#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Lady Gaga website hacked and fans details stolen by Hackers

Lady Gaga website hacked and fans details stolen by Hackers

Jul 16, 2011
Lady Gaga website hacked and fans details stolen by Hackers Lady Gaga has called in police after thousands of her fans personal details were stolen from her website. Her record label Univeral acted after the site was hacked into by US cyber attackers SwagSec. A source said: " She's upset and hopes police get to the bottom of how this was allowed to happen. " The group struck on June 27 but did not make the information, which included names and email addresses, public until this week. The hackers, who also issued a death threat against the singer, bizarrely branded her homophobic. Their statement comes after Gaga recently described as " ridiculous " claims she uses the gay community to sell records. Universal said yesterday: " The hackers took a content database dump from www.ladygaga.co.uk and a section of email, first name and last name records were accessed. There were no passwords or financial information taken. " We take this very seriously and have put in place addit...
THE CRAZIES Hackers Leaks Server Certificates of Defense Information Systems Agency (DISA)

THE CRAZIES Hackers Leaks Server Certificates of Defense Information Systems Agency (DISA)

Jul 16, 2011
THE CRAZIES Hackers Leaks Server Certificates of Defense Information Systems Agency (DISA) THE CRAZIES Hackers steal the Several Certificate revocation lists (CRLs) from Server of Defense Information Systems Agency (DISA) -  https://disa.mil/  and leak the  Certificates at : https://www.mediafire.com/?dvli58a9logojld https://www.mediafire.com/?k8z168aazj6s1k8 Reason of Hacking is Freedom of Libyan nation, Hackers blaming U.S govt. for that they are killing  Libyan for OIL. Certificate revocation lists  are used to distribute information about revoked certificates to individuals, computers, and applications attempting to verify the validity of certificates.The Revocation List tab lists the serial numbers of certificates that have been revoked and the date they were revoked. The Revocation entry field may also provide information about the reason a certificate was revoked.The General tab provides additional information about the CR...
4000 Websites hacked by The 077 ( HamDi HaCker )

4000 Websites hacked by The 077 ( HamDi HaCker )

Jul 15, 2011
4000 Websites hacked by The 077 ( HamDi HaCker ) One of the youngest good hacker "HamDi HaCker" akka "The 077" Deface 4000 more sites in one hit again.  List of 4000 hacked websites and their mirror is here .
cyber security

10 Best Practices for Building a Resilient, Always-On Compliance Program

websiteXM CyberCyber Resilience / Compliance
Download XM Cyber's handbook to learn 10 essential best practices for creating a robust, always-on compliance program.
cyber security

Maximize the Security Tools You Already Have

websitePrelude SecuritySecurity Control Validation
Hone your EDR, identity, vuln, and email platforms against the threats that matter with a 14-day trial.
AntiSecShell v.0.5 Shell Released by underground hackers of Antisec

AntiSecShell v.0.5 Shell Released by underground hackers of Antisec

Jul 15, 2011
AntiSecShell v.0.5 Shell Released by underground hackers of Antisec AntiSecShell (ASS) was built by the underground hacking community and groups like h0no, ac1db1tch3z and others who wish to remainanonymous, have helped altogether to create this new shell. It hasmany functions but most important of all - it bypasses ALL securityof web servers. It is not only a php shell it is a symbol offreedom and the anti-sec movement which we, the hacking underground, approve and support. Note : Shell can be backdoored, Use at your own Risk. Download the shell :  .....Link Removed..... Username : antisec Password : forever Message By Hackers : "On 25.07.2011 at the IRC of notorious group Anonymous (we support them too), underground groups will reveal 0-day exploits exclusively only for selected members with verification code. The code is in the AntiSecShell we released earlier, it is displayed at the bottom of the page. What will 0-days cover you ask? - Apache 2.X branch R...
Parliament Of Botswana hacked by V0iD

Parliament Of Botswana hacked by V0iD

Jul 15, 2011
Parliament Of Botswana hacked by V0iD V0iD hacker again strike with Parliament Of Botswana  https://www.parliament.gov.bw/  . Hacker Releases the database table   information and Admin users login details at  https://pastebin.com/Ts21HhEz  .
Jawahar Knowledge Center website Hacked & Databse leaked by PCA

Jawahar Knowledge Center website Hacked & Databse leaked by PCA

Jul 15, 2011
Jawahar Knowledge Center website Hacked & Databse leaked by PCA Pakistan Cyber Army (PCA) admin Shak hack the website of Jawahar Knowledge Center ( https://www.ieg.gov.in/ ) . They Release the Database backup, which is available for Download at   https://www.multiupload.com/IFLRXDT53W  .  The database includes the password, surname, name, designation, address, phone, useremail, collegecode,dateofreg, gender, districtid, hallticketno, question, answer, alternate mail of Members.
EC-Council Academy Hacked by GaySec (Malaysian hackers)

EC-Council Academy Hacked by GaySec (Malaysian hackers)

Jul 15, 2011
EC-Council Academy Hacked by GaySec (Malaysian hackers) EC-Council Academy ( https://eccouncilacademy.org )   Hacked by GaySec (Malaysian hackers). EC-Council Academy is a separate distinct company with no corporate connection between itself and EC-Council or EC-Council University. Some months before same site was got hacked by some other hacker. Read here ... Some Hack Proofs : [-] Enter Target: -> www.eccouncilacademy.org [-] Enter Path: -> / [-] Port: -> 80 [+] Connecting to www.eccouncilacademy.org... [+] Connected to eccouncilacademy.org [+] Searching for token... [+] W000t!! got it! "AMXhybB3FSBDBYJZU" [+] Convert the token to the RCE Payload [+] Execute the shell... [+] Trying... [+] Got it!!! -> Reverse Shell Started $ id; uname -a; pwd uid=7647041(ecco1665) gid=100450(inetuser) groups=100450(inetuser) context=user_u:system_r:unconfined_t:s0 Linux sg2nlhg017.shr.prod.sin2.secureserver.net 2.6.18-194.32.1.el5PAE #1 SMP Wed Jan 5 1...
Songs.pk hacked by Indishell Against Mumbai blasts

Songs.pk hacked by Indishell Against Mumbai blasts

Jul 15, 2011
Songs.pk hacked by Indishell Against Mumbai blasts Patriotic Indian Hackers " Indishell " / Indian Cyber Army finally Strike to the Biggest Pirated Music Download Website of Bollywood Albums run by Pakistan crew. The hack is perform against the  Mumbai blasts - Wednesday 13 July 2011. Pakistan issues a condemnation after three attacks blamed on terrorists strike Mumbai, targeting the city's Opera House district, its Zaveri bazaar and the central Dadar area. Indian hackers Hack the Songs.pk and add there deface page with a message at  https://songs.pk/usersonline/usersonline.php  . Message By Indishell " Pray for all the innocent victims of Mumbai attack ..This is a small answer from All Indians.. Remember we are Together..You can just kill innocent people .. Women & Childrens..But There is no Future for you.. We are coming with huge speed..Corruption will be under control.. Every Indian will have Money n Power..Then there will be no one to Save you...
Yellowstone County website hacked - Tax Payers Information at Risk

Yellowstone County website hacked - Tax Payers Information at Risk

Jul 15, 2011
Yellowstone County website hacked - Tax Payers Information at Risk Yellowstone County has taken its website offline after the state's technology department discovered the site had been hacked. The website will be brought back online in stages when it is safe to do so, a process that is expected to go into next week, county officials said. It's possible that taxpayers who paid property taxes by electronic bank transfer may have had their account number exposed to the hacker. This does not include taxpayers who made payments by paper check or debit/credit cards. The county system has been taken off line at this time. KTVQ-TV reports that county officials are working with forensic security examiners to determine what, if any, information was taken. The county apologizes for any inconvenience caused by this criminal act of the hacker.
Armitage 07.12.11 - Updated Version

Armitage 07.12.11 - Updated Version

Jul 15, 2011
Armitage 07.12.11 - Updated Version Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don't use Metasploit every day. If you want to learn Metasploit and grow into the advanced features, Armitage can help you. This is the official change log : Fixed a race condition causing some file browser actions to fail on Windows hosts at times. Files downloaded through file browser are now archived in: [host]Downloads Hail Mary output nows goes to [log dir]allhailmary.log Added Crack Passwords button to Credentials tab. This opens the launcher for John the Ripper: auxiliary/analyze/jtr_crack_fast Added Post Modules item to Meterpreter N -> Explore and Shell N menus. This menu item will show applicable post-exploitation modules in the module browser. Loot browser now...
Pentagon Admits to biggest ever data breach

Pentagon Admits to biggest ever data breach

Jul 15, 2011
Pentagon Admits to biggest ever data breach According to Report, Department of Defense and Pentagon is disclosing news of the one of the largest data loss events to date . From investigation, officials to believe the intrusion was orchestrated by a foreign government. The theft of around 24,000 sensitive Pentagon documents occurred in March 2011. From the Associated Press: The Pentagon is revealing that it suffered one of its largest-ever losses of sensitive defense data this spring to a cyber attack that it blames on an unspecified foreign government. The loss is an example of why the Pentagon has developed new cyber security rules that emphasize deeper defenses, more collaboration with private industry and new steps to stop thefts by malicious insiders.  William Lynn, the deputy secretary of defense, said in a speech outlining the new strategy that 24,000 files were stolen from a defense industry computer network in a single intrusion in March. He offered no details....
UK Vodafone Phone Hacking method exposed

UK Vodafone Phone Hacking method exposed

Jul 14, 2011
UK Vodafone Phone Hacking method exposed The Hacker's Choice announced a security problem with Vodafone's Mobile Phone Network today. An attacker can listen to any UK Vodafone customer's phone call. An attacker can exploit a vulnerability in 3G/UMTS/WCDMA - the latest and most secure mobile phone standard in use today. Vodafone released its femto cell to the general public. This means anyone can run his own UMTS network in his house. The box connects back via your DSL connection into their mobile network. This is an initial project to gather information about the technology and verify the security. This project started in 2009 together with hackers from the french underground. Read Complete Details Here
PuTTY v.0.61 New Version released After 4 years

PuTTY v.0.61 New Version released After 4 years

Jul 14, 2011
PuTTY v.0.61  New Version   released  After 4 years After four Years, Putty's New version finally Released today.Here are the PuTTY files themselves: PuTTY (the Telnet and SSH client itself) PSCP (an SCP client, i.e. command-line secure file copy) PSFTP (an SFTP client, i.e. general file transfer sessions much like FTP) PuTTYtel (a Telnet-only client) Plink (a command-line interface to the PuTTY back ends) Pageant (an SSH authentication agent for PuTTY, PSCP, PSFTP, and Plink) PuTTYgen (an RSA and DSA key generation utility). These features are new in beta 0.61 Kerberos/GSSAPI authentication in SSH-2. Local X11 authorisation support on Windows. (Unix already had it, of course.) Support for non-fixed-width fonts on Windows. GTK 2 support on Unix. Specifying the logical host name independently of the physical network address to connect to. Crypto and flow control optimisations. Support for the zlib@openssh.com SSH-2 compression method. Support for new Wind...
Expert Insights Articles Videos
Cybersecurity Resources