#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Association Of American Feed Control Officials (AAFCO) Hacked by ZHC

Association Of American Feed Control Officials (AAFCO) Hacked by ZHC

Jul 20, 2011
Association Of American Feed Control Officials (AAFCO) Hacked by  ZHC The Offocial Website of Association Of American Feed Control Officials (AAFCO) Hacked By ZHC TOSHIRO & ZHC MONGOOSE - ZCompany Hacking Crew - [ZHC] . Hacked Domains are  https://www.aafco.org/ and https://www.petfood.aafco.org/  . The Deface pages contain some message related to Their Protest Regarding PALESTINE. Mirrors of Hack available at  https://www.zone-h.com/mirror/id/14445813 and https://www.zone-h.com/mirror/id/14445892
Anonplus.com (Anonymous Social Networking Site) Hacked by AKINCILAR

Anonplus.com (Anonymous Social Networking Site) Hacked by AKINCILAR

Jul 20, 2011
Anonplus.com (Anonymous Social Networking Site)  Hacked by AKINCILAR After several members of Anonymous were reportedly banned from Google+ , the hacker group has announced they will be building their own social network called Anonplus.com  . Today  Anonplus.com  Got defaced by AKINCILAR with page title " The Seal to Anonymous from AKINCILAR ". Message posted on site: We Are TURKIYE We Are AKINCILAR This logo suits you more..How dare you rise against to the World..Do you really think that you are Ottoman Empire?We thought you before that you cannot challenge with the world and we teach you cannot be socialNow all of you go to your doghouse..
FBI Raids Homes of Suspected Anonymous Hackers at New York

FBI Raids Homes of Suspected Anonymous Hackers at New York

Jul 20, 2011
FBI Raids Homes of Suspected Anonymous Hackers at New York The FBI executed search warrants at the New York homes of three suspected members of notorious hacking group Anonymous early Tuesday morning. More than 10 FBI agents arrived at the Baldwin. The agents spent an hour and 40 minutes at Jordan's house, other agents investigated a second Long Island, N.Y., home and one in Brooklyn. The targets of the FBI searches are all in their late teens to early 20s. Search warrants were part of an ongoing investigation into Anonymous, which claimed responsibility for attacks against a variety of websites including Visa and Mastercard. Anonymous is a loose collection of cybersavvy activists inspired by WikiLeaks and its flamboyant head Julian Assange to fight for " Internet freedom " along the way defacing websites, shutting down servers, and scrawling messages across screens web-wide.
cyber security

10 Best Practices for Building a Resilient, Always-On Compliance Program

websiteXM CyberCyber Resilience / Compliance
Download XM Cyber's handbook to learn 10 essential best practices for creating a robust, always-on compliance program.
cyber security

Maximize the Security Tools You Already Have

websitePrelude SecuritySecurity Control Validation
Hone your EDR, identity, vuln, and email platforms against the threats that matter with a 14-day trial.
LulzSec will release Murdoch email archive

LulzSec will release Murdoch email archive

Jul 20, 2011
LulzSec will release Murdoch email archive LulzSec behind a hack on The Sun's website claim to have extracted an email archive which they plan to release later on Tuesday. The Sun's website were redirected towards a fake story on the supposed death of Rupert Murdoch by infamous hacktivist collective LulzSec. The group also redirected visitors to the main News International website to the LulzSec Twitter account. Sabu leader of LulzSec said via Twitter that the group was sitting on emails of News International staffers that it planned to release. Sabu released email login details for former News International chief exec Rebekah Brooks, a central figure in the News of the World voicemail-hacking scandal. The hackers also posted the mobile phone numbers of three News International execs. This information seems to have come from an old database.
FBI arrests AT&T employee for leaking information to Anonymous

FBI arrests AT&T employee for leaking information to Anonymous

Jul 20, 2011
FBI arrests AT&T employee for leaking information to Anonymous The Tech Herald reported on information given to us by Ryan Cleary shortly before his arrest. AT&T insider who handed sensitive information and a bootable USB disk over to Anonymous. On Tuesday, the FBI arrested an AT&T employee connected to the leak, during a nationwide sweep targeting Anonymous. The public first learned of the AT&T files from a Torrent release by LulzSec. The documents were included in the group's final release before they disappeared from the public eye. The release also marked the second major data leak under the AntiSec movement, which has targeted both government and private sector organizations since its founding. In addition to documents, the insider leak also included a bootable USB drive used by AT&T. while interviewing Cleary for a separate story, he bragged about the AT&T leak, and the fact an insider delivered the information and software to Anonymous. " …a...
BackTrack 5 Release 1 will be available on 10th of August,2011

BackTrack 5 Release 1 will be available on 10th of August,2011

Jul 20, 2011
BackTrack 5 Release 1 will be available on 10th of August,2011 BackTrack 5 R1 (Release one) will be available for download on the 10th of August,2011. This will complete our first 3 month cycle since the last release. With over 100 bug fixes, numerous package updates and the addition of over 30 new tools and scripts.  BackTrack Crew  will have a pre-release event of BackTrack 5 R1 at the BlackHat / Defcon Conference a few days earlier.
Microsoft offers $250,000 reward for information of Rustock Botnet

Microsoft offers $250,000 reward for information of Rustock Botnet

Jul 18, 2011
Microsoft offers $250,000 reward for information of Rustock Botnet Microsoft is offering a $250,000 reward for providing information of Rustock botnet. The Rustock botnet is responsible for a great deal of cyber crime, spam (the botnet has capacity for 30 billion spam mails every day), dodgy pharmaceuticals, counterfeit stuff and pirated software. The size of the Rustock botnet has already been cut in half, but that still leaves it with hundreds of thousands of systems under its control. In order to bring down the entire botnet Microsoft is now turning to the legal system. Microsoft Declares " Today, we take our pursuit a step further. After publishing notices in two Russian newspapers last month to notify the Rustock operators of the civil lawsuit, we decided to augment our civil discovery efforts to identify those responsible for controlling the notorious Rustock botnet by issuing a monetary reward in the amount of $250,000 for new information that results in the identifi...
NetSecL Linux 3.2 released with new XFCE

NetSecL Linux 3.2 released with new XFCE

Jul 18, 2011
NetSecL Linux 3.2 released with new XFCE NetSecL 3.2 comes with a brand new XFCE which increased dramatically the performance experience, we closed many bugs and also gained more compatibility to OpenSuse 11.4 – most packages are 11.4 compatible. GrSecurity kernel is updated to 2.6.32.8 please check installation instructions if you wish to use GrSecurity. Features : - Ext4 issue with GrSecurity is resolved - booting in VM with new GrSecurity resolved - New Metasploit - Firefox 5 - Updated Exploit-db repository - GrSecurity Kernel – locked from zypper – you can update the whole system without worrying - Snort-inline reintegrated (get snort rules and change them to drop – if you use the advanced firewall) - Size of the ISO smaller with 200 MB this allowed us to have a sub project NetSecL Toolset a minimal VM with console, webshell and all pentesting tools! Minimal System Requirements for running the live DVD: 512 MB of RAM Minimal System Requiremen...
Auth3ntiQ & shika01 found Local file include on numericable.be & numericable.lu

Auth3ntiQ & shika01 found Local file include on numericable.be & numericable.lu

Jul 18, 2011
Auth3ntiQ & shika01 found local file include on numericable.be & numericable.lu Hackers named " Auth3ntiQ and shika01 " found local file include on numericable.be & numericable.lu . Venerable Links : Link 1 Link 2 Bugs are critical , Hackers can steal all account with this LFI .
Tourism Development Corporation of Punjab - Pakistan (TDCP) Hacked by Code Injector

Tourism Development Corporation of Punjab - Pakistan (TDCP) Hacked by Code Injector

Jul 18, 2011
Tourism Development Corporation of Punjab - Pakistan (TDCP) Hacked by Code Injector Code Injector from Team Indishell hack the official website of Tourism Development Corporation of Punjab - Pakistan and Deface it. Visitor to the website can see a deface page with some message on homepage. Hackers provide the screenshot of FTP shell :
Linux kernel 3.0 - 343 changes made by Microsoft developer K. Y. Srinivasan

Linux kernel 3.0 - 343 changes made by Microsoft developer K. Y. Srinivasan

Jul 18, 2011
Linux kernel 3.0 - 343 changes made by Microsoft developer K. Y. Srinivasan Linux Kernal Change Logs figures were published on Thursday in an LWN.net article : 343 Changes made by Microsoft developer K. Y. Srinivasan 1,085 change provided by independent developers Red Hat provided 1,000 Changes in Kernal 3.0 Intel provide 839 changes Srinivasan comes in at the top because he made a lot of minor changes. Srinivasan and Microsoft are therefore nearer the bottom of the list. LWN.net found that Microsoft developers changed 11,564 lines of code (1.3 per cent) – compared to Intel's 163,232 (18.1 per cent).
Damn Small SQLi Scanner (DSSS) v0.1b - 100 Lines Python Code

Damn Small SQLi Scanner (DSSS) v0.1b - 100 Lines Python Code

Jul 18, 2011
Damn Small SQLi Scanner (DSSS) v0.1b  - 100 Lines Python Code SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application (like queries). The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It happens from using Microsoft SQL or other poorly designed query language interpreters. Source Code : #!/usr/bin/env python import difflib, httplib, optparse, random, re, sys, urllib2, urlparse NAME = "Damn Small SQLi Scanner (DSSS) < 100 LOC (Lines of Code)" VERSION = "0.1b" AUTHOR = "Miroslav Stampar (https://unconciousmind.blogspot.com | @stamparm)" LICENSE = "GPLv2 (www.gnu.org/licenses/gpl-2.0.html)" NOTE = "This is a fully working PoC proving that commercial (SQLi) scanners can be beaten under 100 li...
Israel Web Hosting Server Hacked For Palestine By Dr T

Israel Web Hosting Server Hacked For Palestine By Dr T

Jul 18, 2011
Israel Web Hosting Server Hacked For Palestine By Dr T Israel Web Hosting Server Rooted Via Server Intrusion and all Domains on Server are Mass Defaced For Palestine By Dr Torjan and Code5 named hackers.  Hacked Websites List is available at :  https://pastebin.com/WvQmSSKh  .
Expert Insights Articles Videos
Cybersecurity Resources