-->
#1 Trusted Cybersecurity News Platform
Followed by 5.40+ million
The Hacker News Logo
Subscribe – Get Latest News

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Pakistan Telecommunication Company (PTCL) Hacked by lionaneesh, users data compromised

Pakistan Telecommunication Company (PTCL) Hacked by lionaneesh, users data compromised

May 14, 2011
Pakistan Telecommunication Company (PTCL)  Hacked by lionaneesh , users data compromised Hacked site :  http://www.ptcl.com.pk/ Hack Proof by Hacker :  http://pastebin.com/eBTR5d5H
13th Friday, Everything Down : Twitter ,You tube & Blogger !

13th Friday, Everything Down : Twitter ,You tube & Blogger !

May 13, 2011
13th Friday, Everything Down : Twitter ,You tube & Blogger ! Twitter is down and fail whales abound. Some users have experienced problems loading the service since about 1:30 ET. Twitter announced that it is aware of the situation on its status log: “ We are currently experiencing site stability issues. There may be intermittent issues loading twitter.com. We’re working to fix it as soon as possible ,” the post says. We’ll continue to update you with more information, as it becomes available. Today Blogger.com was also down from last 48 hours, But Finally, Blogger.com is back !
Critical Flash Player Update to fix 11 Security Holes

Critical Flash Player Update to fix 11 Security Holes

May 13, 2011
Critical Flash Player Update to fix 11 Security Holes Adobe  has released another batch of security updates for its ubiquitous  Flash Player software. This “critical” patch fixes at least 11 vulnerabilities, including one that reports suggest is being exploited in targeted email attacks. In  the advisory  that accompanies this update, Adobe said “there are reports of malware attempting to exploit one of the vulnerabilities, CVE-2011-0627, in the wild via a Flash (.swf) file embedded in a Microsoft Word  (.doc) or  Microsoft Excel  (.xls) file delivered as an email attachment targeting the  Windows  platform. However, to date, Adobe has not obtained a sample that successfully completes an attack.” The vulnerabilities exist in Flash  versions 10.2.159.1  and earlier for Windows,  Mac ,  Linux and  Solaris . To learn which version of Flash you have, visit  this link . The new version for most platforms is 10...
cyber security

2026 Cloud Threats Report

websiteWizCloud Security / Threat Landscape
80% of cloud breaches still start with the basics - and AI is making them faster. Get insights into the patterns behind today's cloud attacks.
cyber security

Pentest Like Attackers Actually Do. SEC560 at SANSFIRE 2026

websiteSANS InstituteLive Training / Cybersecurity
From Kerberoasting to domain dominance—SEC560 covers the full kill chain. Washington, D.C., July 13.
Finally, Blogger.com is back !

Finally, Blogger.com is back !

May 13, 2011
Finally, Blogger.com is back ! Blogger.com is back now, Official statement : http://buzz.blogger.com/2011/05/blogger-is-back.html
Hacker getting WordPress Database Dump with Google Query !

Hacker getting WordPress Database Dump with Google Query !

May 13, 2011
Hacker getting WordPress Database Dump with Google Query ! There appear to be multiple WordPress powered sites that are performing an DB->XML dumb of the articles and subsequent pages. The comments section includes originating IP address, datetime, E-Mail address, homepage, etc. These entities are traditionally not exposed to the anonymous Internet via WordPress. Since the XML dump is structured it's quite easy to harvest this data. More alarming is the volume of sites freely exposing this. I'm not certain of the root cause but perhaps it's related to an upgrade procedure. Google is happily indexing and caching these dumps as it appears they're created in the attachment system (URI ?attachment_id=\d+) with an HREF to the actual dump. A simple Google search below will return a multitude of sites. Perhaps someone on the WordPress side can comment on this behavior? Google Query - inurl:uploads ".xml_.txt" wordpress Anoth...
Expert Insights Articles Videos
Cybersecurity Resources