-->
#1 Trusted Cybersecurity News Platform
Followed by 5.40+ million
The Hacker News Logo
Subscribe – Get Latest News

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

DOD Launches New Cyber Strategy Website

DOD Launches New Cyber Strategy Website

Jul 27, 2011
DOD Launches New Cyber Strategy Website The Department of Defense today launched a new website to highlight DoD’s first unified strategy for cyberspace announced on July 14. The website is a tool to help explain and consolidate DoD’s cybersecurity accomplishments and new way forward for military, intelligence and business operations in cyberspace. The new website is designed to help users explore the five pillars of DoD’s cyber strategy: treating cyberspace as an operational domain; employing new defense operating concepts; partnering with the public and private sector; building international partnerships; and leveraging talent and innovation. Additional content includes links to cybersecurity jobs in government, key news items, press releases, and video of discussions on cybersecurity. Source
Smiasm - Reverse engineering framework

Smiasm - Reverse engineering framework

Jul 27, 2011
Smiasm - Reverse engineering framework What is Miasm? Miasm is a a free and open source (GPLv2) reverse engineering framework. Miasm aims at analyzing/modifying/generating binary programs. Here is a non exhausting list of features: opening/modifying/generating PE/ELF 32/64 le/be using Elfesteem Assembling/Disassembling ia32/ppc/arm Representing assembly semantic using intermediate language Emulating using jit (dynamic code analysis, unpacking, ...) Expression simplification for automatic de-obfuscation Graphic disassembler using Grandalf How does it work? Miasm embed its own disassembler, intermediate language and instruction semantic. It is written in Python. To emulate code, it uses libtcc to jit C code generate from intermediate representation. It can emulate shellcodes, parts of binaries. Python callback can be executed to emulate library functions. Read Documentation & Download Here
#OpPayPal - Anonymous calls for boycott of PayPal for blocking Wikileaks

#OpPayPal - Anonymous calls for boycott of PayPal for blocking Wikileaks

Jul 27, 2011
#OpPayPal - Anonymous calls for boycott of PayPal for blocking Wikileaks The Latest Operation could be a major departure into legal direct action for Anonymous, LulzSec and AntiSec. If so, this is one to watch with great interest. The campaign marks something of a departure for LulzSec and Anonymous, which are both known for stealing and releasing private information from websites with poor security.The groups are at pains to emphasis that their current protest is being waged through legal means.During Operation Payback, Anonymous had called for a boycott, but little was gained due to the distributed nature of Anonymous and relatively low media profile. What is Operation Paypal ( #OpPayPal ) ? IRC: http://bit.ly/pDIZbY According to Anonymous and Lulzsec " Paypal is a corrupt corporation who voluntarily disabled donations to wikileaks with no legal base or reasoning whatsoever.  They are actively working with the FBI to arrest and imprison the only peop...
cyber security

2026 Annual Threat Report: A Defender's Playbook From the Front Lines

websiteSentinelOneEnterprise Security / Cybersecurity
Learn how modern attackers bypass MFA, exploit gaps, weaponize automation, run 8-phase intrusions, and more.
cyber security

Anthropic Won't Release Mythos. But Claude Is Already in Your Salesforce

websiteRecoSaaS Security /AI Security
The real enterprise AI risk isn't the model they locked away. It's the one already inside.
Metasploit Pro 4.0 released - Enterprise Integration, Cloud Deployment & Automation

Metasploit Pro 4.0 released - Enterprise Integration, Cloud Deployment & Automation

Jul 27, 2011
Metasploit Pro 4.0 released - Enterprise Integration, Cloud Deployment & Automation Rapid7 launched Metasploit Pro 4.0, a penetration testing solution that provides security professionals with a better view of their threat landscape by integrating with more than a dozen vulnerability management and Web application scanners, and by providing data to security information and event management (SIEM) systems through a documented interface. This enables defenders to identify vulnerabilities that could lead to a data breach and prioritize their remediation more effectively. Security teams increase their productivity by spending less time fixing unimportant vulnerabilities and have an effective way to verify that remediation was successful. The new capabilities in Metasploit Pro 4.0 now enable defenders to: Integrate security risk intelligence Integrate Metasploit Pro with your security information and event management (SIEM) system to improve your dashboard information Import ...
BSNL System Hacked by Pakistan Cyber Army - Users info at risk

BSNL System Hacked by Pakistan Cyber Army - Users info at risk

Jul 26, 2011
BSNL System Hacked by Pakistan Cyber Army - Users info at risk Pakistan Cyber Army claims to hack the BSNL (Bharat Sanchar Nigam Ltd.- India's No. 1 Telecommunications Company)10,000 User information like name, email, phone number and location & BSNL's internal working of VPN ,detail of circuits and as well as more technical details. More Screenshots: Source: Email from PCA
Expert Insights Articles Videos
Cybersecurity Resources