#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Mubarak Resigns, Congratulations Egypt : Anonymous Press Release !

Mubarak Resigns, Congratulations Egypt : Anonymous Press Release !

Feb 11, 2011
Mubarak Resigns, Congratulations Egypt : Anonymous Press Release ! It was 18 days of sometimes violent demonstrations that forced the man who ruled Egypt for nearly 30 years to step down.  Friday was the day the demonstrators had been awaiting. The announcement of Mr. Mubarak's resignation drew an immediate roar of cheers and honking automobile horns throughout Cairo that went on for hours. The announcement came from Vice President Omar Suleiman on state television. He said Mr. Mubarak was stepping down and had asked the military to take control of the country.  He ended his statement with the words "May God help everyone."  Thousands headed to Cairo's central Tahrir Square to join the tens of thousands already there.  Among them was 33-year-old Eman Saad. "My reaction?  It's amazing!  Freedom!" said an jubilant Saad. Anonymous Press Release : Congratulations Egypt! Sisters and Brothers of Egypt today is momentous. Today you write proud history. T...
Archives of all of HBGary's conversations with the FBi, NSA, CIA, US Army, House and Senate !

Archives of all of HBGary's conversations with the FBi, NSA, CIA, US Army, House and Senate !

Feb 11, 2011
Archives of all of HBGary 's conversations with the FBi, NSA, CIA, US Army, House and Senate ! 16K cia.zip  https://uiu.me/cia.zip 25M nsa.zip  https://uiu.me/nsa.zip 15M fbi.zip  https://uiu.me/fbi.zip 112M army.zip  https://uiu.me/army.zip 396K house.zip  https://uiu.me/house.zip 6.0M senate.zip  https://uiu.me/senate.zip
The Real Story about rootkit.com ,HBGary E-mail !

The Real Story about rootkit.com ,HBGary E-mail !

Feb 11, 2011
The Real Story about rootkit.com , HBGary E-mail ! HBGary E-mail Viewer greg@hbgary.com Go back Original file: 27606 click here to show this e-mail with HTML markup From: jussi jaakonaho <jussij@gmail.com> To: Greg Hoglund <greg@hbgary.com> Date: Sun, 6 Feb 2011 22:15:54 +0200 Subject: Re: need to ssh into rootkit click here to show full headers Attachments: This e-mail does not have any attachments. did you open something running on high port? On Feb 6, 2011, at 9:43 PM, Greg Hoglund wrote: > ok let me know if you need me >  > On 2/6/11, jussi jaakonaho <jussij@gmail.com> wrote: >> tnx. >> i am also connected to the box, seems some people have download problems - >> have figured earlier that some chinese used chinese chars on names of files, >> which then our filtering stripped off when putting db etc. so some db >> editing >>  >>  >> _jussi ...
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
Securing Agentic AI: How to Protect the Invisible Identity Access

Securing Agentic AI: How to Protect the Invisible Identity Access

Jul 15, 2025Automation / Risk Management
AI agents promise to automate everything from financial reconciliations to incident response. Yet every time an AI agent spins up a workflow, it has to authenticate somewhere; often with a high-privilege API key, OAuth token, or service account that defenders can't easily see. These "invisible" non-human identities (NHIs) now outnumber human accounts in most cloud environments, and they have become one of the ripest targets for attackers. Astrix's Field CTO Jonathan Sander put it bluntly in a recent Hacker News webinar : "One dangerous habit we've had for a long time is trusting application logic to act as the guardrails. That doesn't work when your AI agent is powered by LLMs that don't stop and think when they're about to do something wrong. They just do it." Why AI Agents Redefine Identity Risk Autonomy changes everything: An AI agent can chain multiple API calls and modify data without a human in the loop. If the underlying credential is exposed or overprivileged, each addit...
Launching AnonLeaks, Ready To Dump More HBGary E-mails !

Launching AnonLeaks, Ready To Dump More HBGary E-mails !

Feb 11, 2011
Anonymous used to be all about disrupting the Web sites of companies that helped block WikiLeaks' funding. Now it's starting to act like WikiLeaks itself. The group is planning, as early as today, to release 27,000 e-mails from the server of Greg Hoglund, the chief executive of software security firm HPGary, which it says could have permanently damaging consequences for the company. Anonymous has already posted around 50,000 emails of Aaron Barr, the CEO of sister organisation HPGary Federal, which revealed a report by the firm looking at ways to sabotage WikiLeaks in collaboration with Palantir Technologies and Berico Technologies. The emails also show that Bank of America, a potential target of WikiLeaks, was to hear the proposal via its outside law firm Hunton & Williams. A source from Anonymous says that most of the new e-mails from Hoglund are still unchecked and it is unclear who will be most liable when the information is made public, but added that briefly skimming the ...
HITB MagazineVolume 1, Issue 5 Download !

HITB MagazineVolume 1, Issue 5 Download !

Feb 11, 2011
Contents of HITB Magazine Issue 005: Linux Security: Investigating Kernel Return Codes with the Linux Audit System Network Security: Secure Shell Attack Measurement and Mitigation and ARP Spoofing Attacks & Methods for Detection and Prevention: Exploiting Web Virtual Hosting –Malware Infections Windows Security: Windows CSRSS Tips & Tricks Professional development: CISSP® Corner – Tips and Trick on becoming a Certified Information Systems Security Professional Interview: Rolf Rolles And much more…. Click here to read online via Google Docs.
Expert Insights Articles Videos
Cybersecurity Resources