-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

TeaMp0isoN Shell - Private Build [BETA] - v0.1 Download !

TeaMp0isoN Shell - Private Build [BETA] - v0.1 Download !

Feb 26, 2011
TeaMp0isoN Shell - Private Build [BETA] - v0.1 Download ! [ Features ] - Mass Defacement Tool - Safe Mode Bypass - Open_Basedir Bypass - Fixed SQL managed - FTP Brute Force Tool - Fully Undetected Downlaod : [Link Removed]-  Reason: Backdoor News Source : TeaMp0isoN 
Press Release : #OpWisconsin (Operation Wisconsin) by Anonymous Hackers !

Press Release : #OpWisconsin (Operation Wisconsin) by Anonymous Hackers !

Feb 26, 2011
Press Release : #OpWisconsin (Operation Wisconsin) by Anonymous Hackers ! Disclaimer : We are not associated with Anonymous/Hackers Group,This news and Press Release are openly published by Anonymous on their website/facebook/twitter . In 24 hours, Its 2nd Press Release By Anonymous Hackers.., This time they are announcing " Operation Wisconsin ". Exact wording of Press Release are as given below : Dear Citizens of the United States of America, It has come to our attention that the brothers, David and Charles Koch--the billionaire owners of Koch Industries--have long attempted to usurp American Democracy. Their actions to undermine the legitimate political process in Wisconsin are the final straw. Starting today we fight back. Koch Industries, and oligarchs like them, have most recently started to manipulate the political agenda in Wisconsin. Governor Walker's union-busting budget plan contains a clause that went nearly un-noticed. This claus...
Press Release - Who are Anonymous & What Anonymous represents !

Press Release - Who are Anonymous & What Anonymous represents !

Feb 26, 2011
Just now, Anonymous hackers Release a new press note for the people of world. The words are as given below : Dear Citizens of the World. There has been some confusion among the media about who/what anonymous is/represents.  There have also been questions asked about the input from Anonymous during the current global revolution. Anonymous is an online pool of consciousness, sometimes we create a force towards a similar direction which could manifest in revolution. Anonymous has NO leader.  We are one.  We are many.  One does not speak for many. Many do not speak for all.  No one speaks for all. We come from all walks of life. All age, race, sex, places.  We have no ideologies. We have every ideology imaginable. We have no goals.  We have every goal imaginable.  To understand Anonymous would be to understand our universe.  Anonymous can not be labelled, blamed or made a scapegoat. To blame Anonymous would be to blame the citizens of ...
cyber security

5 Cloud Security Risks You Can’t Afford to Ignore

websiteSentinelOneEnterprise Security / Cloud Security
Get expert analysis, attacker insights, and case studies in our 2025 risk report.
cyber security

Red Report 2026: Analysis of 1.1M Malicious Files and 15.5M Actions

websitePicus SecurityAttack Surface / Cloud Security
New research shows 80% of top ATT&CK techniques now target evasion to remain undetected. Get your copy now.
Chip.in - Technology Magazine website Hacked by TriCk & Assasin (ZHC & TeaMp0isoN)

Chip.in - Technology Magazine website Hacked by TriCk & Assasin (ZHC & TeaMp0isoN)

Feb 26, 2011
Chip.in - Technology Magazine website Hacked by TriCk & Assasin (ZHC & TeaMp0isoN) Link :  http://www.chip.in/forums/ Mirror :  http://mirror-az.com/mirror/?id=12689 News Source : TriCk & Assasin (ZHC & TeaMp0isoN)
BlackHole RAT : Mac OS X backdoor Trojan !

BlackHole RAT : Mac OS X backdoor Trojan !

Feb 26, 2011
‘ BlackHole ’ is the latest remote administration tool (RAT) and is available both in Windows and Mac. Hacktool such RAT employs client-server program that communicates to its victim’s machine through its trojan server. The server application is installed on the victim while the client application is on the managing side. The version suggest that ‘ BlackHole ’ is currently in its early stage. However, the author seems to start showcasing the following functionalities: Remote execution of shell commands. Opens webpage using user’s default browser. Sends a message which is displayed on the victims screen. Creates a text file. It is capable to perform shutdown, restart and sleep operation. It is capable to request for admin privileges. Here is an excerpt from the default text that is displayed in the full screen window with the reboot button: "I am a Trojan Horse, so i have infected your Mac Computer. I know, most people think Macs can't be infected, but look, you ARE I...
Motorola Xoom Gets Hacked In Under An Hour after Release !

Motorola Xoom Gets Hacked In Under An Hour after Release !

Feb 26, 2011
Despite just being released on February 24th, the Motorola Xoom has become the newest victim of developer rooting, and it took less than two hours to do it. Xeriouxly. The best part? The Clockwork Recovery running on it means that other developers can now create their own custom ROMs to hack whatever they want onto the tablet. Clockwork Recovery, also known as ClockworkMod, is a recovery console used on rooted Android Google devices, mainly using for flashing custom ROMs. It can make and restore backups, and it fairly straightforward to install too. The root was done by coder " Koushi ", pretty much as soon as he got his copy of the device home. In a blog post, he explained how he managed to get the custom root running so quickly. He got Clockwork Recovery running by building up a recovery (which he will not release yet due to the SD slot being non-functional at the moment) via  AOSP 's kernel and then using a ROM manager to get Superuser on the Xoom. He has a...
Indian United Nations & Football Association website's XSS  Vulnerabilities found by TriCk (TeaMp0isoN)

Indian United Nations & Football Association website's XSS Vulnerabilities found by TriCk (TeaMp0isoN)

Feb 26, 2011
Indian United Nations & Football Association website's XSS  Vulnerabilities found by TriCk (TeaMp0isoN) 1.) The FA (The Football Association) XSS Vulnerability - TriCk - TeaMp0isoN Link : Click Here 2.) Indian United Nations XSS Vulnerability - TriCk - TeaMp0isoN Link : Click Here News Source : TriCk - TeaMp0isoN | Via Email
Hackers Could Exploit Federal Government Shutdown !

Hackers Could Exploit Federal Government Shutdown !

Feb 25, 2011
The federal government's list of emergency network security personnel has not been updated in 15 years, putting national security at high risk if a shutdown takes place on March 4. The possible government shutdown scheduled for March 4, 2011 could trigger a cyberwar emergency. If non-essential government employees end up being furloughed in early March, the federal government's computer systems will be run by a shortlist of critical-need employees. One major problem: The federal government's list of critical-need computer security employees has not been updated in over 15 years. According to the influential Nextgov website, the government's emergency call-up IT security list was last updated in 1995, ahead of the last federal government shutdown. "In 1995, we already had that decided," said Hord Tipton, a former Interior Department chief information officer who was Bureau of Land Management assistant director for resource use and protection during the ...
Xss venerability in 'The Times of India' website Found by Rahul Roshan !

Xss venerability in 'The Times of India' website Found by Rahul Roshan !

Feb 25, 2011
Xss venerability in ' The Times of India ' website Found by Rahul Roshan ! Link : Click Here
Expert Insights Articles Videos
Cybersecurity Resources