#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Wait ! It's not just Stuxnet or DuQu , Kaspersky reveals 5 more cousins

Wait ! It's not just Stuxnet or DuQu , Kaspersky reveals 5 more cousins

Jan 02, 2012
Wait ! It's not just Stuxnet or DuQu , Kaspersky reveals 5 more cousins Russian computer security outfit Kaspersky Lab said that the Stuxnet virus that damaged Iran's nuclear programme was likely to be one of at least five cyber weapons developed on a single platform. The viruses have never been seen 'in the wild' - and it's unclear whether they, like Stuxnet, would be built to cause failures at nuclear plants, or engineered for another purpose. Both Stuxnet and Duqu appear to have been created back in late 2007 or early 2008, and other pieces of malware with similar capabilities were built on the same platform, Gostev said.  Gostev examined two key drivers and variants that were used in both Stuxnet and Duqu, as well as two previously unknown drivers that were similar to the ones used. Not only did the same group of people develop Stuxnet and Duqu, but they likely worked simultaneously on multiple variants, Gostev said. The other pieces may be in the wild an...
Hackers launching own satellites in orbit to beat Censorship

Hackers launching own satellites in orbit to beat Censorship

Jan 01, 2012
Hackers launching own satellites in orbit to beat Censorship Worried about Internet censorship by SOPA and PIPA ? Wait !! This News is for you , Hackers plan to take the internet beyond the reach of censors by putting their own communication satellites into orbit. Good guy hackers plan to launch satellites to fight the Stop Online Piracy Act and create a censorship-free Internet. According to BBC News Technology Reporter David Meyer, the plan, which was detailed this week during the Chaos Communication Congress (CCC) in Berlin, is in response to proposed legislation such as the Stop Online Piracy Act (SOPA), which would allow the U.S. government to block websites believed to violate intellectual property law. " The first goal is an uncensorable internet in space ," hacking activity Nick Farr, who initially began soliciting financial support for what has been dubbed the Hackerspace Global Grid , in August, told Meyer on Friday. " Let's take the internet out of the control of te...
Facebook Scam : Selena Gomez Caught On Leaked Tape

Facebook Scam : Selena Gomez Caught On Leaked Tape

Jan 01, 2012
Facebook Scam : Selena Gomez Caught On Leaked Tape Another Facebook Scam is circulating with the headline " Selena Gomez Caught On Leaked Tape " and Message " you will lost your all respect for Selena Gomez after watching this ". By Clicking the wall post link takes you to the following page designed to look like Facebook. Facebook already declared as " Most Spamy Social Network of the Year " by The Hacker News Awards 2011. Clicking the play button loads a " share " box allowing you to spread the scam message to your friends. The following survey scam also loads another Scam as shown below. Scams like this often use multiple domains, so you may see a variation in the landing pages and scam messages. These scams contain click-jacking and like-jacking components and ends in a survey scam. One of the most common types of Facebook spam is a Wall post that encourages you to install a Facebook application. The application will require that you to agree to a...
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
The Unusual Suspect: Git Repos

The Unusual Suspect: Git Repos

Jul 14, 2025Secrets Management / SaaS Security
While phishing and ransomware dominate headlines, another critical risk quietly persists across most enterprises: exposed Git repositories leaking sensitive data. A risk that silently creates shadow access into core systems Git is the backbone of modern software development, hosting millions of repositories and serving thousands of organizations worldwide. Yet, amid the daily hustle of shipping code, developers may inadvertently leave behind API keys, tokens, or passwords in configuration files and code files, effectively handing attackers the keys to the kingdom. This isn't just about poor hygiene; it's a systemic and growing supply chain risk. As cyber threats become more sophisticated, so do compliance requirements. Security frameworks like NIS2, SOC2, and ISO 27001 now demand proof that software delivery pipelines are hardened and third-party risk is controlled. The message is clear: securing your Git repositories is no longer optional, it's essential. Below, we look at the ris...
One million pages infected by Lilupophilupop SQL injection

One million pages infected by Lilupophilupop SQL injection

Jan 01, 2012
One million pages infected by Lilupophilupop SQL injection ISC (Internet Storm Center) reported that   lilupophilupop.com SQL injection attacks. There were about 80 pages infected according to Google searches few weeks back and now it raise to over 1 million . sites being injected with string : "></title><script src="https://lilupop******.com/**.php"></script>          Recommended Read :  The Hacker News Hacking Awards : Best of Year 2011            Infections are shows on .com, .de, & .uk as the most affected regions. ISC posted stats just to give you a rough idea of where the pages are: UK - 56,300 NL - 123,000 DE - 49,700 FR - 68,100 DK - 31,000 CN - 505 CA - 16,600 COM - 30,500 RU - 32,000 JP - 23,200 ORG - 2,690 If you want to find out if you have a problem just search for " <script src="https://lilupophi*****p.com/ " in google and use the site: parameter to hone in on yo...
Chinese Government taking strong step against Cyber Crime

Chinese Government taking strong step against Cyber Crime

Jan 01, 2012
Chinese Government taking strong step against Cyber Crime The Chinese government is working with domestic Internet search engines like Baidu Inc and Sohu.com and financial institutions to prevent phishing attacks on unsuspecting Chinese web users. The Chinese government has announced that it will work together with 10 Chinese search engines. The user IDs, passwords and email addresses of more than 6 million accounts registered on CSDN, a site for programmers were leaked as we reported last week . The popular social-networking site Tianya was also hit by hackers last week. The Ministry of Industry and Information Technology said on Wednesday it would investigate the hacking incidents. In the U.S. data theft and hacking have become very common over the last few years. Recently, hacker group Anonymous hacked into the servers of security firm Stratfor and stole credit card and other personal details on thousands of users of the site and its services. The U.S. isn't alone in f...
Expert Insights Articles Videos
Cybersecurity Resources