#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Exclusive Report : Is Department of Defense (DoD), Pentagon, NASA, NSA is Secure ?

Exclusive Report : Is Department of Defense (DoD), Pentagon, NASA, NSA is Secure ?

May 15, 2011
Exclusive Report : Is Department of Defense (DoD), Pentagon, NASA, NSA is Secure ? Over the past couple of weeks there has been a series of discussions around why the U.S defense and Intelligence agencies are moving so quickly to adopt cloud computing. Are there any Security Holes in their Security ? Or has someone already hacked them and their documents ?. In the last week we have noticed lots of hackers activity. If you have missed something then have a look to  Super Saturday : The Hacker News Featured Articles  ! Below you are going to read about Security Holes in the U.S defense and Intelligence agencies! A Hacker named " sl1nk " claims that he has: SSH access to a Network of 140 machine's layer 1 to 3 in the Pentagon Access to  APACS (automated personel air clearance system)  Thousand's of documents ranging from seizure of a vehicle up to private encryption key request forms. Database of all usernames/passwords of Webmail of Nasa. Access to A...
Wi-Fi Challenge by Security Tube !

Wi-Fi Challenge by Security Tube !

May 15, 2011
Wi-Fi Challenge by Security Tube ! 1. Objective: This series of challenges is aimed at testing your skills as a Wireless Hacker! We will posting challenges ranging from - Basic, Intermediate, Advanced, Expert and Insane levels! Our first challenge remain uncracked which we categorized as "Basic" :) Challenge 1: https://www.securitytube.net/video/1856 Challenge 1 Solution: https://www.securitytube.net/video/1859 Just posted Challenge 2 : https://www.securitytube.net/video/1862 Which still remains uncracked! 2. Prizes: All Expert and above challenges will have prizes which will be announced in the challenge video. Any level below that qualifies for a prize automatically if unsolved for 24 hours. Challenge 2 is currently unsolved for 21 hours! :) Prize will be an Alfa Networks Wireless card if this remains unsolved for 3 more! So hurry up and participate to win! 3. Joining the Competition: Just go to the Challenge 2 URL above, download the trace file on the p...
PlayStation 3 update 3.61 available Now, PSN begins today !

PlayStation 3 update 3.61 available Now, PSN begins today !

May 15, 2011
PlayStation 3 update 3.61 available Now, PSN begins today ! Today good news for all the PS3 lovers, your PS3 Now will be able to connect to PlayStation Network, today Sony has solved its PSN outage and updated its System to (v3.61) but notes that the update will prompt you to change your PlayStation Network password. This is what the PlayStation blog has updated and you need to read about the new update: We have been working on a new PS3 system software update that requires all PSN users to change their password once PlayStation Network is restored. The update (v3.61) is mandatory and is available now. If using a PS3, your password can only be changed on your own PS3 (or a PS3 on which your PSN account was activated), as an added layer of security. If you have never downloaded any content using your account on the system, an email will be sent to the registered sign-in ID (email address) associated with your account when you first attempt to sign-in to PSN. This e-mail will cont...
cyber security

SaaS Security Made Simple

websiteAppomniSaaS Security / SSPM
Simplify SaaS security with a vendor checklist, RFP, and expert guidance.
Beware the Hidden Risk in Your Entra Environment

Beware the Hidden Risk in Your Entra Environment

Jun 25, 2025Identity Management / Enterprise Security
If you invite guest users into your Entra ID tenant, you may be opening yourself up to a surprising risk.  A gap in access control in Microsoft Entra's subscription handling is allowing guest users to create and transfer subscriptions into the tenant they are invited into, while maintaining full ownership of them.  All the guest user needs are the permissions to create subscriptions in their home tenant, and an invitation as a guest user into an external tenant. Once inside, the guest user can create subscriptions in their home tenant, transfer them into the external tenant, and retain full ownership rights. This stealthy privilege escalation tactic allows a guest user to gain a privileged foothold in an environment where they should only have limited access. Many organizations treat guest accounts as low-risk based on their temporary, limited access, but this behavior, which works as designed, opens the door to known attack paths and lateral movement within the resource t...
Hackers Got Hacked, HackingTips.in Hacked By Shadow008 !

Hackers Got Hacked, HackingTips.in Hacked By Shadow008 !

May 15, 2011
Hackers Got Hacked, HackingTips.in Hacked By Shadow008 ! Sites Hacked : https://www.hackingtips.in/ Mirror : https://www.zone-h.com/mirror/id/13877058
417 U.K websites Got hacked , Server compromised !

417 U.K websites Got hacked , Server compromised !

May 15, 2011
417 U.K websites Got hacked by SeeKeR , Server compromised ! Hacked sites List :  https://pastebin.com/J45HhJfs
Crimepack 3.1.3 Exploit kit Leaked, available for Download !

Crimepack 3.1.3 Exploit kit Leaked, available for Download !

May 15, 2011
Crimepack 3.1.3 Exploit kit Leaked, available for Download ! Part 1 : Java Exploit As stated above, I focus on a malware that exploits a recent JRE vulnerability: CVE-2010-0840 to execute malicious files on a victim system. This malware comes inside a jar file, which contains the following two classes: Crimepack.class and KAVS.class. Part 1.1 : Crimepack.class This class is the engine of the malware, it is obfuscated, but you can quickly strip off the obfuscation (my python beta tool is great…), once you get rid of the obfuscation you can see the following code: As always, we have an Applet that access to the data parameter, generates a random name for the exe payload that will be dropped in the system temp directory and then executed. So at this point as you can see we have nothing new, the above is a common Java downloader… but let's scroll down: Above, we can see that the malware is creating a new instance of the KAVS class (description follows), in order to trigge...
Qualys and Malware Analyser - Online malware scanning engine !

Qualys and Malware Analyser - Online malware scanning engine !

May 14, 2011
Qualys and Malware Analyser - Online malware scanning engine ! Qualys and Malware Analyser ( Author : Beenu Arora ), recently came into an agreement which will allow Qualys to use Malware Analyser tool on its online malware scanning engine. This would enable the users to perform more comprehensive scans on malicious executables. According to sources, the author shared the tool's source code only after signing NDA with the firm. Qualys® ( www.qualys.com ) headquartered in Redwood Shores is the leading provider of on demand IT security risk and compliance management solutions — delivered as a service. Malware analyser is a freeware tool for analysing malwares written in Python. The tool was initially open-source tool way back in 2009 but recently in 2010-11 the author has made some significant improvement in its core engine which has made it one of best static analysis tool. The tool can perform static and dynamic analysis and author has intentions to include the process a...
Anonymous announce #OpIran on 15th May 2011

Anonymous announce #OpIran on 15th May 2011

May 14, 2011
Anonymous announce #OpIran on 15th May 2011  Anonymous will strike back again on Iran Govt. on 15th may-2011.University students from 19 universities throughout Iran join students from Tehran University and Medical Sciences in their call for holding a protest and strike on May 15. A statement issued by students from 19 national universities says: " At a time when the wind of Spring is blowing throughout the Middle East, Iran has not been exempted from the fragrance of this wind and once again, the universities, the bastion of steadfastness and resistance, stood up from under attack of the anti-freedom despots and gave new hopes to those eager for freedom that: yes, universities are alive… " " For this reason, and following the call by students from Tehran University and Medical Sciences for holding a strike and general protests on May 15, we invite all students to actively and widely participate in holding the gatherings in all universities. Because when despotism is on the...
Super Saturday : The Hacker News Featured Articles, If you miss Something !

Super Saturday : The Hacker News Featured Articles, If you miss Something !

May 14, 2011
Super Saturday :  The Hacker News Featured Articles, If you miss Something ! Let's Re-collect all the Featured Recent Interesting Articles of THN, in this post. Hope you Guys will like every news By us. Please share the Links on your Facebook/ Re-tweet on Twitter and everywhere to spread the Cyber Awareness :) The Anonymous : Need of  21st century ! 26 Underground Hacking Exploit Kits available for Download ! [THN] The Hacker News Exclusive Report on Sony 3rd Attack Issue ! Finally Source code of ZeuS Botnet Version: 2.0.8.9 available for Download ! Crimepack 3.1.3 Exploit kit Leaked, available for Download ! You got owned, Exposure about privacy on facebook ! Script that gives hackers access to user accounts floods Facebook Hacker getting WordPress Database Dump with Google Query ! Pakistan Cyber Army got hacked by Indian Cyber Army (Indishell) Facebook Security Update, Protection from Untrustworthy Websites With Web Of Trust (WOT) New Facebook worm propagat...
26 Underground Hacking Exploit Kits available for Download !

26 Underground Hacking Exploit Kits available for Download !

May 14, 2011
List of Hacking Exploit Kits : Unknow Tor Target-Exploit Smart pack RDS My poly sploit multisploit mypack-009 mypack-091 mypack-086 mypack-081 Mpack Infector Ice-pack-1 Ice-pack-2 Ice-pack-3 G-pack Fire pack -1 Fire Pack -2 Fiesta -1 Fiesta -2 Cry 217 Armitage Adpack -1 Adpack -2 0x88 Download : [Link expired]
CHMag Issue 16th, May 2011 Download !

CHMag Issue 16th, May 2011 Download !

May 14, 2011
CHMag Issue 16th, May 2011 Download ! Here we are again with the latest issue of ClubHack Magazine. This time also the issue is dedicated to Browser security. Contents of this Issue:- Tech Gyan - First ever public disclosure of Password secrets of "Apple Safari". Tool Gyan - BeEF (Browser Exploitation Framework) Mom's Guide - User Agent on my Header. Legal Gyan - New Rules under Information Technology Act. Matriux Vibhag - Forensics with Matriux Part - 1 Poster of the month - How safe you are while surfing? Direct Download: https://chmag.in/issue/may2011.pdf Hope you'll enjoy the magazine. Keep sending the bouquets and brickbats!
Understanding The Concept of Bypassing Antivirus,by Internet Security Team

Understanding The Concept of Bypassing Antivirus,by Internet Security Team

May 14, 2011
Understanding The Concept of Bypassing Antivirus ,by Internet Security Team Anti-Virus manufacturers nowadays implements more and more complex functions and algorithms in order to detect the latest and newest viruses along with their variants. There is however simple methods that can be used to by-pass most of these, especially those that doesn't use heuristics and similar techniques at all. Download guide :  https://www.multiupload.com/P8YWVINAIQ Rar file password : thn
Devil shell v1.2  - Php shell with DDoS feature !

Devil shell v1.2 - Php shell with DDoS feature !

May 14, 2011
Devil shell v1.2  - Php shell with DDoS feature !   Features : 1. Design 2. Permission Change of file / Folders 3. Improved DDoS 4. Create Folder 5. Multi uploading 6. Encrypted Title so hard to find by Google.  Download Link https://www.filefactory.com/file/cb4d35e/n/ugdevil.php Username : ugdevil Password : 1234567 For further Query mail me at : ugdevil@gmail.com
Expert Insights Articles Videos
Cybersecurity Resources