#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Hacker Halted USA 2011 - 10 Reasons Why You Should Attend

Hacker Halted USA 2011 - 10 Reasons Why You Should Attend

Sep 08, 2011
Hacker Halted USA 2011 - 10 Reasons Why You Should Attend Hacker Halted is a global series of Computer and Information Security conferences presented by EC-Council. The objective of the Hacker Halted conferences is to raise international awareness towards increased education and ethics in IT Security. The event is currently in its 14th year. Also present at Hacker Halted is EC-Council's H@cker Halted | Academy, trainings and workshops led by EC-Council instructors and trainers. Hacker Halted returns to Miami for the 3rd year in a row will be held in Miami on 25th and 27th October 2011. Participate and be part of one of the world's most recognized information security conference. Gain perspective through keynote addresses on the current state of information security as well as emerging trends and threats. An information security conference with a comprehensive agenda. Choose from the various focused tracks covering critical domains of information security. Match your informati...
winAUTOPWN v2.7 – Windows Autohacking Tool

winAUTOPWN v2.7 – Windows Autohacking Tool

Sep 08, 2011
winAUTOPWN v2.7 – Windows Autohacking Tool This version covers almost all remote exploits up-till mid-July 2011 and a few older ones as well. This version incorporates a few new commandline parameters: -perlrevshURL (for a PERL Reverse Shell URL), – mailFROM (smtpsender) and -mailTO (smtpreceiver). These are the commandline arguments required for a few exploits which require remote connect-back using a perl shell and email server exploits requiring authentication respectively. This version also tackles various internal bugs and fixes them. A complete list of all Exploits in winAUTOPWN is available in CHANGELOG.TXT A complete list of User Interface changes is available in UI_CHANGES.txt Also, in this version : BSDAUTOPWN has been upgraded to version 1.5. In this release you will also find pre-compiled binaries for : FreeBSD x86 FreeBSD x64 DragonFly BSD x86 Download winAUTOPWN v2.7
Sony Hires Ex- Homeland Security Official after PlayStation Hack

Sony Hires Ex- Homeland Security Official after PlayStation Hack

Sep 08, 2011
Sony Hires Ex- Homeland Security Official after PlayStation Hack Sony has hired a former official at the US Department of Homeland Security for the new post of chief information security officer, months after a massive hacking attack leaked information on 100 million user accounts on its games networks. Philip Reitinger, formerly the director of Homeland Security's National Cyber Security Center, will join Sony in the newly created position of chief information security officer and a senior vice president. The new hire signals a heightened seriousness by Sony in the aftermath of an intrusion into its online videogame service earlier this year. The breach compromised the personal information of more than 100 million accounts from its online networks, including the possible loss of some credit card information. Sony said there have been no reports of any credit card data theft. Sony shut down the PlayStation Network and Qriocity streaming video and music network on April 20...
cyber security

Master SaaS AI Risk: Your Complete Governance Playbook

websiteReco AIArtificial Intelligence / SaaS Security
95% use AI, but is it secure? Master SaaS AI governance with standards-aligned frameworks.
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them

Malicious PyPI Packages Are Everywhere — A Practical Guide to Defending the Python Supply Chain

Jul 24, 2025
Python supply chain attacks are surging in 2025. Join our webinar to learn how to secure your code, dependencies, and runtime with modern tools and strategies.
12 Pakistan Government departments websites & Benazir Bhutto site Hacked by Mr52

12 Pakistan Government departments websites & Benazir Bhutto site Hacked by Mr52

Sep 08, 2011
12 Pakistan Government departments websites & Benazir Bhutto  Hacked by Mr52 An Indian Hacker " Mr52 " strike back to Pakistan Government departments. He hack and deface about 12 Government departments websites including Pakistan Navy, Maritime Security Agency, NATIONAL EDUCATION ASSESSMENT SYSTEM, Benazir Bhutto, Ministry of Foreign Affairs websites are hacked. List of defaced sites are : https://www.paknavy.gov.pk/securite/default.html https://www.paknavy.gov.pk/default.html https://www.msa.org.pk/default.html https://www.neas.gov.pk/default.html https://www.nfdc.gov.pk/default.html https://www.niopk.gov.pk/default.html https://www.szab.pk/default.html https://www.benazir.pk/default.html https://www.mopw.gov.pk/default.html https://www.dfp.gov.pk/default.html https://www.erapixels.com/default.html https://www.mofa.gov.pk/default.html
Offline Windows Analysis and Data Extraction (OWADE) - Forensics tool to expose all your online activity

Offline Windows Analysis and Data Extraction (OWADE) - Forensics tool to expose all your online activity

Sep 08, 2011
Offline Windows Analysis and Data Extraction (OWADE) - Forensics tool to expose all your online activity Researchers " Elie Bursztein " from Stanford University in California have managed to bypass the encryption on a PC's hard drive to find out what websites a user has visited and whether they have any data stored in the cloud. " Commercial forensic software concentrates on extracting files from a disc, but that's not super-helpful in understanding online activity ," says Elie Bursztein, whose team developed the software. " We've built a tool that can reconstruct where the user has been online, and what identity they used. " The open-source software, Offline Windows Analysis and Data Extraction (OWADE), was launched at the Black Hat 2011 security conference and works with PCs running on the Windows operating system. OWADE is in alpha version and is only available by checking out the code directly as we update it very frequently. Note th...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>