-->
#1 Trusted Cybersecurity News Platform
Followed by 5.40+ million
The Hacker News Logo
Subscribe – Get Latest News

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

6 denmark websites hacked by ahmdosa !

6 denmark websites hacked by ahmdosa !

Apr 30, 2011
6 denmark websites hacked by ahmdosa ! Hacked Sites : http://aloegel.dk/ http://barndeluxe.dk/ http://drikkegel.dk/ http://julie-jensen.dk/ http://sygehusplan2010.dk/ http://timo-jensen.dk
ICANN Hires Def Con Founder Jeff Moss as Security Chief !

ICANN Hires Def Con Founder Jeff Moss as Security Chief !

Apr 30, 2011
ICANN Hires Def Con Founder Jeff Moss as Security Chief ! Jeff Moss, the hacker better known as “ The Dark Tangent ,” has been named Vice President and Chief Security Officer of ICANN, the non-profit corporation that manages the Internet's names and numbering infrastructure. He is the founder of DEF CON, the world's largest conference for hackers, as well as the Black Hat security conference. A phone phreaker in his youth, Moss has recently worked as a white hat hacker, working to secure networks from attack. “He has the in-depth insider's knowledge that can only come from fighting in the trenches of the on-going war against cyber threats,” said ICANN president Rod Beckstrom in a statement. Moss is well known for having created the game “Spot the Fed” in which a hacker who thinks he's identified an undercover federal agent in the crowd at DEF CON can point him out, make his case, and if the crowd agrees, take home a coveted “I Spotted The Fed at DEF CON” t-shirt. D...
Cross site scripting (XSS) vulnerability in Rebook.com Found By Zero Cool

Cross site scripting (XSS) vulnerability in Rebook.com Found By Zero Cool

Apr 30, 2011
Cross site scripting (XSS) vulnerability in Rebook.com Found By Zero Cool Vulnerable Link :   http://www.reebok.com/IN/ search?t=%3E%22%3E%3CMARQUEE% 3EHACKED%20BY%20ZERO%20COOL% 3C/MARQUEE%3E%3Ciframe+src+% 3D%22http://www.thehackernews. com%22+width%3D%22100%25%22+ height%3D%22100%25%22%3E%3C% 2Fiframe%3E&Submit=Go
cyber security

Secure Coding Best Practices [Cheat Sheet]

websiteWizSecure Coding / DevSecOps
Secure coding starts long before production. Reduce risk early with practical secure coding and design best practices.
cyber security

Inside the 2026 Cyber Workforce: Skills, Shortages, and Shifts in the Age of AI

websiteSANS InstituteAI Security / Cybersecurity
Insights to help leaders make informed decisions and show practitioners where careers are heading.
PacketManipulator 0.3 released - including Windows Installer !

PacketManipulator 0.3 released - including Windows Installer !

Apr 30, 2011
PacketManipulator 0.3 released - including Windows Installer ! PacketManipulator is a network scanning frontend. PacketManipulator is developed in the Python programming language, and its interface is built with the GTK Toolkit. The project goal is to develop a frontend that is really useful for advanced users and easy to be used by newbies. With PacketManipulator, network admin can forge custom packets and send them over the wire to analyze the network, sniff on a selected interface or simply edit a pcap file for further replay. Download  PacketManipulator-0.3-installer-winxp.exe  ( 11.9 MB) For Installation Guide and Further Read : Click Here
Dslreports.com hacked, Over 9000 accounts compromised !

Dslreports.com hacked, Over 9000 accounts compromised !

Apr 30, 2011
Dslreports.com hacked , Over 9000 accounts compromised ! DSL Reports - the information and review site on high speed Internet services which operates over 200 forums - has been hit with a blind SQL injection attack, which resulted in the compromise of at least 9000 accounts. Founder Justin Beech posted a notification about the intrusion on the forum dedicated to the site, in which he specified that no login names, zip codes and private posts were compromised. The attack went on for four hours on Wednesday and it was blocked before it had completed more than 8% of its work. All the same, the attackers managed to obtain a large number of email/password pairs. "The ones they obtained were basically random. So they cover the entire 10 year history of the membership but sprinkled randomly. Some are very old accounts, some are new accounts, some inactive or deleted," says Beech. "I identified the newest accounts, those that were obtained and have logged in over the ...
Expert Insights Articles Videos
Cybersecurity Resources