#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Salesforce Security Handbook

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Main Advertising vulnerable to SQLI by lionaneesh !

Main Advertising vulnerable to SQLI by lionaneesh !

Apr 13, 2011
Main Advertising vulnerable to SQLI by lionaneesh ! One of the best advertising companies in the world which is even used by megaupload is vulnerable to SQLi.   What I can do [Power]:- Loinaneesh found a database in which the hits to a particular link was entered (this is most probably used for counting the revenue). I can change and increase or decrease the ad revenue of a particular site. Target: https://click1.mainadv.com/ad.asp?id=%Inject_Here%609 DATABASE :  MSSQL 2005 Method: GET DATABASE : portals DATABASE : PDATAortals Table Name Columns Formats domain_new Categories domains bannersImp1 sampleAPP bannersImp change articleGroups t_jiaozhu specialTables TablesLinks tabella1 Gestionale contents Luckypot ...
ESET NOD32 releases Antivirus for Linux 4 !

ESET NOD32 releases Antivirus for Linux 4 !

Apr 13, 2011
ESET NOD32 releases Antivirus for Linux 4 ! ESET announced the availability of ESET NOD32 Antivirus 4 Business Edition for Linux Desktop and ESET NOD32 Antivirus 4 for Linux. ESET NOD32 Antivirus 4 for Linux offers protection against cross-platform and emerging threats, enhancing the security of Linux platforms. The scanning engine automatically detects and cleans malicious code, including threats designed for Windows and Mac based systems. ESET NOD32 Antivirus 4 Business Edition for Linux Desktop includes ESET Remote Administrator, which provides IT administrators with a management console to control an entire network from a single screen — supporting tens or thousands of heterogeneous computers. Key benefits and features: Detection and proactive cross-platform protection  – Advanced heuristics technology delivers real-time, proactive protection from malware, hacker attacks and exploits. Product protects against Linux, Windows and Mac malware Small system footprint ...
Malaysiakini - Malaysia's Most Popular News Website Shutdown's after cyber attack !

Malaysiakini - Malaysia's Most Popular News Website Shutdown's after cyber attack !

Apr 13, 2011
Malaysiakini - Malaysia's Most Popular News Website Shutdown's after cyber attack ! It has been reported that Malaysia's most popular news website Malaysiakini ( https://www.malaysiakini.com ) has been hit by cyber attack from 11 AM afternoon shutting the website down. The attack created a stir when the website stopped working just before the Sarawak election, making the website inaccessible to the readers. The attack has been diagnosed as Denial-of-service attack which is considered to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Denial-of-service attacks are considered violations of the IAB's Internet proper use policy, and also violate the acceptable use policies of virtually all Internet service providers. They also commonly constitute violations of the laws of individual nations. According to the technical team, the cyber attack has resulted in  swarming the Malaysiakini servers...
cyber security

2025 Cloud Security Risk Report

websiteSentinelOneEnterprise Security / Cloud Security
Learn 5 key risks to cloud security such as cloud credential theft, lateral movements, AI services, and more.
cyber security

Traditional Firewalls Are Obsolete in the AI Era

websiteZscalerZero Trust / Cloud Security
It's time for a new security approach that removes your attack surface so you can innovate with AI.
French Hacker Arrested After Bragging on TV !

French Hacker Arrested After Bragging on TV !

Apr 13, 2011
A French hacker who boasted on TV about hacking into the network of an important defense contractor was arrested and charged with unauthorized access to a computer system, data theft and organized fraud. The hacker appeared on the France 2 television programme "Complément d'enquête" (Further investigation) where he claimed to have hacked into computers belonging to the French Army and Thales Group, an IT contractor for the aerospace, defense and security industries. After the programme aired, the company filed a complaint, claiming the hacker stole confidential information from its internal network. The man, identified in only as Carl, was arrested on April 7 in Paris. When inspecting his computer, police found the details of hundreds of credit cards and bank accounts. The hacker admitted selling the information on underground websites, as well as using them to make fraudulent purchases for himself and others. This led to additional charges of organized fraud bei...
BackTrack 5 will also be for Motorola Xoom !

BackTrack 5 will also be for Motorola Xoom !

Apr 13, 2011
In the past few days offensive-security have been toying with some Motorola hardware, and have managed to get a basic build of BackTrack 5 (+ toolchain) on a Motorola Xoom. The possibilities look exciting as offensive-security are slowly building several experimental arm packages. offensive-security team does not have much experience with the Android OS nor ARM hardware, but so far – so good. offensive-security will not promise an ARM release on May 10th, as this new "experiment" was not planned in any way – but we'll do our best. As of now, offensive-security have got a modified version of an Ubuntu 10.04 ARM image, chrooted on a Motorola Xoom. The tablet is running a modified, overclockable kernel (from 1.0 to 1.5 GHz). The chrooted BackTrack environment is running a VNC server, from which you can connect from the tablet itself. When run locally from the Xoom tablet, the VNC session does not lag, and the touch keyboard and touchscreen are very workable. As expected from a chr...
DUCAT Punjab Best Ethical Hacker Competition Website hacked by lionaneesh !

DUCAT Punjab Best Ethical Hacker Competition Website hacked by lionaneesh !

Apr 12, 2011
DUCAT Punjab Best Ethical Hacker  Competition Website hacked by  lionaneesh   ! DUCAT have announce Hacking Competition, Read Here  , But today " lionaneesh " an Indian Hacker hack into there site and show all security Holes. With the help of "lionaneesh" & THN , The site is now fixed :) Hack Proof :
Tell us how you did it, Pakistan court to hackers !

Tell us how you did it, Pakistan court to hackers !

Apr 12, 2011
Tell us how you did it, Pakistan court to hackers ! Hackers would be granted bail if they taught judges how to do the job, Pakistan's Supreme Court said in a lighter vein as it heard the bail plea of two teenagers who had broken into the Supreme Court website last year. The Supreme Court then granted bail to the two teenagers who are accused of hacking its official website and placing derogatory material about judiciary and the chief justice on it, Dawn reported Tuesday. The bench, comprising Justices Asif Saeed Khan Khosa and Amir Hani Muslim, was headed by Justice Javed Iqbal. The judges said the hackers had done a " brilliant job ". Their counsel Iftikhar Hussain Gilani promptly said they had not hacked the site. To which, the judges asked Gilani why he was not ready to accept praise for the hackers. They then said in a lighter vein they would grant bail on the condition that the accused taught them how to do such a job. The judges, however, observed that i...
Wireshark 1.5.1 Development Release !

Wireshark 1.5.1 Development Release !

Apr 12, 2011
Wireshark 1.5.1 Development Release ! Wireshark 1.5.1 has been released. Installers for Windows, OS X, and source code are now available. New and Updated Features The following features are new (or have been significantly updated) since version 1.4: Wireshark can import text dumps, similar to text2pcap. You can now view Wireshark's dissector tables (for example the TCP port to dissector mappings) from the main window. TShark can show a specific occurrence of a field when using '-T fields'. Custom columns can show a specific occurrence of a field. You can hide columns in the packet list. Wireshark can now export SMB objects. dftest and randpkt now have manual pages. TShark can now display iSCSI service response times. Dumpcap can now save files with a user-specified group id. Syntax checking is done for capture filters. You can display the compiled BPF code for capture filters in the Capture Options dialog. You can now navigate backwards and forwards through T...
Expert Insights Articles Videos
Cybersecurity Resources