#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Indishell (Indian Hacking Group) Got Hacked By N3t.Crack3R using XSS attack (Pakistani Hacker) !

Indishell (Indian Hacking Group) Got Hacked By N3t.Crack3R using XSS attack (Pakistani Hacker) !

Feb 23, 2011
Indishell (Indian Hacking Group) Got Hacked By N3t.Crack3R  (Pakistani Hacker) ! Indishell 's Official website Hacked By XSS attack , their forum member ' Chai ' (N3t.Crack3R) . This Hack can be seen within restricted login area so there is no ' zone-h ' Mirror, But ' N3t.Crack3R ' make a video of this hack. Download the Video : Click Here   (File size: 507.47 KB) Note : (Reload Page if 1st time you got error "File Temporarily no avaiblable")
Insecure Magazine : Issue 28 available for Download !

Insecure Magazine : Issue 28 available for Download !

Feb 23, 2011
Insecure Magazine :  Issue 28 available for Download ! Database protocol exploits explained Review: MXI M700 Bio Measuring web application security coverage Inside backup and storage: The expert's view Combating the changing nature of online fraud Successful data security programs encompass processes, people, technology Sangria, tapas and hackers: SOURCE Barcelona 2010 What CSOs can learn from college basketball Network troubleshooting 101 America's cyber cold war RSA Conference Europe 2010 Bootkits - a new stage of development Download
Watcher v1.5.1 Web security testing tool and passive vulnerability scanner download !

Watcher v1.5.1 Web security testing tool and passive vulnerability scanner download !

Feb 23, 2011
Watcher is a Web security testing tool and passive vulnerability scanner. This tool is in continues development and has updated it features and capabilities. Watcher is a runtime passive-analysis tool for HTTP-based Web applications. Being passive means it won't damage production systems, it's completely safe to use in Cloud computing, shared hosting, and dedicated hosting environments. Watcher detects Web-application security issues as well as operational configuration issues. Watcher provides pen-testers hot-spot detection for vulnerabilities, developers quick sanity checks, and auditors PCI compliance auditing. It looks for issues related to mashups, user-controlled payloads (potential XSS), cookies, comments, HTTP headers, SSL, Flash, Silverlight, referrer leaks, information disclosure, Unicode, and more. Major Features: Passive detection  of security, privacy, and PCI compliance issues in HTTP, HTML, Javascript, CSS, and development frameworks (e.g. ASP.NET, JavaServer) ...
cyber security

Master SaaS AI Risk: Your Complete Governance Playbook

websiteReco AIArtificial Intelligence / SaaS Security
95% use AI, but is it secure? Master SaaS AI governance with standards-aligned frameworks.
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them

Designing Identity for Trust at Scale—With Privacy, AI, and Seamless Logins in Mind

Jul 24, 2025
Is Managing Customer Logins and Data Giving You Headaches? You're Not Alone! Today, we all expect super-fast, secure, and personalized online experiences. But let's be honest, we're also more careful about how our data is used. If something feels off, trust can vanish in an instant. Add to that the lightning-fast changes AI is bringing to everything from how we log in to spotting online fraud, and it's a whole new ball game! If you're dealing with logins, data privacy, bringing new users on board, or building digital trust, this webinar is for you . Join us for " Navigating Customer Identity in the AI Era ," where we'll dive into the Auth0 2025 Customer Identity Trends Report . We'll show you what's working, what's not, and how to tweak your strategy for the year ahead. In just one session, you'll get practical answers to real-world challenges like: How AI is changing what users expect – and where they're starting to push ba...
Dorset HealthCare University NHS Foundation Trust website Hacked !

Dorset HealthCare University NHS Foundation Trust website Hacked !

Feb 23, 2011
HACKERS brought down a website for a health trust serving 700,000 NHS patients in Dorset. The attack, which disabled the site over the weekend, blocked access to the Dorset HealthCare University NHS Foundation Trust website. The trust provides treatment for mental health issues, addiction, dentistry, and some primary care services to patients across the county. Hackers posted a message on the site which read: "Don't mess with me. Site totally hacked" and a cartoon image of a penguin emerging from a shattered computer screen carrying a gun. A jumbled message posted by the hacker on the trust's website read: "You call this security. You must be kidding. If you don't want to get into trouble, patch your admin." Dr Paul Ton de Vrieze, a lecturer in web systems and technologies at  Bournemouth University , said such attacks were often made only for the hacker's satisfaction. "Sometimes people hack sites for their own bravura. They think it is fun to do and show the world that they are...
Kaspersky Lab forecast for the IT threat landscape 2011 – 2020 !

Kaspersky Lab forecast for the IT threat landscape 2011 – 2020 !

Feb 23, 2011
Kaspersky Lab has released its forecast for the IT threat landscape for this decade (2011 – 2020). Kaspersky bases this forecast on an analysis of the main changes and issues in the sphere of IT security over the past decade, as well as emerging trends in the development of personal computers, mobile phones and operating systems. According to the company's analysts, the most significant trends of the last ten years (2001-2010) were: Mobility and miniaturisation . Smaller and smaller devices can now access the Internet from virtually any point on the globe; making wireless networks the most popular method of connecting to the web. The transformation of virus writing  into cybercrime (Crime committed using a computer and the internet to steal a person's identity, sell contraband, stalk victims or disrupt organisations with malevolent programs). Windows maintaining its leading position  as a vendor of operating systems for personal computers. Intense competition in the mobil...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>