#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Salesforce Security Handbook

Search results for Hack Showcase | Breaking Cybersecurity News | The Hacker News

Want to be the Part of History? Just be a part of E-HACK

Want to be the Part of History? Just be a part of E-HACK

Jun 30, 2013
E-HACK is an Information Security Workshop, organized by infySEC . The workshop aims at creating awareness about INFORMATION SECURITY by showing in what all ways information or data can be stolen. Meddle in cyber-warfare, battle with our machine master mind who will throw challenges on web application security, network security, algorithms, reverse engineering and decryption.  The team which cracks the final level will attain the glory of being Winner at our E-HACK Guinness record attempt with tons of prizes waiting. Be simple but not simpler is quote by Einstein, that's secret of success for E-HACK. Be there to witness the epic battle of brains. It's planned to be done in a more fun way, through a game called CTF (Capture the Flag) . The only way to know how to protect our information is by knowing the ways in which it can be stolen. So, we'll be having wide range of discussions on what all ways a HACKER can get his hands on your information and in what all ways you can thwart...
⚡ THN Weekly Recap: GitHub Supply Chain Attack, AI Malware, BYOVD Tactics, and More

⚡ THN Weekly Recap: GitHub Supply Chain Attack, AI Malware, BYOVD Tactics, and More

Mar 24, 2025 Weekly Recap / Hacking
A quiet tweak in a popular open-source tool opened the door to a supply chain breach—what started as a targeted attack quickly spiraled, exposing secrets across countless projects. That wasn't the only stealth move. A new all-in-one malware is silently stealing passwords, crypto, and control—while hiding in plain sight. And over 300 Android apps joined the chaos, running ad fraud at scale behind innocent-looking icons. Meanwhile, ransomware gangs are getting smarter—using stolen drivers to shut down defenses—and threat groups are quietly shifting from activism to profit. Even browser extensions are changing hands, turning trusted tools into silent threats. AI is adding fuel to the fire—used by both attackers and defenders—while critical bugs, cloud loopholes, and privacy shakeups are keeping teams on edge. Let's dive into the threats making noise behind the scenes. ⚡ Threat of the Week Coinbase the Initial Target of GitHub Action Supply Chain Breach — The supply chain compromise...
Get Ready for Hacker Halted 2011, Miami 21-27 October

Get Ready for Hacker Halted 2011, Miami 21-27 October

Aug 16, 2011
Get Ready for Hacker Halted 2011 , Miami 21-27 October Hacker Halted returns to Miami for the 3rd year in a row. Following last year's success, we are expecting this year to be bigger and better. Hacker Halted will feature 4 focus tracks: 1.What's Hot – Featuring cutting-edge presentations on key topics and aspects of information security, including policies and management issues. 2.Cut the Crap, Show Me The Hack - highly technical track featuring no-nonsense technical security experts who demonstrate the latest hacks, reveal new zero-days, and showcase the most current threats and vulnerabilities. 3.Securing SCADA and Critical Infrastructures - Following the 2010 appearance of the groundbreaking Stuxnet worm, SCADA security has become an issue of growing concern. This track will feature high-level presentations from noted experts in the field. 4.Up in the Clouds – Focused on cloud computing and the security elements surrounding it. Since 2004, Hacker Halted has been held ...
cyber security

2025 Cloud Security Risk Report

websiteSentinelOneEnterprise Security / Cloud Security
Learn 5 key risks to cloud security such as cloud credential theft, lateral movements, AI services, and more.
cyber security

Traditional Firewalls Are Obsolete in the AI Era

websiteZscalerZero Trust / Cloud Security
It's time for a new security approach that removes your attack surface so you can innovate with AI.
Expert Insights Articles Videos
Cybersecurity Resources