#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

iOS Sandbox Vulnerability Puts Enterprise Data at Risk

iOS Sandbox Vulnerability Puts Enterprise Data at Risk

Aug 26, 2015
" Change is the only constant thing ," as it is known could be now modified as " Change is the only constant thing* ," where the * means Terms and conditions apply ! A change ( Mobile Device Management solutions-MDM , Bring Your Own Device-BYOD ) was brought to the organizations, (which later became necessities) for smooth workflow and management of an organization; where resides mobile and other computing devices in masses. The devices, as well as the MDM solutions, are at risk , as reported. Security researchers at Appthority Mobile Threat Team, have found a vulnerability in the sandbox app within the Apple's iOS versions prior to 8.4.1, which makes the configuration settings of managed applications to be openly accessed by anyone. QuickSand – Loophole in Sandbox The vulnerability is assigned CVE-2015-5749 and is named as ' QuickSand ' because of the loophole being present in the Sandbox. Mobile Device Management (MDM) refe...
GitHub Again Hit by DDoS Cyberattack

GitHub Again Hit by DDoS Cyberattack

Aug 26, 2015
Github – the popular code sharing website used by programmers to collaborate on software development – again became a victim of a distributed-denial-of-service (DDoS) attack on Tuesday morning. The attack came just a few months after the popular code repository website GitHub suffered a massive DDoS attack, which was linked to China. Also Read: China Using A Powerful 'Great Cannon' Weapon to Censor The Internet The company was made aware of the issue early on Tuesday. After investigating the problem, the team discovered that the service was under a new DDoS attack. The code repository disclosed the new attack on its status page as well as its official Twitter account. "The connectivity problems have been identified as a DDoS attack. We're working to mitigate now," GitHub status log read early on Tuesday. The March DDoS attack against GitHub lasted close to a week . At the time, the attackers used malicious JavaScript to hijack Internet...
Ashley Madison Hacker – An Insider Woman Employee?

Ashley Madison Hacker – An Insider Woman Employee?

Aug 26, 2015
"Ashley Madison was not hacked!" This is what declared by John McAfee , former founder of antivirus software company McAfee. So far everyone must be aware of Ashley Madison massive data breach. Last week, the hackers, who called themselves Impact Team, posted 10GB of personal data for tens of Millions of its customers, including their names and email addresses. Frequently followed by another leak, where hackers released another 20GB of company's internal data , including personal emails from the CEO of Ashley Madison parent company Avid Life, Noel Biderman, along with the source code for its website and mobile apps. John McAfee: Ashley Madison is an Inside Job by a Woman However, in a post published in the International Business Times, McAfee made a controversial statement saying, " Ashley Madison was not hacked ," and claiming that the alleged data breach was " an inside job ." McAfee says Ashley Madison data was plunde...
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
Securing Agentic AI: How to Protect the Invisible Identity Access

Securing Agentic AI: How to Protect the Invisible Identity Access

Jul 15, 2025Automation / Risk Management
AI agents promise to automate everything from financial reconciliations to incident response. Yet every time an AI agent spins up a workflow, it has to authenticate somewhere; often with a high-privilege API key, OAuth token, or service account that defenders can't easily see. These "invisible" non-human identities (NHIs) now outnumber human accounts in most cloud environments, and they have become one of the ripest targets for attackers. Astrix's Field CTO Jonathan Sander put it bluntly in a recent Hacker News webinar : "One dangerous habit we've had for a long time is trusting application logic to act as the guardrails. That doesn't work when your AI agent is powered by LLMs that don't stop and think when they're about to do something wrong. They just do it." Why AI Agents Redefine Identity Risk Autonomy changes everything: An AI agent can chain multiple API calls and modify data without a human in the loop. If the underlying credential is exposed or overprivileged, each addit...
Popular Download Service μTorrent wants you to pay for its Software

Popular Download Service μTorrent wants you to pay for its Software

Aug 25, 2015
Just to enhance the services being rendered. The popular peer-to-peer file sharing software application is aiming to achieve new heights by making their software be a paid scheme . uTorrent is one of the clients of BitTorrent Inc. (the parent company) which implements a BitTorrent protocol. Where each client is capable of creating, publishing, and transmitting any computer file over a network, using the protocol. μTorrent is a free piece of software and to support it, the company uses bundled software to offset the cost that would "otherwise be paid directly by the user." "This is a familiar revenue model that is commonly used by software companies," the μTorrent team wrote. "It allows us to fund the costs associated with software development, as well as other projects and innovations." However, the team says it's never satisfied with this revenue model approach , as it requires compromises and reduces a premium user experience, ...
Two Arrested For Dropping Drugs And Porn Into Prison Using A Drone

Two Arrested For Dropping Drugs And Porn Into Prison Using A Drone

Aug 25, 2015
The use of Unmanned Aerial Vehicles (UAVs), popularly known as Drones, is rapidly transforming the way crimes are conducted, and this story helps prove this right. Maryland State Police arrested two men  –  Thaddeus Shortz and Keith Brian Russell  –   suspected of allegedly trying to smuggle drugs and porn into a state prison using a drone , according to law enforcement authorities. The men, with the intention to fly a Yuneec Typhoon drone into local jails, were arrested near the Western Correctional Institution and the North Branch Correctional Institution in Cumberland, Maryland late Saturday. The authorities seized: A Yuneec Typhoon drone , which retails for around $1,300 Synthetic marijuana (also known as " Spice ") Pornographic DVDs Tobacco Prescription drugs A mobile phone A loaded pistol However, the pistol likely was not going to be carried by the drone as it was apparently too heavy that it probably would have weighed down ...
Expert Insights Articles Videos
Cybersecurity Resources