#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Potential Security Risk of Geotagging for the Military

Potential Security Risk of Geotagging for the Military

Mar 14, 2012
Potential Security Risk of Geotagging for the Military Did you know that when you upload photos to the Internet they can tell more about you, then you would want to disclose to a random stranger watching it? Where you live, where you spend time with your kids, when you are at home, and when you are not. How is that? Modern smartphones and cameras can add additional information to digital photos they create - date and time, camera model, and lot's of other information, including GPS coordinates of place where photo has been made. And when you upload such photo to your favorite social network it might either display this info explicitly, or just leave it intact and any user who's watching it can find you on a map. A article posted by  Cheryl Rodewig on United States Army website with title " Geotagging poses security risks ". They explain , The question was posed by Brittany Brown, social media manager of the Online and Social Media Division at the Office of the Ch...
Microsoft Security Bulletin with Remote Desktop Flaws

Microsoft Security Bulletin with Remote Desktop Flaws

Mar 14, 2012
Microsoft Security Bulletin with Remote Desktop Flaws Microsoft has released 6 updates in this month's patch Tuesday, including a patch for a critical hole which the software maker warns could be hit within the next 30 days. Microsoft is warning that there's a remote, pre-authentication, network-accessible code execution vulnerability in its implementation of the RDP protocol. A remote code execution vulnerability exists in the way that the Remote Desktop Protocol accesses an object in memory that has been improperly initialized or has been deleted. An attacker who successfully exploited this vulnerability could run abitrary code on the target system. An attacker could then install programs; view,change, or delete data; or create new accounts with full user rights, Read More . The vulnerability, which affects all versions of Windows, was privately reported to Microsoft's via the ZDI vulnerability broker service and the company said it was not yet aware of any attacks in the wild....
BBC Persian TV hacked by Iranian government

BBC Persian TV hacked by Iranian government

Mar 14, 2012
BBC Persian TV hacked by  Iranian government According to BBC News, today Iran hacked BBC Persian TV ( https://www.bbc.co.uk/persian/ ) . This is not the first time the Iranian government has tampered with the BBC's Persian service, Zdnet Report. The Reason behind this attack is part of a broader attempt by the government to disrupt the BBC's Persian service. This  attack follows various tactics by the Iranian government, such as harassment, arrests, and threats against the relatives of BBC Persia correspondents who still live in Iran, in an effort to force the journalists to quit the Persian news service. In Addition to this, The BBC's London office was inundated with automatic phone calls and the company's satellite feeds into Iran were also jammed, while this only affected owners of illegal satellite dishes, these are of course the only ones that can receive the BBC signal in Iran. The BBC has previously accused Iran of attempting to j...
cyber security

SaaS Security Made Simple

websiteAppomniSaaS Security / SSPM
Simplify SaaS security with a vendor checklist, RFP, and expert guidance.
Beware the Hidden Risk in Your Entra Environment

Beware the Hidden Risk in Your Entra Environment

Jun 25, 2025Identity Management / Enterprise Security
If you invite guest users into your Entra ID tenant, you may be opening yourself up to a surprising risk.  A gap in access control in Microsoft Entra's subscription handling is allowing guest users to create and transfer subscriptions into the tenant they are invited into, while maintaining full ownership of them.  All the guest user needs are the permissions to create subscriptions in their home tenant, and an invitation as a guest user into an external tenant. Once inside, the guest user can create subscriptions in their home tenant, transfer them into the external tenant, and retain full ownership rights. This stealthy privilege escalation tactic allows a guest user to gain a privileged foothold in an environment where they should only have limited access. Many organizations treat guest accounts as low-risk based on their temporary, limited access, but this behavior, which works as designed, opens the door to known attack paths and lateral movement within the resource t...
Tunisian Islamist Website Hacked by Anonymous

Tunisian Islamist Website Hacked by Anonymous

Mar 13, 2012
Tunisian Islamist Website Hacked by Anonymous The Facebook page of Hizb Ettahrir, an Islamist political party that is legally unrecognized in Tunisia, was hacked last night by a Tunisian group claiming affiliation with the international cyber activist collective Anonymous. " We are fighting you... your emails, your bank accounts and transactions will be probed, your hard discs will be copied ," said a man wearing the Guy Fawkes mask that has become a trade mark of Anonymous members. The YouTube video embedded above, in French, was posted a few days ago warning of the attack. The video warned their e-mails, bank accounts, and hard drives will be probed. Furthermore, it said if the Tunisian government won't stop them, Anonymous will. The video warned, " We are fighting you… your emails, your bank accounts and transactions will be probed, your hard discs will be copied. If the Tunisian government won't stop your activities in the weeks to come, Anonymous will . "   The a...
10 Lessons learnt from Kim Dotcom

10 Lessons learnt from Kim Dotcom

Mar 13, 2012
10 Lessons learnt from Kim Dotcom Article Cross Post from InternetServices. Kim Dotcom, a hacker that was able to take his knowledge and create a site called Megaupload, was recently arrested due to alleged copyright infringement allegations. Even though he was the top dog in the company, he did not commit these crimes alone, and many other key players were also arrested in the wake of these crimes. Unfortunately, while this guy is obviously intelligent, he should have been using those brains for good instead of evil. However it wasn't all bad, and some good did come from it. Check out 10 things the Internet learned from Kim Dotcom. Cyberlocker technology: This has also been referred to as a 'cloud storage infrastructure'. Basically this technology allowed you to store files that were too large to e-mail for free on the Internet. For instance, you could upload a big long wedding video and your family could go there to download it at no charge. If they wanted to watch it or downlo...
ServerPro Web Hosting Defaced by Team L0g!cs

ServerPro Web Hosting Defaced by Team L0g!cs

Mar 13, 2012
ServerPro Web Hosting Defaced by Team L0g!cs Web hosting provider ServerPro has been compromised and completely defaced by hacking group named " Team L0g!cs ". ServerPro boasts to have over 200,000 clients over a 10 year stand. Shown Defacement page that showcases information about the hack and the group behind the attack, along with some nice ambient music. The attackers were even nice enough to leave behind a contact email in case you have any questions. While writing this Post , Google showing " Warning,  found malware on the site " on the homepage, as shown below: If we Proceed by ignoring the warning, Visitors can see Deface Page still on the page.
FBI charge Anonymous for stealing CC worth $700000 in Stratfor attack

FBI charge Anonymous for stealing CC worth $700000 in Stratfor attack

Mar 13, 2012
FBI charge Anonymous for stealing CC worth $700000 in  Stratfor attack The FBI has revealed that there were $700,000 worth of fraudulent credit card charges after hacktivist group Anonymous stole nearly 200 gigabytes of data, including credit card numbers, from security firm Stratfor. Anonymous hacked Stratfor back in December and fed the resulting emails to Wikileaks for publication. Anonymous stole a large amount of user names and passwords, in addition to some 60,000 credit card records, after exploiting vulnerabilities to reach Stratfor's servers. At the time, Anonymous said it would use the credit cards to make charitable donations money that would obviously never see the hands of the needy. FBI's Milan Patel said that the $700,000 figure " does not reflect any of the charges that may have been incurred on cards associated with the Stratfor Hack for which records have not yet been reviewed ." In addition to the credit card numbers and other personally identifiab...
Vatican Radio hacked by Anonymous Hackers

Vatican Radio hacked by Anonymous Hackers

Mar 13, 2012
Vatican Radio hacked by Anonymous Hackers The hacktivist group Anonymous has taken down the Vatican's website for a second time. The attack is part of the organization's recent declaration of war against religion. The personal data of journalists at Vatican radio was leaked online and the Vatican's website hacked for the second time in several days both attacks believed to be the work of the amorphous Internet activist group Anonymous. Unlike the first hack , which appeared to be a typical Distributed Denial of Service (DDoS) attack, this one is more than just taking down the website. Vatican officials declined to discuss the breach while the attack was still under way. " We regret having to announce that your systems are less secure than what you would like to believe, because, while the hype was directed toward the darkening of vatican.va, we took the liberty to implement a small incursion into your systems, " the statement reads. Anonymous justified its attack by...
Another DDOS tool from Anonymous - HOIC

Another DDOS tool from Anonymous - HOIC

Mar 13, 2012
Another  DDOS tool  from Anonymous  -  HOIC A new DDoS tool from Anonymous called high-orbit ion canon or HOIC come into light. Attackers are constantly changing their tactics and tools in response to defender's actions. HOIC is an Windows executable file. Once started, you will be presented with the following GUI screen. If the attacker clicks on the + sign under TARGETS they get another pop-up box where you can specify target data. The attacker can then specify the following Target data. After the attacker clicks on the Add button, they are taken back to the main screen. The attacker can then adjust the THREADS number if desired to further increase the strength of the attack. When they are ready to lauch the attack, they click on the "FIRE TEH LAZER!" button. LOIC had both TCP and UDP DDoS attacks in addition to HTTP attacks were as HOIC is strictly an HTTP DoS tool. The real difference, or enhancement, that HOIC has over LOIC is its us...
Hacker exposes 40,000 Credit Cards from Digital Playground
Pop star KE$HA twitter Hacked

Pop star KE$HA twitter Hacked

Mar 12, 2012
Pop star KE$HA twitter Hacked Pop star KE$HA has fallen victim to internet pranksters after her Twitter.com blog was hacked on Sunday. Tweet by her account : Single out in a couple hours. Ugh so f**kin stressful… wish I could stay on da (the) beach forever. " It was potentially seen by Kesha's 3.1 million followers, or even more, given that Twitter is a mainly public social network. The singer later spotted the fake message and quickly deleted it after realising her account had been compromised.She tweeted, " Animals!! I love u (sic)! I got hacked. Single is not out yet. Promissse (sic) you'll be the first to know! " According to Zdnet, Kesha's account may be verified, but if someone gains access to a verified Twitter account, it doesn't become unverified. It's currently unclear if someone outside of Kesha's inner circle actually managed to gain access to her account. It's certainly possible that someone she knows and has entrusted her Twitter account password with ...
Finally Google Chrome gets hacked at Pwn2Own

Finally Google Chrome gets hacked at Pwn2Own

Mar 12, 2012
Finally Google Chrome gets hacked at Pwn2Own Vupen Security and Sergey Glazunov independently managed to penetrate Google Chrome's security defenses at the Pwn2Own and 'Pwnium' contests respectively. The annual competition, which invites ethical hackers from around the world to attempt hacking into the most popular web browsers and in the process expose vulnerabilities and loopholes in the browser's security, while grabbing a handsome reward. At this year's competition, the co-founder and head of research of Vupen, Chaouki Bekrar and his team managed to break into Google Chrome in less than 5 minutes, in the process quashing talks about the browser's unquestionable security. They used "a pair of zero-day vulnerabilities to take complete control of a fully patched 64-bit Windows 7 (SP1) machine." For the successful break-in, Vupen has won itself 32 points. Google Chrome security knew that the Flash Player plugin sandbox is significantly weaker and that...
Expert Insights Articles Videos
Cybersecurity Resources