#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

UniOFuzz 0.1.2-beta - Universal fuzzing tool Released

UniOFuzz 0.1.2-beta - Universal fuzzing tool Released

Jan 18, 2012
UniOFuzz  0.1.2-beta  - Universal fuzzing tool Released UniOFuzz version 0.1.2-beta - the universal fuzzing tool for browsers, web services, files, programs and network services/ports released by  nullsecurity team . Video Demonstration:  pigtail23, Developer of UniOFuzz demonstrated the tool in above Video. Download UniOFuzz
Book Review: IPhone Applications Tune-up

Book Review: IPhone Applications Tune-up

Jan 18, 2012
Book Review: IPhone Applications Tune-up Packt recently published a new book- IPhone Applications Tune-up . The book is of course about programming for the iPhone. But there is one chapter on maintainability that is far broader applicability than just the iPhone. This review was written by Wes Boudville . Read more about the book or download a free Sample Chapter here: Sample Chapter Moses explains several general aspects of programming that can and should be adhered to by most participants. Experienced programmers already know this. But if you are starting professional coding, you should pay serious heed. Specifically Moses says you should comment your source code. However, it is "likely a developer's least exercised skill". Learn to regularly put into the source code intelligent comments that explain the context of the source lines they are next to. Especially if the source is intricate. Moses disposes of the objection that some say, that the time taken to write comm...
100 Kenya government websites breached by Indonesian hacker

100 Kenya government websites breached by Indonesian hacker

Jan 18, 2012
100 Kenya government websites breached by Indonesian hacker An Indonesian hacker on Tuesday attacked and defaced more than 100 Kenya government websites Among the ministries affected include the Ministries of Local Government, Livestock, Environment, Fisheries, Housing, and Industrialisation in a major cyber security breach. A Kenyan expert aware of the incident said an Indonesian hacker known as direxer was responsible for the hacking. The hacker, referred to as Direxer , broke into the sites and defaced them to show that he had managed to access them. Others hacked sites are ministries of Finance, Education, Public Health, Youth Affairs, National Heritage and Roads; as well as sensitive departments such as Administration Police, Immigration, Prisons and various city, municipal and county councils. Check List here . A Cyber Incidence Response Team (CIRT) based at the Communications Commission of Kenya (CCK) has moved into action and was making efforts to restore the affected ...
cyber security

Secure your LLMs Against Real-World Threats

websiteWizLLM Security / Artificial Intelligence
LLMs move fast. So do the risks. Get practical, real-world steps to defend against prompt injection, model poisoning, and more.
cyber security

2025 Gartner® MQ Report for Endpoint Protection Platforms (July 2025 Edition)

websiteSentinelOneEndpoint Protection / Unified Security
Compare leading Endpoint Protection vendors and see why SentinelOne is named a 5x Leader
The Undead  “Corporations” by Patti Galle

The Undead "Corporations" by Patti Galle

Jan 18, 2012
The Undead  "Corporations" by Patti Galle  The Hacker News Editor " Patti Galle " share her views about Corporations in THN Magazine December Edition . We would like to share same article with our blog Readers. Enjoy the interesting read : Corporations are soulless entities possessing privileges and the rights of citizenship that actual people have; all the while not having to shoulder any of the natural responsibilities. Undead Corporations have concentrated the essence of avarice, rage and fury to form their corporate structure. And as these covetous Corporations have accumulated immeasurable wealth they have methodically utilized this wealth and power to procure, infiltrate, and seize control of the influential and powerful American government and many governments across the world vigorously fusing them into a globe-encompassing non-living aberration, now rightfully called or labeled as Corporatocracy. At present, on an ever escalating level, world governments ar...
SP Toolkit - Open Source Phishing Education Toolkit

SP Toolkit - Open Source Phishing Education Toolkit

Jan 18, 2012
SP Toolkit - Open Source Phishing Education Toolkit A new open source toolkit makes it ridiculously simple to set up phishing Web sites and lures. The software was designed to help companies test the phishing awareness of their employees, but as with most security tools, this one could be abused by miscreants to launch malicious attacks. The spt project is an open source phishing education toolkit that aims to help in securing the mind as opposed to securing computers. Organizations spend billions of dollars annually in an effort to safeguard information systems, but spend little to nothing on the under trained and susceptible minds that operate these systems, thus rendering most technical protections instantly ineffective. A simple, targeted link is all it takes to bypass the most advanced security protections. The link is clicked, the deed is done.spt was developed from the ground up to provide a simple and easy to use framework to identify your weakest links so that you can patc...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>