#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Adobe Reader zero-day vulnerability with modified Blackhole Exploit-Kit

Adobe Reader zero-day vulnerability with modified Blackhole Exploit-Kit

Nov 08, 2012
Group-IB , a Russian cybercrime investigation company has discovered a zero-day vulnerability, affects Adobe Reader X and Adobe Reader XI. The vulnerability is also included in new modified version of Blackhole Exploit-Kit , which is used for the distributing the banking Trojans (Zeus, Spyeye, Carberp, Citadel) with the help of exploitation different vulnerabilities in client-side software. The particular exploit is available in underground forums for as much as $50,000 and bug is dangerous because it permits cybercriminals to run arbitrary shellcode by bypassing the sandbox feature integrated into the more recent versions of Adobe Reader. For now this flaw is distributed only in only small circles of the underground but it has the potential for much larger post-exploitation methods. The exploit is limited to  Microsoft Windows installations of Adobe Reader and it can't be fully executed until the user closes his Web browser (...
Kim Dotcom's New Domain Me.ga Seized before its launch

Kim Dotcom's New Domain Me.ga Seized before its launch

Nov 07, 2012
Kim Dotcom is still fighting a legal battle in New Zealand against the United States over alleged copyright infringement and piracy. Kim Dotcom's upcoming Mega website Me.ga has had its domain name seized by the African nation of Gabon, with a government minister saying his country will not be used as a base for copyright infringement. Last week, Dotcom unveiled plans to relaunch his file-sharing site in January 2013, using the Gabonese domain me.ga, with the message " this button will change the world ." "Gabon cannot serve as a platform or screen for committing acts aimed at violating copyrights, nor be used by unscrupulous people," says the country's Communication Minister Blaise Louembe. Dotcom reassured his followers, by tweeting , " Don't worry. We have an alternative domain. This just demonstrates the bad faith witch hunt the US government is on...Gabon Minister used time machine to analyze legality of the future Mega. Verdict: Cyber cri...
Anonymous hacker arrested for attacking Home Secretary website

Anonymous hacker arrested for attacking Home Secretary website

Nov 07, 2012
In the UK a 41-year-old man has been arrested over a cyber attack on the website of the British Home Secretary Theresa May. He was arrested in a joint operation by Scotland Yard and local officers on Tuesday morning in Wedgewood Road. The man, who has not been named, was arrested on suspicion of assisting or encouraging crime contrary to the Serious Crime Act 2007. He was taken to a local police station and bailed to return in mid-December, pending further inquiries. Computers, telephones and media storage devices were seized from his home, according to police. Detective Inspector Jason Tunn, from the Metropolitan Police's eCrime Unit (PCeU), said, " The activity this morning demonstrates the commitment of the PCeU and our colleagues to combat cyber criminality anywhere within the UK and take action against those responsible. Assisting and encouraging cyber crime is a serious matter and I would advise all persons to consider their actions and any possible future ...
cyber security

Secure your LLMs Against Real-World Threats

websiteWizLLM Security / Artificial Intelligence
LLMs move fast. So do the risks. Get practical, real-world steps to defend against prompt injection, model poisoning, and more.
cyber security

2025 Gartner® MQ Report for Endpoint Protection Platforms (July 2025 Edition)

websiteSentinelOneEndpoint Protection / Unified Security
Compare leading Endpoint Protection vendors and see why SentinelOne is named a 5x Leader
Pizza Hut defaced, Authorities denies theft of 240000 Credit Cards

Pizza Hut defaced, Authorities denies theft of 240000 Credit Cards

Nov 07, 2012
Yesterday Australian Pizza Hut website was compromised by a hacking group going by the name of 0-Day and Pyknic . Hackers defaced the website and claim that they made off with 260,000 Australian credit card numbers. Hack was 1st noticed by  Whirlpool Forum users. But a Pizza Hut spokeswoman said the company did not store such information on its website. " Pizza Hut can confirm that a layer of its website, pizzahut.com.au , was breached with access gained to names and contact information, including email addresses ". " We are working with our website providers to conduct a thorough investigation of the matter and have also reported the incident to the Office of the Australian Information Commissioner. We would like to reassure all of our customers that absolutely no credit card information was stolen and there is no need for concern regarding credit cards." "The security of our online ordering system has not been compromised in any way and our customers ca...
Skype Illegally handed over data of alleged Anonymous Paypal Hacker

Skype Illegally handed over data of alleged Anonymous Paypal Hacker

Nov 06, 2012
Dutch media report   Skype has Illegally (without court order) distributed a 16 years old user's personal information including user name, real name, email addresses and the home address used for payment to a private company consistently a police investigation into Anonymous-sanctioned cyber attacks on PayPal.  In 2011 most of the online payment solution companies blocked donations to WikiLeaks, in relation to this Anonymous Hacker DDOS paypal and Mastercard. During investigation of attack an IT firm reach skype for the information of their use and Skype  handed over the personal information of a 16-year-old  Illegally to them. Dutch media report that Police operating the case as 'Operation Talang' which is actually focussed on two persons. Joep Gommers, senior director of global research at the Dutch IT security firm iSIGHT Partners, was hired by PayPal to investigate the attacks. They are Alleged to...
UNESCO Etxea website hacked by #NullCrew

UNESCO Etxea website hacked by #NullCrew

Nov 06, 2012
Hacking group #NullCrew deface UNESCO Etxea website (unescoetxea.org), which is an internationally oriented NGOs working for the culture of peace, sustainable human development and human rights, at local and global levels. Deface page reads, " Welcome to the new front page of unesco etxea You have been targeted by NullCrew, as part of the FuckTheSystem movement. We have began the war, once again; but this time, good-luck even coming close to winning. " " The united nations, just a bunch of corrupt nations; united by one source of power.. And for that reason, we have came back; to repeat the process. Enjoy the candy. " After watching the data dumped on deface page including the kernel version of server and wordpress database configuration file we can judge that, hacker is able to upload the php shell on website of UNESCO Etxea and he deface the web page. #NullCrew today also hack  UK Ministry of Defence and dump database...
Chrome 23 Released, 14 vulnerabilities patched

Chrome 23 Released, 14 vulnerabilities patched

Nov 06, 2012
Google today released Chrome version 23 to the Stable Channel. 23.0.1271.64 for Windows, Mac, Linux, and Chrome Frame. Update includes patch for 12 vulnerabilities in the Windows version and two vulnerabilities in Mac OS X version. Chrome 23 is the support of the Do Not Track (DNT) protocol, number of new features including GPU accelerated video decoding on Windows and easier website permissions. " We recently enabled GPU-accelerated video decoding for Chrome on Windows. Dedicated graphics chips draw far less power than a computer's CPU, so using GPU-accelerated video decoding while watching videos can increase battery life significantly ." Out of  14 vulnerabilities , 6 vulnerabilities rated as high and rest are of either medium or low severity. CVE number of all bugs are - CVE-2012-5128, CVE-2012-5126, CVE-2012-5125, CVE-2012-5124, CVE-2012-5123, CVE-2012-5115, CVE-2012-5127, CVE-2012-5120, CVE-2012-5116, CVE-2012-5118, CVE-2012-5121, CVE-2012-5117,CVE-2012-5119, ...
UK Ministry of Defence hacked by NullCrew

UK Ministry of Defence hacked by NullCrew

Nov 06, 2012
The United Kingdom Ministry of Defence website (www.qhm.mod.uk) hacked by two Null Hacking Crew members  @OfficialNull  and @Timoxeline  and They extracted data published online . The data dump include 3400 email addresses and passwords from Ministry of Defence portal. Hackers trying to trend  #FuckTheSystem hashtag on twitter and related it to all their hacks against UK government. Hacker wrote on note : " Your webmaster made a terrible mistake... You may criticize us on the simplicity of the vulnerability. But if you can get so much useful data so easily, why wouldn't you? " "We hope that all governments and organizations realize that #FuckTheSystem is definitely not a joke. We hope that you have the decency to grasp the concept of it. But hey... You're the government right... Just some butthurt little fags. This security just proves how much of a joke our governments are. " note continue. Hackers mention that, they hack the website ...
Patch released for 7 critical Adobe Flash Player Vulnerabilities

Patch released for 7 critical Adobe Flash Player Vulnerabilities

Nov 06, 2012
Adobe release updates for Flash Player on Windows, Mac, and Linux to address 7 recently identified critical security vulnerabilities. Updated version is now 11.5.502.110 for Windows or Mac OS X users or to 11.2.202.251 for Linux. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system. A recent Q3 2012 Threat repor t from Kaspersky Lab showed that nearly 30% of the exploits circulating online are targeting Adobe products. Java vulnerabilities were exploited in more than 50% of all attacks. According to Oracle, different versions of this virtual machine are installed on more than 1.1 billion computers. CVE number of 7 critical Adobe Flash Player Vulnerabilities are CVE-2012-5274, CVE-2012-5275, CVE-2012-5276, CVE-2012-5277, CVE-2012-5278, CVE-2012-5279, CVE-2012-5280. Adobe's advisory about this update is available here .
Russian Underground Cybercrime market offering sophisticated services

Russian Underground Cybercrime market offering sophisticated services

Nov 05, 2012
Security firm Trend Micro recent analyses the Russian crimeware markets and has found that malware tools and services range from one-time packages which cost just pennies to sophisticated packages and services which cost purchasers thousands of dollars per month. If you want to buy a botnet it will cost you somewhere in the region of $700. If you just want to hire someone else's botnet for an hour, though, it can cost as little as $2. There are at least 20 different types of services offered in Russian-speaking forums for just about anyone who wants to make a buck off of cybercrime, everything from crime-friendly VPN and security software-checking services to plain old off-the-shelf exploits. " As the Russian underground community continuously modifies targets and improves technologies, security companies and users must constantly face the challenge of effectively protecting their money and the information they store in their computers and other devices ," the ...
Illiterate Ethiopian kids hack Motorola Xoom

Illiterate Ethiopian kids hack Motorola Xoom

Nov 05, 2012
About five months ago, OLPC Project started a little experiment . They chose a village in Ethiopia where the literacy rate was nearly 0% and decided to drop off a bunch of Motorola Xooms there. The One Laptop Per Child project started as a way of delivering technology and resources to schools in countries with little or no education infrastructure, using inexpensive computers to improve traditional curricula. On the tablets, there was custom software that was meant to teach kids how to read. This experiment began earlier this year. Timeline of Experiment: 1st Four Minutes - One kid had opened the box and had figured out how to turn on the Xoom. In 1st Five Days -  The kids were using nearly 50 applications each every day. In Two Weeks - The kids were singing their ABC's in English. Now its 5th Month - They hacked the Motorola Xooms so they could enable the camera, which had been disabled by OLPC. OLPC founder Nicholas Negroponte at MIT Technology Review's EmTech confer...
Cross-VM Side-channel attacks against cryptography keys

Cross-VM Side-channel attacks against cryptography keys

Nov 05, 2012
A group of researchers has developed a side-channel attack targeting virtual machines that could pose a threat to cloud computing environments. Side-channel attacks against cryptography keys have, until now, been limited to physical machines, this attack is the first such attack demonstrated on a symmetric multiprocessing system virtualized using a modern VMM (Xen). A side channel is a form of information leakage that arises as a byproduct of resource exposure, such as the sharing of memory caches. A side-channel attack exploits such leakage to steal secrets, such as cryptographic keys. " In this attack, the researchers were able to extract a private ElGamal decryption key from the target VM's libgcrypt library; the target was running Gnu Privacy Guard. Over the course of a few hours of observations, they were able to reconstruct a 457-bit exponent accompanying a 4096-bit modulus with high accuracy. So high that the attacker was then left to search fewer than 10,000 possible...
Expert Insights Articles Videos
Cybersecurity Resources