#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Rootkit.com database leaked by Anonymous Hackers, Available for Download !

Rootkit.com database leaked by Anonymous Hackers, Available for Download !

Feb 10, 2011
On February 6, 2011, as part of their attack on HBGary , the Anonymous group social engineered administrator of rootkit.com , Jussi Jaakonaho, to gain root access to rootkit.com . The entire MySQL database backup was then released by Anonymous and announced using HBGary's CEO Twitter account, @aaronbarr   : Sup, here's rootkit.com MySQL Backup https://stfu.cc/rootkit_com_mysqlbackup_02_06_11.gz #hbgary #rootkit #anonymous.   The table pic shown is the list of accounts found in rootkit.com MySQL database backup with passwords in cleartext.
Chinese hackers penetrate multinational oil giants !

Chinese hackers penetrate multinational oil giants !

Feb 10, 2011
Hackers in China  are causing havoc among computer systems of five multinational oil and gas companies, according to a new report by McAfee.  Security outfits have warned that this type of attack could get lot worse as multinationals continue to prod the Chinese government.  McAfee said in its  Night Dragon whitepaper  that hackers have stolen bidding plans and other critical proprietary information. This can be used to detrimental effect and give competitors an advantage.  It could not name the five petrochemical and oil companies as it says they are clients. George Kurtz, CTO, said in a  blog post : "We have strong evidence suggesting that the attackers were based in China. The tools, techniques, and network activities used in these attacks originate primarily in China. These tools are widely available on the Chinese Web forums and tend to be used extensively by Chinese hacker groups." He warns that well-coordinated, targeted attacks such a...
Operation Italy Press Release : Anonymous Hackers will Soon strike again !

Operation Italy Press Release : Anonymous Hackers will Soon strike again !

Feb 10, 2011
Operation Italy Press Release : Anonymous Hackers will Soon strike again ! Operation Italy part2 - Target: Surprise : Join #opitaly the 13/02/2011 at 12 GMT PM Attention Please: citizens of the world Anonymous will soon strike again. We are determined to continue our protest. Anonymous represent the voice of the people,and that voice has clearly spoken against the current Italian government. Italian people deserve something better than faggot Berlusconi and his political class. The ruling political party in Italy stand against everything that Anonymous consider worthwhile freedom of expression,freedom of press,and a freely accessible and uncensored internet being only some of those universally granted rights. We also request the removal of the ban against thepiratebay.org and the deletion of the infamous Bondi/SIAE tax on digital storage. ,We are not willing to set deadlines for our protest;it will endure until all our requests ...
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
The Unusual Suspect: Git Repos

The Unusual Suspect: Git Repos

Jul 14, 2025Secrets Management / SaaS Security
While phishing and ransomware dominate headlines, another critical risk quietly persists across most enterprises: exposed Git repositories leaking sensitive data. A risk that silently creates shadow access into core systems Git is the backbone of modern software development, hosting millions of repositories and serving thousands of organizations worldwide. Yet, amid the daily hustle of shipping code, developers may inadvertently leave behind API keys, tokens, or passwords in configuration files and code files, effectively handing attackers the keys to the kingdom. This isn't just about poor hygiene; it's a systemic and growing supply chain risk. As cyber threats become more sophisticated, so do compliance requirements. Security frameworks like NIS2, SOC2, and ISO 27001 now demand proof that software delivery pipelines are hardened and third-party risk is controlled. The message is clear: securing your Git repositories is no longer optional, it's essential. Below, we look at the ris...
School site hacked and replaced with porn webpages !

School site hacked and replaced with porn webpages !

Feb 10, 2011
A LOCAL secondary school's website was allegedly hacked and replaced with a pornographic site according to  a post in citizen journalism website Stomp. Stomper John, seeking a potential school for his son entering secondary school next year, visited the website of Junyuan Secondary School for more information on Wednesday evening after recommendations from friends that it was a good school. Upon logging into www.junyuansec.net , a pornographic site greeted him. He said the website had been hacked into and replaced with the pornographic site. 'What shocked me more was that the school did not do anything about it and let it remain this way,' he says. He added: 'It was like this the entire evening and I hope that the school will do something about it asap as it will tarnish the school's reputation.' An page error notification appeared when StraitsTimes.com tried to access the link on Thursday afternoon. The school's principal, Lee Lai Yong, told Straits...
The Iphone can be hacked in 6 minutes !

The Iphone can be hacked in 6 minutes !

Feb 10, 2011
INSECURITY RESEARCHERS have busted an Iphone's encryption protection in just six minutes to gain access to passwords. Boffins at the Fraunhofer Institute for Secure Information Technology (SIT) in Germany devised the hack. The researchers did the tests to demonstrate that passwords aren't secure on Iphones that have been lost. They obviously had a point to prove and weren't happy with just hacking Apple's shoddy security encryption in six minutes. Within the allotted time, the team also managed to retrieve most of the passwords stored on the Iphone, accessing personal data that could be used to get into bank accounts. What's great about this hack is that the team spends some time in its report tellng us that it renders the Iphone completely vulnerable as a business tool. It could even make a company's network security vulnerable as well. The flaw affects all Ithings with the latest firmware and the team didn't even have to break the more complicated 256...
Expert Insights Articles Videos
Cybersecurity Resources