-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Impassioned Framework Download - Another Crimeware Available for Free !

Impassioned Framework Download - Another Crimeware Available for Free !

May 24, 2011
Impassioned Framework Download - Another Crimeware Available for Free ! Russo is the creator of Impassioned Framework - Browser Exploitation Kit , a subscription-based software vulnerability exploit service. He is 23 year old the young hacker, This toolkits designed to be stitched into a Web site and probe visitor PCs for security holes that can be used to surreptitiously install malicious software. Impassioned Framework Recent Attack : Security weaknesses in the hugely popular file-sharing Web site thepiratebay.org have exposed the user names, e-mail and Internet addresses of more than 4 million Pirate Bay users using this Kit. Browsers Affected : - Chrome - Firefox - Msie 6 - Msie 7 - Msie 8 - Opera - Safari Os Affected : - Windows x - Unix and OS X NON AFFECTED Best exploits currently available: - MS09_002 - MS09_043 - MS Dshow - iepeers.dll - Firefox escape - Firefox CompareTo - Java Calendar - Adobe Reader Lib - Adobe Reader newPlayer - Adobe...
LulzSec Leak Sony's Japanese websites Database !

LulzSec Leak Sony's Japanese websites Database !

May 24, 2011
LulzSec Leak Sony's Japanese websites Database ! Update : 10th Attack on Sony -->  Sony Ericsson Got Hacked by Idahca (Lebanese hacker Group) LulzSec Hacking team today Release the Sony's Japanese website Database dump via their Twitter Account. This is the 9th Attack on Sony. This attack is also using SQL Injection method. The vulnerable Links are: SQLi #1: http://www.sonymusic.co.jp/bv/cro-magnons/track.php?item=7419 SQLi #2: http://www.sonymusic.co.jp/bv/kadomatsu/item.php?id=30&item=4490 Database Structure Has been Leaked on a text file via Pastebin.com :  http://pastebin.com/NyEFLbyX LulzSec are the guys who cracked the Fox.com login database , including emails and passwords. Then LulzSec Hack & Leak pointless ATM information also. Last attack on Sony was also using SQL injection, Sony BMG Greece Hack . The attack on Sony are Continues , But still Sony's Security Experts are busy in only making PlayStation Live again. Th...
Delicious.com Getting Problem with SSL Certificate

Delicious.com Getting Problem with SSL Certificate

May 23, 2011
Delicious.com Getting Problem with SSL Certificate Just now we have notice that Delicious.com  ( https://delicious.com/ ) getting some problem with their SSL Certificate. The Certificate is Valid unto 4/30/2012 as you can see below : But Secure SSL site Link :  https://delicious.com/  is Down and showing Error as shown :
cyber security

Eliminate Shadow AI Blind Spots

websiteNudge SecuritySaaS Security / Shadow AI
Shadow AI is quietly accessing sensitive data across your SaaS environment. Learn how to close AI blind spots and get ahead of data exposure risks.
cyber security

OpenClaw: RCE, Leaked Tokens, and 21K Exposed Instances in 2 Weeks

websiteReco AIAttack Surface / AI Agents
The viral AI agent connects to Slack, Gmail, and Drive—and most security teams have zero visibility into it.
DNA-Stuxnet.in Hacked & Database Leaked By Shadow008 (PakCyberArmy)

DNA-Stuxnet.in Hacked & Database Leaked By Shadow008 (PakCyberArmy)

May 23, 2011
DNA-Stuxnet.in Hacked & Database Leaked By Shadow008 (PakCyberArmy) Sites Hacked : http://dna-stuxnet.in/home/ Mirror : http://zone-h.com/mirror/id/14090295 Database BackUp -   http://www.multiupload.com/180BT14ZGK
Hackers attack on Norwegian military Computers

Hackers attack on Norwegian military Computers

May 23, 2011
Hackers attack on Norwegian military Computers The Norwegian security police is investigating a hacker attack that zoned in on military computers shortly after Norway joined the Libya air campaign in March. The army says about a hundred computers were targeted in the attack, where staff received a fake email from a Norwegian government agency containing a malicious code The unidentified hackers only managed to access non-classified information from one computer before the security systems fended them off. The army would not disclose more details about the type of data the hackers were trying to access.
Arachni v.0.2.3 - Open Source Web Application Security Scanner Framework

Arachni v.0.2.3 - Open Source Web Application Security Scanner Framework

May 23, 2011
Arachni v.0.2.3 - Open Source Web Application Security Scanner Framework Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.Arachni is smart, it trains itself by learning from the HTTP responses it receives during the audit process.Unlike other scanners, Arachni takes into account the dynamic nature of web applications and can detect changes caused while travelling through the paths of a web application's cyclomatic complexity.This way attack/input vectors that http://www.blogger.com/img/blank.gifwould otherwise be undetectable by non-humans are seamlessly handled by Arachni. The main focus of this release has been on distributed deployment and bugfixing.Main additions include the update of the HTML report to include false positive reporting functionality and an updated WebUI with support for multiple Dispatchers. Download :  https://github.com/Zapotek/arac...
Infographic - The Sony PlayStation Hack

Infographic - The Sony PlayStation Hack

May 23, 2011
Infographic - The Sony PlayStation Hack We were doing an expose on the 'Sony Hack Fiasco' and realized no infographic was done on the subject - at least none we can find. Considering how big the issue was for our readers, we decided to create an infographic to summarize the events. Our sources include news site and commentary pieces. Because the subject matter is so time sensitive, we decided to include minimal information to the graphic and get it out when it matters. We will, however, be updating it with the latest information as it comes through. Source : http://www.creditcardfinder.com.au/the-sony-playstation-hack-what-it-means-outside-the-gaming-world.html
BlackHole Exploit Kit 1.0.2 - Download !

BlackHole Exploit Kit 1.0.2 - Download !

May 23, 2011
BlackHole Exploit Kit 1.0.2 - Download ! First Public Release of  BlackHole Exploit Kit . BlackHole exploit kit is yet another in an ongoing wave of attack toolkits flooding the underground market. The kit first appeared on the crimeware market in September of 2010 and ever since then has quickly been gaining market share over its vast number of competitors. In fact, many antivirus vendors now claim that this is one of the most prevalent exploit kits used in the wild. Even Malware Domain List is showing quite a few domains infected with the BlackHole exploit kit. Black Market Cost : Users can purchase the annual license for $1500, semi-annual license for $1000, or just a quarterly license for $700. The license includes free software updates for the duration of the contract. For those malicious users with a commitment phobia the makers of the kit offer yet another solution. You can rent the kit (on the author’s servers) for $50 for 24 hours, $200 for 1 week, $300 for 2...
Democrat website Youngdemocrat.org hacked by ALLAH`U EKBER-Team !

Democrat website Youngdemocrat.org hacked by ALLAH`U EKBER-Team !

May 23, 2011
Democrat website Youngdemocrat.org hacked by  ALLAH`U EKBER-Team ! A website of the Democrat Party, set up to attract young people, was hacked since Sunday night. Reports said an anonymous hacker broke into "www.youngdemocrat.org" while Prime Minister and Democrat leader Abhisit Vejjajiva was using social media for his party's election campaign. The hacker replaced the homepage with a black background with the message: "Don't Worry Admin! Your Files and Database Are Safe!!! I Just Wanna Tell You that Your Security Sucks!!!" The black background and the message were removed on Monday morning but the website was still down.
Expert Insights Articles Videos
Cybersecurity Resources