-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

SolarWinds Log & Event Manager for Log Management and SEIM Security

SolarWinds Log & Event Manager for Log Management and SEIM Security

May 14, 2013
SolarWinds ® Log & Event Manager (LEM) , a full-function Security & Information Event Management (SIEM) solution, delivers powerful log management capabilities in a highly affordable, easy-to-deploy virtual appliance. SolarWinds LEM combines real-time log analysis, event correlation, and a groundbreaking approach to IT search, delivering the visibility, security, and control users need to overcome everyday IT challenges. How does LEM work? SolarWinds LEM integrates with and collects log data from a variety of assets in your IT environment including security appliances, network devices, workstations, operating systems, databases and servers. With the collected and normalized log data, LEM performs real-time, in-memory, non-linear multiple event correlation to analyze device and machine logs, and provides advanced incident awareness on all operational, security and policy-driven events on your network. What can you do with LEM? LEM allows you to alert on securi...
Another day, Another verified Twitter Account Hacked

Another day, Another verified Twitter Account Hacked

May 14, 2013
Another day, Another verified twitter account with over 900,000 followers hacked by 'Colin'. Hacker hacked into a Sky News Twitter account earlier today, and left a semi-permanent mark on the internet's consciousness. The mysterious Colin soon began to trend on Twitter as #ColinWasHere hashtag. However, the tweet which simply said " Colin was here " - has now been deleted, with Sky blaming the tweet on a hack. The post was retweeted more than 7,500 times before it was removed half an hour later. The Syrian Electronic Army in the recent past has been accused of hacking social media feeds of a number of well known Twitter handles, such as AP , The Guardian and even for some bizarre reason, the satire news agency ‘ The Onion ’ UPDATE:  The Sky News press office has informed that Colin was, in fact, " a ‘disaster recovery’ test message which accidently went live " and that "no Colin was harmed in the making of this message".
'The Onion' Twitter Account Hacked via Phishing Attack

'The Onion' Twitter Account Hacked via Phishing Attack

May 12, 2013
The hacktivist group Syrian Electronic Army (SEA) briefly took over the Twitter account of the satirical news publication The Onion, posting a series of anti-Israeli joke stories and an anti-Obama meme image. In a post on The Onion tech team's GitHub blog , the fake news site explains that the Syrian Electronic Army didn't wrestle control of its Twitter account using some advanced hacker scheme. The hack attack penetrated the publication with at least three methods of phishing attacks, where a false e-mail redirected people to a fake Website which then asked for Google Apps credentials. Previously the Syrian Electronic Army (SEA) has shanghaied its way into the official Twitter feeds of AP and the Guardian, using the former to post a tweet falsely claiming that there had been an explosion at the white House. Exposing details about an attack is not the normal approach companies take after they are hacked. The New York Times revealed earlier this year how Chinese hackers brea...
cyber security

How to Discover Shadow AI [Free Guide]

websiteNudge SecuritySaaS Security / Shadow AI
The first step in mitigating AI risks is to uncover where AI is being used. Get a head start with this guide.
cyber security

OpenClaw: RCE, Leaked Tokens, and 21K Exposed Instances in 2 Weeks

websiteReco AIAttack Surface / AI Agents
The viral AI agent connects to Slack, Gmail, and Drive—and most security teams have zero visibility into it.
Microsoft Patch Tuesday to fix critical IE8 zero-day flaw

Microsoft Patch Tuesday to fix critical IE8 zero-day flaw

May 12, 2013
This coming Tuesday, Microsoft will issue fixes for 33 vulnerabilities in total, including two critical  zero-day flaws relating to Internet Explorer recently discovered that has been used to attack several high-profile targets. Internet Explorer 6, 7, 8, 9 and 10 are the recipients of a patch that can prevent an exploit that enables remote code execution in the browser. This affects all Windows operating systems except XP. The vulnerability ( CVE-​​2013-​​1347 ) had previously been addressed in a workaround yesterday , but given the way it was being exploited with attacks reported on the US Department of Labor and European aerospace and nuclear researchers the patch has been prioritised. A second bulletin deals with another IE vulnerability believed to be one disclosed in March at the annual Pwn2Own hacking competition. At least four of the patches require a restart, Microsoft said. The remaining eight patches will address flaws that ran...
Apple Decrypts Seized iPhones For The Police

Apple Decrypts Seized iPhones For The Police

May 10, 2013
The security features built into Apple ’s iOS software are so good that the police are unable to gain access to defendant’s iPhones when they need to.  Companies like Apple and Google are being asked by law enforcement officials to bypass these protections to aid in investigations. Apple receives so many police demands to decrypt seized iPhones that it has created a waiting list to handle the deluge of requests. In one of the recent cases, according to court documents, the federal agents were baffled by the encrypted iPhone 4S of a man in Kentucky who was charged for supplying crack cocaine. CNET reports that ATF agent Rob Maynard spent three months trying to “locate a local, state, or federal law enforcement agency with the forensic capabilities to unlock” an iPhone 4S. After everyone said that they did not have the capabilities, Maynard turned to Apple. Apple can reportedly bypass the security lock to get access to data on a phone, download it to an ...
Expert Insights Articles Videos
Cybersecurity Resources