#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

TheHackerNews and CyberArmy(India) Facebook Pages Hacked By Albania Security Group !

TheHackerNews and CyberArmy(India) Facebook Pages Hacked By Albania Security Group !

Feb 06, 2011
TheHackerNews  and  CyberArmy(India)   Facebook Pages Hacked By  Albania Security Group  ! Link of pages :  https://www.facebook.com/thehackernews and https://www.facebook.com/cyberarmy.in Albania Security Group !! The Group is created by 4 members !! hacker twilight ,akrepi hacker , BombRun , WarBot ! They have hacked 300 facebook fan pages in 1 day ! No issue for us, Because If  Facebook Founder, Mark Zuckerberg's Facebook Fan Page can be Hacked , then no-one is secure on Facebook ! Thanks to  Albania Security Group, They prove that Security is really from you !! I read the script these guys used to hack us... and really wanna appreciate, they did damn awesome job.  Update : Both Facebook Pages Successfully Retrieved By Owner Of "The Hacker News" , - Security is From you !!
President Ali Abdullah Saleh website hacked !

President Ali Abdullah Saleh website hacked !

Feb 06, 2011
Yemen has denied that the website of President Ali Abdullah Saleh—the ambition of anti-government protests—was brought bottomward by hackers this accomplished week, its official account bureau said. "An official in the admiral of advice and advice technology denied letters claiming that the website of President Ali Abdullah Saleh was hacked" on Thursday, the Saba account bureau said in a celerity backward Friday. "The president's website, which is directed by Saba, has been operating commonly annular the alarm and was not hacked." AFP approved in arrogant to admission Saleh's website (presidentsaleh.gov.ye) on Thursday afterward calls by a loose-knit accumulation of all-around hackers accepted as Anonymous for attacks on the site. The armpit was activity as accustomed yesterday. Valleywag, a Silicon Valley blog endemic by the Gawker network, said the cyber attacks on official Yemeni government websites had been dubbed "Operation Yemen" in Anonymous babble rooms.
British govt computers under cyber attacks from hostile states !

British govt computers under cyber attacks from hostile states !

Feb 05, 2011
British Adopted Secretary William Hague has said that cyberspace is acceptance abyss and adverse intelligence agencies to advance the British government. During a appointment in Munich, Hague not alone talked about how government computers were adulterated by a virus aftermost year, but additionally abundant an attack to abduct abstracts from a UK defence contractor. He fatigued that addition in beard of an agent of addition defence close had advised to abduct information, the BBC reports. He additionally said that some computers of the British government were adulterated with the "Zeus" virus, which was appear afterwards users had opened an e-mail declared to accept appear from the White House and followed a link, the address said. "Our experts were able to bright up this infection but added adult attacks such as these are acceptable added common," he said. Insisting that cyberspace was accouterment "rich pickings" for criminals, Hague apprenticed...
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
Between Buzz and Reality: The CTEM Conversation We All Need

Between Buzz and Reality: The CTEM Conversation We All Need

Jun 24, 2025Threat Exposure Management
I had the honor of hosting the first episode of the Xposure Podcast live from Xposure Summit 2025. And I couldn't have asked for a better kickoff panel: three cybersecurity leaders who don't just talk security, they live it. Let me introduce them. Alex Delay , CISO at IDB Bank, knows what it means to defend a highly regulated environment. Ben Mead , Director of Cybersecurity at Avidity Biosciences, brings a forward-thinking security perspective that reflects the innovation behind Avidity's targeted RNA therapeutics. Last but not least, Michael Francess , Director of Cybersecurity Advanced Threat at Wyndham Hotels and Resorts, leads the charge in protecting the franchise. Each brought a unique vantage point to a common challenge: applying Continuous Threat Exposure Management (CTEM) to complex production environments. Gartner made waves in 2023 with a bold prediction: organizations that prioritize CTEM will be three times less likely to be breached by 2026. But here's the kicker -...
Gang stole credit card details of US Citizens !

Gang stole credit card details of US Citizens !

Feb 05, 2011
The cyber abomination badge arrested four youths, who had purchased cottony sarees account over Rs 17 lakh by application baseborn acclaim agenda capacity and agreement orders online. The youths, three of them engineers, had become accompany while alive in a arch alarm centre in the city. While one is a business graduate, the added three had marine, computer and civilian engineering degrees. The accused -- A Peter (29), V Kaviarasu (27) and SK Yuvaraj (27) Coimbatore and A Irfan (26) of Kolathur actuality were arrested by the cyber abomination addition badge absorbed to the Central Abomination Branch (CCB) on Friday and adjourned in administrative custody. The four had purchased cottony sarees account Rs 17.8 lakh and awash them to a few bounded shops at a cheaper price. Irfan and Yuvaraj were incharge of auction of the baseborn goods. Based on the complaint of Kumarasamy, who is a accepted administrator in a arch bolt exhibit in T Nagar, the cyber abomination badge tracked the a...
The End of the Internet in this week !

The End of the Internet in this week !

Feb 05, 2011
You may accept heard that the Internet ran out of IP addresses this week, a after crisis sometimes compared to all the Y2K agitation that accompanied the accession of the year 2000. Actually, this is alone the alpha of the end for the Internet as we apperceive it. And as with Y2K, alarms are actuality aloft with the ambition of acclamation the botheration far abundant in beforehand that back the end assuredly comes no one will notice. If you recall, Y2K was declared to beggarly utilities would abort and planes would abatement out of the sky if programmers bootless to basis out every instance ofcomputer application accounting with 2-digit date fields, as if the 1900s would never end. In this case, the affair is the burnout of the 4.3 billion Internet Protocol adaptation 4 addresses (IPv4), which are rapidly actuality assigned to web servers, cable modems, and acute phones. No one is admiration the end of the world, but there is assignment to be done by anybody who manages a arrangem...
3 Months Journey of 'The Hacker News' !

3 Months Journey of 'The Hacker News' !

Feb 05, 2011
3 Months Journey of ' The Hacker News ' "Journey Of 3 Beautiful and Successful Months Of ' The Hacker News '. We wanna say thanks to all Hacking Groups and Hackers who become the Part of 'The Hacker News' in any form ie. as News/Source/Admin/Support/Reader. For us you all are diamonds, We work beyond the Boundaries & Limits. We dedicate our best to update form mind 24X7. Stay Tuned to us, Fell The Truth (^_^) " Our Stats Of these 3 Months : Team : T he H acker N ews Thank You !
Is WikiLeaks Really Hacking for Secrets !

Is WikiLeaks Really Hacking for Secrets !

Feb 05, 2011
In April 2009 the whistle-blower website WikiLeaks appear a abstruse U.S. aggressive certificate account abstruse capabilities of the U.S. Navy's Pacific Missile Range Facility on Kauai. In an online column answer how it acquired the information, WikiLeaks adumbrated alone that it came from "a source." It was addition accomplishment for WikiLeaks and its founder, Julian Assange, who describes the extensive organization—it has no anchored domicile—as a defended agenda bead box for antagonistic insiders. He has again said WikiLeaks doesn't actively access classified abstracts but rather provides a belvedere for others who accept arcane advice to acknowledge for the attainable good. Except that WikiLeaks, according to Internet aegis aggregation Tiversa, appears to accept bolter bottomward that aggressive certificate itself. Tiversa says the accumulation may accept exploited a affection of file-sharing applications such as LimeWire and Kazaa that are generally acclimate...
Nasdaq systems were hacked last year !

Nasdaq systems were hacked last year !

Feb 05, 2011
Federal authorities are investigating a computer advance at the aggregation that runs the Nasdaq banal exchange, the Wall Street Journal arise Friday. According to the report, which cites bearding sources, Nasdaq OMX Group computers were compromised ancient over the accomplished year, but the company's trading belvedere was unaffected. "So far, [the perpetrators] arise to accept aloof been attractive around," the Journal quotes one antecedent as saying. Nasdaq OMX Group runs a cardinal of banal exchanges, including the U.S. Nasdaq, and exchanges that barter in Copenhagen, Stockholm, Helsinki, and the Baltic region. The analysis is actuality conducted by the U.S. Federal Bureau of Analysis and the U.S. Secret Service, the address states. Nasdaq assembly could not be accomplished anon for comment. Hacking incidents like this are acceptable added common, as boundless e-mail and Web-based computer attacks abide to beat workers in corporations and in government. In som...
Expert Insights Articles Videos
Cybersecurity Resources