#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

NetworkMiner 1.1 -  Network Forensic Analysis Tool (NFAT) Released

NetworkMiner 1.1 - Network Forensic Analysis Tool (NFAT) Released

Sep 19, 2011
NetworkMiner 1.1 -  Network Forensic Analysis Tool (NFAT) Released  NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows. NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner can also parse PCAP files for off-line analysis and to regenerate/reassemble transmitted files and certificates from PCAP files.NetworkMiner collects data (such as forensic evidence) about hosts on the network rather than to collect data regarding the traffic on the network. The main user interface view is host centric (information grouped per host) rather than packet centric (information showed as a list of packets/frames). Consider a scenario where you're analyzing a suspicious website, wishing to understand the way that it might try attacking its visitors. One way to approach this challenge is to browse the website using a Windows ...
Intelligence and National Security Alliance (INSA) hacked

Intelligence and National Security Alliance (INSA) hacked

Sep 19, 2011
Intelligence and National Security Alliance (INSA) hacked On Wednesday, 48 hours after releasing a policy paper on cybersecurity, the top trade association for intelligence contractors got a first-hand lesson on the subject: they discovered that their website was hacked. Cryptome, a site affiliated with the hacker collective Anonymous, published the membership emails and phone numbers and in some cases home addresses for the members of the Intelligence and National Security Alliance (INSA). By clicking on a link titled, "INSA Nest of Official and Corporate Spies," anyone can find contact information for senior officials at the NSA, FBI, and CIA, as well as top national security contracting firms like Booz Allen Hamilton. The apparent cyberattack on the Intelligence and National Security Alliance, or INSA, is the latest example of the ability of hackers to penetrate the computer systems of government agencies and private companies — including those that pride themselves on their ...
Comodohacker is 21 year old patriotic Iranian Hacker

Comodohacker is 21 year old patriotic Iranian Hacker

Sep 19, 2011
Comodohacker is 21 year old patriotic Iranian Hacker The New York Times got in touch with Comodohacker, who says he's a 21-year-old Iranian student, and asked him about the motives behind his sweeping breach of Gmail this summer. By sniping security certificates from a Dutch company — essentially the digital ID cards that tell your computer a website's legit — Comodohacker was able to crack 300,000 Iranian Gmail accounts, prompting Google to warn the entire country. " My country should have control over Google, Skype, Yahoo, etc., " he said by e-mail. " I'm breaking all encryption algorithms and giving power to my country to control all of them. "" I'm totally independent, " he said " I just share my findings with some people in Iran. They are free to do anything they want with my findings and things I share with them, but I'm not responsible. " Hundreds of companies and government authorities around the world, including in the United States and China, have the power to issue the...
cyber security

New Whitepaper: The Evolution of Phishing Attacks

websitePush SecurityIdentity Attacks / Phishing
Why is phishing still so effective? Learn about modern phishing techniques and how to counteract them.
cyber security

Key Essentials to Modern SaaS Data Resilience

websiteVeeam SoftwareSaaS Security / Data Protection
Read this guide to learn exactly what today's organizations need to stay protected, compliant, and in control
United States Navy Military domain is vulnerable to hackers

United States Navy Military domain is vulnerable to hackers

Sep 17, 2011
United States Navy Military domain is vulnerable to hackers United States Navy Military website is full of vulnerabilities. Sec Indi Security Team Hacker upload a custom message on the server as shown below : Url is hidden for Security Reasons. Hacker claim to inform the website admins already, but government did not fix it yet so he releasing this in public.
Vulnerability Discovered in SpyEye Botnet, Exploit Available for Download

Vulnerability Discovered in SpyEye Botnet, Exploit Available for Download

Sep 17, 2011
Vulnerability Discovered in SpyEye Botnet , Exploit Available for Download Blind SQL injection Vulnerability Discovered in SpyEye Botnet by S4(uR4 ( r00tw0rm.com ) Exploit : Vulnn type : Blind SQL injection vuln script : frm_cards_edit.php Affected version : ALL May use any botnet from : https://spyeyetracker.abuse.ch/monitor.php What is SpyEye ? W32/SpyEye Aliases :  This is a list of aliases for the variant of SpyEye discovered in early February 2011 that has been actively targeting Norwegian banking websites: Trojan-Spy.Win32.SpyEyes.evg (Kaspersky) PWS-Spyeye.m (McAfee) Trojan:Win32/EyeStye.H (Microsoft) A variant of Win32/Spy.SpyEye.CA (NOD32) W32/Malware.QOOC (Norman) Trojan.Zbot (Symantec) Mal_Xed-24 (Trend Micro) Brief overview SpyEye is a trojan with backdoor capabilities that attempts to steal sensitive information related to online banking and credit card transactions from an infected machine. SpyEye is sold via its author in an easy to configure ...
0-Day SCADA Exploits Publicly Exposed by Italian researchers

0-Day SCADA Exploits Publicly Exposed by Italian researchers

Sep 17, 2011
0-Day SCADA Exploits Publicly Exposed by Italian researchers An Italian researcher has uncovered at least a dozen security flaws in software used in utilities and other critical infrastructure systems, prompting security advisories from the U.S. government. Security researcher Luigi Auriemma disclosed the attacks against six SCADA (Supervisory Control and Data Acquisition) systems including US giant Rockwell Automation.The step-by-step exploits allowed attackers to execute full remote compromises and denial of service attacks.Some of the affected SCADA systems were used in power, water and waste distribution and agriculture.Such zero-day information disclosure was generally frowned upon in the information security industry because it exposed customers to attack while published vulnerabilities remained unpatched.Attacks against SCADA systems were particularly controversial because exploits could affect a host of machinery from lift control mechanisms to power plants. The advisor...
SSHtrix - Fastest Multithreaded SSHv1 and SSH1v2 login cracker

SSHtrix - Fastest Multithreaded SSHv1 and SSH1v2 login cracker

Sep 16, 2011
SSHtrix - Fastest Multithreaded SSHv1 and SSH1v2 login cracker sshtrix is a very fast multithreaded SSH login cracker. It supports SSHv1 and SSHv2.sshtrix was designed to automate rapid bruteforce attacks against SSH authentification screens. Unlike other public tools, the aim is to keep it simple, stable, fast and modular. With its clean code design, it is easy to extend the code to a framework or to fork it against protocols of your choice. In fact, sshtrix is a fork of my own generic login cracker framework. Download SSHtrix here
Droidsheep : Android Application for Session Hijacking

Droidsheep : Android Application for Session Hijacking

Sep 16, 2011
Droidsheep : Android Application for Session Hijacking  Droidsheep is free alternate of faceniff which is available on download droidsheep website for free. Its one click hijacking tool which supports Amazon.de facebook.com flickr.com twitter.com linkdein.com yahoo.com live.com google.de (only the non-encrypted services like "maps") What do you need to run DroidSheep.? You need an android-powered device, running at least version 2.1 of Android You need Root-Access on your phone (link) You need DroidShep (You can get it in the "GET IT" section) Download Droidsheep
Its Fail 2011 - Year of Hacks !

Its Fail 2011 - Year of Hacks !

Sep 16, 2011
Its Fail 2011 - Year of Hacks ! According to IT security experts Year 2011 have labeled as the " Year of the Hack " or " #Fail 2011 ". Hacking has become much easier over the years allowing hackers to hack into systems easier then ever before, which is why 2011 had a lot of hacking happen so far. Hackers are coming up with tools as well as finding new methods to hacking faster then companies can increase their security. Even, Every year is the year of the hacking as long as there are hackers out there ready to execute their malicious programs and attain their goals like gathering important information to the victim's computer, stealing important identities, credit card information, etc. This year 2011 could be another generation of hacking. Since every year there are always forward advancements of the tools and programs that could use by the hackers. The most important is to avoid them if you are a computer user. RSA Hack (3/17/2011) : Motive - Unknown attacker, alth...
Operation OpIndependencia : Anonymous Hit Mexican Government Official websites

Operation OpIndependencia : Anonymous Hit Mexican Government Official websites

Sep 16, 2011
Operation OpIndependencia : Anonymous Hit Mexican Government Official websites The websites of several Mexican government ministries, including Defense and Public Security, went offline on Thursday, and a hacker group claimed responsibility. Yesterday's date was significant because it was the symbolic beginning of Mexico's independence from Spain. According to Anonymous, blocking Mexican government sites is part of the operation OpIndependencia, but its essence is not disclosed and could not explain their actions." We are anonymous, we are legion, we don't forgive, we don't forget. Wait for us, " said a statement on a blog linked to a Twitter account for Anonymous Hispano. Meanwhile, X-Ploit's three members say they are tracking senators' Web surfing habits, including visits to porn sites, in addition to initiating hacks against Mexico's Health Ministry, National Water Commission and National Statistics Institute sites." We're only looking to show that we don...
ClickIndia Classifieds network hacked by Sec Indi

ClickIndia Classifieds network hacked by Sec Indi

Sep 16, 2011
The Sec Indi Security Team has found Multiple major flaws on Clickindia.com - One of the biggest Classifieds network. There is a highly possible chance to damage ClickIndia system or to steal the Database. Hackers Exploit it via SQL Injection Vulnerability.
Linux.com down again due to Security Breach

Linux.com down again due to Security Breach

Sep 16, 2011
Linux.com down again due to Security Breach Linux Foundation infrastructure including LinuxFoundation.org, Linux.com, and their subdomains are again down for maintenance due to a security breach that was discovered on September 8, 2011. Investigators yet can't elaborate the source of attack. Regarding coming back online , Linux.com says " Our team is working around the clock to restore these important services. We are working with authorities and exercising both extreme caution and diligence. Services will begin coming back online in the coming days and will keep you informed every step of the way. " The added " We are in the process of restoring services in a secure manner as quickly as possible. As with any intrusion and as a matter of caution, you should consider the passwords and SSH keys that you have used on these sites compromised. If you have reused these passwords on other sites, please change them immediately. We are currently auditing all systems and wil...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>