#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

PHP 5.3.6 closes five security holes !

PHP 5.3.6 closes five security holes !

Mar 17, 2011
The PHP developers have  released  PHP 5.3.6, a maintenance update to the PHP interpreter. Among over 60 bug fixes are a number of fixes for security related problems. A format string vulnerability in the phar extension of PHP 5.3.5,  CVE-2011-1153 , may allow attackers to view memory, cause a denial of service or execute arbitrary code. There was also an integer overflow in the shmop_read() function which allowed for denial-of-service ( CVE-2011-1092 ). Other flaws included crashes with crafted tags in exif metadata and ziparchive with empty archives. Security has also been enhanced in the protocol parsing done by the fastcgi process manager (FPM SAPI). Some of the flaws reportedly affect all versions of PHP 5.3.x and earlier. The release also sees SQLite3 upgraded to version 3.7.4 and PCRE updated to version 8.11. The ability to connect to HTTPS sites through a proxy was also added as was options for debugging backtrace functions. A full list of changes is available in...
Index Twitter HaCkeD By The 077 ( Hamdi HaCker ) Tunisian HaCker

Index Twitter HaCkeD By The 077 ( Hamdi HaCker ) Tunisian HaCker

Mar 17, 2011
Index Twitter HaCkeD By The 077 ( Hamdi HaCker ) Tunisian HaCker Hacked Site :  https://www.indextwitter.com/077.html
Hackers Exploit BlackBerry Browser Bug !

Hackers Exploit BlackBerry Browser Bug !

Mar 17, 2011
Research in Motion has found a security flaw and recommended that user disable JavaScript in browsers on certain phones, threatening the BlackBerry maker's iron-clad reputation for security. "The issue could result in remote code execution on affected BlackBerry smartphones," the Waterloo, Ontario-based company said. "Successful exploitation of the vulnerability requires the user to browse to a website that the attacker has maliciously designed." The flaw is in the WebKit browser that RIM includes in version 6 of its BlackBerry OS. RIM said hackers can steal data from users' memory cards on some BlackBerry devices. They can also install malware by exploiting the hole, but the company said that even if attacked, the phone's emails and contacts would be safe. The publicity is particularly bad for the company who stakes its reputation on the security and privacy of its service. RIM, which has been forced to use more third-party software to compete w...
cyber security

Master SaaS AI Risk: Your Complete Governance Playbook

websiteReco AIArtificial Intelligence / SaaS Security
95% use AI, but is it secure? Master SaaS AI governance with standards-aligned frameworks.
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them

Malicious PyPI Packages Are Everywhere — A Practical Guide to Defending the Python Supply Chain

Jul 24, 2025
Python supply chain attacks are surging in 2025. Join our webinar to learn how to secure your code, dependencies, and runtime with modern tools and strategies.
2 Bangladesh Government Hacked By Mr-ADeL !

2 Bangladesh Government Hacked By Mr-ADeL !

Mar 17, 2011
2 Bangladesh Government Hacked By Mr-ADeL ! Hacked Sites : https://plandiv.gov.bd/ https://sfcdp.gov.bd/ News Source : Kai Farmer
Twitter offers encryption to beat hackers !

Twitter offers encryption to beat hackers !

Mar 17, 2011
Twitter is offering users better protection from hackers with a new option to always use an encrypted connection to access its microblogging service. The measure is particulary designed to defend those who access Twitter via unsecured public Wi-Fi networks, which can make it easy for hackers to steal their passwords. If activated, the new option in users' account settings means that whenever a they log on, their browser will connect to Twitter's servers via HTTPS, an encrypted version of the basic web protocol. Virtually anyone trying to spy on the traffic will see only packets of completely unintelligible data. "This will improve the security of your account and better protect your information if you're using Twitter over an unsecured Internet connection, like a public WiFi network, where someone may be able to eavesdrop on your site activity," said Twitter spokeswoman Carolyn Penner. "In the future, we hope to make HTTPS the default setting," she adde...
Chinese Site Hacked by Cyber king (TEAM NUTS)

Chinese Site Hacked by Cyber king (TEAM NUTS)

Mar 17, 2011
Chinese Site Hacked by Cyber king (TEAM NUTS) Hacked Site :  https://www.bjname.com/NUTS.HTML
3 websites hacked by Team-Greyhat !

3 websites hacked by Team-Greyhat !

Mar 17, 2011
3 websites hacked by Team-Greyhat ! Hacked Sites : https://demoshop2.pentaconweb.dk/ https://suphamyenbai.edu.vn/index.htm https://impalamultiplex.com/index.html News Source :  Napster
Yahoo India R&D to Host ‘HACK U’ for IIT Kharagpur Students !

Yahoo India R&D to Host 'HACK U' for IIT Kharagpur Students !

Mar 16, 2011
Yahoo! India R&D will be hosting 'HACK U'– the University Hack Day event for IIT Kharagpur students on campus between 17 and 20 March. Close to 250 students are expected to participate in this four day event of learning, hacking and fun, which is part of Yahoo!'s on-going commitment to nurture talent and innovation among today's student bodies. Conceptualized along the lines of Open Hack Day, Hack U provides a platform for the student community to develop and build applications using Yahoo!'s Open APIs (Application Programming Interface) like YQL and YAP, or even to create a new product concept itself. This novel concept provides students with the opportunity to work on product ideas, develop working prototypes in a 24 hour 'Hackathon' and eventually stand the chance to win cool prizes. The event will kick off with a series of hack-related presentations and tech talks by Yahoo! engineers followed by a non-stop 24-hour hacking session by the students. Praveen Ramachandr...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>