#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Optima DDOS 10a Botnet leaked on Underground Forums

Optima DDOS 10a Botnet leaked on Underground Forums

Oct 08, 2011
Optima DDOS 10a botnet leaked on Underground Forums On underground forums " Optima DDOS 10a Botnet " full version posted for all to download and use. Complete new version of the acclaimed DDoS bot Optima Darkness. In this new version 10a according to the author was raised in secrecy bot system and optimized grabber passwords. It cost about $ 600 worth. Features a bot: DDoS attacks of three types - http flood, icmp-flood, syn-flood. Theft of stored passwords from some applications installed on the victim's system, details below. Opening on the infected system proxy Socks5. The possibility of cheating various counters on the websites (http-access the sites). Hidden download and run the specified file to the affected systems. Installed in the system as a service Weight bot - 95.5 kb, written in Delphi. At the moment the following antivirus detected: [ Source ]
Apache Patch released for Reverse proxy Bypass Vulnerability

Apache Patch released for Reverse proxy Bypass Vulnerability

Oct 08, 2011
Apache Patch released for  Reverse proxy Bypass Vulnerability Security experts at Context have discovered a hole in the Apache web server that allows remote attackers to access internal servers. Security experts are warning firms running the Apache web server to keep up to date with the latest patches after the Apache Software Foundation issued a security advisory to all customers highlighting a new vulnerability. The weakness in 1.3 and all 2.x versions of the Apache HTTP Server can be exploited only under certain conditions. Reverse proxies are used to route external HTTP and HTTPS web requests to one of several internal web servers to access data and resources. Typical applications include load balancing, separating static from dynamic content, or to present a single interface to a number of different web servers at different paths. Context explained that the attack is based on an Apache web server using the mod_rewrite proxy function, and uses a common hacking...
Android malware - Works on remote commands form encrypted blog

Android malware - Works on remote commands form encrypted blog

Oct 08, 2011
Android malware - Works on remote commands form encrypted blog Researchers from Trend Micro have spotted a piece of malicious software for Android. This is the first known Android malware that reads blog posts and interprets these as commands. It can also download and install additional applications, therefore further compromising the affected device. Trend Micro calls the malware " ANDROIDOS_ANSERVER.A. " If the application is installed, it asks for a variety of permissions. If those are granted, it can then make calls, read log files, write and receive SMSes and access the Internet and network settings, among other functions. This backdoor may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. " This is a blog site with encrypted content, which based on our research, is the first time Android malware implemented this kind of technique to communicate, " wrote Karl Dominguez, a Trend Micro threat resp...
cyber security

New Whitepaper: The Evolution of Phishing Attacks

websitePush SecurityIdentity Attacks / Phishing
Why is phishing still so effective? Learn about modern phishing techniques and how to counteract them.
cyber security

Key Essentials to Modern SaaS Data Resilience

websiteVeeam SoftwareSaaS Security / Data Protection
Read this guide to learn exactly what today's organizations need to stay protected, compliant, and in control
Microsoft FUSE Labs Sub-domain defaced by Hmei7

Microsoft FUSE Labs Sub-domain defaced by Hmei7

Oct 08, 2011
Microsoft FUSE Labs Sub-domain defaced by Hmei7 Hacker named " Hmei7 " defaced the official sud-domain of Microsoft FUSE Labs ( https://fuse.microsoft.com/ ) as shown above. He wrote a taunt on the home page with signature " are you microsoft?? , hackedby Hmei7 ". Mirror of hack at Zone-H is here .
Suzuki Official Website of Azerbaijan hacked by Co-cain Tm

Suzuki Official Website of Azerbaijan hacked by Co-cain Tm

Oct 08, 2011
Suzuki Official Website of Azerbaijan hacked by Co-cain Tm Suzuki Official Website of Azerbaijan today defaced by Co-cain Tm Hackers. The home page contain following lines: Cg 125 For Ever ! Co-cain Tm Sp Tnx 2 Skitt3r The Mirror of this hack also available on Zone-H . Reason of hack is unknown, supposed to be just for fun.
REMnux: A Linux Distribution for Reverse-Engineering Malware

REMnux: A Linux Distribution for Reverse-Engineering Malware

Oct 07, 2011
REMnux: A Linux Distribution for Reverse-Engineering Malware REMnux is a lightweight Linux distribution for assisting malware analysts in reverse-engineering malicious software. The distribution is based on Ubuntu and is maintained by Lenny Zeltser. REMnux is designed for running services that are useful to emulate within an isolated laboratory environment when performing behavioral malware analysis. As part of this process, the analyst typically infects another laboratory system with the malware sample and directs potentially-malicious connections to the REMnux system that's listening on the appropriate ports. REMnux is also useful for analyzing web-based malware, such as malicious JavaScript, Java programs, and Flash files. It also has tools for analyzing malicious documents, such as Microsoft Office and Adobe PDF files, and utilities for reversing malware through memory forensics. In these cases, malware may be loaded onto REMnux and analyzed directly on the REMnux system w...
Student Arrested for hacking Thailand Prime Minister Accounts

Student Arrested for hacking Thailand Prime Minister Accounts

Oct 07, 2011
Student Arrested for hacking Thailand Prime Minister Accounts Prime Minister Yingluck Shinawatra's personal Twitter account was hacked on October 2nd, 2011 in what officials said was possibly part of a conspiracy to embarrass the government. Police in Thailand have arrested a university student who is said to have admitted hacking into the Prime Minister's Twitter account and posting messages accusing her of incompetence. 22-year-old Aekawit Thongdeeworakul, a fourth year architecture student at Chulalongkorn University, could face up to two years in prison if found guilty of illegally accessing computer systems without authorization.
Expert Insights Articles Videos
Cybersecurity Resources
//]]>