-->
#1 Trusted Cybersecurity News Platform
Followed by 5.40+ million
The Hacker News Logo
Subscribe – Get Latest News

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Understanding The Concept of Bypassing Antivirus,by Internet Security Team

Understanding The Concept of Bypassing Antivirus,by Internet Security Team

May 14, 2011
Understanding The Concept of Bypassing Antivirus ,by Internet Security Team Anti-Virus manufacturers nowadays implements more and more complex functions and algorithms in order to detect the latest and newest viruses along with their variants. There is however simple methods that can be used to by-pass most of these, especially those that doesn’t use heuristics and similar techniques at all. Download guide :  http://www.multiupload.com/P8YWVINAIQ Rar file password : thn
Devil shell v1.2  - Php shell with DDoS feature !

Devil shell v1.2 - Php shell with DDoS feature !

May 14, 2011
Devil shell v1.2  - Php shell with DDoS feature !   Features : 1. Design 2. Permission Change of file / Folders 3. Improved DDoS 4. Create Folder 5. Multi uploading 6. Encrypted Title so hard to find by Google.  Download Link http://www.filefactory.com/file/cb4d35e/n/ugdevil.php Username : ugdevil Password : 1234567 For further Query mail me at : ugdevil@gmail.com
PlayStation Network hack launched from Amazon EC2 !

PlayStation Network hack launched from Amazon EC2 !

May 14, 2011
PlayStation Network hack launched from Amazon EC2 ! The hackers who breached the security of Sony's PlayStation network and gained access to sensitive data for 77 million subscribers used Amazon's web services cloud to launch the attack, Bloomberg News reported. The attackers rented a sever from Amazon's EC2 service and penetrated the popular network from there, the news outlet said, citing an unnamed person with knowledge of the matter. The hackers supplied fake information to Amazon. The account has now been closed. Neither Sony nor Amazon commented on the claims. Bloomberg doesn't say how Amazon's cloud service was used to mount the attack. If the report is correct, it wouldn't be the first time it's been used by hackers. Read More
cyber security

2026 Cloud Threats Report

websiteWizCloud Security / Threat Landscape
80% of cloud breaches still start with the basics - and AI is making them faster. Get insights into the patterns behind today's cloud attacks.
cyber security

Pentest Like Attackers Actually Do. SEC560 at SANSFIRE 2026

websiteSANS InstituteLive Training / Cybersecurity
From Kerberoasting to domain dominance—SEC560 covers the full kill chain. Washington, D.C., July 13.
China plugging holes in its Great Firewall by disrupting VPN traffic !

China plugging holes in its Great Firewall by disrupting VPN traffic !

May 14, 2011
China plugging holes in its Great Firewall by disrupting VPN traffic ! Chinese internet users suspect that their government is interfering with the method they have been using to tunnel under the "Great Firewall" to prevent them connecting with the outside world. Sites such as search engine Google and news site MSN have become difficult to access, they say. And a number of universities and businesses have begun warning their users not to try to evade the firewall. Since 6 May, a number of users says that internet connections via China Telecom, the largest telephone company, and China Unicom have become "unstable", with intermittent access when trying to access sites in foreign countries using a "virtual private network" (VPN) – a preferred method of evading the blocks put up by China's censors to external sites. Even Apple's app store has been put off-limits by the new blocks, according to reports. The disruption has mainly affected corpor...
LUMS University Database Hacked By Hitcher

LUMS University Database Hacked By Hitcher

May 14, 2011
LUMS University Database Hacked By Hitcher Vulnerable link :   http://www.lums.edu.pk/event_detail.php?id='300 Databases links for student info :   http://pastebin.com/TAYcwPd3 Faculty info : http://pastebin.com/1RpBitHf
Expert Insights Articles Videos
Cybersecurity Resources