-->
#1 Trusted Cybersecurity News Platform
Followed by 5.40+ million
The Hacker News Logo
Subscribe – Get Latest News

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Microsoft Vulnerability in Bluetooth Stack Could Allow Remote Code Execution

Microsoft Vulnerability in Bluetooth Stack Could Allow Remote Code Execution

Jul 12, 2011
Microsoft Vulnerability in Bluetooth Stack Could Allow Remote Code Execution The single Critical vulnerability in today’s batch of security updates addresses an issue in the Bluetooth stack. Your workstations’ risk to this vulnerability varies, depending on a number of factors. I’d like to use this blog post to outline those risk factors. This security update resolves a privately reported vulnerability in the Windows Bluetooth Stack. The vulnerability could allow remote code execution if an attacker sent a series of specially crafted Bluetooth packets to an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability only affects systems with Bluetooth capability. This security update is rated Critical for all supported editions of Windows Vista and Windows 7. For more information, see the subsection, Affected and Non-Affected Software, in this section. The security update addresses the...
421 FTP hacked and logins leaked by PiraX hackers

421 FTP hacked and logins leaked by PiraX hackers

Jul 12, 2011
421 FTP hacked and logins leaked by PiraX hackers PiraX hacking Crew (  http://pirax.net/  ) today Leak the Username / Passwords of 421 FTP's via Pastebin link .  Message By Hackers " The LulzBoat may be sunken but PiraX keeps 'a goin'! Have fun! * ".
International Organization For Migration database hacked by Inj3ct0r Team for GREEN LIBYA

International Organization For Migration database hacked by Inj3ct0r Team for GREEN LIBYA

Jul 12, 2011
International Organization For Migration database  hacked by Inj3ct0r Team for GREEN LIBYA  Inj3ct0r Team Hackers hack the database of International Organization For Migration database ( http://www.iom.int/ ) . Statement by Hacker " Sorry about the usernames and passwords not giving because we take no responsibility of defacing their database and official website.. But we want to deliver them the message that they're still publishing lies and trying to give a bad image about what's going in libya. Rooted and exposed for the pride of GREEN LIBYA and Supporting the green libyan nation ." Data leaked By Hackers Database : MySQL (MM MySQL JDBC) Database driver : com.mysql.jdbc.Driver Database URL : jdbc:mysql://localhost/jahia?useUnicode=true&characterEncoding=UTF-8 2) Database : Orcale 9.x - 10.x Database driver : oracle.jdbc.driver.OracleDriver Database URL : jdbc:oracle:thin:@localhost:1521:jahia 3) Database : ...
cyber security

2026 Annual Threat Report: A Defender's Playbook From the Front Lines

websiteSentinelOneEnterprise Security / Cybersecurity
Learn how modern attackers bypass MFA, exploit gaps, weaponize automation, run 8-phase intrusions, and more.
cyber security

Anthropic Won't Release Mythos. But Claude Is Already in Your Salesforce

websiteRecoSaaS Security /AI Security
The real enterprise AI risk isn't the model they locked away. It's the one already inside.
Exploitsearch.net - Exploit & Vulnerability Search Engine

Exploitsearch.net - Exploit & Vulnerability Search Engine

Jul 12, 2011
Exploitsearch.net - Exploit & Vulnerability Search Engine This is a online search for currently utilizing data from NVD, OSVDB, SecurityFocus, Exploit-DB, Metasploit, Nessus, OpenVAS, and PacketStorm.Well search engine does the work but this is a specific search engine for better results. There not much to write about just visit the site and all your queries will be answered. VISIT :  http://www.exploitsearch.net/
WPSCAN - WordPress Security & vulnerability Scanner

WPSCAN - WordPress Security & vulnerability Scanner

Jul 12, 2011
WPSCAN - WordPress Security & vulnerability Scanner WPScan is a vulnerability scanner which checks the security of WordPress installations using a black box approach. Details Username enumeration (from author querystring and location header) Weak password cracking (multithreaded) Version enumeration (from generator meta tag) Vulnerability enumeration (based on version) Plugin enumeration (2220 most popular by default) Plugin vulnerability enumeration (based on version) (todo) Plugin enumeration list generation Other misc WordPress checks (theme name, dir listing, ...) DOWNLOAD HERE DEMO
Expert Insights Articles Videos
Cybersecurity Resources