#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

One more Hacker Website Ub3rHakerz.NET Hacked By Shadow008 (PakCyberArmy)

One more Hacker Website Ub3rHakerz.NET Hacked By Shadow008 (PakCyberArmy)

May 04, 2011
One more Hacker Website Ub3rHakerz.NET Hacked By Shadow008 (PakCyberArmy) Sites Hacked :  https://ub3rhakerz.net/ Mirror : https://zone-h.com/mirror/id/13604712
Source Code of Osama FaceBook worm Leaked !

Source Code of Osama FaceBook worm Leaked !

May 04, 2011
Source Code of Osama FaceBook worm Leaked ! Source Code :  https://www.reddit.com/tb/h3mdu
Network access control system PacketFence 2.2 released !

Network access control system PacketFence 2.2 released !

May 04, 2011
PacketFence is a free and open source network access control (NAC) system. It can be used to effectively secure networks - from small to very large heterogeneous networks. PacketFence has been deployed in production environments where thousands of users are involved - on wired and wireless networks. PacketFence provides an impressive list of supported features. Among them, there are: Registration of network components through a captive portal Automatic isolation, if desired, of unwanted devices such as Apple iPod, Sony PlayStation, wireless access points and more Instant stopping of computer worms or virus propagation Blocking of attacks on your servers or other network components Compliance for computers present on your network (software installed, particular configurations, etc.) PacketFence is an unobtrusive solution that works with equipment from many vendors (wired or wireless) such as Cisco, Nortel, Hewlett-Packard, Enterasys, Accton/Edge-corE, 3Com, D-Link, Intel, Dell...
cyber security

The MCP Security Guide for Early Adopters

websiteWizArticles Intelligence / MCP Security
Thousands of MCP servers are already live, but most security teams don't have a clear strategy yet. Get the practical guide to MCP for security teams.
cyber security

How Security Leaders, like Snowflake's CISO, are Securing Unmanaged Devices

websiteBeyond IdentityIdentity Security / Enterprise Protection
Unmanaged devices fuel breaches. Learn 5 ways CISOs secure them without hurting productivity.
Bhutan Government's hacked with Blind Sqli Injection

Bhutan Government's hacked with Blind Sqli Injection

May 04, 2011
Bhutan Government 's hacked with Blind Sqli Injection Hacked Site : bhutan.gov.bt
Bryantx.gov - City of Bryan Hacked and 175 emails/passwords Exposed By  Fr0664/FCA

Bryantx.gov - City of Bryan Hacked and 175 emails/passwords Exposed By Fr0664/FCA

May 04, 2011
Bryantx.gov - City of Bryan Hacked and 175 emails/passwords Exposed By   Fr0664/FCA Hacker Expose  175 emails/passwords at  https://pastebin.com/weSMwxAi
Tor 0.2.2.25-alpha released - To Toggle, or not to Toggle & The End of Torbutton!

Tor 0.2.2.25-alpha released - To Toggle, or not to Toggle & The End of Torbutton!

May 03, 2011
Tor 0.2.2.25-alpha released - To Toggle, or not to Toggle & The End of Torbutton! Tor 0.2.2.25-alpha fixes many bugs: hidden service clients are more robust, routers no longer overreport their bandwidth, Win7 should crash a little less, and NEWNYM (as used by Vidalia's "new identity" button)now prevents hidden service-related activity from being linkable. It provides more information to Vidalia so you can see if your bridge is working. Also, 0.2.2.25-alpha revamps the Entry/Exit/ExcludeNodes and StrictNodes configuration options to make them more reliable, more understandable, and more regularly applied. If you use those options, please see the revised documentation for them in the manual page. TorButton Modifies to " To Toggle, or not to Toggle " : Read Here Download : https://www.torproject.org/download/download
Assange says Facebook is spying tool for US intelligence !

Assange says Facebook is spying tool for US intelligence !

May 03, 2011
Assange says Facebook is spying tool for US intelligence ! WikiLeaks editor-in-chief Julian Assange has branded Facebook an "appalling spying machine". According to Assange, whose WikiLeaks whistle-blowing site has propelled him into the media limelight, US intelligence services have direct access to records of Facebook users. "Facebook is the most appalling spying machine that's ever been invented," he said in an interview with Russia Today. "Here we have the world's most comprehensive database about people, their relationships, their addresses and locations, their communications with each other - all sitting within the United States and all accessible to US intelligence." Assange claimed that because of the costs involved each time an internet company was asked for access to specific data files, the big companies have built in back doors for officials to help themselves to whatever data they wanted. "Facebook, Google, Yahoo – all these major US organisations - hav...
0day Exploit Released : Adobe, HP, Sun, Microsoft Interix & many more Vendors FTP hackable !

0day Exploit Released : Adobe, HP, Sun, Microsoft Interix & many more Vendors FTP hackable !

May 03, 2011
0day Exploit Released : Adobe, HP, Sun, Microsoft Interix & many more Vendors FTP hackable ! Topic : Multiple Vendors libc/glob(3) resource exhaustion (+0day remote ftpd-anon) CVE : CVE-2010-2632 CWE : CWE-NOMAPPING SecurityRisk : Medium (About) Remote Exploit : Yes Local Exploit : Yes Victim interaction required : No Credit : Maksymilian Arciemowicz Affected Software (verified): - - OpenBSD 4.7 - - NetBSD 5.0.2 - - FreeBSD 7.3/8.1 - - Oracle Sun Solaris 10 - - GNU Libc (glibc) Affected Ftp Servers: - - ftp.openbsd.org (verified 02.07.2010: "connection refused" and ban) - - ftp.netbsd.org (verified 02.07.2010: "connection limit of 160 reached" and ban) - - ftp.freebsd.org - - ftp.adobe.com - - ftp.hp.com - - ftp.sun.com - - more more and more Affected Vendors (not verified): - - Apple - - Microsoft Interix - - HP - - more more more Exploit Download :  https://www.exploit-db.com/exploits/15215/
Expert Insights Articles Videos
Cybersecurity Resources
//]]>