#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

ICQ vulnerable to account theft using JavaScripts

ICQ vulnerable to account theft using JavaScripts

Jul 28, 2011
ICQ vulnerable to account theft using JavaScripts In security advisories for ICQ ( https://noptrix.net/advisories/icq_cli_xss.txt )and the ICQ web site ( https://noptrix.net/advisories/icq_web_xss.txt ), security researcher Levent Kayan warns that both the ICQ instant messenger for Windows and the ICQ web site contain vulnerabilities that potentially allow attackers to take control of a user's ICQ account. According to Kayan ICQ doesn't adequately check user's profile information and fails properly to analyse status messages, which can be freely chosen by users, to see if they contain executable code. Kayan recently discovered a similar hole in the Skype client. Heise Security was able to reproduce the flaw discovered by Kayan using the current 7.5 version of ICQ. ICQ told that it was in the process of developing and testing a security fix.
Paypal gives FBI the list of IP Address of 1,000 Anomymous hackers

Paypal gives FBI the list of IP Address of 1,000 Anomymous hackers

Jul 28, 2011
Paypal gives FBI the list of IP Address of 1,000 Anomymous hackers Paypal collected 1000 IP addresses of those carrying out Anonymous' DDoS attacks against PayPal last December. To be fair the names on the list will probably be the bottom feeding script kiddies rather than the hackers at the top of Anomymous's greasy pole. The clever hackers know to mask their IP addresses first. An FBI affidavit suggests the Untouchables may have lots more people to arrest. FBI agent Chris Thompson says PayPal security officials were in close contact with the bureau beginning 6 December, two days after PayPal froze WikiLeaks' donation account and the first day it began receiving serious denial-of-service traffic. FBI agents began monitoring Anonymous press releases while PayPal collected traffic logs on a Radware intrusion prevention system installed on its network. Paypal gave the feds a USB thumb drive containing the Radware reports, which documented " approximately 1,000 ...
SPINN - Secure Personal Information Notification Network Hacked By Inj3ct0r

SPINN - Secure Personal Information Notification Network Hacked By Inj3ct0r

Jul 28, 2011
SPINN - Secure Personal Information Notification Network Hacked By Inj3ct0r Official website of  SPINN - Secure Personal Information Notification Network has been hacked and Defaced by Team Inj3ct0r. Screenshot is as shown above.
cyber security

Secure your LLMs Against Real-World Threats

websiteWizLLM Security / Artificial Intelligence
LLMs move fast. So do the risks. Get practical, real-world steps to defend against prompt injection, model poisoning, and more.
cyber security

2025 Gartner® MQ Report for Endpoint Protection Platforms (July 2025 Edition)

websiteSentinelOneEndpoint Protection / Unified Security
Compare leading Endpoint Protection vendors and see why SentinelOne is named a 5x Leader
War Texting : Hackers Unlock Car Doors Via SMS

War Texting : Hackers Unlock Car Doors Via SMS

Jul 28, 2011
War Texting : Hackers Unlock Car Doors Via SMS Don Bailey and Mathew Solnik, Two hackers have found a way to unlock cars that use remote control and telemetry systems like BMW Assist, GM OnStar, Ford Sync, and Hyundai Blue Link. These systems communicate with the automaker's remote servers via standard standard mobile networks like GSM and CDMA — and with a clever bit of reverse engineering, the hackers were able to pose as these servers and communicate directly with a car's on-board computer via " war texting " — a riff on "war driving," the act of finding open wireless networks. Don Bailey and Mathew Solnik, both employees of iSEC Partners, will deliver their findings at next week's Black Hat USA conference in Las Vegas in a briefing entitled " War Texting: Identifying and Interacting with Devices on the Telephone Network. " The exact details of the attack won't be disclosed until the affected manufacturers have had a chance to fix their systems, and the hackers are not expected ...
Iframe Injection Vulnerability on FileHippo - Popular software download site

Iframe Injection Vulnerability on FileHippo - Popular software download site

Jul 28, 2011
Iframe Injection Vulnerability on FileHippo - Popular software download site One of the most Popular Freeware Software download website "FileHippo" is Vulnerable to Iframe Injection. This Vulnerability is Found and submitted by  n3t phir3 . Here is the  Vulnerable Link  and Screenshot as shown above.
Apache Log Extractor tool

Apache Log Extractor tool

Jul 28, 2011
Apache Log Extractor tool Apache Log Extractor is a quick script to export URL information from Apache access logs. The thought behind this script was to provide a list of known URL's on a remote server by analysing the logs. This list could then be used as the input for further testing tools e.g Burp Suite – Intruder . The script accepts an Apache access file as the input and creates an output file containing one URL per line. The list is unique and should only contain the URL without parameters (incomplete directory names are not extracted). It also takes these URLs and creates a wordlist output of all valid directoy names for use with brute-forcing tools. This fingerprinting tool can reduse the realm of password cracking. How to use ./apache_log_extractor.py access.log.1 Output [ ] Extracting URLs from logfile : access.log.1 [ ] Extracted URL : / [ ] Extracted URL : /Signed_Update.jar [ ] Extracted URL : /ajax/bottomnavinfo.ashx [ ] Extracted URL : /MetaAdServ...
THN Review : Ghost in the Wires - Kevin Mitnick

THN Review : Ghost in the Wires - Kevin Mitnick

Jul 28, 2011
THN Review : Ghost in the Wires - Kevin Mitnick First of all Thanks to Mr. Kevin Mitnick for sending Review Copy of his latest book & Auto-Biography " Ghost in the Wires - My Adventures As The World's Most Wanted Hacker ". I take about a week to read this amazing book and Finally  The Hacker News Review for this Book : Some call him a saint, some a criminal, others adore him. Industry may loathe him but we here at hacker news say " Get Reading " loyal subscribers and laugh, get mad, feel revenge, and pure educational enjoyment reading Kevin Mitnick's new book " Ghost in the Wires " .  Yeah, we consider him pretty cool and the father of Social Engineering which is just ours and yours level of interest.   If a guy that can stay one step ahead of big business, catching them with their pants down and their hands in the Cookie jar, then this is the book for you.  If you admire a person who can squeeze blood from a turnip, you have the rig...
LulzSec Member Topiary arrested in the Shetland Islands

LulzSec Member Topiary arrested in the Shetland Islands

Jul 28, 2011
LulzSec Member Topiary arrested in the Shetland Islands Police arrest 18-year-old man in Shetland Islands who is alleged to be involved in hacker attacks on law enforcement agencies.Officers from the Metropolitan Police Service's Police Central e-Crime Unit (PCeU) arrested the man as part of an international investigation into the activities of the Anonymous and LulzSec hacktivist groups.The man, who was arrested at a residential address in Shetland, is said to have used the online nickname " Topiary " and acted as a spokesperson for the groups via forums such as Twitter. He was arrested at a residential address in the Shetland Islands and is currently being transported to a police station in central London. A search is ongoing at the address. It was carried out with the assistance of the Scottish Crime and Drug Enforcement Agency (SCDEA) and Lincolnshire Constabulary. The arrest of Topiary is the third made in the UK in the search for members of the group, followi...
DOD Launches New Cyber Strategy Website

DOD Launches New Cyber Strategy Website

Jul 27, 2011
DOD Launches New Cyber Strategy Website The Department of Defense today launched a new website to highlight DoD's first unified strategy for cyberspace announced on July 14. The website is a tool to help explain and consolidate DoD's cybersecurity accomplishments and new way forward for military, intelligence and business operations in cyberspace. The new website is designed to help users explore the five pillars of DoD's cyber strategy: treating cyberspace as an operational domain; employing new defense operating concepts; partnering with the public and private sector; building international partnerships; and leveraging talent and innovation. Additional content includes links to cybersecurity jobs in government, key news items, press releases, and video of discussions on cybersecurity. Source
Smiasm - Reverse engineering framework

Smiasm - Reverse engineering framework

Jul 27, 2011
Smiasm - Reverse engineering framework What is Miasm? Miasm is a a free and open source (GPLv2) reverse engineering framework. Miasm aims at analyzing/modifying/generating binary programs. Here is a non exhausting list of features: opening/modifying/generating PE/ELF 32/64 le/be using Elfesteem Assembling/Disassembling ia32/ppc/arm Representing assembly semantic using intermediate language Emulating using jit (dynamic code analysis, unpacking, ...) Expression simplification for automatic de-obfuscation Graphic disassembler using Grandalf How does it work? Miasm embed its own disassembler, intermediate language and instruction semantic. It is written in Python. To emulate code, it uses libtcc to jit C code generate from intermediate representation. It can emulate shellcodes, parts of binaries. Python callback can be executed to emulate library functions. Read Documentation & Download Here
#OpPayPal - Anonymous calls for boycott of PayPal for blocking Wikileaks

#OpPayPal - Anonymous calls for boycott of PayPal for blocking Wikileaks

Jul 27, 2011
#OpPayPal - Anonymous calls for boycott of PayPal for blocking Wikileaks The Latest Operation could be a major departure into legal direct action for Anonymous, LulzSec and AntiSec. If so, this is one to watch with great interest. The campaign marks something of a departure for LulzSec and Anonymous, which are both known for stealing and releasing private information from websites with poor security.The groups are at pains to emphasis that their current protest is being waged through legal means.During Operation Payback, Anonymous had called for a boycott, but little was gained due to the distributed nature of Anonymous and relatively low media profile. What is Operation Paypal ( #OpPayPal ) ? IRC: https://bit.ly/pDIZbY According to Anonymous and Lulzsec " Paypal is a corrupt corporation who voluntarily disabled donations to wikileaks with no legal base or reasoning whatsoever.  They are actively working with the FBI to arrest and imprison the only peop...
Metasploit Pro 4.0 released - Enterprise Integration, Cloud Deployment & Automation

Metasploit Pro 4.0 released - Enterprise Integration, Cloud Deployment & Automation

Jul 27, 2011
Metasploit Pro 4.0 released - Enterprise Integration, Cloud Deployment & Automation Rapid7 launched Metasploit Pro 4.0, a penetration testing solution that provides security professionals with a better view of their threat landscape by integrating with more than a dozen vulnerability management and Web application scanners, and by providing data to security information and event management (SIEM) systems through a documented interface. This enables defenders to identify vulnerabilities that could lead to a data breach and prioritize their remediation more effectively. Security teams increase their productivity by spending less time fixing unimportant vulnerabilities and have an effective way to verify that remediation was successful. The new capabilities in Metasploit Pro 4.0 now enable defenders to: Integrate security risk intelligence Integrate Metasploit Pro with your security information and event management (SIEM) system to improve your dashboard information Import ...
BSNL System Hacked by Pakistan Cyber Army - Users info at risk

BSNL System Hacked by Pakistan Cyber Army - Users info at risk

Jul 26, 2011
BSNL System Hacked by Pakistan Cyber Army - Users info at risk Pakistan Cyber Army claims to hack the BSNL (Bharat Sanchar Nigam Ltd.- India's No. 1 Telecommunications Company)10,000 User information like name, email, phone number and location & BSNL's internal working of VPN ,detail of circuits and as well as more technical details. More Screenshots: Source: Email from PCA
Operation Intifada: Anonymous Prepares For DDOS Attack On Israel Parliament

Operation Intifada: Anonymous Prepares For DDOS Attack On Israel Parliament

Jul 26, 2011
Operation Intifada: Anonymous Prepares For DDOS Attack On Israel Parliament The latest target of Operation Anonymous, which following the dissolution of LulzSec is the last substantial non-amorphous hacker collective left out there, could lead to some substantial geopolitical fallout. That is because the target of the just announced upcoming DDOS attack is none other than the Israeli Parliament, the Knesset, and while Israel has allegedly been happy to dispense hack attacks in the past, the onslaught on the Iranian nuclear power plant courtesy of the Stuxnet virus coming to mind, we doubt it will as happy to be seen on the receiving end of decentralized computer warfare.
OSForensics – Digital investigations faster

OSForensics – Digital investigations faster

Jul 26, 2011
OSForensics – Digital investigations faster Here there is a new utility called OSForensics, currently it is freely available that I found very useful for conducting a computer forensics. OSForensics can retrieve data about recently accessed applications, documents, media and network shares by scanning locations in the registry which store a user's Most Recently Used (MRU) lists. The data which can be tracked by OSForensics includes files accessed in Microsoft Office applications, Microsoft Wordpad, Microsoft Paint, Microsoft Media Player, Windows Search, Connected Network Drives and the Windows Run command. Read More Here Download OSForensics 
90000 web pages infected by mass iFrame attack

90000 web pages infected by mass iFrame attack

Jul 26, 2011
90000 web pages infected by mass iFrame attack Security Experts Wayne Huang, Chris Hsiao, NightCola Lin discovered that more than 90000 web pages are infected by mass iFrame attack. There's been a mass scale injection ongoing recently, with the injected iframe pointing to willysy.com . Just Try a simple Google Search to find out the facts. Video Demonstration: Researchers at Armorize said the injected scripts redirect users to malicious Web domains that is launching attacks targeting known vulnerabilities in Java, Adobe's PDF, Microsoft's Internet Explorer and other common platforms, according to the report by Armorize experts Wayne Huang, Chris Hsiao and NightCola Lin. The campaign is targeting online commerce sites, the researchers found. Read more at Source .
Change.Gov Donor List 2010 leaked by #Antisec

Change.Gov Donor List 2010 leaked by #Antisec

Jul 26, 2011
Change.Gov Donor List 2010 leaked by #Antisec Anonymous Hackers today leak the list of 60804 Donors to Change.Gov via Twitter tweets. The list is uploaded on Mediafire Link . The data contains the Name, Employee,City, State, Zip and Donated Amount in a CSV file. Yesterday 300 Military and Government Accounts leaked by P0keu and  CNAIPIC - Italian government hacked by #Antisec , Various Confidential documents leaked.
Anonymous ,LulzSec & Stuxnet nominated for Pwnie Awards 2011 for Epic 0wnage

Anonymous ,LulzSec & Stuxnet nominated for Pwnie Awards 2011 for Epic 0wnage

Jul 25, 2011
Anonymous , LulzSec & Stuxnet nominated for Pwnie Awards 2011 for Epic 0wnage The nominees for the Pwnie Awards 2011 are finally selected today. Anonymous are nominated for hacking HBGary , LulzSec for hacking everyone & Stuxnet also nominated in  Epic 0wnage. More Details on Nominations Read Here Next week the judges will gather at an undisclosed location and vote on the winners, who will be announced during the awards ceremony on Aug 3rd in Las Vegas.
300 Military and Government Accounts leaked by P0keu

300 Military and Government Accounts leaked by P0keu

Jul 25, 2011
300 Military and Government Accounts leaked by P0keu In a tweet , P0keu posted a link to PasteBin which appears to be e-mail accounts and passwords of 300 military and government accounts used the same password as their actual e-mails, then the contents of their e-mail account will also be exposed. The PasteBin dump says it contains 290 accounts. A large number of them end in .mil and .gov. Just a point of clarification, this doesn't appear to be actual e-mail accounts and passwords, but rather, a website that uses people's e-mail accounts as a log-in name. So the account to the website is exposed. If the password used with the e-mail is the same as the password for that actual e-mail address, then that e-mail might also be exposed along with who knows what else that is tied to that account. Amongst those accounts that are exposed, there appears to be accounts from the Department of Justice, the FBI, the Deparment of Homeland Security, the NSA, the Pentagon and several others. ...
Red Hat Enterprise Linux 5.7 Released

Red Hat Enterprise Linux 5.7 Released

Jul 25, 2011
Red Hat Enterprise Linux 5.7 Released Red Hat has updated Enterprise Linux 5.7, which now includes several features from Red Hat Enterprise Linux 6. The operating system processors supports deployments on Intel, AMD, POWER and IBM System z architectures. Highlights of Red Hat Enterprise Linux 5.7 include: Hardware enablement Support for new hardware from Red Hat partners encompassing processors, chipsets and new drivers for storage, networking, and graphics allows Red Hat Enterprise Linux 5 deployments to benefit from new hardware platforms delivered in 2011, including Intel, AMD, POWER and IBM System z. Virtualization improvements Several virtualization enhancements in Red Hat Enterprise Linux 5.7 include improved migration performance for KVM, as well as several performance and scalability improvements for the Xen hypervisor. SCAP support OpenSCAP introduces support for the Security Content Automation Protocol, including a library and set of utilities, giving a stan...
Expert Insights Articles Videos
Cybersecurity Resources