#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

UNITED Security Summit 2011, 19-20 September - San Francisco

UNITED Security Summit 2011, 19-20 September - San Francisco

Aug 11, 2011
UNITED Security Summit 2011 , 19-20 September - San Francisco The UNITED Security Summit is focused on innovation and collaboration in the security community. Bringing together security decision makers, practitioners, commercial vendors, open source projects and academia, the Summit highlights technologies and approaches that will help organizations better cope with the increased security threats they are seeing on a daily basis.Based on the anatomy of a breach, the Summit provides educational and interactive sessions that will reflect on the fundamental security challenges from four perspectives through a common lens. Date : 19 September-20 September 2011 Location : Hyatt Fisherman's Wharf, San Francisco, USA
JonDo 00.15.004 IP changer with Bitcoin, connection manipulation protection and higher efficiency

JonDo 00.15.004 IP changer with Bitcoin, connection manipulation protection and higher efficiency

Aug 11, 2011
JonDo 00.15.004 IP changer with Bitcoin, connection manipulation protection and higher efficiency JonDos publishes a new version of the JonDo-Software, an IP changer and IP anonymization program, that you can use for anonymous surfing in the Internet with high security anonymous proxy servers. What is new? JonDo now integrates Bitcoin as additional payment method for the JonDonym Premium services: For every new payment, a new random Bitcoin address is generated. This hides against third parties for what a customer pays. Additionally, all data about the payment proccess are deleted after completion in order to fulfill even the highest privacy requirements. But of course, even if the identity of a buyer was known, neither JonDos nor the JonDonym operators could see what he/she does in the JonDonym system. Moreover, a stability protection against connection manipulations has been developed: In some countries, especially those in the middle east, HTTPS/SSL connections get manipulat...
HKEx - Hong Kong stock exchange Hacked

HKEx - Hong Kong stock exchange Hacked

Aug 11, 2011
HKEx - Hong Kong stock exchange Hacked Trading in Hong Kong was disrupted on Wednesday by a hacking incident on the Hong Kong Exchange website. " Our current assessment that this is a result of a malicious attack by outside hacking ," Charlies Li, chief executive of Hong Kong Exchanges & Clearing, told reporters. The seven stocks in question were all due to release sensitive results to the website that could impact the price of their stocks.Although the Hong Kong stock exchange also operates an alternative backup site for posting the results, it chose to halt trading of the affected stocks for the afternoon session.Stocks affected included HSBC, Cathay Pacific, China Power International and the Hong Kong exchange itself.It is unclear at this point whether the attack actually compromised the site, or if it was merely a denial of service attack. " It was the first time for a suspension due to such a kind of technical problem and one involving so many companies ,...
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
The Unusual Suspect: Git Repos

The Unusual Suspect: Git Repos

Jul 14, 2025Secrets Management / SaaS Security
While phishing and ransomware dominate headlines, another critical risk quietly persists across most enterprises: exposed Git repositories leaking sensitive data. A risk that silently creates shadow access into core systems Git is the backbone of modern software development, hosting millions of repositories and serving thousands of organizations worldwide. Yet, amid the daily hustle of shipping code, developers may inadvertently leave behind API keys, tokens, or passwords in configuration files and code files, effectively handing attackers the keys to the kingdom. This isn't just about poor hygiene; it's a systemic and growing supply chain risk. As cyber threats become more sophisticated, so do compliance requirements. Security frameworks like NIS2, SOC2, and ISO 27001 now demand proof that software delivery pipelines are hardened and third-party risk is controlled. The message is clear: securing your Git repositories is no longer optional, it's essential. Below, we look at the ris...
Hungry Hackers website hacked by CyberMind

Hungry Hackers website hacked by CyberMind

Aug 11, 2011
Hungry Hackers website hacked by CyberMind One of the Famous Hacking Tips and Tricks site "Hungry Hackers" -  https://www.hungry-hackers.com/  for Beginners got Hacked and Defaced by  CyberMind . The Hack shows that " Hackers are also not safe " . Update : Same site was also hacked on 2011-07-29 by Group Hp-Hack - Dr.TaiGaR and NeT DeviLSaudi Arabia Hackers . Mirror of hack can be seen here
Hackers Get Hacked at #Defcon 19 Conference

Hackers Get Hacked at #Defcon 19 Conference

Aug 10, 2011
Hackers Get Hacked at # Defcon 19 Conference There are so many ways to get hacked at the world's largest hacker conference. A hacker could bump against your pocket with a card reader that steals your credit card information. Or a hacker might eavesdrop on your Internet traffic through an unsecured Wi-Fi network. Or a hacker might compromise your cell phone while you charge it in the hotel's public phone-charging kiosk. More than 10,000 hackers and security experts have descended upon the Rio Hotel and Casino in Las Vegas this weekend for three days of lectures and contests. A hacker with name Coderman claim about such an incident Happens at Rao Hotel Well by early Saturday morning a weapon was deployed in DefCon. Some characteristics of Hack Attack : - full active MitM against CDMA and 4G connections from Rio to carriers. - MitM positioning for remote exploitation to ring0 on Android and PC. - fall back to userspace only or non-persistent methods when p...
Expert Insights Articles Videos
Cybersecurity Resources