-->
#1 Trusted Cybersecurity News Platform
Followed by 5.70+ million
The Hacker News Logo
Get the Latest News
cybersecurity

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Auth3ntiQ & shika01 found Local file include on numericable.be & numericable.lu

Auth3ntiQ & shika01 found Local file include on numericable.be & numericable.lu

Jul 18, 2011
Auth3ntiQ & shika01 found local file include on numericable.be & numericable.lu Hackers named " Auth3ntiQ and shika01 " found local file include on numericable.be & numericable.lu . Venerable Links : Link 1 Link 2 Bugs are critical , Hackers can steal all account with this LFI .
Tourism Development Corporation of Punjab - Pakistan (TDCP) Hacked by Code Injector

Tourism Development Corporation of Punjab - Pakistan (TDCP) Hacked by Code Injector

Jul 18, 2011
Tourism Development Corporation of Punjab - Pakistan (TDCP) Hacked by Code Injector Code Injector from Team Indishell hack the official website of Tourism Development Corporation of Punjab - Pakistan and Deface it. Visitor to the website can see a deface page with some message on homepage. Hackers provide the screenshot of FTP shell :
Linux kernel 3.0 - 343 changes made by Microsoft developer K. Y. Srinivasan

Linux kernel 3.0 - 343 changes made by Microsoft developer K. Y. Srinivasan

Jul 18, 2011
Linux kernel 3.0 - 343 changes made by Microsoft developer K. Y. Srinivasan Linux Kernal Change Logs figures were published on Thursday in an LWN.net article : 343 Changes made by Microsoft developer K. Y. Srinivasan 1,085 change provided by independent developers Red Hat provided 1,000 Changes in Kernal 3.0 Intel provide 839 changes Srinivasan comes in at the top because he made a lot of minor changes. Srinivasan and Microsoft are therefore nearer the bottom of the list. LWN.net found that Microsoft developers changed 11,564 lines of code (1.3 per cent) – compared to Intel's 163,232 (18.1 per cent).
cyber security

Military Appreciation Month: 10% Off SANS Cybersecurity Training

websiteSANS InstituteCybersecurity Training
Get 10% off SANS training this May—online or in person. Use code MILITARY10. U.S. only.
cyber security

The Validation Gap: What Automated Pentesting Alone Cannot See

websitePicus SecurityAutomated Pentesting / Exposure Validation
This free guide maps the structural blind spots and gives you 3 diagnostic questions for any vendor conversation.
Damn Small SQLi Scanner (DSSS) v0.1b - 100 Lines Python Code

Damn Small SQLi Scanner (DSSS) v0.1b - 100 Lines Python Code

Jul 18, 2011
Damn Small SQLi Scanner (DSSS) v0.1b  - 100 Lines Python Code SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application (like queries). The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It happens from using Microsoft SQL or other poorly designed query language interpreters. Source Code : #!/usr/bin/env python import difflib, httplib, optparse, random, re, sys, urllib2, urlparse NAME = "Damn Small SQLi Scanner (DSSS) < 100 LOC (Lines of Code)" VERSION = "0.1b" AUTHOR = "Miroslav Stampar (http://unconciousmind.blogspot.com | @stamparm)" LICENSE = "GPLv2 (www.gnu.org/licenses/gpl-2.0.html)" NOTE = "This is a fully working PoC proving that commercial (SQLi) scanners can be beaten under 100 li...
Israel Web Hosting Server Hacked For Palestine By Dr T

Israel Web Hosting Server Hacked For Palestine By Dr T

Jul 18, 2011
Israel Web Hosting Server Hacked For Palestine By Dr T Israel Web Hosting Server Rooted Via Server Intrusion and all Domains on Server are Mass Defaced For Palestine By Dr Torjan and Code5 named hackers.  Hacked Websites List is available at :  http://pastebin.com/WvQmSSKh  .
Lady Gaga website hacked and fans details stolen by Hackers

Lady Gaga website hacked and fans details stolen by Hackers

Jul 16, 2011
Lady Gaga website hacked and fans details stolen by Hackers Lady Gaga has called in police after thousands of her fans personal details were stolen from her website. Her record label Univeral acted after the site was hacked into by US cyber attackers SwagSec. A source said: “ She’s upset and hopes police get to the bottom of how this was allowed to happen. ” The group struck on June 27 but did not make the information, which included names and email addresses, public until this week. The hackers, who also issued a death threat against the singer, bizarrely branded her homophobic. Their statement comes after Gaga recently described as “ ridiculous ” claims she uses the gay community to sell records. Universal said yesterday: “ The hackers took a content database dump from www.ladygaga.co.uk and a section of email, first name and last name records were accessed. There were no passwords or financial information taken. “ We take this very seriously and have put in place addit...
THE CRAZIES Hackers Leaks Server Certificates of Defense Information Systems Agency (DISA)

THE CRAZIES Hackers Leaks Server Certificates of Defense Information Systems Agency (DISA)

Jul 16, 2011
THE CRAZIES Hackers Leaks Server Certificates of Defense Information Systems Agency (DISA) THE CRAZIES Hackers steal the Several Certificate revocation lists (CRLs) from Server of Defense Information Systems Agency (DISA) -  http://disa.mil/  and leak the  Certificates at : http://www.mediafire.com/?dvli58a9logojld http://www.mediafire.com/?k8z168aazj6s1k8 Reason of Hacking is Freedom of Libyan nation, Hackers blaming U.S govt. for that they are killing  Libyan for OIL. Certificate revocation lists  are used to distribute information about revoked certificates to individuals, computers, and applications attempting to verify the validity of certificates.The Revocation List tab lists the serial numbers of certificates that have been revoked and the date they were revoked. The Revocation entry field may also provide information about the reason a certificate was revoked.The General tab provides additional information about the CR...
Expert Insights Articles Videos
Cybersecurity Resources