-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

53 Websites defaced by Andre Corleone (Indonesian hacker)

53 Websites defaced by Andre Corleone (Indonesian hacker)

May 16, 2011
53 Websites defaced by Andre Corleone (Indonesian hacker) Hacked Sites List : http://pastebin.com/dsqCUbaX
Rumor or True ? FBI & Fox.com hackers exposed : LulzSec Participants Identified !

Rumor or True ? FBI & Fox.com hackers exposed : LulzSec Participants Identified !

May 15, 2011
Rumor or True ? FBI &  Fox.com hackers exposed : LulzSec Participants Identified ! Okay Now we have  LulzSec Participants, Just now Exposed by some Investigators at http://pastebin.com/EKmkvtfj . LulzSec are the guys who Hack Fox.com cracked the Fox.com login database, including emails and passwords . Now they Claim to have 178 logins from an FBI-related website. Update :  We have just talk to  OpNoPro  and He claim that, He is not the part of any HACKING ACTIVITY . Neither he is part of   LulzSec . Nothing is confirmed, But still there are lots of important things, that we have to consider before blaming anyone. These two identified guys can be Innocent. We are looking forward to Investigation teams for validating the news and Facts. Stay Tuned ! OpNoPro , heyguise  have been identified according to Source : OpNoPro Info AnonOps IRC Nic: OpNoPro AKA Lulz4All Likely the primary instigator of LulzSec. Pict...
Exclusive Report : Is Department of Defense (DoD), Pentagon, NASA, NSA is Secure ?

Exclusive Report : Is Department of Defense (DoD), Pentagon, NASA, NSA is Secure ?

May 15, 2011
Exclusive Report : Is Department of Defense (DoD), Pentagon, NASA, NSA is Secure ? Over the past couple of weeks there has been a series of discussions around why the U.S defense and Intelligence agencies are moving so quickly to adopt cloud computing. Are there any Security Holes in their Security ? Or has someone already hacked them and their documents ?. In the last week we have noticed lots of hackers activity. If you have missed something then have a look to  Super Saturday : The Hacker News Featured Articles  ! Below you are going to read about Security Holes in the U.S defense and Intelligence agencies! A Hacker named " sl1nk " claims that he has: SSH access to a Network of 140 machine's layer 1 to 3 in the Pentagon Access to  APACS (automated personel air clearance system)  Thousand's of documents ranging from seizure of a vehicle up to private encryption key request forms. Database of all usernames/passwords of Webmail of Nasa. Access to A...
cyber security

5 Cloud Security Risks You Can’t Afford to Ignore

websiteSentinelOneEnterprise Security / Cloud Security
Get expert analysis, attacker insights, and case studies in our 2025 risk report.
cyber security

Red Report 2026: Analysis of 1.1M Malicious Files and 15.5M Actions

websitePicus SecurityAttack Surface / Cloud Security
New research shows 80% of top ATT&CK techniques now target evasion to remain undetected. Get your copy now.
Wi-Fi Challenge by Security Tube !

Wi-Fi Challenge by Security Tube !

May 15, 2011
Wi-Fi Challenge by Security Tube ! 1. Objective: This series of challenges is aimed at testing your skills as a Wireless Hacker! We will posting challenges ranging from - Basic, Intermediate, Advanced, Expert and Insane levels! Our first challenge remain uncracked which we categorized as "Basic" :) Challenge 1: http://www.securitytube.net/video/1856 Challenge 1 Solution: http://www.securitytube.net/video/1859 Just posted Challenge 2 : http://www.securitytube.net/video/1862 Which still remains uncracked! 2. Prizes: All Expert and above challenges will have prizes which will be announced in the challenge video. Any level below that qualifies for a prize automatically if unsolved for 24 hours. Challenge 2 is currently unsolved for 21 hours! :) Prize will be an Alfa Networks Wireless card if this remains unsolved for 3 more! So hurry up and participate to win! 3. Joining the Competition: Just go to the Challenge 2 URL above, download the trace file on the p...
PlayStation 3 update 3.61 available Now, PSN begins today !

PlayStation 3 update 3.61 available Now, PSN begins today !

May 15, 2011
PlayStation 3 update 3.61 available Now, PSN begins today ! Today good news for all the PS3 lovers, your PS3 Now will be able to connect to PlayStation Network, today Sony has solved its PSN outage and updated its System to (v3.61) but notes that the update will prompt you to change your PlayStation Network password. This is what the PlayStation blog has updated and you need to read about the new update: We have been working on a new PS3 system software update that requires all PSN users to change their password once PlayStation Network is restored. The update (v3.61) is mandatory and is available now. If using a PS3, your password can only be changed on your own PS3 (or a PS3 on which your PSN account was activated), as an added layer of security. If you have never downloaded any content using your account on the system, an email will be sent to the registered sign-in ID (email address) associated with your account when you first attempt to sign-in to PSN. This e-mail will cont...
Hackers Got Hacked, HackingTips.in Hacked By Shadow008 !

Hackers Got Hacked, HackingTips.in Hacked By Shadow008 !

May 15, 2011
Hackers Got Hacked, HackingTips.in Hacked By Shadow008 ! Sites Hacked : http://www.hackingtips.in/ Mirror : http://www.zone-h.com/mirror/id/13877058
417 U.K websites Got hacked , Server compromised !

417 U.K websites Got hacked , Server compromised !

May 15, 2011
417 U.K websites Got hacked by SeeKeR , Server compromised ! Hacked sites List :  http://pastebin.com/J45HhJfs
Crimepack 3.1.3 Exploit kit Leaked, available for Download !

Crimepack 3.1.3 Exploit kit Leaked, available for Download !

May 15, 2011
Crimepack 3.1.3 Exploit kit Leaked, available for Download ! Part 1 : Java Exploit As stated above, I focus on a malware that exploits a recent JRE vulnerability: CVE-2010-0840 to execute malicious files on a victim system. This malware comes inside a jar file, which contains the following two classes: Crimepack.class and KAVS.class. Part 1.1 : Crimepack.class This class is the engine of the malware, it is obfuscated, but you can quickly strip off the obfuscation (my python beta tool is great…), once you get rid of the obfuscation you can see the following code: As always, we have an Applet that access to the data parameter, generates a random name for the exe payload that will be dropped in the system temp directory and then executed. So at this point as you can see we have nothing new, the above is a common Java downloader… but let’s scroll down: Above, we can see that the malware is creating a new instance of the KAVS class (description follows), in order to trigge...
Qualys and Malware Analyser - Online malware scanning engine !

Qualys and Malware Analyser - Online malware scanning engine !

May 14, 2011
Qualys and Malware Analyser - Online malware scanning engine ! Qualys and Malware Analyser ( Author : Beenu Arora ), recently came into an agreement which will allow Qualys to use Malware Analyser tool on its online malware scanning engine. This would enable the users to perform more comprehensive scans on malicious executables. According to sources, the author shared the tool's source code only after signing NDA with the firm. Qualys® ( www.qualys.com ) headquartered in Redwood Shores is the leading provider of on demand IT security risk and compliance management solutions — delivered as a service. Malware analyser is a freeware tool for analysing malwares written in Python. The tool was initially open-source tool way back in 2009 but recently in 2010-11 the author has made some significant improvement in its core engine which has made it one of best static analysis tool. The tool can perform static and dynamic analysis and author has intentions to include the process a...
Expert Insights Articles Videos
Cybersecurity Resources