#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

#Opiran new press release for 23 September by Anonymous Hackers

#Opiran new press release for 23 September by Anonymous Hackers

Sep 13, 2011
#Opiran new press release for 23 September by Anonymous Hackers [Salutation] To the Noble and Brave People of Iran and Syria, [Acknowledge plight] The people of Iran and Syria are still being caged, tortured and murdered. They are ruled by vile leaders, who seek not to protect, but to harm. Leaders who will stop at nothing to keep their power. [Statement of Facts and Outcomes] Iran deserves modern affortable energy and fair elections. The entire world speaks of the treachery of Iran's fraudulous regime. Newly secret US ambassadorial letters, released by WikiLeaks, confirm what you already know. [ irc.iranserv.com #opiran port 6697 ssl ] [Outline Client Condition] The people of Syria are beaten by regime police from Iran. The People of Syria are kept down by the regime of Iran, which backs the will of Assad to remain in power. No matter how many innocent victims fighting for freedom and social justice, this may cost. [Support] Ahmadinejad, Khamenei and Assad know th...
The Security Onion LiveDVD - Download

The Security Onion LiveDVD - Download

Sep 13, 2011
The Security Onion LiveDVD - Download The Security Onion LiveDVD is a bootable DVD that contains software used for installing, configuring, and testing Intrusion Detection Systems. It is based on Xubuntu 10.04 and contains Snort, Suricata, Sguil, Squert, Xplico, nmap, metasploit, Armitage, scapy, hping, netcat, tcpreplay, and many other security tools. Official change log for Security Onion 20110919: The "IDS Rules" menu now has a new entry called "Add Local Rules" which will open /etc/nsm/rules/local.rules for editing using the "mousepad" GUI editor. You can then add any rules that you want to maintain locally (outside of the downloaded VRT or Emerging Threats rulesets). A new menu called "IDS Config" was added with a new menu entry called "Configure IDS engine(s)". This will list all of the IDS engines on your system and allow you to choose one to configure. It will then open the proper config file for whatever IDS engine you're running. After you save and close the config f...
BruCON – Belgium’s First Security Conference

BruCON – Belgium's First Security Conference

Sep 13, 2011
BruCON – Belgium's First Security Conference BruCON, Belgium's first security conference is back for it's third edition on 19-22 September. After witnessing greater success in the past two years, this year's event is expected to attract more then 400 people from around Europe. BruCON conference aims to create bridge between the various actors active in computer security world, included but not limited to hackers, security professionals, security communities, non-profit organizations, CERTs, students, law enforcement agencies,academic researchers, etc. BruCON is organized as a non-profit event by volunteers. A group of security enthusiasts decided that it was time in Belgium to have its own security conference. A lot of countries around the world already had these kind of conferences to discuss and present research on computer security and related subject matters. This group of volunteers wanted Belgium not to be the last to have a similar conference. The event features more then 27...
cyber security

Secure your LLMs Against Real-World Threats

websiteWizLLM Security / Artificial Intelligence
LLMs move fast. So do the risks. Get practical, real-world steps to defend against prompt injection, model poisoning, and more.
cyber security

2025 Gartner® MQ Report for Endpoint Protection Platforms (July 2025 Edition)

websiteSentinelOneEndpoint Protection / Unified Security
Compare leading Endpoint Protection vendors and see why SentinelOne is named a 5x Leader
Hook Analyser Malware Tool Released

Hook Analyser Malware Tool Released

Sep 13, 2011
Hook Analyser Malware Tool Released Hook analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer. The tool can hook to an API in a process and can do following tasks. 1. Hook to API in a process 2. Hook to API and search for pattern in memory of a process 3. Hook to API and dump buffer (memory). Download Here
Panda Security (Pakistan domain) hacked by X-NerD

Panda Security (Pakistan domain) hacked by X-NerD

Sep 11, 2011
Panda Security (Pakistan domain) hacked by X-NerD Panda Security, One of the famous Computer software company website got hacked. Pakistan domain of Panda Security hacked by Pakistani hacker " X-NerD ". Hacker is from Pakistan Cyber Army team of hackers. Taunt by hacker on deface page " OoooOOPss...I am ShockeD At YouR SecuritY..S3cuR!tY L3vEL Z3r0...YOu Dont KnoW HOw To SecurRe Your AsS n Pr0vidinG SEcurity to 0therS...Big LauGh... ". Yesterday X-Nerd was in news for hacking Hundreds of other domains. Mirror of hack on Zone-H .
Suggested The Linux 3.1 Kernel logo

Suggested The Linux 3.1 Kernel logo

Sep 11, 2011
Suggested The Linux 3.1 Kernel logo This new logo was proposed just this weekend and the current discussion to see whether it will be accepted for Linux 3.1 can be found in this LKML thread . To mark the upcoming release of the Linux 3.1 kernel IBM's Darrick Wong has proposed changing the familiar solo-Tux logo to something more, well, befitting of the version number. This proposed logo for the Linux 3.1 kernel isn't to raise awareness for any animals or other causes. but to poke fun at Microsoft Windows 3.1. Darrick Wong of IBM has proposed replacing the Tux logo in the Linux 3.1 kernel with a new logo that makes mockery of Microsoft's Windows 3.1 operating system that began selling 19 years ago.
Truth Alliance Network and 20 Churches websites hacked by Muslim Liberation Army

Truth Alliance Network and 20 Churches websites hacked by Muslim Liberation Army

Sep 11, 2011
Truth Alliance Network and 20 Churches websites hacked by Muslim Liberation Army 20 Churches websites and Truth Alliance Network defaced by Muslim Liberation Army. Hacker with name "XtReMiSt" deface all these 21 websites and post above image and message on homepage as shown. Message posted by hackers " To Raise A Voice Against Quran Burning Day and Illegal occupation of Israel and India in Palestine and kashmir.. and to show why muslims are raising their voice against america....Message Delievered with peace... !!! " Further message posted by him : Sites like Church of God of North America, Legacy Church, First United Church of God, First Church of God Madisonville, First Baptist Church Hyannis, Meet the Pastors - First Church of God has been defaced. List of hacked sites is here .
Federal Nigerian Government Websites Hacked by Elemento_pcx & s4r4d0

Federal Nigerian Government Websites Hacked by Elemento_pcx & s4r4d0

Sep 11, 2011
Federal Nigerian Government Websites Hacked by Elemento_pcx & s4r4d0 Nigerian Government Websites defaced by hacker with name " Elemento_pcx & s4r4d0 ". Defacement page   contain the message " Fatal Error!by Elemento_pcx & s4r4d0 ..."Be yourself but not always the same" ... G. The Thinker ...Help? s4r4d0 [at] yahoo.com & elemento_pcx [at] yahoo.com.br ". Mirror of hack also posted to Zone-H .
Linux Foundation & Linux.com multiple server compromised

Linux Foundation & Linux.com multiple server compromised

Sep 11, 2011
Linux Foundation & Linux.com multiple server compromised The Linux Foundation has pulled its websites from the web to clean up from a "security breach". A notice posted on the Linux Foundation said the entire infrastructure including LinuxFoundation.org, Linux.com, and their subdomains are down for maintenance due to a security breach that was discovered on September 8, 2011. Multiple Servers that are part of the Linux Foundation & Linux.com infrastructure were affected during a recent intrusion on 8 September which " may have compromised your username, password, email address and other information ".  More from the Linux Foundation announcement: We are in the process of restoring services in a secure manner as quickly as possible. As with any intrusion and as a matter of caution, you should consider the passwords and SSH keys that you have used on these sites compromised. If you have reused these passwords on other sites, please change them immediately. ...
Hundreds of domains hacked by X-NerD hacker

Hundreds of domains hacked by X-NerD hacker

Sep 10, 2011
Hundreds of domains hacked by X-NerD hacker More than 250 websites are defaced by Pakistani hacker " X-NerD " and a custom page can be seen their at site/x.php . List and Mirror of all 250+ hacked sites are here .
The George Washington Institue for Sustainability hacked by Cocain TeaM

The George Washington Institue for Sustainability hacked by Cocain TeaM

Sep 10, 2011
The George Washington Institue for Sustainability hacked by Cocain TeaM The George Washington Institue for Sustainability website got hacked and defaced by Cocain TeaM hackers. Mirror of hack available on Zone-H . The George Washington University is located four blocks from the White House and was created by an Act of Congress in 1821. Today, GW is the largest institution of higher education in the nation's capital.
Rootkit Hunter - Rootkit scanning tool

Rootkit Hunter - Rootkit scanning tool

Sep 10, 2011
Rootkit Hunter - Rootkit scanning tool Rootkit scanner is scanning tool to ensure you for about 99.9%* you're clean of nasty tools. This tool scans for rootkits, backdoors and local exploits by running tests like: - MD5 hash compare - Look for default files used by rootkits - Wrong file permissions for binaries - Look for suspected strings in LKM and KLD modules - Look for hidden files - Optional scan within plaintext and binary files Download Rootkit Hunter
14 Years in Jail for mass credit card theft

14 Years in Jail for mass credit card theft

Sep 10, 2011
14 Years in Jail for mass credit card theft A 21 year old man received a 14 year prison sentenced on Friday for running an online business that sold counterfeit credit cards encoded with stolen account information with losses estimated at more than $3 million. Tony Perez III, of Hammond, Indiana, pleaded guilty to the charges on April 4. In his plea, Perez said he sold counterfeit credit cards encoded with stolen account information. Perez found customers through criminal "carding forums," Internet discussion groups set up to aid in the buying and selling of stolen financial account information and related services. When the US Secret Service raided his apartment in June 2010, they found data for 21,000 stolen credit cards and equipment needed to encode them onto blank cards. Credit card companies said losses from the card numbers in Perez's possession topped more than $3 million. In addition to the prison term, Judge Liam O'Grady of U.S. District Court for th...
Expert Insights Articles Videos
Cybersecurity Resources