#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Reversing Stuxnet's Rootkit Into C++ , Download !

Reversing Stuxnet's Rootkit Into C++ , Download !

Feb 11, 2011
This is the first time Mr.  Amr Thabet from Egypt , student at Alexandria University Faculty of Engineering Mechanical Department  ,  reverse a rootkit. He choose Stuxnet Rootkit (as it's a famous virus) and begin reversing.. Finally now he convert it into C++ code with a commented IDA Pro v.5.1 Database for it. Download Here
Online dating site eHarmony.com Hacked !

Online dating site eHarmony.com Hacked !

Feb 11, 2011
Online dating giant  eHarmony  has begun urging many users to change their passwords, after being alerted  to a potential security breach of customer information. The individual responsible for all the ruckus is an Argentinian hacker who recently claimed responsibility for a similar breach  at competing e-dating site PlentyOfFish.com . Late last year,  Chris "Ch" Russo , a self-styled "security researcher" from Buenos Aires, told me he'd discovered vulnerabilities in eHarmony's network that allowed him to view passwords and other information on tens of thousands of eHarmony users. Russo first alerted me to his findings in late December, right after he said he first began contacting site administrators about the flaw. At the time, I sent messages to several of the administrative eHarmony e-mail addresses whose passwords Russo said he was able to discover, although I received no response. Russo told me shortly thereafter that he'd hit a brick wall in his researc...
Senior bank manager's account hacked !

Senior bank manager's account hacked !

Feb 11, 2011
JAIPUR: A senior manager of a private bank has registered an FIR against some unidentified persons who allegedly hacked his email ID and sent objectionable emails. The Ashok Nagar police are investigating the matter. SHO, Ashok Nagar and investigating officer of the case Jagmohan said one Brijesh Kumar registered the FIR on Wednesday. "He says that someone hacked his email account and sent mails with pornographic content and other objectionable mails," the officer said. "We have lodged a case under sections of Information Technology Act," the officer added.
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
The Unusual Suspect: Git Repos

The Unusual Suspect: Git Repos

Jul 14, 2025Secrets Management / SaaS Security
While phishing and ransomware dominate headlines, another critical risk quietly persists across most enterprises: exposed Git repositories leaking sensitive data. A risk that silently creates shadow access into core systems Git is the backbone of modern software development, hosting millions of repositories and serving thousands of organizations worldwide. Yet, amid the daily hustle of shipping code, developers may inadvertently leave behind API keys, tokens, or passwords in configuration files and code files, effectively handing attackers the keys to the kingdom. This isn't just about poor hygiene; it's a systemic and growing supply chain risk. As cyber threats become more sophisticated, so do compliance requirements. Security frameworks like NIS2, SOC2, and ISO 27001 now demand proof that software delivery pipelines are hardened and third-party risk is controlled. The message is clear: securing your Git repositories is no longer optional, it's essential. Below, we look at the ris...
Metasploit Framework v3.5.2 latest version download !

Metasploit Framework v3.5.2 latest version download !

Feb 11, 2011
Our favourite exploitation framework – The Metasploit Framework has been updated! We now have Metasploit Framework version 3.5.2! "The Metasploit Framework is a penetration testing toolkit, exploit development platform, and research tool. The framework includes hundreds of working remote exploits for a variety of platforms. Payloads, encoders, and nop slide generators can be mixed and matched with exploit modules to solve almost any exploit-related task." This is the detailed release log: Statistics: * Metasploit now ships with 644 exploit modules and 330 auxiliary modules. * 39 new modules and payloads have been added since the last point release. * 58 tickets were resolved and 331 commits were made since the last point release. New Modules: New Exploits and Auxiliaries: * Apache Tomcat Transfer-Encoding Information Disclosure and DoS * Microsoft IIS FTP Server Encoded Response Overflow Trigger * Apache HTTPD mod_negotiation Filename Bruter * Apache HTTPD mod_negotiatio...
Leader.ir Next Target by Anonymous at 11.02.2011 at 18.00 !!

Leader.ir Next Target by Anonymous at 11.02.2011 at 18.00 !!

Feb 10, 2011
Leader.ir Next Target by Anonymous at 11.02.2011 at 18.00 !! TARGET: Leader.ir -- 11.02.2011 at 18.00 ( 6 PM ) GMT LOIC:   https://3.ly/77Dy PRESS:   Operation Iran - Press release by Anonymous Hackers ! REASONS:   https://www.youtube.com/watch?v=3_IHeYjiFlY
Expert Insights Articles Videos
Cybersecurity Resources