#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Insider Risk Management

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

JavaSnoop-1.0 FINAL - Latest Release

JavaSnoop-1.0 FINAL - Latest Release

Dec 05, 2010
" JavaSnoop is a tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer." This is the change log for the current release: Added granular logging on the agent (still controlled by the main UI menu) Fixed Jython/BeanShell bug (had to remove scripting jars from bootclasspath and add them to the system classpath at runtime with Instrumentation class) Added scripting capability in the Scripting Console in Jython/BeanShell Fixed other random small bugs Added three new Action menu features " Force classes… " (asks target process to load specific classes so that JavaSnoop can parse them for serialization/de-serialization later) and " Synchronize " classes to update JavaSnoop on the classes that have been loaded since attaching , and finally " Agent debugging ", which toggles whether agent messages should go to System.out Removed static fields from showing up in the edit object view Multiple big performance
Bahria.edu.pk Hacked By Indishell

Bahria.edu.pk Hacked By Indishell

Dec 05, 2010
Bahria.edu.pk Hacked By Indishell Link :  https://www.bahria.edu.pk/ Mirror record :  https://www.mirror-az.com/mirror/?id=6287
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Apr 29, 2024Exposure Management / Attack Surface
It comes as no surprise that today's cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics that attackers use demand the adoption of better, more holistic and consolidated ways to meet this non-stop challenge. Security teams constantly look for ways to reduce risk while improving security posture, but many approaches offer piecemeal solutions – zeroing in on one particular element of the evolving threat landscape challenge – missing the forest for the trees.  In the last few years, Exposure Management has become known as a comprehensive way of reigning in the chaos, giving organizations a true fighting chance to reduce risk and improve posture. In this article I'll cover what Exposure Management is, how it stacks up against some alternative approaches and why building an Exposure Management program should be on  your 2024 to-do list. What is Exposure Management?  Exposure Management is the systematic identification, evaluation,
Artandframing.co.uk Hacked By Pimpdaddy

Artandframing.co.uk Hacked By Pimpdaddy

Dec 05, 2010
Artandframing.co.uk Hacked By Pimpdaddy Link :  https://www.artandframing.co.uk/tradefair/images/Defaced.html
cyber security

Want to Bolster Your CI/CD Pipeline?

websiteWizSecurity Auditing / Container Security
This cheat sheet covers best practices with actionable items in Infrastructure security, code security, secrets management, access and authentication, and monitoring and response.
Indian Cyber Army Hack Ogra.org.pk

Indian Cyber Army Hack Ogra.org.pk

Dec 04, 2010
Indian Cyber Army Hack Ogra.org.pk  website In a dangerous emerging trend of back and forth website defacing, a group of Indian hackers called the 'Indian Cyber Army' hacked the Oil & Gas Regulatory Authority (OGRA) [ www.ogra.org.pk ]  website on Saturday. The website was later recovered by the site admins. The message left on the Ogra page says the hack is in response to the attack on over 200 Indian websites by the 'Pakistan Cyber Army.' The message reads: You Have Been Hacked By The "INDIAN CYBER ARMY" This Is a Retaliation Of Hacking "CBI" Earlier, a group of Pakistani hackers going by the name of 'Predators PK' hacked over 200 Indian websites, as a form of retaliation to a recent cyber attack on Pakistani sites carried out by the Indian Cyber Army (ICA). Unlike the ICA attack which was cited as 'revenge for 26/11′, the page inserted by Pakistani hackers did not suggest ideological motivations, but simply revenge. Pakistani hacker's perspective The PakCyberArmy (PCA) in an
Cyberwar : Interview with Cyber Security Expert,Gary McGraw !

Cyberwar : Interview with Cyber Security Expert,Gary McGraw !

Dec 04, 2010
As if the wars on terror and drugs weren't keeping U.S. officials busy enough, the drum beats of cyberwar are increasing. There were the online espionage attacks Google said originated in China. Several mysterious activities with Internet traffic related to China. The Stuxnet worm that experts say possibly targeted Iranian nuclear centrifuges. An attack on the WikiLeaks site after it released classified documents damaging to U.S. foreign policy. And don't forget the Internet attack on Estonia from a few years ago. To deal with the geopolitical dramas that are projected in the online world, the U.S. is using military strategy and mindset to approach cybersecurity, creating a Cyber Command and putting oversight for national cybersecurity under the auspices of the Department of Defense. But offense isn't always the best defense, and it never is when it comes to Internet security, says Gary McGraw, author and chief technology officer at security consultancy
Dradis v2.6 - Tool for sharing information during security testing !

Dradis v2.6 - Tool for sharing information during security testing !

Dec 04, 2010
" Dradis is a tool for sharing information during security testing . While plenty of tools exist to help in the different stages of the test, not so many exist to share interesting information captured. When a team of testers is working on the same set of targets, having a common repository of information is essential to avoid duplication of efforts. " This is the official change log: Improved performance across the board Upgraded libraries: Rails 3 and ExtJS 3.3 New First Time User Content showing how to use the interface You still get all the old features HTML and Word reporting plugin. Burp Upload plugin so you can use Burp Scanner output. Nikto Upload plugin to use your Nikto scan results. OSVDB Import plugin straight from the OSVDB. Bugs fixed: #3021312, #3030629, #3076709. Download Dradis v2.6   here
WikiLeaks : The next big leak could be of yours Companies !

WikiLeaks : The next big leak could be of yours Companies !

Dec 04, 2010
WikiLeaks' release of secret government communications should serve as a warning to the nation's biggest companies: You're next. Computer experts have warned for years about the threat posed by disgruntled insiders and by poorly crafted security policies, which give too much access to confidential data. And there is nothing about WikiLeaks' release of U.S. diplomatic documents to suggest that the group can't — or won't — use the same methods to reveal the secrets of powerful corporations. And as WikiLeaks claims it has incriminating documents from a major U.S. bank, possibly Bank of America, there's new urgency to addressing information security inside corporations and a reminder of its limits when confronted with a determined insider. At risk are companies' innermost secrets — e-mails, documents, databases and internal websites that are thought locked to the outside world. Companies create records of every decision they make, whether it&
Hey Hackers, Get Ready For BackTrack 5 in February 2011 !

Hey Hackers, Get Ready For BackTrack 5 in February 2011 !

Dec 04, 2010
Hey Hackers, Get Ready For BackTrack 5 in February 2011 ! Exciting times here at Offensive Security. This week two prominent security communities are launching some monster news. We'll start with BackTrack.  The open source community has been the heart and soul behind its growth from a personal side project to over 5 million downloads.  As times go on it gets harder to devote the time and effort needed to maintain, update and enhance BackTrack.  That is no longer a problem as a funded team is now arranged to ensure those things get done.  We now have a  roadmap  that lands you at the end with the release of BackTrack 5. On to the Exploit Database.  In the past couple of months we've been putting a significant amount of effort in improving the database and adding new features. Today we begin a new initiative within the Exploit database – a new EDB Research and Development team. The team is actively working on vulnerability discovery and development, and will post interesting findin
40 websites Hacked By AHG CreW

40 websites Hacked By AHG CreW

Dec 04, 2010
40 websites Hacked By AHG CreW Sites : www.arminashoes.nl www.samisecretgiftbaskets.com www.salekeyboard.com www.laurabonetti.com www.primedental.gr www.silkyhouse.gr www.swedishcare.gr www.symboulosbooks.gr www.jewellery2die4.com www.goodwinesonline.com www.shop.sunberrycoffee.com www.nevadahotwood.com www.zencha-tea.com www.mulberryst.tw www.holycowcoffeecompany.com www.velohive.com www.sunshinecommunication.com www.sunlighthydroponics.com www.suitid.com www.jolle-15.hu www.arminashoes.nl www.samisecretgiftbaskets.com www.salekeyboard.com www.laurabonetti.com www.primedental.gr www.silkyhouse.gr www.swedishcare.gr www.symboulosbooks.gr www.jewellery2die4.com www.goodwinesonline.com www.shop.sunberrycoffee.com www.nevadahotwood.com www.zencha-tea.com www.mulberryst.tw www.holycowcoffeecompany.com www.velohive.com www.sunshinecommunication.com www.sunlighthydroponics.com www.suitid.com www.arminashoes.nl  
CBI website hacked by 'Pakistani Cyber Army'

CBI website hacked by 'Pakistani Cyber Army'

Dec 04, 2010
In a major embarrassment, the website of premier investigating agency CBI was hacked tonight by programmers identifying themselves as "Pakistani Cyber Army". The home page of the CBI website had a message from the 'Pakistani Cyber Army' warning the Indian Cyber Army not to attack their . The hackers have made a mockery of the country's cyber security by infiltrating into the CBI website, supposed to be one of the most secure websites. The CBI is connected to the command centre of world police organisation - Interpol - 24x7. The message from the hackers also spoke about the filtering controls provided by the National Informatics Centre (NIC), a body which mans computer servers across the country. Intelligence agencies have been often warning the government that proper cyber security was not being ensured in government offices and that no security audit was being carried out. The Pakistani Cyber Army has also warned that it would carry out " mass defacemen
Cybersecurity
Expert Insights
Cybersecurity Resources