-->
#1 Trusted Cybersecurity News Platform
Followed by 5.70+ million
The Hacker News Logo
Get the Latest News
cybersecurity

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Anonymous leaks Classified Documents from Greek Finance Ministry server

Anonymous leaks Classified Documents from Greek Finance Ministry server

Oct 29, 2012
Collective hacking group Anonymous  leaks username-passwords  and classified documents from Greek Finance Ministry server. Just a few days before the Greek Parliament is scheduled to vote on a $17.45 billion spending cut and tax hike plan. Attack was carried out under anonymous operation named - #opGreece . The leaked documents include various classified data from e-mails that were exchanged between the Greek Ministry and envoys from international lenders negotiating more austerity measures and bailouts, to thousands of passwords of Greek individuals and evaluations of banks. " The cyber-attack was described as one of the most serious against Greek government networks " secnews.gr said in report .  The attackers claim that they wanted to expose the date on the state of Greek economy so that all Greeks know the truth and thus just days before the 13.5-billion-euro austerity package goes to Parliament for voting. " Citizens of Greece you are paying Ba...
Malware making bomb and death threats detected

Malware making bomb and death threats detected

Oct 29, 2012
Japanese police had arrested three people, accused them of making death threats via email and discussion forums. However, later Researchers at Symantec have determined that a piece of malware was making death and bomb threats online on behalf of its victims infected. Symantec  confirmed that the malware " Backdoor.Rabasheeta " is capable of controlling a compromised computer from a remote location and the creator has the capability to command the malware to make the threats like bomb and murders. The most curious thing about this particular dropper is that it comes with a graphical user interface (GUI). The dropper for Backdoor.Rabasheeta drops a main module and a configuration file. The dropper creates a registry entry so that the main module is executed whenever the compromised computer starts. This dropper also modifies CreationTime, LastWriteTime, and LastAccessTime of the main module with random values to help keep it hidden. Then the dropper will execute the...
Anonymous hackers threatened Zynga For Mistreating Employees

Anonymous hackers threatened Zynga For Mistreating Employees

Oct 29, 2012
Hacking Group Anonymous has threatened to target Zynga, according to a post on the group’s official news channel and a since-deleted YouTube video (but it was removed because it was considered a "violation of YouTube's policy on depiction of harmful activities") which suggests that the social game company is planning further layoffs which threaten to bring about “ the end of the US game market as we know it ”. Zynga announced plans to lay off 150 employees last week and shut down a number of its offices, as it looks to make savings of between $15 and $20 million. The operation, dubbed maZYNGA, will consist of the shutting down of Facebook - the platform on which Zynga games are hosted - and the distribution of previously obtained Zynga game codes for free. " During the last few days anonymous has been targeting Zynga for the outrageous treatment of their employees and their actions against many developers. We have come to believe that this actions of Zynga will res...
cyber security

Shadow AI is Everywhere. Here's How You Can Find and Secure it [Free Guide]

websiteNudge SecuritySaaS Security / AI Security
Learn what actually works for uncovering shadow AI apps, integrations, and data exposure—and where some methods fall short.
cyber security

The Salesforce Aura Attack Surface Most Pentesters Miss

websiteRecoAI Agent Security
A step-by-step guide to Salesforce Experience Site pentesting, including novel Apex enumeration.
Euromillions lottery French Site defaced By Muslim Hackers

Euromillions lottery French Site defaced By Muslim Hackers

Oct 29, 2012
A group has hacked the French website for the EuroMillions lottery (http://euromillions.fr/) with warnings denouncing gambling as the work of the devil. A group going by name " Moroccanghosts ", posted the message in Arabic and French  - " Oh you believers. Wine, games of chance, statues all augur impurity and are the work of the devil. " It exhorted people to quit gambling, saying it was used by the devil along with alcohol to " sow hatred between yourselves and turn you away from God and prayer ". The company behind the site, Francaise des Jeux, took the passage down and the site was unavailable from last 12 hours later, but now Euromillions.fr  redirects to https://www.fdj.fr , the secure website of the firm that runs the Euromillions lottery in France. The Twitter user Moroccanghosts appeared to threaten that other gambling sites could be next. So there may be more attacks. France has a population of 65 million, including an estimated four million Mu...
Android Adware abusing permissions, Collecting more than they need

Android Adware abusing permissions, Collecting more than they need

Oct 29, 2012
So you just bought a new Android-based smartphone, what comes next? What else but the most exciting part downloading the right apps to boost its functionality. Android gives you the freedom to personalize your device, which has made it attractive to those who want their smartphones to be as unique as possible " Many apps will ask you to grant them network access so they can download updates. Others seek permission to read your phone’s state and identity so calls won't disrupt them from doing what they're doing. Unfortunately, these permissions can be abused for criminal intentions. " Trendmicro  said in report. Before android applications was abusing permissions to access user's personal data, but now new generations of adware targeting Android smartphones are increasingly violating user privacy by grabbing personal information and using it without permission. Adware is software that is used to gather information about the users. This ...
Expert Insights Articles Videos
Cybersecurity Resources