#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Insider Risk Management

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Kaspersky’s security suite source code leaked, available for download !!

Kaspersky's security suite source code leaked, available for download !!

Jan 31, 2011
As a result of leakage of public access were sources of products from Kaspersky Lab.   And the company and to read the archive of the experts claim that it contained "a fragment of an older version of the antivirus engine, which had previously been circulated in closed hacking resources. A free file hosting Mlfat4arab posted the source code of the product Kaspersky Lab »- Kaspersky Internet Security. Rar-archive size of 182 MB of January 26, 2011 uploaded to the hosting user unknown, and at the time of this writing, the file has been downloaded 2071 times.   The archive contains a collection of files with code written in C + + tool in Visual C, and assembly files. Judging by the names of the folders in the archive, it contains the source code of the engine KLAVA, which is a work in Kaspersky Lab's entered the final phase in 2008, based on KLAVA all subsequent generations of the company's products, starting with the line in 2009, which appeared on the market autumn 2008
Nmap 5.50 latest Version out !

Nmap 5.50 latest Version out !

Jan 31, 2011
"Nmap ("Network Mapper") is a free and open source utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are avalable for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), and a uti
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Apr 29, 2024Exposure Management / Attack Surface
It comes as no surprise that today's cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics that attackers use demand the adoption of better, more holistic and consolidated ways to meet this non-stop challenge. Security teams constantly look for ways to reduce risk while improving security posture, but many approaches offer piecemeal solutions – zeroing in on one particular element of the evolving threat landscape challenge – missing the forest for the trees.  In the last few years, Exposure Management has become known as a comprehensive way of reigning in the chaos, giving organizations a true fighting chance to reduce risk and improve posture. In this article I'll cover what Exposure Management is, how it stacks up against some alternative approaches and why building an Exposure Management program should be on  your 2024 to-do list. What is Exposure Management?  Exposure Management is the systematic identification, evaluation,
All about Microsoft Windows 8 !

All about Microsoft Windows 8 !

Jan 31, 2011
Only Microsoft knows how the abutting adaptation of its Windows operating arrangement will attending and what it will be called, but big changes could be advanced for the OS that assemblage accredit to as "Windows 8." At this year's Consumer Electronics Appearance in Las Vegas, Microsoft appear that Windows 8 will abutment system-on-a-chip architectures appliance ARM processors. Unlike the x86 architectonics that today's Windows laptops and desktops assignment with, ARM-based chips tend to run such low-power accessories as tablets and smartphones. In his CES keynote speech, Microsoft CEO Steve Ball­mer said, "This advertisement is absolutely all about enabling a fresh chic of hardware, and fresh silicon ally for Windows, to accompany the widest accessible ambit of anatomy factors to the market." In added words, Windows won't be aloof for laptops and desktops anymore. Actual Facts Microsoft's ARM advertisement represents the firm's abando
cyber security

SaaS Security Buyers Guide

websiteAppOmniSaaS Security / Threat Detection
This guide captures the definitive criteria for choosing the right SaaS Security Posture Management (SSPM) vendor.
1600 New Web Sites Hacked by Hamdi HaCker ( The 077 ) !!

1600 New Web Sites Hacked by Hamdi HaCker ( The 077 ) !!

Jan 31, 2011
1600 New Web Sites Hacked by Hamdi HaCker ( The 077 ) !! List of Hacked sites :  https://pastebin.com/cdxbYKjz Zone-H Link :  https://www.zone-h.org/archive/notifier=The%20077 News Source : Hamdi HaCker ( The 077 ) | Via Fb msg
Smart Systems restore over hacked 295 websites !

Smart Systems restore over hacked 295 websites !

Jan 31, 2011
Over bisected of the websites, whose hostings are serviced by Smart Systems accept been restored. Currently, the aggregation gain with adjustment works. The server of Smart Systems was attacked by a accumulation of hackers, what has resulted in malfunction of 295 websites on January 29. Instead of the aboriginal content, the hackers acquaint anti-Armenian slogans in Turkish language. The websites of the Armenian Center for Contemporary Experimental Art, POPOK all-embracing announcement festival, School for Young Leaders, a ambit of online shops and bartering companies were amid those, which suffered from the attack. Besides, Armenian aperture of job announcements - job.am - and the website of Armenian accompanist Emmy, who will represent Armenia at Eurovision Song Contest 2011, were additionally down.
Hobbit helmsman Jackson trap in $190K credit card scam !

Hobbit helmsman Jackson trap in $190K credit card scam !

Jan 30, 2011
Lord of the Rings Director Peter Jackson was the ambition of a US$190,000 (£120,000) acclaim agenda artifice that approved to bond out a disturbing business. The recently-knighted Hobbit helmsman acclimated his American Express agenda to shop for items from the Michigan Toy Soldier Company, which specialises in the auction of actual miniatures. Richard Berry, buyer of the company, acclimated the capacity to cut counterfeit invoices in adjustment to accumulate his disturbing business afloat, a US cloister has heard, the Daily Telegraph reports. Berry, who admits fraud, faces a best book of 18 months abaft bars. Berry's lawyer, David Steingold, told the court: "He bare account and acclimated the acclaim card, and hoped to accord the money aback sales best up." "Things got out of duke because the abridgement didn't about-face around," he added. Sir Peter was not larboard out of abridged as a aftereffect of the scam. Berry, who has already paid Am Ex
Expert Insights
Cybersecurity Resources