#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Chip.in - Technology Magazine website Hacked by TriCk & Assasin (ZHC & TeaMp0isoN)

Chip.in - Technology Magazine website Hacked by TriCk & Assasin (ZHC & TeaMp0isoN)

Feb 26, 2011
Chip.in - Technology Magazine website Hacked by TriCk & Assasin (ZHC & TeaMp0isoN) Link :  https://www.chip.in/forums/ Mirror :  https://mirror-az.com/mirror/?id=12689 News Source : TriCk & Assasin (ZHC & TeaMp0isoN)
BlackHole RAT : Mac OS X backdoor Trojan !

BlackHole RAT : Mac OS X backdoor Trojan !

Feb 26, 2011
' BlackHole ' is the latest remote administration tool (RAT) and is available both in Windows and Mac. Hacktool such RAT employs client-server program that communicates to its victim's machine through its trojan server. The server application is installed on the victim while the client application is on the managing side. The version suggest that ' BlackHole ' is currently in its early stage. However, the author seems to start showcasing the following functionalities: Remote execution of shell commands. Opens webpage using user's default browser. Sends a message which is displayed on the victims screen. Creates a text file. It is capable to perform shutdown, restart and sleep operation. It is capable to request for admin privileges. Here is an excerpt from the default text that is displayed in the full screen window with the reboot button: "I am a Trojan Horse, so i have infected your Mac Computer. I know, most people think Macs can't be infected, but look, you ARE I...
Motorola Xoom Gets Hacked In Under An Hour after Release !

Motorola Xoom Gets Hacked In Under An Hour after Release !

Feb 26, 2011
Despite just being released on February 24th, the Motorola Xoom has become the newest victim of developer rooting, and it took less than two hours to do it. Xeriouxly. The best part? The Clockwork Recovery running on it means that other developers can now create their own custom ROMs to hack whatever they want onto the tablet. Clockwork Recovery, also known as ClockworkMod, is a recovery console used on rooted Android Google devices, mainly using for flashing custom ROMs. It can make and restore backups, and it fairly straightforward to install too. The root was done by coder " Koushi ", pretty much as soon as he got his copy of the device home. In a blog post, he explained how he managed to get the custom root running so quickly. He got Clockwork Recovery running by building up a recovery (which he will not release yet due to the SD slot being non-functional at the moment) via  AOSP 's kernel and then using a ROM manager to get Superuser on the Xoom. He has a...
cyber security

Master SaaS AI Risk: Your Complete Governance Playbook

websiteReco AIArtificial Intelligence / SaaS Security
95% use AI, but is it secure? Master SaaS AI governance with standards-aligned frameworks.
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them

Malicious PyPI Packages Are Everywhere — A Practical Guide to Defending the Python Supply Chain

Jul 24, 2025
Python supply chain attacks are surging in 2025. Join our webinar to learn how to secure your code, dependencies, and runtime with modern tools and strategies.
Indian United Nations & Football Association website's XSS  Vulnerabilities found by TriCk (TeaMp0isoN)

Indian United Nations & Football Association website's XSS Vulnerabilities found by TriCk (TeaMp0isoN)

Feb 26, 2011
Indian United Nations & Football Association website's XSS  Vulnerabilities found by TriCk (TeaMp0isoN) 1.) The FA (The Football Association) XSS Vulnerability - TriCk - TeaMp0isoN Link : Click Here 2.) Indian United Nations XSS Vulnerability - TriCk - TeaMp0isoN Link : Click Here News Source : TriCk - TeaMp0isoN | Via Email
Hackers Could Exploit Federal Government Shutdown !

Hackers Could Exploit Federal Government Shutdown !

Feb 25, 2011
The federal government's list of emergency network security personnel has not been updated in 15 years, putting national security at high risk if a shutdown takes place on March 4. The possible government shutdown scheduled for March 4, 2011 could trigger a cyberwar emergency. If non-essential government employees end up being furloughed in early March, the federal government's computer systems will be run by a shortlist of critical-need employees. One major problem: The federal government's list of critical-need computer security employees has not been updated in over 15 years. According to the influential Nextgov website, the government's emergency call-up IT security list was last updated in 1995, ahead of the last federal government shutdown. "In 1995, we already had that decided," said Hord Tipton, a former Interior Department chief information officer who was Bureau of Land Management assistant director for resource use and protection during the ...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>