#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Script Kiddies can Now Create their Own Ransomware using This Kit

Script Kiddies can Now Create their Own Ransomware using This Kit

Aug 19, 2015
Don't panic! You heard it right. A Turkish security researcher named Utku Sen has posted a fully functional Ransomware code on open source code sharing website GitHub . The Ransomware dubbed Hidden Tear , uses AES Encryption to lock down files before displaying a ransom message warning to get users to pay up. The currently undetectable version of ransomware can be modified and implemented accordingly, as it contains every feature a cybercriminal can expect from modern malware. Sen describes his Ransomware as "a ransomware-like file crypter sample which can be modified for specific purposes." This means even script kiddies can now develop their own Ransomware to threaten people. The Hidden Tear — Free Ransomware Kit The " Hidden Tear " Ransomware package consists of four files namely: Hidden-Tear-Decrypter Hidden-Tear .gitignore README.md Hidden Tear Ransomware is capable of : Using AES algorithm to encrypt files Sendi...
Ashley Madison Hackers Finally Released All the Stolen Data Online

Ashley Madison Hackers Finally Released All the Stolen Data Online

Aug 19, 2015
Well, Cheaters are about to have a very Bad Night Today! Hackers who claimed to have stolen customers' data from Ashley Madison , the popular online casual sex and cheating website with a tagline " Life is short. Have an affair ," recently leaked nearly 10GB of its users' personal data online. The group of hackers, which called itself The Impact Team , has reportedly leaked personal data of Ashley Madison customers on the so-called dark web, meaning the data is accessible anyone on encrypted browsers. The leaked data includes personal details of nearly 36 Million Ashley Madison customers' accounts , which includes: Username First and Last Names Email addresses Hashed passwords Partial Credit Card data Street Names Phone Numbers Records documenting 9.6 Million Credit Card Transactions No Mercy for You Cheaters! The Impact Team stole the data  from the popular cheating website last month and threatened the company to reveal all a...
IBM launches LinuxONE: Linux-only Mainframe Systems

IBM launches LinuxONE: Linux-only Mainframe Systems

Aug 18, 2015
World's largest hardware supplier of mainframe computers IBM (International Business Machine) Corp. has launched two mainframe servers that run only on Linux operating system. IBM used RAS as a term to describe the strength of the mainframe computers; RSA stands for R eliability, A vailability, and S erviceability. However, IBM has now added a new feather to its mainframe servers in an effort to increase the open source software combined with mainframe hardware RAS. Dubbed LinuxONE , the new mainframe servers comes with two different flavors: LinuxONE Emperor for large enterprises and runs on the IBM z13 LinuxONE Rockhopper designed for mid-size businesses The IBM LinuxONE Emperor is capable of ultimate flexibility, scalability, performance and trust for business critical Linux applications whereas… The IBM LinuxONE Rockhopper offers all the same great capabilities, value and innovation of LinuxONE system with the flexibility of a small package with g...
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
The Unusual Suspect: Git Repos

The Unusual Suspect: Git Repos

Jul 14, 2025Secrets Management / SaaS Security
While phishing and ransomware dominate headlines, another critical risk quietly persists across most enterprises: exposed Git repositories leaking sensitive data. A risk that silently creates shadow access into core systems Git is the backbone of modern software development, hosting millions of repositories and serving thousands of organizations worldwide. Yet, amid the daily hustle of shipping code, developers may inadvertently leave behind API keys, tokens, or passwords in configuration files and code files, effectively handing attackers the keys to the kingdom. This isn't just about poor hygiene; it's a systemic and growing supply chain risk. As cyber threats become more sophisticated, so do compliance requirements. Security frameworks like NIS2, SOC2, and ISO 27001 now demand proof that software delivery pipelines are hardened and third-party risk is controlled. The message is clear: securing your Git repositories is no longer optional, it's essential. Below, we look at the ris...
Windows 10 Remotely Disables Pirated Games and illegal Hardware

Windows 10 Remotely Disables Pirated Games and illegal Hardware

Aug 18, 2015
If you are one of those 70 Million users who have upgraded their systems to the newest Windows 10 operating system, Microsoft could be scanning your PC for pirated games and unauthorized hardware . Almost three weeks have passed after the worldwide launch of Windows 10, Millions of users have upgraded their systems to the Microsoft's latest operating system.  However, we have seen many privacy concerns around the new OS, including: Turned ON bandwidth sharing to distribute updates to other Windows 10 users Default settings sending users' data to Microsoft servers Wi-Fi password sharing feature i.e. Windows Wi-Fi Sense enabled Forcing Automatic software updates for Windows 10 Also Read: How to Fix 35+ Windows 10 Privacy Issues With Just One Click Unlike at first glance, these changes made by Microsoft in its new Free Windows upgrade do not actually felt free to its users due to a lack of transparency from the company about the reality of the new ...
Official Name of Android M is 'Marshmallow' [Version 6.0]

Official Name of Android M is 'Marshmallow' [Version 6.0]

Aug 18, 2015
"Android M will be Muffin?, or Mango shake?, Milkshake?, Malt ball?, Moon Pie?, Macaroon?, or is it Mars?, Marshmallow?"... …this was the guessing game that occupied most of us when Google created a suspense three months ago, at the launch of the Android M Developer Preview at Google I/O in May. Much awaited Android M is named as ' Marshmallow '; it is the thirteenth Google's Android operating system. Google revealed the 'Marshmallow' by following its ritual of keeping the statue of Android robot with a Marshmallow in his hand. Google has maintained its tradition of naming the dominant mobile Android operating system by the names of sugary delights, starting from: Cupcake Donut Eclair Froyo Gingerbread Honeycomb Ice Cream Sandwich Jelly Bean KitKat Lollipop Official Android 6.0 SDK Available for Download After the final Developer Preview, the official Android 6.0 Software Developer Toolkit (SDK) is now available for d...
Expert Insights Articles Videos
Cybersecurity Resources