#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Appin Hacked - Ethical Hacking Training institute hacked again

Appin Hacked - Ethical Hacking Training institute hacked again

May 16, 2011
Once again Appin tech. hacked,this time TIC GROUP hack their one more site, Have a look : Hacked Domain: https://appinonline.com Mirror :  https://mirror.sec-t.net/defacements/?id=26044
LulzSec Hack & Leak pointless ATM information !

LulzSec Hack & Leak pointless ATM information !

May 16, 2011
LulzSec Hack & Leak pointless ATM information ! LulzSec Hack & Leak pointless ATM information on their official Twitter account. They are LulzSec, who Hack Fox.com cracked the Fox.com login database, including emails and passwords. Now they also Claim to have 178 logins from an FBI-related website. Leak of ATM info is at  https://pastebin.com/raw.php?i=myPTr0aE
Indian server HaCkeD By The 077 ( Hamdi HaCker )

Indian server HaCkeD By The 077 ( Hamdi HaCker )

May 16, 2011
Indian server HaCkeD By The 077 ( Hamdi HaCker ) Hacked Site list and Mirror : Link : https://zone-h.com/archive/ip=216.67.245.98
cyber security

Master SaaS AI Risk: Your Complete Governance Playbook

websiteReco AIArtificial Intelligence / SaaS Security
95% use AI, but is it secure? Master SaaS AI governance with standards-aligned frameworks.
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them

Designing Identity for Trust at Scale—With Privacy, AI, and Seamless Logins in Mind

Jul 24, 2025
Is Managing Customer Logins and Data Giving You Headaches? You're Not Alone! Today, we all expect super-fast, secure, and personalized online experiences. But let's be honest, we're also more careful about how our data is used. If something feels off, trust can vanish in an instant. Add to that the lightning-fast changes AI is bringing to everything from how we log in to spotting online fraud, and it's a whole new ball game! If you're dealing with logins, data privacy, bringing new users on board, or building digital trust, this webinar is for you . Join us for " Navigating Customer Identity in the AI Era ," where we'll dive into the Auth0 2025 Customer Identity Trends Report . We'll show you what's working, what's not, and how to tweak your strategy for the year ahead. In just one session, you'll get practical answers to real-world challenges like: How AI is changing what users expect – and where they're starting to push ba...
53 Websites defaced by Andre Corleone (Indonesian hacker)

53 Websites defaced by Andre Corleone (Indonesian hacker)

May 16, 2011
53 Websites defaced by Andre Corleone (Indonesian hacker) Hacked Sites List : https://pastebin.com/dsqCUbaX
Rumor or True ? FBI & Fox.com hackers exposed : LulzSec Participants Identified !

Rumor or True ? FBI & Fox.com hackers exposed : LulzSec Participants Identified !

May 15, 2011
Rumor or True ? FBI &  Fox.com hackers exposed : LulzSec Participants Identified ! Okay Now we have  LulzSec Participants, Just now Exposed by some Investigators at https://pastebin.com/EKmkvtfj . LulzSec are the guys who Hack Fox.com cracked the Fox.com login database, including emails and passwords . Now they Claim to have 178 logins from an FBI-related website. Update :  We have just talk to  OpNoPro  and He claim that, He is not the part of any HACKING ACTIVITY . Neither he is part of   LulzSec . Nothing is confirmed, But still there are lots of important things, that we have to consider before blaming anyone. These two identified guys can be Innocent. We are looking forward to Investigation teams for validating the news and Facts. Stay Tuned ! OpNoPro , heyguise  have been identified according to Source : OpNoPro Info AnonOps IRC Nic: OpNoPro AKA Lulz4All Likely the primary instigator of LulzSec. Pict...
Exclusive Report : Is Department of Defense (DoD), Pentagon, NASA, NSA is Secure ?

Exclusive Report : Is Department of Defense (DoD), Pentagon, NASA, NSA is Secure ?

May 15, 2011
Exclusive Report : Is Department of Defense (DoD), Pentagon, NASA, NSA is Secure ? Over the past couple of weeks there has been a series of discussions around why the U.S defense and Intelligence agencies are moving so quickly to adopt cloud computing. Are there any Security Holes in their Security ? Or has someone already hacked them and their documents ?. In the last week we have noticed lots of hackers activity. If you have missed something then have a look to  Super Saturday : The Hacker News Featured Articles  ! Below you are going to read about Security Holes in the U.S defense and Intelligence agencies! A Hacker named " sl1nk " claims that he has: SSH access to a Network of 140 machine's layer 1 to 3 in the Pentagon Access to  APACS (automated personel air clearance system)  Thousand's of documents ranging from seizure of a vehicle up to private encryption key request forms. Database of all usernames/passwords of Webmail of Nasa. Access to A...
Wi-Fi Challenge by Security Tube !

Wi-Fi Challenge by Security Tube !

May 15, 2011
Wi-Fi Challenge by Security Tube ! 1. Objective: This series of challenges is aimed at testing your skills as a Wireless Hacker! We will posting challenges ranging from - Basic, Intermediate, Advanced, Expert and Insane levels! Our first challenge remain uncracked which we categorized as "Basic" :) Challenge 1: https://www.securitytube.net/video/1856 Challenge 1 Solution: https://www.securitytube.net/video/1859 Just posted Challenge 2 : https://www.securitytube.net/video/1862 Which still remains uncracked! 2. Prizes: All Expert and above challenges will have prizes which will be announced in the challenge video. Any level below that qualifies for a prize automatically if unsolved for 24 hours. Challenge 2 is currently unsolved for 21 hours! :) Prize will be an Alfa Networks Wireless card if this remains unsolved for 3 more! So hurry up and participate to win! 3. Joining the Competition: Just go to the Challenge 2 URL above, download the trace file on the p...
PlayStation 3 update 3.61 available Now, PSN begins today !

PlayStation 3 update 3.61 available Now, PSN begins today !

May 15, 2011
PlayStation 3 update 3.61 available Now, PSN begins today ! Today good news for all the PS3 lovers, your PS3 Now will be able to connect to PlayStation Network, today Sony has solved its PSN outage and updated its System to (v3.61) but notes that the update will prompt you to change your PlayStation Network password. This is what the PlayStation blog has updated and you need to read about the new update: We have been working on a new PS3 system software update that requires all PSN users to change their password once PlayStation Network is restored. The update (v3.61) is mandatory and is available now. If using a PS3, your password can only be changed on your own PS3 (or a PS3 on which your PSN account was activated), as an added layer of security. If you have never downloaded any content using your account on the system, an email will be sent to the registered sign-in ID (email address) associated with your account when you first attempt to sign-in to PSN. This e-mail will cont...
Hackers Got Hacked, HackingTips.in Hacked By Shadow008 !

Hackers Got Hacked, HackingTips.in Hacked By Shadow008 !

May 15, 2011
Hackers Got Hacked, HackingTips.in Hacked By Shadow008 ! Sites Hacked : https://www.hackingtips.in/ Mirror : https://www.zone-h.com/mirror/id/13877058
417 U.K websites Got hacked , Server compromised !

417 U.K websites Got hacked , Server compromised !

May 15, 2011
417 U.K websites Got hacked by SeeKeR , Server compromised ! Hacked sites List :  https://pastebin.com/J45HhJfs
Crimepack 3.1.3 Exploit kit Leaked, available for Download !

Crimepack 3.1.3 Exploit kit Leaked, available for Download !

May 15, 2011
Crimepack 3.1.3 Exploit kit Leaked, available for Download ! Part 1 : Java Exploit As stated above, I focus on a malware that exploits a recent JRE vulnerability: CVE-2010-0840 to execute malicious files on a victim system. This malware comes inside a jar file, which contains the following two classes: Crimepack.class and KAVS.class. Part 1.1 : Crimepack.class This class is the engine of the malware, it is obfuscated, but you can quickly strip off the obfuscation (my python beta tool is great…), once you get rid of the obfuscation you can see the following code: As always, we have an Applet that access to the data parameter, generates a random name for the exe payload that will be dropped in the system temp directory and then executed. So at this point as you can see we have nothing new, the above is a common Java downloader… but let's scroll down: Above, we can see that the malware is creating a new instance of the KAVS class (description follows), in order to trigge...
Qualys and Malware Analyser - Online malware scanning engine !

Qualys and Malware Analyser - Online malware scanning engine !

May 14, 2011
Qualys and Malware Analyser - Online malware scanning engine ! Qualys and Malware Analyser ( Author : Beenu Arora ), recently came into an agreement which will allow Qualys to use Malware Analyser tool on its online malware scanning engine. This would enable the users to perform more comprehensive scans on malicious executables. According to sources, the author shared the tool's source code only after signing NDA with the firm. Qualys® ( www.qualys.com ) headquartered in Redwood Shores is the leading provider of on demand IT security risk and compliance management solutions — delivered as a service. Malware analyser is a freeware tool for analysing malwares written in Python. The tool was initially open-source tool way back in 2009 but recently in 2010-11 the author has made some significant improvement in its core engine which has made it one of best static analysis tool. The tool can perform static and dynamic analysis and author has intentions to include the process a...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>