-->
#1 Trusted Cybersecurity News Platform
Followed by 5.40+ million
The Hacker News Logo
Subscribe – Get Latest News

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Delicious.com Getting Problem with SSL Certificate

Delicious.com Getting Problem with SSL Certificate

May 23, 2011
Delicious.com Getting Problem with SSL Certificate Just now we have notice that Delicious.com  ( https://delicious.com/ ) getting some problem with their SSL Certificate. The Certificate is Valid unto 4/30/2012 as you can see below : But Secure SSL site Link :  https://delicious.com/  is Down and showing Error as shown :
DNA-Stuxnet.in Hacked & Database Leaked By Shadow008 (PakCyberArmy)

DNA-Stuxnet.in Hacked & Database Leaked By Shadow008 (PakCyberArmy)

May 23, 2011
DNA-Stuxnet.in Hacked & Database Leaked By Shadow008 (PakCyberArmy) Sites Hacked : http://dna-stuxnet.in/home/ Mirror : http://zone-h.com/mirror/id/14090295 Database BackUp -   http://www.multiupload.com/180BT14ZGK
Hackers attack on Norwegian military Computers

Hackers attack on Norwegian military Computers

May 23, 2011
Hackers attack on Norwegian military Computers The Norwegian security police is investigating a hacker attack that zoned in on military computers shortly after Norway joined the Libya air campaign in March. The army says about a hundred computers were targeted in the attack, where staff received a fake email from a Norwegian government agency containing a malicious code The unidentified hackers only managed to access non-classified information from one computer before the security systems fended them off. The army would not disclose more details about the type of data the hackers were trying to access.
cyber security

2026 Cloud Threats Report

websiteWizCloud Security / Threat Landscape
80% of cloud breaches still start with the basics - and AI is making them faster. Get insights into the patterns behind today's cloud attacks.
cyber security

Pentest Like Attackers Actually Do. SEC560 at SANSFIRE 2026

websiteSANS InstituteLive Training / Cybersecurity
From Kerberoasting to domain dominance—SEC560 covers the full kill chain. Washington, D.C., July 13.
Arachni v.0.2.3 - Open Source Web Application Security Scanner Framework

Arachni v.0.2.3 - Open Source Web Application Security Scanner Framework

May 23, 2011
Arachni v.0.2.3 - Open Source Web Application Security Scanner Framework Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.Arachni is smart, it trains itself by learning from the HTTP responses it receives during the audit process.Unlike other scanners, Arachni takes into account the dynamic nature of web applications and can detect changes caused while travelling through the paths of a web application's cyclomatic complexity.This way attack/input vectors that http://www.blogger.com/img/blank.gifwould otherwise be undetectable by non-humans are seamlessly handled by Arachni. The main focus of this release has been on distributed deployment and bugfixing.Main additions include the update of the HTML report to include false positive reporting functionality and an updated WebUI with support for multiple Dispatchers. Download :  https://github.com/Zapotek/arac...
Infographic - The Sony PlayStation Hack

Infographic - The Sony PlayStation Hack

May 23, 2011
Infographic - The Sony PlayStation Hack We were doing an expose on the 'Sony Hack Fiasco' and realized no infographic was done on the subject - at least none we can find. Considering how big the issue was for our readers, we decided to create an infographic to summarize the events. Our sources include news site and commentary pieces. Because the subject matter is so time sensitive, we decided to include minimal information to the graphic and get it out when it matters. We will, however, be updating it with the latest information as it comes through. Source : http://www.creditcardfinder.com.au/the-sony-playstation-hack-what-it-means-outside-the-gaming-world.html
Expert Insights Articles Videos
Cybersecurity Resources