#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Insider Risk Management

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Amazon Web Hosting Company Is now Hosting DNS Service !

Amazon Web Hosting Company Is now Hosting DNS Service !

Jan 28, 2011
Web hosting company has announced that Amazon would have access to the Domain Name System (DNS) services, the game will give the DNS hosting as well. Thus, Route 53 will become part of the web hosting, pay-as-you-go DNS hosting service, which pays the amount of DNS issues can be resolved. DNS is the term used when the domain name has been translated into a numeric IP address. Compared with other traditional DNS server that contains the zone file, Route 53 has some differences. It supports the traditional types of records, including records IPv4 and IPv6, and can be displayed in the web services hosted in the cloud providers and traditional single server. The service is likely to encourage users who want a backup DNS server to a remote network, taking into account that large sites usually prefer to monitor the Internet a vital service. However, after the controversial case, Wikileaks, the ability Amazon DNS hosting provider can be called into question for many, especially sites that
"Devil shell" coded by Underground Devil, member "Team Nuts" !

"Devil shell" coded by Underground Devil, member "Team Nuts" !

Jan 28, 2011
" Devil shell " coded by Underground Devil , member " Team Nuts " ! Shell Username :  ugdevil Shell Password : 1234567 Download shell :   https://hacknuts.com/shell.rar Rar password : hacknuts
Twitter Worm Redirects Users !!

Twitter Worm Redirects Users !!

Jan 28, 2011
Kaspersky Lab, a leading solutions for secure content and threat management, warns users about a new worm that exploits rapid Twitter Google goo.gl shortened links. Shortened URLs are easy and popularly used in the micro-blogging which limits the length of messages to users of services like Twitter. However, the shortcut links for the serious security threat, because the text on a shortened URL is relatively obscure and a user does not know what it contains before ending up in an infected site. Hackers manage to successfully attract the unwary to use their malicious links truncated. A recently discovered worm Twitter redirect chain pushes users to a website that provides AV thugs called "Safety Shield". After several referrals, a user is taken to the page related to the distribution rogue AV. The page uses techniques eclipse code that includes an implementation of RSA in JavaScript. Kaspersky Lab has found thousands of Twitter messages continue to propagate the worm. Ka
cyber security

Want to Bolster Your CI/CD Pipeline?

websiteWizSecurity Auditing / Container Security
This cheat sheet covers best practices with actionable items in Infrastructure security, code security, secrets management, access and authentication, and monitoring and response.
How to Make Your Employees Your First Line of Cyber Defense

How to Make Your Employees Your First Line of Cyber Defense

May 01, 2024Security Awareness Training
There's a natural human desire to avoid threatening scenarios. The irony, of course, is if you hope to attain any semblance of security, you've got to remain prepared to confront those very same threats. As a decision-maker for your organization, you know this well. But no matter how many experts or trusted cybersecurity tools your organization has a standing guard, you're only as secure as your weakest link. There's still one group that can inadvertently open the gates to unwanted threat actors—your own people. Security must be second nature for your first line of defense For your organization to thrive, you need capable employees. After all, they're your source for great ideas, innovation, and ingenuity. However, they're also human. And humans are fallible. Hackers understand no one is perfect, and that's precisely what they seek to exploit. This is why your people must become your first line of defense against cyber threats. But to do so, they need to learn how to defend thems
Pak Cyber Army Site Hacked by TriCk ( TeaMp0isoN )

Pak Cyber Army Site Hacked by TriCk ( TeaMp0isoN )

Jan 27, 2011
Pak Cyber Army Site Hacked by TriCk ( TeaMp0isoN ) TeaMp0isoN  Hack Pakistan cyber army website ie.  https://pakcyberarmy.net Its a ' Name Server Hijack ' Hack, After that PCA site is down ! Zone-H mirror : https://zone-h.org/mirror/id/12973192 News Source : TeamPoison
Fedora Web Site Hacked, But the Servers Undamaged !

Fedora Web Site Hacked, But the Servers Undamaged !

Jan 27, 2011
An attacker who had credentials and the use of taxpayer Fedora Fedora server, but the project leaders say the assailants apparently managed to compromise any software or servers. An attacker has attempted to compromise the servers for the Fedora Project, the community version of Red Hat Enterprise Linux, but no damage or code servers, according to an e-mail sent to the Fedora mailing list on January 25 . In the statement, "a security incident on Fedora infrastructure" right Fedora Project manager Jared Smith revealed that the login and password Fedora contributor was stolen and used to access systems on January 22. It was a factor against those who had the right to run the code packages for Fedora SCM, build and manage to make updates to the Fedora packages, according to Smith. Donor had no sysadmin or Release Engineering teams, and had only limited rights fedorapeople.org wrote. Fedora Infrastructure team is investigating the incident and was unable to conclude that
Site of AT&T-iPad hackers is hacked !!

Site of AT&T-iPad hackers is hacked !!

Jan 27, 2011
Web site, a hacker group, whose members are accused of crimes committed after the hole in the exposed customers to AT & T iPad website last year, has been hacked today. At least a couple of hours, obscenity message loads to the site Goatse Security said: "I took the liberty to expose a gaping hole ... As you are self-grow group [profanity drafted], I also contacted the media that this case receives the coverage it deserves. "In cracking this site, send specially crafted requests to the server with my browser card false identity to that of an iPad. Please note that although not played great role in this crack _WAS_ poetic in many ways. Goatsec also gave me the same warning given to AT & T. .. not at all, to repair his hole. User Accounts have been removed, and passwords changed, "it said. This message gave "props" of the FBI and some of the hackers and made disparaging references to AT & T and Apple, for example. Previously CNET contacted by
Cybersecurity
Expert Insights
Cybersecurity Resources