#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

36 Web domains seized tied to online financial fraud

36 Web domains seized tied to online financial fraud

Apr 26, 2012
Thirty-six websites used to sell stolen bank account details have been taken down following an investigation by the Serious Organised Crime Agency ( SOCA ). The arrest of two men in the UK and another in Macedonia is the result of an international operation in which 36 web domains, used to trade compromised banking data, were taken offline. SOCA has been tracking the development of AVCs and monitoring their use by cyber criminals, who support payment card and online banking fraud on a global scale. Working with the FBI, the BKA in Germany, the KLPD in the Netherlands, the Ukraine Ministry of Internal Affairs, the Australian Federal Police, and the Romanian National Police, SOCA has recovered over 2.5 million items of compromised personal and financial information over the past 2 years. Lee Miles, head of cyber operations for SOCA, said: " Our activities have saved business, online retailers and financial institutions potential fraud losses estimated at more than half a billion pounds...
0Day Remote Password Reset Vulnerability in MSN Hotmail patched

0Day Remote Password Reset Vulnerability in MSN Hotmail patched

Apr 26, 2012
Microsoft's MSN Hotmail (Live) email service currently hosts over 350 million unique users. A Vulnerability Laboratory senior researcher, Benjamin Kunz Mejri, identified a critical security vulnerability in Microsoft's official MSN Hotmail (Live) service. A critical vulnerability was found in the password reset functionality of Microsoft's official MSN Hotmail service. The vulnerability allows an attacker to reset the Hotmail/MSN password with attacker chosen values. Remote attackers can bypass the password recovery service to setup a new password and bypass in place protections (token based). The token protection only checks if a value is empty then blocks or closes the web session. A remote attacker can, for example bypass the token protection with values "+++)-". Successful exploitation results in unauthorized MSN or Hotmail account access. An attacker can decode CAPTCHA & send automated values over the MSN Hotmail module. Regarding the consequences it was a win for Micr...
Penetration Testers Get Ready - BackBox Linux 2.05 released !

Penetration Testers Get Ready - BackBox Linux 2.05 released !

Apr 26, 2012
The BackBox team has announce the release 2.05 of BackBox Linux. The new release include features such as Ubuntu 11.04, Linux Kernel 2.6.38 and Xfce 4.8.0. BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known ethical hacking tools. What's new System upgrade Bug corrections Performance boost Improved start menu Improved WiFi driver (compat-wireless aircrack patched) New Hacking tools: creepy, fern-wifi-cracker, joomscan, pyrit, reaver, xplico, etc. Updated tools: crunch, fimap, hydra, magictree, metasploit, set, sipvicious, skipfish, w3af, weevely, wireshark, wirouterkeyrec, wpscan, zaproxy, theharvester, xsser, etc. Download Backbox 2.05
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
The Unusual Suspect: Git Repos

The Unusual Suspect: Git Repos

Jul 14, 2025Secrets Management / SaaS Security
While phishing and ransomware dominate headlines, another critical risk quietly persists across most enterprises: exposed Git repositories leaking sensitive data. A risk that silently creates shadow access into core systems Git is the backbone of modern software development, hosting millions of repositories and serving thousands of organizations worldwide. Yet, amid the daily hustle of shipping code, developers may inadvertently leave behind API keys, tokens, or passwords in configuration files and code files, effectively handing attackers the keys to the kingdom. This isn't just about poor hygiene; it's a systemic and growing supply chain risk. As cyber threats become more sophisticated, so do compliance requirements. Security frameworks like NIS2, SOC2, and ISO 27001 now demand proof that software delivery pipelines are hardened and third-party risk is controlled. The message is clear: securing your Git repositories is no longer optional, it's essential. Below, we look at the ris...
10 Lebanese government websites taken down by Hacktivist group

10 Lebanese government websites taken down by Hacktivist group

Apr 26, 2012
Several Lebanese ministry websites were the target of a hack attack Thursday by the group Raise Your Voice, in the second such attack on government-related portals this month. " We are RYV, short for Raise Your Voice, and we are simply a group of people who could not bare (sic) sitting in silence, watching all the crimes and injustice going on in Lebanon. We will not be silenced and brainwashed by your media. We will not stop until the Lebanese people mobilize, demand their rights, and earn them ," said the group's message posted on the hacked websites. It is unclear whether Lebanon Anonymous is affiliated with the hacktivist group #Anonymous, renowned for its attacks on websites of governments and corporations it considers corrupt or seeking to limit free speech on the web. Last month, they took down the Interpol's website as a response to the arrest of 25 of their members, as well as the United Nations' official site. Below is the list of the websites that were hacked on...
Chinese Hackers continued to attack the Philippine government

Chinese Hackers continued to attack the Philippine government

Apr 26, 2012
Hackers continued to attack the Philippine government's online presence, with at least one agency on Thursday reporting a denial-of-service attack the night before. The official website of the Department of Budget and Management (DBM) yesterday became the latest victim of a cyber attack by suspected Chinese hackers.The DBM website was defaced at around 2 pm Wednesday and will remain offline until the repairs are complete, according to Budget Secretary Florencio Abad. In a press statement, Abad said the DBM's official website, www.dbm.gov.ph , is currently undergoing a security audit and "may be inaccessible until critical issues are resolved." The hackers placed a Chinese flag on the DBM website along with a caption announcing it was " Hacked! Owned by Chinese Hackers?! " The webpage also contained a message: " How come a small bitch border country are overconfident? And Challenged to Our Chinese Super Hacker? " A warning was also displayed: " Don't Trouble Chine...
Facebook strengthens security with AntiVirus Marketplace

Facebook strengthens security with AntiVirus Marketplace

Apr 26, 2012
Facebook strengthens security with AntiVirus Marketplace Facebook has launched Anti-Virus Marketplace  , a new portal to protect the social network's users.Members are being encouraged to download anti-malware programs which they can use at no cost for six months. Facebook is strengthening its security controls in an attempt to protect its 900 million users from spam and malicious content.Facebook said Wednesday that it will work with Microsoft Corp. and with computer security firms Trend Micro Inc., Sophos, Symantec Corp. and Intel Corp.'s McAfee to provide safeguards on Facebook. " The Antivirus Marketplace was developed with industry partners to enhance protection for people on Facebook ," Facebook wrote in a blog post . " This program will help us provide even better protections to those using Facebook, no matter where they are on the web. " Facebook's security push comes as social networks become an increasingly popular target for spammers and ...
Iran Preparing For Cyberwar Against U.S

Iran Preparing For Cyberwar Against U.S

Apr 26, 2012
Iran Preparing For Cyberwar Against U.S Security professionals in both the U.S. government and in private industry have long feared the prospect of a cyberwar with China or Russia, two states capable of launching destructive attacks on the computer networks that control critical assets such as the power grid or the financial system. But, Iran is recruiting a hacker army to target the U.S. power grid, water systems and other vital infrastructure for cyberattack in a future confrontation with the United States, security specialists will warn Congress Thursday. " If Iran is willing to blow up a Washington restaurant and kill innocent Americans, we would be naive to think Iran would never conduct a cyberattack against the U.S. homeland ," said Counterterrorism and Intelligence Subcommittee Chairman Pat Meehan, R-Pa. " Over the past three years, the Iranian regime has invested heavily in both defensive and offensive capabilities in cyberspace ," states testimony from Ilan Berman...
VMWare Source Code leaked by Anonymous Hackers

VMWare Source Code leaked by Anonymous Hackers

Apr 24, 2012
VMware on Tuesday announced that a single file from its ESX server hypervisor source code has been posted online, and it held out the possibility that more proprietary files could be leaked in the future.  " The fact that the source code may have been publicly shared does not necessarily mean that there is any increased risk to VMware customers ," VMware said in a statement. " Hardcore Charlie " - who claims to have downloaded some 300 Megabytes of VMWare source code. Anonymous tweeted: @AnonymousIRC: Oops, VMWare source leaked? Not good https://pastebin.com/JGxdK6vw to Anonymous contributors. May the Pirate Bay always sail strong! The leaked documents include what appear to be internal VMWare communications, pasted onto CEIEC letterhead and with official looking stamps. One email exchange, dated June 5, 2003 is from Jeffrey Sheldon to an internal VMWare listserv and has the subject "code review:untruncating segments. Given the large number of service pr...
New Flashback malware variant found in the wild

New Flashback malware variant found in the wild

Apr 24, 2012
New Flashback malware variant found in the wild A new Flashback Trojan has been discovered that infects Macs without prompting the user for a password. If you haven't updated Java on your Mac, or disabled it entirely, you could be a victim. The new variant  dubbed Flashback.S  is actively being distributed in the wild, taking advantage of a Java vulnerability that Apple has already patched. Flashback.S drops two files in the user's home folder, then deletes cached Java files to avoid detection. However, the researchers did not indicate what this new variant was specifically designed to do or how many computers might be infected. At its height, the original Flashback, which was designed to grab passwords and other information from users through their web browser and other applications, was estimated to be infecting more than 600,000 Macs . After analyzing 100,000 Macs running the firm's free anti-virus software program, Sophos discovered several Apple computers ...
Plown : Security scanner for Plone CMS

Plown : Security scanner for Plone CMS

Apr 24, 2012
Plown : Security scanner for Plone CMS Despite the fact that Plone is one of the most secure CMS, even the most secure system can be penetrated due to misconfigurations, use of weak passwords and if the admins never apply the patches released. Plown has been developed during penetration tests on Plone sites and was used to ease the discovery of usernames and passwords, plus expose known Plone vulnerabilities that might exist on a system. What Plown does Username enumeration Multithreading password cracking.You can specify the login url (if different that login_form) and the number of threads (16 default) Known vulnerability enumeration, based on urls/objects exposed. If found vulnerable, the tool informs about the vulnerability and the url of the patch Version enumeration is planned, based on md5 hashes of static content (css, js) We hope that plown can act as an assistant to system administrators to strengthen their Plone sites. Download Code (written on python)  or visi...
Hacker deface T&T Parliament website to warn about security holes

Hacker deface T&T Parliament website to warn about security holes

Apr 23, 2012
Hacker deface T&T Parliament website to warn about security holes The Government's parliamentary website, www.ttparliament.org, was taken offline yesterday after a computer software hacker apparently breached the security codes of the site and left a mischievous message announcing the security break. Under the name "CoD3X", the hacker reassured the parliamentary site administrator that all the files and the system's database remained intact. " Greatz to admin your website hacked due to security vulnerabilities, patch your website, keep it updated. Don't worry all your files and your database are still here. This is a warning, what other hackers can do to your website. Keep it in mind...CoD3X ." Minister of Government Business and Acting Attorney General Dr Roodal Moonilal, though, was not concerned with the breach and in fact denied that the Parliament site was taken offline to deal with that specific issue. Corporate communications manager, Jason Elcock, yester...
Cyber Attack on The Iranian Oil Ministry's Computer Network

Cyber Attack on The Iranian Oil Ministry's Computer Network

Apr 23, 2012
Cyber Attack on The Iranian Oil Ministry 's Computer Network The Iranian oil ministry's computer network came under attack from hackers and a computer virus, prompting the Islamic Republic to disconnect the country's main oil export terminal from the internet as a preventative measure, a semiofficial news agency reported on Monday. The Mehr News Agency, which is a semi-official arm of the Iranian government, reported Monday that the country's principal oil terminal on Kharg Island was disconnected from the Internet as part of the response to the attacks. Email systems associated with the targets were also pulled offline. Iranian officials said the virus attack, which began in earnest Sunday afternoon, had not affected oil production or exports, since the industry was still primarily mechanical and does not rely on the Internet. Officials said they were disconnecting the oil terminals and possibly some other installations in an effort to combat the virus. Cyberattac...
Google raises Hackers bounties to $20,000

Google raises Hackers bounties to $20,000

Apr 23, 2012
Google raises Hackers bounties to $20,000 Google on Monday raised to $20,000 its bounty on software bugs that hackers could exploit for cyber attacks on the Internet giant's online services. The maximum reward for exposing a vulnerability that would let an intruder's code get up to mischief in a Google data centre was ramped up from the $US3,133 ($A3,030) payout set when the bounty program was launched in November of 2010. Remote code flaws found in Google's Web apps will also be rewarded $20,000.The term "remote code execution" refers to the most serious category of vulnerabilities, those which when exploited allow an attacker to hijack a system and/or plant malware on a machine. A $10,000 bounty will be paid for SQL injection bugs or significant authentication bypass or data leak vulnerabilities, Google said in the revised rules for the program. At Google's Pwnium contest in March, Google paid out $60,000 prizes to anyone that could exploit the Chrome b...
Iran Replicating Captured U.S. Drone RQ-170 Sentinel

Iran Replicating Captured U.S. Drone RQ-170 Sentinel

Apr 22, 2012
Iran Replicating Captured U.S. Drone RQ-170 Sentinel Iranian military aerospace chief General Amir Ali Hajizadeh was quoted having said:" The Americans should be aware to what extent we have infiltrated the plane. " Iran has broke the encryption codes and begun construction of a replica of the United States surveillance drone captured last year, according to Iranian officials. American spy drone that went down in Iran last year, including information that the aircraft was used to spy on Osama bin Laden weeks before he was killed. Iran also said it was building a copy of the drone. US Senator Joe Lieberman dismissed the claim that a copy was being made as " Iranian bluster " saying, "they're on the defensive because of our economic sanctions against them". The U.S. says the drone malfunctioned and downplayed any suggestion that Iran could mine the aircraft for sensitive information because of measures taken to limit the intelligence value of drones operating...
Fuck CISPA - Stop censoring Internet !

Fuck CISPA - Stop censoring Internet !

Apr 21, 2012
Fuck CISPA - Stop censoring Internet ! -  By:    Patti Galle, Executive Editor The Cyber Intelligence Sharing and Protection Act (CISPA) H.R. 3532 is a new bill being introduced in Congress that is gunning to blast the ongoing cyber attacks that have occurred since internet users figured out the keyboard could be an effective weapon. If passed through Congress, the bill would allow the government access to personal correspondence of any person of their choosing. Once again, we are being fucked by those nosey neighbors in our government. You should be very mad and very afraid because CISPA is far worse than SOPA and PIPA in its effects on the internet. The wording of this bill is mumbo jumbo, vague and broad. Reading through the nonsense, basically the act would allow Congress to circumvent existing exemptions to online privacy laws, and would allow the monitoring and censorship of any user of the internet. Peeping Toms will be wetting their pants. The real kicker (in ...
Advance Ethical Hacking and Cyber Security Boot Camp at Delhi, India

Advance Ethical Hacking and Cyber Security Boot Camp at Delhi, India

Apr 21, 2012
Have you ever wondered how Hackers or Black Hats hack into a computer system ? Our Hacker Boot Camp training session will teach you how this can be done. You will be shown the techniques, tools and methods that the hacker uses. This insight will help you understand how to better protect your IT architecture and identify the vectors of attack that hackers use. The Hacker News organising an Advance Ethical Hacking and Cyber Security Boot Camp at Delhi, India. All of our instructors are experts in their field and maintain respected reputations within the security community. CCSN is a revolutionary new certification in the field of information security training program for amateurs and professionals to help you gain the skills you need to become an expert in the field of information security. This specialized certification assures potential employers and customers that you have a level of advanced knowledge to detect and offer support for some of the most advanced secur...
TapLogger Android Trojan can Determine Tapped Keys

TapLogger Android Trojan can Determine Tapped Keys

Apr 21, 2012
TapLogger Android Trojan cab Determine Tapped Keys Today's smartphones are shipp ed with various embedded motion sensors, such as the accelerometer, gyroscope, and orientation sensors. These motion sensors are useful in supporting the mobile UI innovation and motion-based commands. However, they also bring potential risks of leaking user's private information as they allow third party applications to monitor the motion changes of smart phones. A team of researchers from Pennsylvania State University (PSU) and IBM have devised an Android-based Trojan that can use a handset's onboard movement sensors to crack passwords. The team created an experimental app called TapLogger , which is based on the premise that when you tap on your touch screen, you're not just interacting with the screen, but moving the entire device. So if you hit a button in the upper right corner, your phone will actually move in that direction slightly, and that subtle movement is then read by...
US-based website covering China's Bo Xilai scandal hacked

US-based website covering China's Bo Xilai scandal hacked

Apr 21, 2012
US-based website covering China's Bo Xilai scandal hacked A US-based website that has reported extensively on the Bo Xilai scandal in Chongqing says it has been crippled by a concerted hacker attack. The site was rendered inaccessible for much of Thursday, depriving readers of coverage of the latest developments in the downfall of Chinese Communist Party official Bo Xilai, said Watson Meng, 47, who runs the Chinese-language site from Durham, North Carolina. Watson Meng, the manager of the Boxun.com website, said it was out of action for several hours after a denial of service attack, in which several hackers overload a website with enquiries.The site was set up in 2000 to report on the pro-democracy movement and has been attacked before. The scandal has deeply embarrassed party leaders. Six years ago, when Shanghai powerful party chief Chen Liangyu was sacked in a corruption purge, Chinese social media was in its infancy and months went by with no word on the case against hi...
Hackers Launch DDoS Attack on D.C. Government Websites

Hackers Launch DDoS Attack on D.C. Government Websites

Apr 21, 2012
Hackers Launch DDoS Attack on D.C. Government Websites Hackers launched a DoS denial of service attack on D.C. government websites today, clogging the system with a flurry of requests so that it operates extremely slow or is impossible to load. " The District government has detected an attempted intrusion into it's technology infrastructure system, " the D.C. Department of Homeland Security and Emergency Management said in an email to specified recipients around noon. " Customers may experience intermittent difficulties in accessing the District's web site as we attempt to address the issue. We are aggressively working to resolve this matter. " In January the group launched a similar attack against the UFC for its support of the controversial Stop Online Piracy Act that was debated by Congress earlier this year. DDoS attacks have been launched by a variety of groups such as Anonymous and LulzSec against federal government websites and servers, including the FBI and CIA.
Specialized Trojan can stealing credit card details from hotel

Specialized Trojan can stealing credit card details from hotel

Apr 21, 2012
Specialized Trojan can stealing credit card details from hotel The next time you check in to a hotel, a cybercriminal could be checking you out. A remote access computer Trojan (RAT) designed to steal credit card details from hotel point-of-sale (PoS) applications is being sold on the underground forums, according to researchers from security firm Trusteer. Trusteer, the world's leading provider of secure web access services, detected these schemes and says hotel poaching is a virile trade in underground and tech forums. Attack codes can be purchased in Visa underground forums for $280 and the spyware cannot be detected by anti-virus software. The package even includes a manual loaded with tips on how the poacher can trick the desk clerk into loading the spyware for them. Malware writers often repackage their malicious installers with new algorithms in order to evade signature-based antivirus detection, said Bogdan Botezatu, a senior e-threat analyst at antivirus vendor BitDef...
Expert Insights Articles Videos
Cybersecurity Resources