#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

BackTrack 4: Assuring Security by Penetration Testing

BackTrack 4: Assuring Security by Penetration Testing

May 05, 2011
BackTrack 4  : Assuring Security by Penetration Testing Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide professional guidelines and recommendations to you. The book is designed in a simple and intuitive manner, which allows you to explore the whole BackTrack testing process or study parts of it individually. If you are an IT security professional or network administrator who has a basic knowledge of Unix/Linux operating systems including awareness of information security factors, and you want to use BackTrack for penetration testing, then this book is for you.  Download :  https://shrta.com/files/0ZYSOJBV/BackTrack-4-Assuring-Security-by-Penetration-Testing.zip Or https://www.multiupload.com/ZCV9Q3WO4X
Gloriousindia.com database hacked by DrGr4vity, 1000 users data compromised

Gloriousindia.com database hacked by DrGr4vity, 1000 users data compromised

May 05, 2011
Gloriousindia.com database hacked by DrGr4vity , 1000 users data compromised Compromised User Data Leaked at https://docs.google.com/document/d/1NwQNGeFTb3z3QcFwT4vHNvPUv3uLyro8zQ556Oq_wRY/edit?hl=en
Banglarmela.org Hacked By EvilSoul

Banglarmela.org Hacked By EvilSoul

May 05, 2011
Banglarmela.org Hacked By EvilSoul Hacked Site : Banglarmela.org
cyber security

The MCP Security Guide for Early Adopters

websiteWizArticles Intelligence / MCP Security
Thousands of MCP servers are already live, but most security teams don't have a clear strategy yet. Get the practical guide to MCP for security teams.
cyber security

How Security Leaders, like Snowflake's CISO, are Securing Unmanaged Devices

websiteBeyond IdentityIdentity Security / Enterprise Protection
Unmanaged devices fuel breaches. Learn 5 ways CISOs secure them without hurting productivity.
Datefinder.co.nz - Free Dating Site Pwnd by Fr0664/FCA

Datefinder.co.nz - Free Dating Site Pwnd by Fr0664/FCA

May 05, 2011
Datefinder.co.nz - Free Dating Site Pwnd by Fr0664/FCA Fr0664/FCA hack Datefinder.co.nz and Expose 252 emails/passwords @  https://pastebin.com/W2TDnGUR
Metasploit Framework 3.7.0 Released !

Metasploit Framework 3.7.0 Released !

May 04, 2011
Metasploit Framework 3.7.0 Released ! The Metasploit team has spent the last two months focused on one of the least-visible, but most important pieces of the Metasploit Framework; the session backend. Metasploit 3.7 represents a complete overhaul of how sessions are tracked within the framework and associated with the backend database. This release also significantly improves the staging process for the reverse_tcp stager and Meterpreter session initialization. Shell sessions now hold their output in a ring buffer, which allows us to easily view session history -- even if you don't have a database. This overhaul increases performance in the presence of many sessions and allows for a larger number of concurrent incoming sessions in a more reliable manner. The Metasploit Console can now comfortably handle hundreds of sessions, an especially important consideration when running large-scale social engineering engagements. Several areas of database performance have seen significant i...
SportGFX.COM - World's Largest Sport GFX Community Hacked by PirateAL

SportGFX.COM - World's Largest Sport GFX Community Hacked by PirateAL

May 04, 2011
SportGFX.COM - World's Largest Sport GFX Community Hacked by PirateAL Hacked Site :  SportGFX.C OM Proof: https://www.youtube.com/watch?v=dWV4lUNsWxA Zone-h mirror : https://zone-h.org/mirror/id/13608314
Goal.com Hacked, found to be serving malware !

Goal.com Hacked, found to be serving malware !

May 04, 2011
According to Armorize, soccer news site Goal.com was recently found to be serving malware. "In an analysis of the attack, Armorize researcher Wayne Huang suggests that a hacker specifically targeted and compromised Goal.com through a back-door that allowed the attacker to manipulate the site's content at will," writes threatpost's Brian Donohue. "According to the report, Goal.com was detected on April 27 and 28, 2011 serving up an iframe attack that forwarded visitors to a rogue domain in the .cc top level domain (TLD)," Donohue writes. "That redirect was the first in a chain of events that resulted in the delivery of a known exploit pack, g01pack that targets attacks at the specific operating system and browser version the Goal.com visitor is using. After exploiting the user's browser, further malware, including a Trojan horse program were downloaded to the victim's computer."
PlayStation Network Security Update !

PlayStation Network Security Update !

May 04, 2011
On Tuesday, April 26 Sony shared that some information that was compromised in connection with an illegal and unauthorized intrusion into our network. Once again, Sony'd like to apologize to the many users who were inconvenienced and worried about this situation. Sony want to state this again given the increase in speculation about credit card information being used fraudulently. One report indicated that a group tried to sell millions of credit card numbers back to Sony. To my knowledge there is no truth to this report of a list, or that Sony was offered an opportunity to purchase the list. One other point to clarify is from  this weekend's press conference . While the passwords that were stored were not "encrypted," they were transformed using a cryptographic hash function. There is a difference between these two types of security measures which is why Sony said the passwords had not been encrypted. But I want to be very clear that the passwords were not stored in our databa...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>