-->
#1 Trusted Cybersecurity News Platform
Followed by 5.40+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

"TeaM DNA StuXnet Shell v1.0" is ripped copy of "Predator Shell" !

"TeaM DNA StuXnet Shell v1.0" is ripped copy of "Predator Shell" !

Mar 12, 2011
" TeaM DNA StuXnet Shell v1.0 " is ripped copy of " Predator Shell " ! " TeaM DNA StuXnet " have submit us a shell named " TeaM DNA StuXnet Shell v1.0 " to publish as news, They claimed that this is a news and original shell. Shell is created by " Cyb3r Ac3 " . We request  Pakistan Cyber Army (Real PCA is Reality) for some research on a new shell posted by " TeaM DNA StuXnet ". Finally we got whole report that The " TeaM DNA StuXnet Shell v1.0 " is 100% ripped copy of " Predator Shell " Written by " LoFFi & Ls01r " who are said to be some " Russian " freaks.They just find and replace "color=#888888" with "color=#0961d9" .The best part about this shell is " LoFFi & Ls01r " also ripped another shell named " crashblack a.k.a vi0ne " an Indonesian hacker who wrote the shell named " System Shell ". " LoFFi & Ls01r " tran...
MHTML vulnerability under active exploitation !

MHTML vulnerability under active exploitation !

Mar 12, 2011
We’ve noticed some highly targeted and apparently politically motivated attacks against our users. We believe activists may have been a specific target. We’ve also seen attacks against users of another popular social site. All these attacks abuse a publicly-disclosed MHTML vulnerability for which an exploit was publicly posted in January 2011. Users browsing with the Internet Explorer browser are affected. For now, we recommend concerned users and corporations seriously consider deploying Microsoft’s temporary Fixit to block this attack until an official patch is available. To help protect users of our services, we have deployed various server-side defenses to make the MHTML vulnerability harder to exploit. That said, these are not tenable long-term solutions, and we can’t guarantee them to be 100% reliable or comprehensive. We’re working with Microsoft to develop a comprehensive solution for this issue. The abuse of this vulnerability is also interesting because it represents ...
Dehuajie.gov.cn Hacked by Anarchy Cr3w (Kurdish Hackers) !

Dehuajie.gov.cn Hacked by Anarchy Cr3w (Kurdish Hackers) !

Mar 12, 2011
Dehuajie.gov.cn Hacked by Anarchy Cr3w (Kurdish Hackers) ! Hacked Site :   http://www.dehuajie.gov.cn/ News Source : Anarchy Cr3w (Kurdish Hackers)
cyber security

Secure Coding Best Practices [Cheat Sheet]

websiteWizSecure Coding / DevSecOps
Secure coding starts long before production. Reduce risk early with practical secure coding and design best practices.
cyber security

Inside the 2026 Cyber Workforce: Skills, Shortages, and Shifts in the Age of AI

websiteSANS InstituteAI Security / Cybersecurity
Insights to help leaders make informed decisions and show practitioners where careers are heading.
Town Council of OGEMBO & MARAGUA Hacked by HEXBOOT3R (Turkish Hacker) !

Town Council of OGEMBO & MARAGUA Hacked by HEXBOOT3R (Turkish Hacker) !

Mar 12, 2011
Town Council of OGEMBO & MARAGUA Hacked by HEXBOOT3R (Turkish Hacker) ! Hacked sites :  http://www.ogembotown.go.ke/ http://www.maraguatown.go.ke/
In search of the Twitter Hacker !

In search of the Twitter Hacker !

Mar 12, 2011
Labor woes. Steroids. Corrupt college programs. There are many serious issues facing the sports world. But they all are a distant second to one other. It's someone so skilled, so savvy, that you may not have even heard of him. The Twitter Hacker. Let's start at the beginning. Or what could be the beginning. The Twitter Hacker is so stealthy and subtle that there's no way to know when he began hacking into the accounts of our athletes. But one of the first cases that caught some attention came last May when the following appeared on the Twitter account of Boston Celtics forward Paul Pierce after the Celtics took a 2-0 lead over the Magic in the Eastern Conference finals: "Anybody got a BROOM?" Ha! A confident athlete talking trash. Nothing remotely out of the ordinary there. But soon after, Pierce's digital media rep claimed that tweet did not come from Pierce, claiming the "BROOM" tweet was "courtesy of a hack." And that they were ...
Expert Insights Articles Videos
Cybersecurity Resources