#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

More than 3,000 may accept been victims of phone hacking !

More than 3,000 may accept been victims of phone hacking !

Feb 10, 2011
Up to 3,000 bodies who may accept been victims of the phone-hacking aspersion will be contacted by police, it has emerged. Officers plan to address to abstracts from politics, showbusiness and action whose names were begin at the bounds of a clandestine detective confined over the scam. The added across of the assay was appear afterwards Scotland Yard said it had articular an bearding cardinal of abeyant fresh victims. Meanwhile, above agent prime abbot Lord Prescott said he was told by badge that they had 'significant fresh evidence' apropos to his affirmation that he had been targeted. Sources said fresh advice reveals that up to 20 people, told in the aboriginal 2005 assay that there was little or no advice apropos to them, are now anticipation to accept been targeted by the Account Of The World. Last night the Duchess of York, became the most recent high-profile amount to affirmation she was a victim of buzz hacking. Sarah Ferguson said she believed her voicemail letter...
Yahoo! Announces Hack U™ Spring 2011 Series !

Yahoo! Announces Hack U™ Spring 2011 Series !

Feb 09, 2011
Yahoo! is proud to announce the Hack U™ Spring 2011 calendar of events. Join Yahoo! web experts for a week of learning, hacking and fun! You'll hear interesting tech talks, hacking tips and lessons, and get hands-on coding workshops where you'll work with cutting-edge technology. The week's events will culminate with our University Hack Day competition—a day-long festival of coding, camaraderie, demos, awards, food, music and jollity (it's a real word, look it up). It's not about perfect code, just your creativity, a cool idea and a working prototype. You'll have access to tons of APIs and tools in the Yahoo! Developer Network (check out YQL, the YUI Library, Flickr and BOSS just to name a few). No rules or limitations - just show up and hack for your opportunity to win cool prizes, a spot in the gallery, street cred and the chance to represent your school at the University Hack Showdown in California. This is your shot to develop something that will revolutionize the industry, mak...
Egyptian censor-busting website hacked !

Egyptian censor-busting website hacked !

Feb 09, 2011
A Morocco-based website advised to accord Egyptians the adeptness to get about their government's jamming of Internet sites was brought bottomward on Friday by a adult cyber-attack, the website's managing administrator said. "Someone got into the armpit about four o'clock this morning and destroyed its agency of admission to the all-around web," Francesco Landogna said. The site, Wall5, had set up a apparition aperture which baffled the basic barriers put up by Egyptian authorities back the alpha of the massive demonstrations adjoin President Hosni Mubarak two weeks ago. Landogna said that the cardinal of downloads of Wall5's censorship-busting affairs had exceeded 200,000 by backward Thursday. Algerian as able-bodied as Egyptian subscribers accept acclimated it. Rejecting a adventitious advance by hackers, he said, "These were bodies with adult accoutrement who got into the server and ashore it." Landogna said it was absurd to acquaint area the advance had appear from, but h...
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
The Unusual Suspect: Git Repos

The Unusual Suspect: Git Repos

Jul 14, 2025Secrets Management / SaaS Security
While phishing and ransomware dominate headlines, another critical risk quietly persists across most enterprises: exposed Git repositories leaking sensitive data. A risk that silently creates shadow access into core systems Git is the backbone of modern software development, hosting millions of repositories and serving thousands of organizations worldwide. Yet, amid the daily hustle of shipping code, developers may inadvertently leave behind API keys, tokens, or passwords in configuration files and code files, effectively handing attackers the keys to the kingdom. This isn't just about poor hygiene; it's a systemic and growing supply chain risk. As cyber threats become more sophisticated, so do compliance requirements. Security frameworks like NIS2, SOC2, and ISO 27001 now demand proof that software delivery pipelines are hardened and third-party risk is controlled. The message is clear: securing your Git repositories is no longer optional, it's essential. Below, we look at the ris...
All India Architects Website hacked by XrosFerZ (XrosFerZ Hacking Unit)

All India Architects Website hacked by XrosFerZ (XrosFerZ Hacking Unit)

Feb 09, 2011
All India Architects Website hacked by XrosFerZ (XrosFerZ Hacking Unit) Link :  https://www.allindiaarchitects.com/
Infiltrate 2011 - Information security Event !

Infiltrate 2011 - Information security Event !

Feb 09, 2011
Infiltrate is a deep technical security conference that will focus entirely on offensive technical issues. It will be the single-most important event for those who are focused on the technical aspects of offensive security issues. No policy or high-level presentations, just hard-core thought provoking technical meat. World-renowned researchers focused on the latest technical issues will do the presentations – demonstrating techniques you can't learn about anywhere else. In order to keep Infiltrate accessible, we are limiting attendance to 100 attendees. In addition to two days of seminars, Immunity is also offering training both before and after the event. Both Immunity's most popular class "Unethical Hacking" and a new offering, the Immunity Master Class are available. This is the only venue where these classes are offered to the public. Event details Event: Infiltrate 2011 Date: 16 April-17 April 2011 Location: National Hotel in South Beach, Florida, USA. Organizer: Immunit...
Expert Insights Articles Videos
Cybersecurity Resources