-->
#1 Trusted Cybersecurity News Platform
Followed by 5.40+ million
The Hacker News Logo
Subscribe – Get Latest News

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

50 sites Hacked by Error boy !

50 sites Hacked by Error boy !

May 10, 2011
50 sites Hacked by Error boy ! Hacked sites list : http://pastebin.com/AbxTBhuE
Chambers of Milton Commerce Canada, Nribahrain online forum & YQWORLD Education Portal hacked by lionaneesh

Chambers of Milton Commerce Canada, Nribahrain online forum & YQWORLD Education Portal hacked by lionaneesh

May 10, 2011
Chambers of Milton Commerce Canada, Nribahrain online forum & YQWORLD Education Portal hacked by lionaneesh Hack Proof + Database : http://pastebin.com/fSftCzPq
SWFRETools 1.1.0 -  Adobe Flash SWF file reverse engineering !

SWFRETools 1.1.0 - Adobe Flash SWF file reverse engineering !

May 09, 2011
SWFRETools 1.1.0 - Adobe Flash SWF file reverse engineering ! SWFRETools package contains three different tools. The most advanced tool is called Flash Dissector. It is a Java-based GUI tool you can use to inspect the binary content of SWF files. The second tool is a Java-based command-line tool called Minimizer. This tool is useful for vulnerability researchers that have a SWF file that crashes Flash Player and now they want to get rid of all parts of the SWF file that are not related to the crash. The third tool is a primitive Python-based debugger that can be used to hook and trace the Flash Player executable. Download :  version 1.1.0 of the SWFRETools on GitHub
cyber security

2026 Cloud Threats Report

websiteWizCloud Security / Threat Landscape
80% of cloud breaches still start with the basics - and AI is making them faster. Get insights into the patterns behind today's cloud attacks.
cyber security

Everyone in the Room Knows Something You Don't. Fix That at SANSFIRE

websiteSANS InstituteLive Training / Cybersecurity
SEC301 bridges the gap between business and technical teams. D.C., July 13. GISF certification.
Lahore High court to Consider Permanent Ban on Facebook !

Lahore High court to Consider Permanent Ban on Facebook !

May 09, 2011
Lahore High court to Consider Permanent Ban on Facebook ! In Pakistan, blanket bans and censorship have been a regular feature. Since 2006, there have been instances where YouTube has been blocked, and more recently, Facebook. While the pretext is national security, the protection of Islam or the interest of the greater good, political motives have almost always been behind these acts. There were many critics of those lobbying against the ban on Facebook ban in May 2010, the constant criticism being: It’s just a ban on Facebook, get over it. But actually, it wasn’t “just a ban.” It was about how we react to blasphemy, it was about the prevalent tendency to lynch others for what they say without hearing them out properly, without verifying, without giving second chances. It was about political appeasement, the use of religion for political purposes, and it was about the unconstitutional overstepping of authority by state institutions and departments. So it was not just about Faceboo...
Remote DoS Flaw in BIND Fixed in New Version !

Remote DoS Flaw in BIND Fixed in New Version !

May 09, 2011
The Internet Systems Consortium released an advisory ( http://www.isc.org/CVE-2011-1907 ) today informing BIND users that certain types of queries to name servers can cause the servers to crash and create a denial-of-service condition. This remotely exploitable bug only affects BIND users with the Response Policy Zones (RPZ) feature configured for RRset replacement, and has a high severity rating. The RPZ feature was initially built into 9.8.0 as a mechanism for modifying DNS responses from recursive servers according to local rules or those imported from a reputation provider. RPZ is generally used for forcing NXDOMAIN responses from untrusted names or RRset replacement. When RPZ is in use, queries from RRSIG for names configured for RRset replacements will trigger assertion failures and cause the name server process to exit. There is no active exploit here, but certain DNSSEC validators are known to send RRSIG queries, which then trigger the failure. A work-around for this issu...
Expert Insights Articles Videos
Cybersecurity Resources