#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Apollohospitals.com is vulnerable to SQL injection !

Apollohospitals.com is vulnerable to SQL injection !

Apr 13, 2011
Apollohospitals.com is vulnerable to SQL injection Found and Submitted By : Zero Cool
Supreme Court of Canada vulnerable to non prsistance xss attack !

Supreme Court of Canada vulnerable to non prsistance xss attack !

Apr 13, 2011
Supreme Court of Canada vulnerable to xss attack ! Vunl Link :  https://sr.scc-csc.gc.ca/ search?client=SCC-CSC&site= Internet&output=xml_no_dtd& proxystylesheet=SCC-CSC&hl=en& oe=latin1&ie=latin1&q=%3E%22% 3E%3CMARQUEE%3EHACKED+BY+ZERO+ COOL%3C%2FMARQUEE%3E&btnG= Search Found n Submitted by : Zero Cool
Main Advertising vulnerable to SQLI by lionaneesh !

Main Advertising vulnerable to SQLI by lionaneesh !

Apr 13, 2011
Main Advertising vulnerable to SQLI by lionaneesh ! One of the best advertising companies in the world which is even used by megaupload is vulnerable to SQLi.   What I can do [Power]:- Loinaneesh found a database in which the hits to a particular link was entered (this is most probably used for counting the revenue). I can change and increase or decrease the ad revenue of a particular site. Target: https://click1.mainadv.com/ad.asp?id=%Inject_Here%609 DATABASE :  MSSQL 2005 Method: GET DATABASE : portals DATABASE : PDATAortals Table Name Columns Formats domain_new Categories domains bannersImp1 sampleAPP bannersImp change articleGroups t_jiaozhu specialTables TablesLinks tabella1 Gestionale contents Luckypot ...
cyber security

New Whitepaper: The Evolution of Phishing Attacks

websitePush SecurityIdentity Attacks / Phishing
Why is phishing still so effective? Learn about modern phishing techniques and how to counteract them.
cyber security

Key Essentials to Modern SaaS Data Resilience

websiteVeeam SoftwareSaaS Security / Data Protection
Read this guide to learn exactly what today's organizations need to stay protected, compliant, and in control
ESET NOD32 releases Antivirus for Linux 4 !

ESET NOD32 releases Antivirus for Linux 4 !

Apr 13, 2011
ESET NOD32 releases Antivirus for Linux 4 ! ESET announced the availability of ESET NOD32 Antivirus 4 Business Edition for Linux Desktop and ESET NOD32 Antivirus 4 for Linux. ESET NOD32 Antivirus 4 for Linux offers protection against cross-platform and emerging threats, enhancing the security of Linux platforms. The scanning engine automatically detects and cleans malicious code, including threats designed for Windows and Mac based systems. ESET NOD32 Antivirus 4 Business Edition for Linux Desktop includes ESET Remote Administrator, which provides IT administrators with a management console to control an entire network from a single screen — supporting tens or thousands of heterogeneous computers. Key benefits and features: Detection and proactive cross-platform protection  – Advanced heuristics technology delivers real-time, proactive protection from malware, hacker attacks and exploits. Product protects against Linux, Windows and Mac malware Small system footprint ...
Malaysiakini - Malaysia's Most Popular News Website Shutdown's after cyber attack !

Malaysiakini - Malaysia's Most Popular News Website Shutdown's after cyber attack !

Apr 13, 2011
Malaysiakini - Malaysia's Most Popular News Website Shutdown's after cyber attack ! It has been reported that Malaysia's most popular news website Malaysiakini ( https://www.malaysiakini.com ) has been hit by cyber attack from 11 AM afternoon shutting the website down. The attack created a stir when the website stopped working just before the Sarawak election, making the website inaccessible to the readers. The attack has been diagnosed as Denial-of-service attack which is considered to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Denial-of-service attacks are considered violations of the IAB's Internet proper use policy, and also violate the acceptable use policies of virtually all Internet service providers. They also commonly constitute violations of the laws of individual nations. According to the technical team, the cyber attack has resulted in  swarming the Malaysiakini servers...
French Hacker Arrested After Bragging on TV !

French Hacker Arrested After Bragging on TV !

Apr 13, 2011
A French hacker who boasted on TV about hacking into the network of an important defense contractor was arrested and charged with unauthorized access to a computer system, data theft and organized fraud. The hacker appeared on the France 2 television programme "Complément d'enquête" (Further investigation) where he claimed to have hacked into computers belonging to the French Army and Thales Group, an IT contractor for the aerospace, defense and security industries. After the programme aired, the company filed a complaint, claiming the hacker stole confidential information from its internal network. The man, identified in only as Carl, was arrested on April 7 in Paris. When inspecting his computer, police found the details of hundreds of credit cards and bank accounts. The hacker admitted selling the information on underground websites, as well as using them to make fraudulent purchases for himself and others. This led to additional charges of organized fraud bei...
BackTrack 5 will also be for Motorola Xoom !

BackTrack 5 will also be for Motorola Xoom !

Apr 13, 2011
In the past few days offensive-security have been toying with some Motorola hardware, and have managed to get a basic build of BackTrack 5 (+ toolchain) on a Motorola Xoom. The possibilities look exciting as offensive-security are slowly building several experimental arm packages. offensive-security team does not have much experience with the Android OS nor ARM hardware, but so far – so good. offensive-security will not promise an ARM release on May 10th, as this new "experiment" was not planned in any way – but we'll do our best. As of now, offensive-security have got a modified version of an Ubuntu 10.04 ARM image, chrooted on a Motorola Xoom. The tablet is running a modified, overclockable kernel (from 1.0 to 1.5 GHz). The chrooted BackTrack environment is running a VNC server, from which you can connect from the tablet itself. When run locally from the Xoom tablet, the VNC session does not lag, and the touch keyboard and touchscreen are very workable. As expected from a chr...
DUCAT Punjab Best Ethical Hacker Competition Website hacked by lionaneesh !

DUCAT Punjab Best Ethical Hacker Competition Website hacked by lionaneesh !

Apr 12, 2011
DUCAT Punjab Best Ethical Hacker  Competition Website hacked by  lionaneesh   ! DUCAT have announce Hacking Competition, Read Here  , But today " lionaneesh " an Indian Hacker hack into there site and show all security Holes. With the help of "lionaneesh" & THN , The site is now fixed :) Hack Proof :
Expert Insights Articles Videos
Cybersecurity Resources
//]]>