#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Get the Free Newsletter
SaaS Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Terrorist group "Hizb-ul_Muzahidin" official site Hacked By Indishell

Terrorist group "Hizb-ul_Muzahidin" official site Hacked By Indishell

Nov 26, 2010
Terrorist group " Hizb-ul_Muzahidin " official site Hacked By Indishell Link :  https://hizbmedia.net/ICA.html
4 websites Defaced by "r0ckykhan"

4 websites Defaced by "r0ckykhan"

Nov 26, 2010
4 websites Defaced by " r0ckykhan " Links :: https://idoubao.com/PCA.htm https://www.zcky.com/PCA.htm https://www.hi3j.com/PCA.htm   https://qd15.net/PCA.htm
Making Sense of Operational Technology Attacks: The Past, Present, and Future

Making Sense of Operational Technology Attacks: The Past, Present, and Future

Mar 21, 2024Operational Technology / SCADA Security
When you read reports about cyber-attacks affecting operational technology (OT), it's easy to get caught up in the hype and assume every single one is sophisticated. But are OT environments all over the world really besieged by a constant barrage of complex cyber-attacks? Answering that would require breaking down the different types of OT cyber-attacks and then looking back on all the historical attacks to see how those types compare.  The Types of OT Cyber-Attacks Over the past few decades, there has been a growing awareness of the need for improved cybersecurity practices in IT's lesser-known counterpart, OT. In fact, the lines of what constitutes a cyber-attack on OT have never been well defined, and if anything, they have further blurred over time. Therefore, we'd like to begin this post with a discussion around the ways in which cyber-attacks can either target or just simply impact OT, and why it might be important for us to make the distinction going forward. Figure 1 The Pu
55 Indian sites deface by Pakcobra's

55 Indian sites deface by Pakcobra's

Nov 26, 2010
55 Indian sites deface by Pakcobra 's Links : https://exams.victorgrowth.com https://victorgrowth.com https://www.allindiaarchitects.com https://www.shyamlalexports.com https://www.theexodusevent.com https://leadwings.com https://e-ant.in https://www.abellatechnologies.in https://chennaibook.com https://busybazaar.com https://annaialumni.com/ https://annaicollege.com/ https://anuranjanimarketing.com/ https://bismibattery.com/ https://bismicell.com/ https://cinekings.com/ https://clicktamil.com/ https://fcubeinfotech.com/ https://gandhitrust.com/ https://geofoodmart.com/ https://infoworldce.com/ https://internationaltamilology.com/ https://jhoomarwala.com/ https://kosimani.com/ https://krazybags.com/ https://kudamookku.com/ https://kudanthaimurasu.com/ https://kumbakonamrealestate.com/ https://lakshmitraders.com/ https://mstechnology.in/ https://mypdagear.com/  https://onyxon.net/ https://sachinsaini.com/ https://southindianbronze.com/ https://studio9moviecompany.com/ https://sv
cyber security

Automated remediation solutions are crucial for security

websiteWing SecurityShadow IT / SaaS Security
Especially when it comes to securing employees' SaaS usage, don't settle for a longer to-do list. Auto-remediation is key to achieving SaaS security.
PROJECT JAI HIND : 26/11 Revenge Defacements by Indishell (400 Websites)

PROJECT JAI HIND : 26/11 Revenge Defacements by Indishell (400 Websites)

Nov 26, 2010
PROJECT JAI HIND : 26/11 Revenge Defacements by Indishell Hacked Sites List :  https://pastebin.com/xGmaabaK  (Check Here) More Sites will Be listed Soon, If u Have full list then inform us on Facebook !!
Arachni v0.2.1 - penetration testers Framework - latest release

Arachni v0.2.1 - penetration testers Framework - latest release

Nov 26, 2010
"Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications." This is the official change log : Major performance improvements Major system refactoring and code clean-up Major module API refactoring providing even more flexibility regarding element auditing and manipulation Integration with the Metasploit Framework via: ( New ) ArachniMetareport , an Arachni report specifically designed to provide WebApp context to the Metasploit framework. Arachni plug-in for the Metasploit framework, used to load the ArachniMetareport in order to provide advanced automated and manual exploitation of WebApp vulnerabilities. Advanced generic WebApp exploit modules for the Metasploit framework, utilized either manually or automatically by the Arachni MSF plug-in. Improved Blind SQL Injection module, significantly less requests per audit. XMLRPC server ( New ) XMLRPC C
Two Indian Websites Hacked By PakCyberHaxors

Two Indian Websites Hacked By PakCyberHaxors

Nov 25, 2010
Two Indian Websites Hacked By PakCyberHaxors Links : https://ibdco.co.in/PCH.html https://stb.mjpru.ac.in/PCH.htm l
Frisson-lingerie.com Hacked By Tunisian Hacker "Youssef Attia"

Frisson-lingerie.com Hacked By Tunisian Hacker "Youssef Attia"

Nov 25, 2010
Frisson-lingerie.com Hacked By Tunisian Hacker " Youssef Attia " Link :  https://www.frisson-lingerie.com/hacked.html
NATO , EU and US to Work Together on Cyber Defense

NATO , EU and US to Work Together on Cyber Defense

Nov 25, 2010
A range of new plans to tackle cyber-crime has been approved by the European Union, the U.S and NATO over the past three days. The European Commission announced on Monday its proposals to develop three systems to raise the level of security for citizens and businesses in cyberspace. An E.U. cybercrime centre to be established by 2013 will coordinate cooperation between member states, E.U. institutions and international partners, while an European information sharing and alert system, also planned for 2013, will facilitate communication between rapid-response teams and law-enforcement authorities. The Commission also wants to create a network of Computer Emergency Response Teams (CERTs) by 2012, with a CERT in every E.U. country. However, Home Affairs Commissioner Cecilia Malmström was keen to play down concerns that these systems would lead to the creation of yet another citizens' information database, saying that no such database would be set up and that the aim of
14 Websites Hacker By Tunisian Hacker "The~077"

14 Websites Hacker By Tunisian Hacker "The~077"

Nov 25, 2010
14 Websites Hacker By  Tunisian Hacker " The~077" Sites List : https://www.system-com.com.mx/ https://mycherish.org/ https://securitycar.com.mx/ https://www.cyprusbids.com/images/ https://www.lasagadesarts.com/ https://sportec.com.mx/ https://rosecityhardwoods.com/ https://www.juegosfinancieros.com.mx/ https://novosistemas.com.mx/ https://www.promobili.com.mx/ https://www.moser-briefmarken.de/ https://eurekalibreria.cl/ https://www.cyprusbids.com/images/ https://www.apnimarket.co.cc/
Shahid Afridi's official site Hacked by ExeSoul !

Shahid Afridi's official site Hacked by ExeSoul !

Nov 24, 2010
Shahid Afridi's official site Hacked ! Link :  https://www.shahidafridi.com.pk/eXeSoul.htm
Infected Web sites double in 2010 : A Report

Infected Web sites double in 2010 : A Report

Nov 24, 2010
The number of Web sites infected with malware has doubled from a year ago to more than 1.2 million, according to a study released today by Internet security company Dasient. Not only are social-media sites getting targeted, but sites of larger government agencies increasingly are hit, including the National Institutes of Health, the U.S. Treasury, and the Environmental Protection Agency, according to the report. In the last two years, the NIH has been infected and reinfected five times, and the state of Alabama's site was infected 37 times. More than 1.5 million malicious ads are served every day, including drive-by downloads and fake antivirus campaigns. Drive-by downloads on legitimate Web sites have become the most popular method for delivering malicious programs, overtaking the use of spam and e-mail attachments, Dasient said. Source : https://news.cnet.com/8301-27080_3-20023576-245.html#ixzz16A7hWjDC
BackTrack 4 R2 : New release download now !

BackTrack 4 R2 : New release download now !

Nov 24, 2010
After being in production for almost 3 months, BackTrack has been updated – yet again! It has been aptly code named – " Nemesis ". "BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you're making BackTrack your primary operating system, booting from a LiveDVD, or using your favorite thumbdrive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester." This is the official change log for the update: Kernel 2.6.35.8 – *Much* improved mac80211 stack. USB 3.0 support. New wireless cards supported. All wireless Injection patches applied, maximum support for wireless attacks. Even *faster* desktop environment. Revamped Fluxbox environment for the KDE challenged. Metasploit rebuilt from scratch , MySQL db_drivers working out of the
Cybersecurity Resources