#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Sony Music Brazil Gets defaced !

Sony Music Brazil Gets defaced !

Jun 05, 2011
Sony Music Brazil Gets defaced ! A Sony Entertainment website just got hacked. A group of hackers by name " The UnderTakers " were able to take down Sony Music Brazil, which is down for more than 12 hours now. Looks like they don't even know about it yet, as the " Hacked The UnderTaker " message left by the breachers on sonymusic.com.br , is still intact. The Sony network and its services got hacked more than a dozen times over a period of 2 months. Quite alarming it is for everyone, but the company is yet to learn from its mistakes. Check Here It's pretty apparent to everyone that Sony hasn't plugged holes yet, and has failed to be alert.
John The Ripper 1.7.7 Jumbo 5 - Latest Release Download

John The Ripper 1.7.7 Jumbo 5 - Latest Release Download

Jun 04, 2011
John The Ripper 1.7.7 Jumbo 5 - Latest Release Download New version of John The Ripper has been released, John the Ripper is a free password cracking software tool. Initially developed for the UNIX operating system, it currently runs on fifteen different platforms (11 architecture-specific flavors of Unix, DOS, Win32, BeOS, and OpenVMS). It is one of the most popular password testing/breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customizable cracker. It can be run against various encrypted password formats including several crypt password hash types most commonly found on various UNIX flavors. John the Ripper Pro currently supports the following password hash types (and more are planned): Traditional DES-based Unix crypt – most commercial Unix systems (Solaris, AIX, …), Mac OS X 10.2, ancient Linux and *BSD "bigcrypt" – HP-UX, Tru64 / Digital Unix / OSF/1 BSDI-style extended DES-based crypt – BSD...
THN Report : ACER hacked because of their own stupidity !

THN Report : ACER hacked because of their own stupidity !

Jun 04, 2011
THN Report : ACER hacked because of their own stupidity ! Yes ! you read right , ACER hacked because of their own stupidity. Yesterday we report that Pakistan Cyber Army hacked Acer Europe Server and 40,000 Users Data, Source Codes & Server Compromised . Today we investigate on this and try to find out that how exactly Pakistan hackers got the FTP access . Here in above image you can see the screenshot taken by us from a ASP forum of Acer-Euro. Acer ASP Support Team posted some Hot Fix Release and give FTP access to other members , so that they can download that Hot Fix. This was posted on January 11, 2008 . Pakistan hackers got this and explore the FTP and In  "PB" directory they get "Country Wise Customer Data.zip" file,  which include the 40000 users data managed according to country wise.  Now this Data breach is only because of ACER's own Stupidity. The link of Forum post is " https://asp.acer-euro.com/FORUM/Topic472-8-1.aspx ".
cyber security

Master SaaS AI Risk: Your Complete Governance Playbook

websiteReco AIArtificial Intelligence / SaaS Security
95% use AI, but is it secure? Master SaaS AI governance with standards-aligned frameworks.
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them

Malicious PyPI Packages Are Everywhere — A Practical Guide to Defending the Python Supply Chain

Jul 24, 2025
Python supply chain attacks are surging in 2025. Join our webinar to learn how to secure your code, dependencies, and runtime with modern tools and strategies.
F-Secure Releases Anti-Virus For Mac

F-Secure Releases Anti-Virus For Mac

Jun 04, 2011
F-Secure Releases Anti-Virus For Mac Key Features Easier and faster to use Designed with performance in mind Reliable protection Real-time antivirus protection, automated malware removal logic Easy to take into use Panic button Instantly block all traffic except update servers F-Secure Anti-Virus has 2 areas of protection. Firstly it has a realtime protection system that stops malware getting into your Mac in the first place. Secondly you have the option to scan your hard drive to detect threats that may already be present. The realtime scanner is great – it sits happily in them menu bar and doesn't take up any CPU resource worth mentioning. The manual scanning however is a beast. For me, on a 128GB SSD (45GB in use) the scan took over 4 hours. In that time the program used up 80% of the CPU. F-Secure Anti-Virus for Mac is available from the company website with subscriptions starting at $29 a year. Free trials are also available. Video Presentation :
Ani-Shell v1.0 - PHP shell with features like Mass-Mailer , Fuzzer , DDoser by lionaneesh

Ani-Shell v1.0 - PHP shell with features like Mass-Mailer , Fuzzer , DDoser by lionaneesh

Jun 04, 2011
Ani-Shell v1.0 - PHP shell with features like Mass-Mailer , Fuzzer , DDoser by lionaneesh Ani-Shell is a simple PHP shell with some unique features like Mass Mailer , A simple Web-Server Fuzzer , and a DDoser ! This shell has immense capabilities and have been written with some coding standards in mind for better editing and customization. Features -- Shell -- Plateform Independent -- Mass - Mailer -- Small Web-Server Fuzzer -- DDoser -- Design Username : lionaneesh Password : lionaneesh Download  & More Info
Operation Cupcake : MI6 hacks al-Qaeda website !

Operation Cupcake : MI6 hacks al-Qaeda website !

Jun 04, 2011
As part of its cyber-warfare operations, British spy agency MI6 has hacked into an al-Qaeda online magazine and replaced '' bomb-making '' instructions with a recipe for cupcakes, a media report said. The operation was launched by MI6 in an attempt to disrupt efforts by al-Qaeda in the Arabian Peninsular to recruit " lone-wolf " terrorists with a new English-language magazine, 'The Daily Telegraph' reported. When followers tried to download the 67-page colour magazine, instead of instructions about how to " Make a bomb in the Kitchen of your Mom " by " The AQ Chef ", they were greeted with garbled computer code. The code, which had been inserted into the original magazine by the British intelligence hackers, was actually a web page of recipes for "The Best Cupcakes in America" published by the Ellen DeGeneres chat show. It said: " The little cupcake is big again. Self- contained and satisfying, it summons memo...
Lulzsec hack Infragard Atlanta Members Alliance & challenge FBI !

Lulzsec hack Infragard Atlanta Members Alliance & challenge FBI !

Jun 04, 2011
Lulzsec hack Infragard Atlanta Members Alliance & challenge FBI ! Lulzsec yesterday hack Sony and Today they hack  Infragard Atlanta Members Alliance , which having partnership with FBI . There is a Video Posted By Lulzsec on Their site after hack : The message written by them : LET IT FLOW YOU STUPID FBI BATTLESHIPS Not even This ,  700 mb of Emails backup also hacked and leaked via Torrent . The Tut about how to open these mails also posted by Lulzsec : Twitter feed to taunt the Federal Bureau of Investigation in the wake of a major cyberattack on Sony Pictures Entertainment and Sony Music. LulzSec also said that it has received some funding from supporters who want to see it continue its work. Lulzsec other previous hacks are: Sony Pictures hacked and Database Leaked Public Broadcasting Service (PBS) Hacked LulzSec Leak Sony's Japanese websites Database LulzSec Hack & Leak pointless ATM information X Factor Leaked Contestants Datab...
Sony 12th time Hacked : Database of Application Store at Sony Europe Leaked !

Sony 12th time Hacked : Database of Application Store at Sony Europe Leaked !

Jun 04, 2011
Sony 12th time Hacked : Database of Application Store at Sony Europe Leaked ! Okay ! The Idahc - Lebanese hacker is back to hit Sony. This time he claim to hack the Database of Application Store at Sony Europe  https://apps.pro.sony.eu/ . A new day, A new surprise for Sony ! Yesterday, Sony Pictures hacked and Database Leaked by LulzSec . Last time Sony Ericsson Got Hacked by Idahc - Lebanese hacker ,  Read Here .  The attack is same using SQL injection , Here the Proof : The data extracted by hacker have 120 users data , as posted on a public text sharing site Pastebin.com .
ACER Hacked : 40,000 Users Data, Source Codes & Server Compromised

ACER Hacked : 40,000 Users Data, Source Codes & Server Compromised

Jun 03, 2011
ACER Hacked : 40,000 Users Data, Source Codes & Server Compromised Update :  THN Report : ACER hacked because of their own stupidity This Week is Really with great UP-DOWNS in Cyber World. Mega hacks like  Sony Pictures hacked ,  Chinese Hacker Cracks 100's of Gmail accounts   , Public Broadcasting Service (PBS) Hacked , 10,000 E-mails of Iranian Government Leaked ,etc etc and lots more... Now here we have the latest Report on Huge Data breach at Server of ACER ( Europe )  acer-euro.com by well know hacking Group " Pakistan Cyber Army ". We got mail from PCA that they successfully hacked the FTP of ACER and Stole around 40,000 Users Data , Various Source Codes stored on server. For the Proof PCA provide some Screenshots of Hack : 1.) User data copied from server   2.) FTP Access on acer-euro.com   3.) 40,000 Customers data Country Wise Here is a  glimpse of  Source code Stealed : Project...
Hackers stole classified information from two Canadian ministries

Hackers stole classified information from two Canadian ministries

Jun 03, 2011
Hackers stole classified information from two Canadian ministries The hackers sent e-mails to staff that seemed to come from senior managers, the Canadian Broadcasting Corp. reported. When recipients opened the attachments, the hackers got a path into the federal network. Stockwell Day, then the Treasury Board president, told the CBC Thursday he was not told of the breach. "Certainly, on the information that I got, I had full confidence that the systems had moved quickly to shut down, that significant information had not in fact been carried away, and that the ongoing assessment of that by the technicians continues," he said. The Department of Finance and the Treasury Board were still restricting Internet access for their workers Thursday. The agencies now have separate computer stations disconnected from the main government network. A secret May 2010 memo from Canada's spy agency warned that cyberattacks on government, university and industry computers were gro...
Anonymous Leaks 10,000 E-mails of Iranian Government

Anonymous Leaks 10,000 E-mails of Iranian Government

Jun 03, 2011
Anonymous Leaks 10,000 E-mails of Iranian Government A collection of 10,365 e-mails of the Iranian government were leaked by Anonymous OpIran on June 2, 2011. According to members of Anonymous the files were taken after the hacker accessed the Iranian Passport and Visa Office email center. These files consist mostly of the Iranian government alerting individuals of their visa application status. According to a member of Anonymous, the files were aimed more to damage the image of Iran in " both cyber space and the real world. " The 63 mb file was released quietly by Anonymous. It was posted to file-sharing websites across the Internet. Download The File and Rar password is :  opiranopiran
Chinese hackers having aim to Spying on U.S. Govt

Chinese hackers having aim to Spying on U.S. Govt

Jun 03, 2011
Chinese hackers having aim to Spying on U.S. Govt It's the second time Google has blamed a major computer hacking scheme on China . On 1st of June we have Reported that :  Chinese Hacker Cracks Hundreds of Gmail Accounts of U.S. & Asia .  This time Google says unknown hackers from Jinan, China, a city with a military command center, stole the personal Gmail passwords of hundreds of senior U.S .government officials. Google said the hackers' "goal" was to eavesdrop on the officials  "to monitor the content of the users' emails." The hackers did not steal any government-owned emails, but U.S. officials who work at home frequently use Gmail to do government business. White House teams often use Gmail to communicate where and when the President might travel. The risk is growing that too much secure information is being sent on non-secure systems. FBI is now investigating and this new revelation of hacking is adding heat to the growing frict...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>