#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Mikko Hypponen : Fight cybercrime, but keep the net free

Mikko Hypponen : Fight cybercrime, but keep the net free

Aug 08, 2011
Mikko Hypponen : Fight cybercrime, but keep the net free Mikko Hypponen is an expert on cybercrime and chief research officer at F-Secure Corporation in Helsinki, Finland. TED is a nonprofit organization dedicated to "Ideas worth spreading," which it distributes on its website . In the real world, you only have to worry about the criminals who live in your city. But in the online world, you have to worry about criminals who could be on the other side of the planet. Online crime is always international because the Internet has no borders. Today computer viruses and other malicious software are no longer written by hobbyist hackers seeking fame and glory among their peers, but by professional criminals who are making millions with their attacks. These criminals want access to your computer, your Paypal passwords and your credit card numbers. Criminal online gangs recruit people with high level computing skills but no job opportunities in the real-world economy. There is...
#DefCon 19 : Android Network Toolkit for Penetration Testing and Hacking

#DefCon 19 : Android Network Toolkit for Penetration Testing and Hacking

Aug 08, 2011
#DefCon 19 : Android Network Toolkit for Penetration Testing and Hacking Have an Android and wanna start pwning people, networks and machines like penetration testers do? Defcon 2011 is in full hacking swing, and Itzhak Avraham -- "Zuk" for short -- and his company Zimperium have unveiled the Android Network Toolkit for easy hacking on the go. Need to find vulnerabilities on devices using nearby networks? The app, dubbed "Anti" for short, allows you to simply push a button to do things like search a WiFi network for potential targets, or even take control of a PC trojan-style. The firm says the tool's purpose is for people to find aged exploits and patch them so that "hacking" their network and taking control of devices connected to it isn't as easy as putting together a 10 piece puzzle. It will allow users to do more than just "find" these exploits, though – you can actually act on them as if you had every intent to cause malintent.Commands like " man-in-the-m...
Call for DEFCON Chennai (DC602028) 2011 meet on 14th August

Call for DEFCON Chennai (DC602028) 2011 meet on 14th August

Aug 08, 2011
Call for DEFCON Chennai (DC602028) 2011 meet on 14th August Welcome to DC602028 aka DEF-CON Chennai  DEFCON Chennai (DC602028) inviting all the like minded heads for the August 2011 meet In Chennai. Get Ready for Next Generation DefCon Meet.. -Where it 's taking place? Dazzle restaurant, Neelankarai Chennai. -At what time? From 4PM to 6PM. -Who will be the speaker ? There is no speaker, really. We dont have any speakers. It's going to be a Hacker meet, so we want each and everyone among us to share their little adventure. In other words "All are Speakers". -What are we going to talk about? Literally about everything on the "Hack Field". PS: We will be discussing about Exploits and Narcissism. - Will I get a Free foods, Drinks and hukka? Sorry due to recession, we are in recession. We advice you to have 300rs to 500rs ;-) - How can I contact DEF-CON Chennai? You can contact us at defchennai@gmail.com .  Please leave your name and ph...
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
The Unusual Suspect: Git Repos

The Unusual Suspect: Git Repos

Jul 14, 2025Secrets Management / SaaS Security
While phishing and ransomware dominate headlines, another critical risk quietly persists across most enterprises: exposed Git repositories leaking sensitive data. A risk that silently creates shadow access into core systems Git is the backbone of modern software development, hosting millions of repositories and serving thousands of organizations worldwide. Yet, amid the daily hustle of shipping code, developers may inadvertently leave behind API keys, tokens, or passwords in configuration files and code files, effectively handing attackers the keys to the kingdom. This isn't just about poor hygiene; it's a systemic and growing supply chain risk. As cyber threats become more sophisticated, so do compliance requirements. Security frameworks like NIS2, SOC2, and ISO 27001 now demand proof that software delivery pipelines are hardened and third-party risk is controlled. The message is clear: securing your Git repositories is no longer optional, it's essential. Below, we look at the ris...
Oracle, other companies hacked by Social Engineering attack in #DefCon 19

Oracle, other companies hacked by Social Engineering attack in #DefCon 19

Aug 08, 2011
Oracle, other companies hacked by Social Engineering attack in #DefCon 19 A weekend contest from 4th August to 7th August , at the world's largest hacking convention in Las Vegas showed one reason why big corporations seem to be such easy prey for cyber criminals : their workers are poorly trained in security. Reuters post the news about Hacking of Oracle and some more big Companies just by using Social Engineering in DefCon 19. Hackers taking part in the competition on Friday and Saturday found it ridiculously easy in some cases to trick employees at some of the largest U.S. companies to reveal information that can be used in planning cyber attacks against them. A contestant pretended to work for a company's IT department and persuaded an employee to give him information on the configuration of her PC, data that could help a hacker decide what type of malware would work best in an attack. " For me it was a scary call because she was so willing to comply ," said...
Youth Peer Education Network (YPEER) Of Syria Defaced by Cocain TeaM

Youth Peer Education Network (YPEER) Of Syria Defaced by Cocain TeaM

Aug 08, 2011
Youth Peer Education Network Of Syria Defaced by Cocain TeaM Hacker from Cocain Underground Team today deface the website of   Youth Peer Education Network Of Syria . The Youth Peer Education Network (YPEER), is a groundbreaking and comprehensive youth-to-youth initiative pioneered by UNFPA.Y-PEER Network is already in 48 countries Including (SYRIA) and still counting. Mirror of Hack is available  here . Yesterday Official site of NDRRMC was hacked by Cocain TeaM  . and just few hours before  Syrian Ministry of Defense is hacked by Anonymous Hackers.
Expert Insights Articles Videos
Cybersecurity Resources