#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Anonymous announce #OpIran on 15th May 2011

Anonymous announce #OpIran on 15th May 2011

May 14, 2011
Anonymous announce #OpIran on 15th May 2011  Anonymous will strike back again on Iran Govt. on 15th may-2011.University students from 19 universities throughout Iran join students from Tehran University and Medical Sciences in their call for holding a protest and strike on May 15. A statement issued by students from 19 national universities says: " At a time when the wind of Spring is blowing throughout the Middle East, Iran has not been exempted from the fragrance of this wind and once again, the universities, the bastion of steadfastness and resistance, stood up from under attack of the anti-freedom despots and gave new hopes to those eager for freedom that: yes, universities are alive… " " For this reason, and following the call by students from Tehran University and Medical Sciences for holding a strike and general protests on May 15, we invite all students to actively and widely participate in holding the gatherings in all universities. Because when despotism is on the...
Super Saturday : The Hacker News Featured Articles, If you miss Something !

Super Saturday : The Hacker News Featured Articles, If you miss Something !

May 14, 2011
Super Saturday :  The Hacker News Featured Articles, If you miss Something ! Let's Re-collect all the Featured Recent Interesting Articles of THN, in this post. Hope you Guys will like every news By us. Please share the Links on your Facebook/ Re-tweet on Twitter and everywhere to spread the Cyber Awareness :) The Anonymous : Need of  21st century ! 26 Underground Hacking Exploit Kits available for Download ! [THN] The Hacker News Exclusive Report on Sony 3rd Attack Issue ! Finally Source code of ZeuS Botnet Version: 2.0.8.9 available for Download ! Crimepack 3.1.3 Exploit kit Leaked, available for Download ! You got owned, Exposure about privacy on facebook ! Script that gives hackers access to user accounts floods Facebook Hacker getting WordPress Database Dump with Google Query ! Pakistan Cyber Army got hacked by Indian Cyber Army (Indishell) Facebook Security Update, Protection from Untrustworthy Websites With Web Of Trust (WOT) New Facebook worm propagat...
26 Underground Hacking Exploit Kits available for Download !

26 Underground Hacking Exploit Kits available for Download !

May 14, 2011
List of Hacking Exploit Kits : Unknow Tor Target-Exploit Smart pack RDS My poly sploit multisploit mypack-009 mypack-091 mypack-086 mypack-081 Mpack Infector Ice-pack-1 Ice-pack-2 Ice-pack-3 G-pack Fire pack -1 Fire Pack -2 Fiesta -1 Fiesta -2 Cry 217 Armitage Adpack -1 Adpack -2 0x88 Download : [Link expired]
cyber security

Master SaaS AI Risk: Your Complete Governance Playbook

websiteReco AIArtificial Intelligence / SaaS Security
95% use AI, but is it secure? Master SaaS AI governance with standards-aligned frameworks.
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them

Designing Identity for Trust at Scale—With Privacy, AI, and Seamless Logins in Mind

Jul 24, 2025
Is Managing Customer Logins and Data Giving You Headaches? You're Not Alone! Today, we all expect super-fast, secure, and personalized online experiences. But let's be honest, we're also more careful about how our data is used. If something feels off, trust can vanish in an instant. Add to that the lightning-fast changes AI is bringing to everything from how we log in to spotting online fraud, and it's a whole new ball game! If you're dealing with logins, data privacy, bringing new users on board, or building digital trust, this webinar is for you . Join us for " Navigating Customer Identity in the AI Era ," where we'll dive into the Auth0 2025 Customer Identity Trends Report . We'll show you what's working, what's not, and how to tweak your strategy for the year ahead. In just one session, you'll get practical answers to real-world challenges like: How AI is changing what users expect – and where they're starting to push ba...
CHMag Issue 16th, May 2011 Download !

CHMag Issue 16th, May 2011 Download !

May 14, 2011
CHMag Issue 16th, May 2011 Download ! Here we are again with the latest issue of ClubHack Magazine. This time also the issue is dedicated to Browser security. Contents of this Issue:- Tech Gyan - First ever public disclosure of Password secrets of "Apple Safari". Tool Gyan - BeEF (Browser Exploitation Framework) Mom's Guide - User Agent on my Header. Legal Gyan - New Rules under Information Technology Act. Matriux Vibhag - Forensics with Matriux Part - 1 Poster of the month - How safe you are while surfing? Direct Download: https://chmag.in/issue/may2011.pdf Hope you'll enjoy the magazine. Keep sending the bouquets and brickbats!
Understanding The Concept of Bypassing Antivirus,by Internet Security Team

Understanding The Concept of Bypassing Antivirus,by Internet Security Team

May 14, 2011
Understanding The Concept of Bypassing Antivirus ,by Internet Security Team Anti-Virus manufacturers nowadays implements more and more complex functions and algorithms in order to detect the latest and newest viruses along with their variants. There is however simple methods that can be used to by-pass most of these, especially those that doesn't use heuristics and similar techniques at all. Download guide :  https://www.multiupload.com/P8YWVINAIQ Rar file password : thn
Devil shell v1.2  - Php shell with DDoS feature !

Devil shell v1.2 - Php shell with DDoS feature !

May 14, 2011
Devil shell v1.2  - Php shell with DDoS feature !   Features : 1. Design 2. Permission Change of file / Folders 3. Improved DDoS 4. Create Folder 5. Multi uploading 6. Encrypted Title so hard to find by Google.  Download Link https://www.filefactory.com/file/cb4d35e/n/ugdevil.php Username : ugdevil Password : 1234567 For further Query mail me at : ugdevil@gmail.com
PlayStation Network hack launched from Amazon EC2 !

PlayStation Network hack launched from Amazon EC2 !

May 14, 2011
PlayStation Network hack launched from Amazon EC2 ! The hackers who breached the security of Sony's PlayStation network and gained access to sensitive data for 77 million subscribers used Amazon's web services cloud to launch the attack, Bloomberg News reported. The attackers rented a sever from Amazon's EC2 service and penetrated the popular network from there, the news outlet said, citing an unnamed person with knowledge of the matter. The hackers supplied fake information to Amazon. The account has now been closed. Neither Sony nor Amazon commented on the claims. Bloomberg doesn't say how Amazon's cloud service was used to mount the attack. If the report is correct, it wouldn't be the first time it's been used by hackers. Read More
China plugging holes in its Great Firewall by disrupting VPN traffic !

China plugging holes in its Great Firewall by disrupting VPN traffic !

May 14, 2011
China plugging holes in its Great Firewall by disrupting VPN traffic ! Chinese internet users suspect that their government is interfering with the method they have been using to tunnel under the "Great Firewall" to prevent them connecting with the outside world. Sites such as search engine Google and news site MSN have become difficult to access, they say. And a number of universities and businesses have begun warning their users not to try to evade the firewall. Since 6 May, a number of users says that internet connections via China Telecom, the largest telephone company, and China Unicom have become "unstable", with intermittent access when trying to access sites in foreign countries using a "virtual private network" (VPN) – a preferred method of evading the blocks put up by China's censors to external sites. Even Apple's app store has been put off-limits by the new blocks, according to reports. The disruption has mainly affected corpor...
LUMS University Database Hacked By Hitcher

LUMS University Database Hacked By Hitcher

May 14, 2011
LUMS University Database Hacked By Hitcher Vulnerable link :   https://www.lums.edu.pk/event_detail.php?id='300 Databases links for student info :   https://pastebin.com/TAYcwPd3 Faculty info : https://pastebin.com/1RpBitHf
Pakistan Telecommunication Company (PTCL) Hacked by lionaneesh, users data compromised

Pakistan Telecommunication Company (PTCL) Hacked by lionaneesh, users data compromised

May 14, 2011
Pakistan Telecommunication Company (PTCL)  Hacked by lionaneesh , users data compromised Hacked site :  https://www.ptcl.com.pk/ Hack Proof by Hacker :  https://pastebin.com/eBTR5d5H
13th Friday, Everything Down : Twitter ,You tube & Blogger !

13th Friday, Everything Down : Twitter ,You tube & Blogger !

May 13, 2011
13th Friday, Everything Down : Twitter ,You tube & Blogger ! Twitter is down and fail whales abound. Some users have experienced problems loading the service since about 1:30 ET. Twitter announced that it is aware of the situation on its status log: " We are currently experiencing site stability issues. There may be intermittent issues loading twitter.com. We're working to fix it as soon as possible ," the post says. We'll continue to update you with more information, as it becomes available. Today Blogger.com was also down from last 48 hours, But Finally, Blogger.com is back !
Critical Flash Player Update to fix 11 Security Holes

Critical Flash Player Update to fix 11 Security Holes

May 13, 2011
Critical Flash Player Update to fix 11 Security Holes Adobe  has released another batch of security updates for its ubiquitous  Flash Player software. This "critical" patch fixes at least 11 vulnerabilities, including one that reports suggest is being exploited in targeted email attacks. In  the advisory  that accompanies this update, Adobe said "there are reports of malware attempting to exploit one of the vulnerabilities, CVE-2011-0627, in the wild via a Flash (.swf) file embedded in a Microsoft Word  (.doc) or  Microsoft Excel  (.xls) file delivered as an email attachment targeting the  Windows  platform. However, to date, Adobe has not obtained a sample that successfully completes an attack." The vulnerabilities exist in Flash  versions 10.2.159.1  and earlier for Windows,  Mac ,  Linux and  Solaris . To learn which version of Flash you have, visit  this link . The new version for most platforms is 10...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>