#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Armitage Update : Graphical cyber attack management tool for Metasploit

Armitage Update : Graphical cyber attack management tool for Metasploit

Feb 15, 2012
Armitage Update : Graphical cyber attack management tool for Metasploit Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don't use Metasploit every day. If you want to learn Metasploit and grow into the advanced features, Armitage can help you. Armitage Changelog 14/Feb/12 - Added ports 5631 (pc anywhere) and 902 (vmauthd) to the MSF Scans feature. - Several cosmetic tweaks to the spacing in Armitage tables. - Moved table render code from Sleep to Java to avoid potential lock conflicts - Added support for vba-exe payload output type. - Payload generation dialog now sets more appropriate default options for the vba output type when it is selected. - Meterp command shell "read more stuff?" heuristic now accounts for Yes/No/All - Fixed ExitOnSession ...
Tor Bridge Relay to Bypass Internet Censorship

Tor Bridge Relay to Bypass Internet Censorship

Feb 15, 2012
Internet users in dozens of countries around the world where governments tend to look askance at freedom and civil liberties have come to rely on the Tor network for dependable, anonymous access to the Web. But those governments and some popular websites have caught on to the game and begun to make it more difficult for users to connect to the Tor network. If you live in an area with little or no Internet censorship, you may want to run a Tor relay or a Tor bridge relay to help other Tor users access an uncensored Internet.The Tor network relies on volunteers to donate bandwidth. The more people run relays, the faster and more secure the Tor network will be. To help people using Tor bypass Internet censorship, set up a bridge relay rather than an ordinary relay. Now, new version of the software include a feature that enables users to connect to one of several " bridges ," or Tor relays whose IP addresses aren't listed in the Tor directory. Bridges to Tor is a step forwa...
Indian Stock Market next target of Bangladesh Hackers

Indian Stock Market next target of Bangladesh Hackers

Feb 15, 2012
Indian Stock Market next target of Bangladesh Hackers Bangladesh Cyber Army hackers released a Youtube video mentioning their next attack would be on Indian Stock Market, in order to Protesting the killing of another Bangladeshi citizen on Border by BSF. Bangladesh Cyber Army has attacked 3 important Indian Stock Market sites : https://www.dseindia.com/ https://www.nseindia.com/ https://www.paisacontrol.com/ The websites were down during the peak hour. So all types of online transaction was off. The sites faced DDoS attacks and were down for around 10 hours. This caused a huge amount of loss in the financial sector of India. The amount of loss may reach millions of rupees as well. Bangladesh Cyber Army mentioned that they are still not done. They will continue their attacks if BSF does not stop their brutality over innocent Bangladeshi citizens. They also mentioned that these high-profile sites will suffer continuous attacks if the points mentioned by them are not accepted. Bangla...
cyber security

Master SaaS AI Risk: Your Complete Governance Playbook

websiteReco AIArtificial Intelligence / SaaS Security
95% use AI, but is it secure? Master SaaS AI governance with standards-aligned frameworks.
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them

Malicious PyPI Packages Are Everywhere — A Practical Guide to Defending the Python Supply Chain

Jul 24, 2025
Python supply chain attacks are surging in 2025. Join our webinar to learn how to secure your code, dependencies, and runtime with modern tools and strategies.
Dangerous IE browser vulnerabilities, Allows remote code execution !

Dangerous IE browser vulnerabilities, Allows remote code execution !

Feb 15, 2012
Dangerous IE browser vulnerabilities, Allows remote code execution ! Microsoft is expected to show some love for Windows administrators on Valentine's Day, with nine patches fixing 21 vulnerabilities in February's Patch Tuesday release. Also, Microsoft is warning all users of its Internet Explorer web browser to immediately apply the latest security patch as a precaution against malicious hacker attacks. Critical fixes would address flaws that could allow remote code execution in Windows, Internet Explorer, .NET Framework, and Silverlight, Microsoft's web development tool. The update is rated "critical" for Internet Explorer 7, Internet Explorer 8, and Internet Explorer 9 on Windows client machines and Microsoft expects to see reliable exploit code published with the next 30 days. Here are the bulletins for February 2012: MS12-008 – Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2660465) MS12-010 – Cumulative Security Update for Inte...
Anonymous Hackers target Nasdaq website

Anonymous Hackers target Nasdaq website

Feb 15, 2012
Anonymous Hackers target Nasdaq website Websites of exchange operators Nasdaq and BATS have been attacked by hackers over the last 24 hours, causing ongoing disruptions for those trying to use the sites. Sites was down because of distributed denial-of-service attack from a group of Anonymous hackers. L0NGwave99 ,a online hacktivist, is claiming to be responsible for the attack. In a release issued Tuesday, an operative writes " This DDoS Operation over NASDAQ is done in support of the great and rooted 99% movement, whom the L0NGwave99 Group has decided to give a present ." " The website wasn't hacked, nobody got any information. What they did was try to block access for our users ," NASDAQ spokesman Joseph Christinat adds to the agency. Trading in Nasdaq stocks has not been affected by the attacks. According to reports, the attacks have also affected the NasdaqTrader.com site, although it seems to be fine at the moment. " The website wasn't hacke...
Anonymous leak 400 Mb Documents from US Army Intelligence Knowledge Network

Anonymous leak 400 Mb Documents from US Army Intelligence Knowledge Network

Feb 15, 2012
Anonymous leak 400 Mb Documents from US Army Intelligence Knowledge Network Anonymous claim to hack Intelligence Knowledge Network (IKN) Portal of United States Army -  ikn.army.mil . Hackers dump around 400 Mb of Data on Rapidshare in two parts : https://rapidshare.com/files/665225777/Documents1.zip https://rapidshare.com/files/2204410673/Documents.zip AnonymousIRC also tweeted few part of leaked documents , here and here .  IKN is a Knowledge Management tool and dynamic portal that enables Intelligence Soldiers all over the world to communicate, collaborate and investigate. IKN serves as the Intelligence Warfighter Forum and hosts discussion forums, a single point of entry to access Intelligence Community websites, and provides a variety of public and private web applications that support the Intelligence Community and the Warfighter.IKN Public Sites
Cryptome Webpages infected with Blackhole exploit kit

Cryptome Webpages infected with Blackhole exploit kit

Feb 13, 2012
Cryptome Webpages infected with Blackhole exploit kit Cryptome.org a popular website and similar to Wikileaks was hacked by the cybercriminals & Attackers were able to hide malicious scripts on every one of the site's 6,000 pages. Anyone visiting with a vulnerable browser will have found themselves infected with Blackhole, most likely adding their computer to a larger bot. Cryptome attack, website owners only know they have a problem when users contact them with the bad news after detecting it with security software wise to its many techniques for staying out of sight. Cryptome official write , " A reader reported today that accessing a file on Cryptome caused this intrusion warning " and " Replacement with clean files is proceeding, probably done by end of day ." Two years ago, the organisation published Microsoft's secret Global Criminal Compliance handbook, which laid out how the company was gathering certain data from users of some of its services...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>