#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Amazon Web Hosting Company Is now Hosting DNS Service !

Amazon Web Hosting Company Is now Hosting DNS Service !

Jan 28, 2011
Web hosting company has announced that Amazon would have access to the Domain Name System (DNS) services, the game will give the DNS hosting as well. Thus, Route 53 will become part of the web hosting, pay-as-you-go DNS hosting service, which pays the amount of DNS issues can be resolved. DNS is the term used when the domain name has been translated into a numeric IP address. Compared with other traditional DNS server that contains the zone file, Route 53 has some differences. It supports the traditional types of records, including records IPv4 and IPv6, and can be displayed in the web services hosted in the cloud providers and traditional single server. The service is likely to encourage users who want a backup DNS server to a remote network, taking into account that large sites usually prefer to monitor the Internet a vital service. However, after the controversial case, Wikileaks, the ability Amazon DNS hosting provider can be called into question for many, especially sites that
"Devil shell" coded by Underground Devil, member "Team Nuts" !

"Devil shell" coded by Underground Devil, member "Team Nuts" !

Jan 28, 2011
" Devil shell " coded by Underground Devil , member " Team Nuts " ! Shell Username :  ugdevil Shell Password : 1234567 Download shell :   https://hacknuts.com/shell.rar Rar password : hacknuts
Code Keepers: Mastering Non-Human Identity Management

Code Keepers: Mastering Non-Human Identity Management

Apr 12, 2024DevSecOps / Identity Management
Identities now transcend human boundaries. Within each line of code and every API call lies a non-human identity. These entities act as programmatic access keys, enabling authentication and facilitating interactions among systems and services, which are essential for every API call, database query, or storage account access. As we depend on multi-factor authentication and passwords to safeguard human identities, a pressing question arises: How do we guarantee the security and integrity of these non-human counterparts? How do we authenticate, authorize, and regulate access for entities devoid of life but crucial for the functioning of critical systems? Let's break it down. The challenge Imagine a cloud-native application as a bustling metropolis of tiny neighborhoods known as microservices, all neatly packed into containers. These microservices function akin to diligent worker bees, each diligently performing its designated task, be it processing data, verifying credentials, or
Twitter Worm Redirects Users !!

Twitter Worm Redirects Users !!

Jan 28, 2011
Kaspersky Lab, a leading solutions for secure content and threat management, warns users about a new worm that exploits rapid Twitter Google goo.gl shortened links. Shortened URLs are easy and popularly used in the micro-blogging which limits the length of messages to users of services like Twitter. However, the shortcut links for the serious security threat, because the text on a shortened URL is relatively obscure and a user does not know what it contains before ending up in an infected site. Hackers manage to successfully attract the unwary to use their malicious links truncated. A recently discovered worm Twitter redirect chain pushes users to a website that provides AV thugs called "Safety Shield". After several referrals, a user is taken to the page related to the distribution rogue AV. The page uses techniques eclipse code that includes an implementation of RSA in JavaScript. Kaspersky Lab has found thousands of Twitter messages continue to propagate the worm. Ka
cyber security

WATCH: The SaaS Security Challenge in 90 Seconds

websiteAdaptive ShieldSaaS Security / Cyber Threat
Discover how you can overcome the SaaS security challenge by securing your entire SaaS stack with SSPM.
Pak Cyber Army Site Hacked by TriCk ( TeaMp0isoN )

Pak Cyber Army Site Hacked by TriCk ( TeaMp0isoN )

Jan 27, 2011
Pak Cyber Army Site Hacked by TriCk ( TeaMp0isoN ) TeaMp0isoN  Hack Pakistan cyber army website ie.  https://pakcyberarmy.net Its a ' Name Server Hijack ' Hack, After that PCA site is down ! Zone-H mirror : https://zone-h.org/mirror/id/12973192 News Source : TeamPoison
Fedora Web Site Hacked, But the Servers Undamaged !

Fedora Web Site Hacked, But the Servers Undamaged !

Jan 27, 2011
An attacker who had credentials and the use of taxpayer Fedora Fedora server, but the project leaders say the assailants apparently managed to compromise any software or servers. An attacker has attempted to compromise the servers for the Fedora Project, the community version of Red Hat Enterprise Linux, but no damage or code servers, according to an e-mail sent to the Fedora mailing list on January 25 . In the statement, "a security incident on Fedora infrastructure" right Fedora Project manager Jared Smith revealed that the login and password Fedora contributor was stolen and used to access systems on January 22. It was a factor against those who had the right to run the code packages for Fedora SCM, build and manage to make updates to the Fedora packages, according to Smith. Donor had no sysadmin or Release Engineering teams, and had only limited rights fedorapeople.org wrote. Fedora Infrastructure team is investigating the incident and was unable to conclude that
Cybersecurity Resources