#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Sun Microsystems (Print) - Cross Site Scripting Vulnerabilities

Sun Microsystems (Print) - Cross Site Scripting Vulnerabilities

Feb 05, 2012
Sun Microsystems (Print) - Cross Site Scripting Vulnerabilities Today Ucha Gobejishvili ( longrifle0x ) a Pentester from Georgia reported 3 More important Cross Site Scripting Vulnerabilities in Sun Microsystem's and Java Printer Webpages. Java's Vulnerable Link   : Click Here Sun's Vulnerable Link 1 :  Click Here Sun's Vulnerable Link 2 :  Click Here Cross-Site Scripting occurs when an attacker can send a malicious script to a different user by relaying the script from an otherwise trusted or innocuous server. These flaws are extensive on the Web and allow an attacker to place malicious code that can execute attacks against other users in the security context of the web servers of the trusted host. Previous vulnerabilities  reported by longrifle0x : Click here to Read or Mirrors .
ProCredit Bank Georgia hacked by RetnOHacK

ProCredit Bank Georgia hacked by RetnOHacK

Feb 05, 2012
ProCredit Bank Georgia hacked by RetnOHacK #AntiSerbs Group of Hackers named - B!JemBeX, RetnOHacK, Weedh0aX, mR.Thg hack into ProCredit Bank of Georgia (procreditbank.ge) . They Deface the Administrator panel page located at  https://www.procreditbank.ge/admin/login.php  as shown in image attached. On Deface page Hacker said " This day have received that much time..when will you accept that you lose the fight ?in this game you do not have no chance to win..you always were and always will be losers remain losersMitrovica do not sell , Mitrovica is ours as alwaysWe do not want peace with you , because I hate slaves.Date of " 28 November " is approaching to unite all Albanians... ". Till now its unclear that Hacker damage anything else rather than site pages.
Anonymous Hacks FBI and Records Conference Call

Anonymous Hacks FBI and Records Conference Call

Feb 03, 2012
Anonymous Hacks FBI and Records Conference Call Earlier today, Anonymous released a confidential conference call between the FBI and law enforcement officers in the UK. The 16-minute call discusses ongoing investigations into hackers associated with Anonymous, AntiSec, and LulzSec. From all appearances, Anonymous retrieved the sensitive access code information and a list of attendees from an FBI email account. The group released a roughly 15-minute-long recording of what appears to be a Jan. 17 conference call devoted to tracking and prosecuting members of the loose-knit hacking group. The email, titled " Anon-Lulz International Coordination Call ", was published on pastebin earlier today: https://pastebin.com/8G4jLha8  . The email with details for accessing the call was sent to law enforcement officials in Britain, France, the Netherlands and others but the only people who identify themselves on the call are from the FBI and Scotland Yard.In a message on Twitter, An...
cyber security

Master SaaS AI Risk: Your Complete Governance Playbook

websiteReco AIArtificial Intelligence / SaaS Security
95% use AI, but is it secure? Master SaaS AI governance with standards-aligned frameworks.
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them

Designing Identity for Trust at Scale—With Privacy, AI, and Seamless Logins in Mind

Jul 24, 2025
Is Managing Customer Logins and Data Giving You Headaches? You're Not Alone! Today, we all expect super-fast, secure, and personalized online experiences. But let's be honest, we're also more careful about how our data is used. If something feels off, trust can vanish in an instant. Add to that the lightning-fast changes AI is bringing to everything from how we log in to spotting online fraud, and it's a whole new ball game! If you're dealing with logins, data privacy, bringing new users on board, or building digital trust, this webinar is for you . Join us for " Navigating Customer Identity in the AI Era ," where we'll dive into the Auth0 2025 Customer Identity Trends Report . We'll show you what's working, what's not, and how to tweak your strategy for the year ahead. In just one session, you'll get practical answers to real-world challenges like: How AI is changing what users expect – and where they're starting to push ba...
Call of Duty, Spider-Man and other 7 Largest Video Game Sites Hacked

Call of Duty, Spider-Man and other 7 Largest Video Game Sites Hacked

Feb 03, 2012
Call of Duty , Spider-Man and other 7 Largest Video Game Sites Hacked Today Turkish Hackers from group " GrayHatz " hack and Deface Call of Duty, Spider-Man and other 7 Largest Video Game Sites. Hacked Sites Include: - Call of Duty® Official Video Game Site : Link and Mirror - X-Men Origins: Wolverine Official Video Game Site :  Link  and  Mirror - Spider-Man: Edge of Time Official Game Website - Transformers: Fall of Cybertron Official Video Game Site : Link and Mirror - Prototype 2 Official Video Game Site : Link and Mirror - Infinity Ward Developer of Call of Duty : Link and Mirror - The Quantum Of Solace Game Official Video Game : Link and Mirror - DJ Hero 2 | Available Now Official Site : Link and Mirror - Guitar Hero Official Site : Link and Mirror
Wifi Protector - Protect Your Android From Wi-Fi Sniffing Attacks

Wifi Protector - Protect Your Android From Wi-Fi Sniffing Attacks

Feb 03, 2012
Wifi Protector - Protect Your Android From Wi-Fi Sniffing Attacks The only app that is able to countermeasure " Man In The Middle " attacks on Android platform - Wifi Protector . No other app provides this type of high network security. Protects your phone from tools like FaceNiff, Cain & Abel, ANTI, ettercap, DroidSheep, NetCut, and all others that try to hijack your session via "Man In The Middle" through ARP spoofing / ARP poisoning. WifiKill can't take you offline with this app installed. The "Immunity" feature is the only one that requires root, all other features work without root access. Features - Uses very few resources - Uses no resources if Wi-Fi is disabled - Nearly zero battery consumption - Requires very few permissions. Requests only absolutely necessary permissions - Undetectable by the bad guy - 100% silent and passive inside the network. Generates no noise - Highly customizable notifications - Plays ringtone on atta...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>