#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Anonymous Hackers hack neo-Nazis website & leak personal info of 16,000 Finns

Anonymous Hackers hack neo-Nazis website & leak personal info of 16,000 Finns

Nov 08, 2011
Anonymous Hackers hack neo-Nazis website & leak personal info of 16,000 Finns Anonymous Hackers have successfully hacked the neo-Nazi website and published the database of its 16000 membership application database containing personal data of some applicants from all around the country. The hack was motivated by an apparent desire to shame the Finnish government into improving data security. In a Statement Anonymous says " We have no tolerance for any group based on racial, sexual and religion discrimination as well as for all the people belonging to them and sharing their ideologies, which is the reason why we decided to carry out last Monday's attack. ". Authorities are investigating the security breaches, according to an online message attributed to Anonymous Finland. According to the Helsingin Sanomat, the published information seems stolen from several sources: the Work Efficiency Institute, Student Alliance Osku, WinNova Länsirannikon koulutus Ltd, and Adu...
Researcher Charlie Miller kicked out from iOS dev program for Exploiting iOS security flaw

Researcher Charlie Miller kicked out from iOS dev program for Exploiting iOS security flaw

Nov 08, 2011
Researcher Charlie Miller kicked out from iOS dev program for Exploiting iOS security flaw A major security flaw in Apple's iOS operating system that could allow hackers to remotely gain unauthorized access to an iPhone, iPod touch or iPad has been uncovered by a security expert "Charlie Miller ". Charlie Miller gets a kick of out defeating Apple's security mechanisms, using his hacking skills to break into Macbooks and iPhones. Now, Apple has kicked the security researcher out of its iOS developer program after word got out that he built a proof-of-concept iPhone app to showcase a bypass of the code signing mechanism. Hours before, a YouTube video that Miller released went viral. In it, he demonstrated how he hijacked an iPhone to run malicious code after installing his Instastock app, which was admitted into the App Store in September. According to the report, Miller plans to reveal the issue in a presentation at the SysCan security conference in Taiwan next week. As...
The Hacker News arrived on Google+ Pages

The Hacker News arrived on Google+ Pages

Nov 07, 2011
The Hacker News arrived on Google+ Pages Google has finally added Google+ Pages feature in their social network which allow brands, products, companies, businesses, places, groups, and everyone else to establish a presence on the service. We've gone ahead and set up our very own ' The Hacker News ' Google+ page for all of our Readers . How you can help us to Grow Us ? Use " Share This Page " button available below the profile picture to share THN page with your friends and Family.  Add THN in your Circle Now  ! Find Us on: Twitter Facebook Page
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
Between Buzz and Reality: The CTEM Conversation We All Need

Between Buzz and Reality: The CTEM Conversation We All Need

Jun 24, 2025Threat Exposure Management
I had the honor of hosting the first episode of the Xposure Podcast live from Xposure Summit 2025. And I couldn't have asked for a better kickoff panel: three cybersecurity leaders who don't just talk security, they live it. Let me introduce them. Alex Delay , CISO at IDB Bank, knows what it means to defend a highly regulated environment. Ben Mead , Director of Cybersecurity at Avidity Biosciences, brings a forward-thinking security perspective that reflects the innovation behind Avidity's targeted RNA therapeutics. Last but not least, Michael Francess , Director of Cybersecurity Advanced Threat at Wyndham Hotels and Resorts, leads the charge in protecting the franchise. Each brought a unique vantage point to a common challenge: applying Continuous Threat Exposure Management (CTEM) to complex production environments. Gartner made waves in 2023 with a bold prediction: organizations that prioritize CTEM will be three times less likely to be breached by 2026. But here's the kicker -...
International Foreign Government E-Mails Hacked by TeaMp0isoN

International Foreign Government E-Mails Hacked by TeaMp0isoN

Nov 07, 2011
International Foreign Government  E-Mails Hacked by TeaMp0isoN TeaMp0isoN group of hackers claim to hack more than 150 Email Id's of International Foreign Governments. They Release the Email List with Password on Pastebin note . Hex000101 Hacker, A member of TeaMp0isoN team got these Login credentials from various Government sites after hacking their databases such as armynet.mod.uk and website of Parliament of Australia (aph.gov.au) .
China is the birth place for most of malicious Android apps

China is the birth place for most of malicious Android apps

Nov 07, 2011
China is the birth place for most of malicious Android apps Mobile malware is rising, and there have been explosions in the world of viruses and Trojans. Virus makers are now targeting mobile platforms- thanks to their growing popularity. If we take the statistics from last 6 months, the chances of Android smart phones to be infected have doubled. A new report by TrendMicro says that " China is the birth place for most of malicious Android applications " . Even Android OS is also becoming more and more popular in China. This growth of Android users in China, however, seems to do little for the rocky relationship between Google and the Chinese government. It has been reported that access to the Google Android Market has been intermittent since 2009. According to a Report by TrendMicro, The inconvenience in accessing the Android Market, one not experienced by users from other countries, can be considered a big factor in the Chinese users' preference in terms of where to dow...
Brazil ISP servers under Massive DNS poisoning attacks

Brazil ISP servers under Massive DNS poisoning attacks

Nov 07, 2011
Brazil ISP servers under Massive DNS poisoning attacks Kaspersky Lab expert Fabio Assolini Report that A massive DNS cache poisoning attack attempting to infect users trying to access popular websites is currently under way in Brazil. Several large ISPs in the highly connected country have been affected by the attack, and police have made at least one arrest in connection with the operation. Attackers have been able to poison the DNS cache records for several major Web sites at some large ISPs. Last week Brazil's web forums were alive with desperate cries for help from users who faced malicious redirections when trying to access websites such as YouTube, Gmail and Hotmail, as well as local market leaders including Uol, Terra and Globo. In all cases, users were asked to run a malicious file as soon as the website opened. It asks the customer to download and install the so-called " Google Defence " software required to use the search engine. In reality, though, this ...
Sqlninja 0.2.6 is now available

Sqlninja 0.2.6 is now available

Nov 07, 2011
Sqlninja 0.2.6 is now available Sqlninja's goal is to exploit SQL injection vulnerabilities on web applications that use Microsoft SQL Server as back end. It is released under the GPLv3.There are a lot of other SQL injection tools out there but sqlninja, instead of extracting the data, focuses on getting an interactive shell on the remote DB server and using it as a foothold in the target network.  Here's what it does: Fingerprint of the remote SQL Server (version, user performing the queries, user privileges, xp_cmdshell availability, DB authentication mode) Bruteforce of 'sa' password (in 2 flavors: dictionary-based and incremental) Privilege escalation to sysadmin group if 'sa' password has been found Creation of a custom xp_cmdshell if the original one has been removed Upload of netcat (or any other executable) using only normal HTTP requests (no FTP/TFTP needed) TCP/UDP portscan from the target SQL Server to the attacking machine, in order to find a port th...
Expert Insights Articles Videos
Cybersecurity Resources