#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Operation Satiagraha - Brazil Corruption Scandal exposed, #Antisec provide 5GB of evidence

Operation Satiagraha - Brazil Corruption Scandal exposed, #Antisec provide 5GB of evidence

Aug 12, 2011
Operation Satiagraha - Brazil Corruption Scandal exposed , #Antisec provide 5GB of evidence Once Again Pandora's box is open. In a joint move between LulzSec and Anonymous, as part of Operation Antisec, were released documents, photos, audio files and videos, exposing that wich was one of the greatest corruption scandals in the recent history of Brazil. In 2008, after four years of investigations, the Operation Satiagraha resulted in the arrest of several bankers, CFOs and investors, accused of corruption, misuse of public money, as well as money laundering. Antisec Hackers released a cache of evidence revealing government cover up of a corruption investigation involving the CIA, theBrazilian telecom industry, and multiple US corporations. The fact is that exposing so many powerful people, in both political and financial areas, Operation Satiagraha was eventually manipulated. Those who conducted the investigations were removed and habeas corpus were granted to the accu...
Free Gary McKinnon Campaign websites Hacked by TG ( TurkGuvenligi )

Free Gary McKinnon Campaign websites Hacked by TG ( TurkGuvenligi )

Aug 12, 2011
Free Gary McKinnon Campaign websites Hacked by TG ( TurkGuvenligi ) TG ( TurkGuvenligi ) today deface the websites of Free Gary McKinnon Campaign as shown. TG hacker is same who deface  Microsoft.com.br (Brasil)  some months before. Hacked Sites :  https://freegary.org.uk/ https://freegary.co.uk/ Mirror of Hack : https://zone-h.org/mirror/id/14649402 https://zone-h.org/mirror/id/14649399
In.com Hacked and Defaced by Mr52

In.com Hacked and Defaced by Mr52

Aug 11, 2011
In.com Hacked and Defaced by Mr52 One of the Leading Indian website " In.com " has been defaced by Indian Hacker Mr52 .This is the 3rd Biggest Site Hit by Mr52. He Upload shell on the Server for Defacing site. Readers can check the Linux Kernel and Username even also from Screenshot. Defaced Url :  https://mobile18.in.com/ Mirror of Hack :   https://zone-h.com/mirror/id/14643631
cyber security

Secure your LLMs Against Real-World Threats

websiteWizLLM Security / Artificial Intelligence
LLMs move fast. So do the risks. Get practical, real-world steps to defend against prompt injection, model poisoning, and more.
cyber security

2025 Gartner® MQ Report for Endpoint Protection Platforms (July 2025 Edition)

websiteSentinelOneEndpoint Protection / Unified Security
Compare leading Endpoint Protection vendors and see why SentinelOne is named a 5x Leader
NERC - National Syrian energy research center Defaced by Cocain Team

NERC - National Syrian energy research center Defaced by Cocain Team

Aug 11, 2011
NERC - National Syrian energy research center Defaced by Cocain Team Cocain Hackers Team once again Hit Syrian. This time they hack and deface the website of  National Syrian energy research center . Site was defaced Yesterday and administrator again backup the site, But Readers can check hack mirror here .  Last week Official site of NDRRMC  and  Youth Peer Education Network (YPEER) Of Syria were hacked by Cocain TeaM.
SpyEye 1.3.45 Download - Loader source code

SpyEye 1.3.45 Download - Loader source code

Aug 11, 2011
SpyEye 1.3.45 Download - Loader source code A new fresh and sophisticated web-based bot named SpyEye is around in the markets and looks like to be the possible successor of the famous Zeus Trojan due to its very interesting features, with the main objective to steal bank accounts, credit cards, ftp accounts and other sensitive data from the victim's computer. SpyEye was written in C++ and the size of the compiled binary is of 60 KB, the operating systems supported are from Windows 2000 to the recent Windows 7, it works in ring3 mode (same as Zeus Trojan). It is sold as undetected from most Antivirus Software and it is invisible from the task managers and other user-mode applications, it hides the files from the regular explorer searches and it hides also its registry keys. Snorre Fagerland, Senior Virus Analyst at Norman, briefly explains what the SpyEye online banking trojan is and what you need to be on the lookout for when banking online. SpyEye is actually sold by its au...
FireCAT 2.0 Released - Firefox Catalog of Auditing Extensions

FireCAT 2.0 Released - Firefox Catalog of Auditing Extensions

Aug 11, 2011
FireCAT 2.0 Released - Firefox Catalog of Auditing Extensions FireCAT (Firefox Catalog of Auditing exTensions) is a mindmap collection of the most efficient and useful Firefox extensions oriented application security auditing and assessment. FireCAT is not a replacement of other security utilities and software as well as fuzzers, proxies and application vulnerabilities scanners. FireCAT v2.0 - Firefox Catalog of Auditing exTensions Information Gathering Proxies & Web Utilities Editors Network Utilities Misc IT Security Related Application Auditing Download FireCAT here
University of Wisconsin-Milwaukee hacked - 75,000 social security numbers exposed

University of Wisconsin-Milwaukee hacked - 75,000 social security numbers exposed

Aug 11, 2011
University of Wisconsin-Milwaukee hacked - 75,000 social security numbers exposed University of Wisconsin-Milwaukee was the target. Malicious code was discovered on a document management database server. The university contacted law enforcement and after a month-long investigation realized that the database on the system contained over 75,000 records that included social security numbers for both students and employees. Nobody is sure how long the malware was running on the server, but it was shutdown once the breach was found. It's suspected that the software was being used to identify cutting edge research that the school is working on, but that has yet to be confirmed. It's also good to know that while students may have had their identity stolen, the database contained no " academic information such as student grades ," so at least the attackers won't be able to identify whether students passed their criminology courses.
Expert Insights Articles Videos
Cybersecurity Resources