#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Japan developing cyber weapons for Counter Attacks

Japan developing cyber weapons for Counter Attacks

Jan 02, 2012
Japan developing cyber weapons for Counter Attack Japanese technology firm Fujitsu is developing a ' seek and destroy ' virus which could identify and combat hacking and other cyber threats in a more effective way. The weapon is the culmination of a 179 million yen three-year project entrusted by the government to technology maker Fujitsu Ltd to develop a virus and equipment to monitor and analyse attacks, the daily said. The chief snag for the plan is that Japanese law currently forbids the manufacturing of computer viruses. However, we would suspect that a compromise can be reached in due course, given the project is being carried out in the interest of national security. Japan was a notable victim of hacking in 2011, which proved to be a year in which cyber crimes and threats rose to prominence.  Japan's parliament had its computer system hacked into, while a number of cyber espionage campaigns including one targeting almost 50 US companies were waged on governments an...
Fully automated MySQL5 boolean based enumeration tool

Fully automated MySQL5 boolean based enumeration tool

Jan 02, 2012
Fully automated MySQL5 boolean based enumeration tool Blackhatacademy Developers  releases Fully automated MySQL5 boolean based enumeration tool. By default, this script will first determine username, version and database name before enumerating the information_schema information. When the -q flag is applied, a user can supply any query that returns only a single cell If the exploit or vulnerability requires a single quote, simply tack  %27  to the end of the URI. This script contains  error detection : It will only work on a mysql 5.x database, and knows when its queries have syntax errors. This script uses perl's LibWhisker2 for IDS Evasion (The same as Nikto). This script uses the MD5 algorithm for optimization. There are other optimization methods, and this may not work on all sites. GET TOOL SCRIPT HERE .
Zero Day Reflected Cross Site Scripting vulnerability in wordpress 3.3

Zero Day Reflected Cross Site Scripting vulnerability in wordpress 3.3

Jan 02, 2012
Zero Day Reflected Cross Site Scripting vulnerability in wordpress 3.3 Two Indian Security Experts : Aditya Modha & Samir Shah from from Net-Square Solutions reveals Zero Day Reflected Cross Site Scripting vulnerability in latest version of wordpress 3.3 ! Vulnerability exploit the comment feature of Wordpress Blog. Following two Steps mentioned in Exploit . Step 1: Post a comment to the target website. Step 2: Replace the value of author tag, email tag, comment tag with the exact value of what has been post in the last comment. Change the value of comment_post_ID to the value of post (which can be known by opening that post and checking the value of p parameter in the url). For example the if the url is https://192.168.1.102/wordpress/?p=6 then the value of comment_post_ID is 6. Get Complete Exploit  Here
cyber security

Secure your LLMs Against Real-World Threats

websiteWizLLM Security / Artificial Intelligence
LLMs move fast. So do the risks. Get practical, real-world steps to defend against prompt injection, model poisoning, and more.
cyber security

2025 Gartner® MQ Report for Endpoint Protection Platforms (July 2025 Edition)

websiteSentinelOneEndpoint Protection / Unified Security
Compare leading Endpoint Protection vendors and see why SentinelOne is named a 5x Leader
Wait ! It's not just Stuxnet or DuQu , Kaspersky reveals 5 more cousins

Wait ! It's not just Stuxnet or DuQu , Kaspersky reveals 5 more cousins

Jan 02, 2012
Wait ! It's not just Stuxnet or DuQu , Kaspersky reveals 5 more cousins Russian computer security outfit Kaspersky Lab said that the Stuxnet virus that damaged Iran's nuclear programme was likely to be one of at least five cyber weapons developed on a single platform. The viruses have never been seen 'in the wild' - and it's unclear whether they, like Stuxnet, would be built to cause failures at nuclear plants, or engineered for another purpose. Both Stuxnet and Duqu appear to have been created back in late 2007 or early 2008, and other pieces of malware with similar capabilities were built on the same platform, Gostev said.  Gostev examined two key drivers and variants that were used in both Stuxnet and Duqu, as well as two previously unknown drivers that were similar to the ones used. Not only did the same group of people develop Stuxnet and Duqu, but they likely worked simultaneously on multiple variants, Gostev said. The other pieces may be in the wild an...
Hackers launching own satellites in orbit to beat Censorship

Hackers launching own satellites in orbit to beat Censorship

Jan 01, 2012
Hackers launching own satellites in orbit to beat Censorship Worried about Internet censorship by SOPA and PIPA ? Wait !! This News is for you , Hackers plan to take the internet beyond the reach of censors by putting their own communication satellites into orbit. Good guy hackers plan to launch satellites to fight the Stop Online Piracy Act and create a censorship-free Internet. According to BBC News Technology Reporter David Meyer, the plan, which was detailed this week during the Chaos Communication Congress (CCC) in Berlin, is in response to proposed legislation such as the Stop Online Piracy Act (SOPA), which would allow the U.S. government to block websites believed to violate intellectual property law. " The first goal is an uncensorable internet in space ," hacking activity Nick Farr, who initially began soliciting financial support for what has been dubbed the Hackerspace Global Grid , in August, told Meyer on Friday. " Let's take the internet out of the control of te...
Facebook Scam : Selena Gomez Caught On Leaked Tape

Facebook Scam : Selena Gomez Caught On Leaked Tape

Jan 01, 2012
Facebook Scam : Selena Gomez Caught On Leaked Tape Another Facebook Scam is circulating with the headline " Selena Gomez Caught On Leaked Tape " and Message " you will lost your all respect for Selena Gomez after watching this ". By Clicking the wall post link takes you to the following page designed to look like Facebook. Facebook already declared as " Most Spamy Social Network of the Year " by The Hacker News Awards 2011. Clicking the play button loads a " share " box allowing you to spread the scam message to your friends. The following survey scam also loads another Scam as shown below. Scams like this often use multiple domains, so you may see a variation in the landing pages and scam messages. These scams contain click-jacking and like-jacking components and ends in a survey scam. One of the most common types of Facebook spam is a Wall post that encourages you to install a Facebook application. The application will require that you to agree to a...
One million pages infected by Lilupophilupop SQL injection

One million pages infected by Lilupophilupop SQL injection

Jan 01, 2012
One million pages infected by Lilupophilupop SQL injection ISC (Internet Storm Center) reported that   lilupophilupop.com SQL injection attacks. There were about 80 pages infected according to Google searches few weeks back and now it raise to over 1 million . sites being injected with string : "></title><script src="https://lilupop******.com/**.php"></script>          Recommended Read :  The Hacker News Hacking Awards : Best of Year 2011            Infections are shows on .com, .de, & .uk as the most affected regions. ISC posted stats just to give you a rough idea of where the pages are: UK - 56,300 NL - 123,000 DE - 49,700 FR - 68,100 DK - 31,000 CN - 505 CA - 16,600 COM - 30,500 RU - 32,000 JP - 23,200 ORG - 2,690 If you want to find out if you have a problem just search for " <script src="https://lilupophi*****p.com/ " in google and use the site: parameter to hone in on yo...
Expert Insights Articles Videos
Cybersecurity Resources