
A press release from Anonymous regarding PSN !

A press release from Anonymous regarding PSN !

May 05, 2011
A press release from Anonymous regarding PSN !
Hackers steal 250,000 X Factor Details !

Hackers steal 250,000 X Factor Details !

May 05, 2011
Hackers steal 250,000 X Factor Details ! The FBI is reportedly investigating after hackers broke into Simon Cowell's computer network. Details of more than 250,000 X Factor entrants are said to have been stolen and Simon and bosses at American TV network Fox, are said to be scared that the thieves will use the details to make money. An official investigation has been launched and an email, which was seen by the Daily Star, was sent to all contestants to warn them about the security breach. It read: 'This week, we learned that computer hackers illegally accessed information you and others submitted to us to receive information about The X Factor auditions. 'It is possible that the information you did provide to us, which included your name, email address, zip code, phone number (which was optional), date of birth, and gender, may have been accessed. 'We are taking this matter very seriously and are working with federal law enforcement authorities to investigate t...
cyber security

Secure your LLMs Against Real-World Threats

websiteWizLLM Security / Artificial Intelligence
LLMs move fast. So do the risks. Get practical, real-world steps to defend against prompt injection, model poisoning, and more.
cyber security

2025 Gartner® MQ Report for Endpoint Protection Platforms (July 2025 Edition)

websiteSentinelOneEndpoint Protection / Unified Security
Compare leading Endpoint Protection vendors and see why SentinelOne is named a 5x Leader
Anonymous Response to Sony : We didn't do it as we will never hurt the innocents !

Anonymous Response to Sony : We didn't do it as we will never hurt the innocents !

May 05, 2011
Anonymous Response to Sony : We didn't do it as we will never hurt the innocents ! Press Release as shown :  Last month, an unknown party managed to break into Sony's servers and acquired millions of customer records including credit card numbers. Insomuch as that this incident occurred in the midst of Anonymous' OpSony, by which participants engaged in several of our standard information war procedures against the corporation and its executives, Sony and other parties have come to blame Anonymous for the heist. Today, in a letter directed to members of Congress involved in an inquiry into the situation, Sony claimed to have discovered a file on its servers, presumably left by the thieves in question, entitled "Anonymous" and containing a fragment of our slogan, "We are Legion." In response, we would like to raise the following points: 1. Anonymous has never been known to have engaged in credit card theft. 2. Many of our corporate and governmental ad...
LastPass Forces Users to Change Master Passwords Following Suspicious Activity

LastPass Forces Users to Change Master Passwords Following Suspicious Activity

May 05, 2011
LastPass, one of the most popular cloud-based password management services, is forcing users to change their master passwords as a precaution after it discovered an unauthorized data transfer out of its network. In a post on its blog the company explains, in sufficient detail, what prompted this measure, why it was the best course of action and what it means for users. On May 3, the company detected larger than normal outbound traffic and immediately launched an internal audit to determine the source. Such transfers have been detected before, but each time the origin was determined to be an employee or an automated script. "In this case, we couldn't find that root cause. After delving into the anomaly we found a similar but smaller matching traffic anomaly from one of our databases in the opposite direction. "Because we can't account for this anomaly either, we're going to be paranoid and assume the worst: that the data we stored in the database was some...
BackTrack 4: Assuring Security by Penetration Testing

BackTrack 4: Assuring Security by Penetration Testing

May 05, 2011
BackTrack 4  : Assuring Security by Penetration Testing Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide professional guidelines and recommendations to you. The book is designed in a simple and intuitive manner, which allows you to explore the whole BackTrack testing process or study parts of it individually. If you are an IT security professional or network administrator who has a basic knowledge of Unix/Linux operating systems including awareness of information security factors, and you want to use BackTrack for penetration testing, then this book is for you.  Download :  https://shrta.com/files/0ZYSOJBV/BackTrack-4-Assuring-Security-by-Penetration-Testing.zip Or https://www.multiupload.com/ZCV9Q3WO4X
Gloriousindia.com database hacked by DrGr4vity, 1000 users data compromised

Gloriousindia.com database hacked by DrGr4vity, 1000 users data compromised

May 05, 2011
Gloriousindia.com database hacked by DrGr4vity , 1000 users data compromised Compromised User Data Leaked at https://docs.google.com/document/d/1NwQNGeFTb3z3QcFwT4vHNvPUv3uLyro8zQ556Oq_wRY/edit?hl=en
Banglarmela.org Hacked By EvilSoul

Banglarmela.org Hacked By EvilSoul

May 05, 2011
Banglarmela.org Hacked By EvilSoul Hacked Site : Banglarmela.org
Datefinder.co.nz - Free Dating Site Pwnd by Fr0664/FCA

Datefinder.co.nz - Free Dating Site Pwnd by Fr0664/FCA

May 05, 2011
Datefinder.co.nz - Free Dating Site Pwnd by Fr0664/FCA Fr0664/FCA hack Datefinder.co.nz and Expose 252 emails/passwords @  https://pastebin.com/W2TDnGUR
Metasploit Framework 3.7.0 Released !

Metasploit Framework 3.7.0 Released !

May 04, 2011
Metasploit Framework 3.7.0 Released ! The Metasploit team has spent the last two months focused on one of the least-visible, but most important pieces of the Metasploit Framework; the session backend. Metasploit 3.7 represents a complete overhaul of how sessions are tracked within the framework and associated with the backend database. This release also significantly improves the staging process for the reverse_tcp stager and Meterpreter session initialization. Shell sessions now hold their output in a ring buffer, which allows us to easily view session history -- even if you don't have a database. This overhaul increases performance in the presence of many sessions and allows for a larger number of concurrent incoming sessions in a more reliable manner. The Metasploit Console can now comfortably handle hundreds of sessions, an especially important consideration when running large-scale social engineering engagements. Several areas of database performance have seen significant i...
SportGFX.COM - World's Largest Sport GFX Community Hacked by PirateAL

SportGFX.COM - World's Largest Sport GFX Community Hacked by PirateAL

May 04, 2011
SportGFX.COM - World's Largest Sport GFX Community Hacked by PirateAL Hacked Site :  SportGFX.C OM Proof: https://www.youtube.com/watch?v=dWV4lUNsWxA Zone-h mirror : https://zone-h.org/mirror/id/13608314
Goal.com Hacked, found to be serving malware !

Goal.com Hacked, found to be serving malware !

May 04, 2011
According to Armorize, soccer news site Goal.com was recently found to be serving malware. "In an analysis of the attack, Armorize researcher Wayne Huang suggests that a hacker specifically targeted and compromised Goal.com through a back-door that allowed the attacker to manipulate the site's content at will," writes threatpost's Brian Donohue. "According to the report, Goal.com was detected on April 27 and 28, 2011 serving up an iframe attack that forwarded visitors to a rogue domain in the .cc top level domain (TLD)," Donohue writes. "That redirect was the first in a chain of events that resulted in the delivery of a known exploit pack, g01pack that targets attacks at the specific operating system and browser version the Goal.com visitor is using. After exploiting the user's browser, further malware, including a Trojan horse program were downloaded to the victim's computer."
Expert Insights Articles Videos
Cybersecurity Resources