#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Poll Results : Prefer way b/w Whitehats & Blackhats ?

Poll Results : Prefer way b/w Whitehats & Blackhats ?

Feb 01, 2011
Poll Results :  Question : With whom/as whom you will Prefer to work ? a) Registered WhiteHat Hackers b) Unregistered BlackHat Hackers We have Total 457 Votes in 15 Days on our Sites. Finally today the result is out, and  Registered WhiteHat Hackers won by 72% Votes (331 Votes) , where  Unregistered BlackHat Hackers got 27% Votes (126 Votes) In last 15 days of open Voting. Thank you friends for voting and participating in this event of " The Hacker News " :D
AVG and Netlog Partner to Help More Than 24 Million Social Networking Users Stay Safe !

AVG and Netlog Partner to Help More Than 24 Million Social Networking Users Stay Safe !

Feb 01, 2011
AVG Technologies, developers of the world's best accepted chargeless anti-virus software, appear today that it has teamed up with Netlog to barrage a co-branded Aegis Center aural the accepted European amusing arrangement now accessible at https://www.netlog.com/go/helpdesk/security/. The Aegis Center powered by AVG, will acquaint and brainwash users about Internet security, accommodate tips and advice users assure themselves from malware, spyware and added attacks by cybercriminals while they cream online. Additionally, all links aural Netlog will be automatically scanned by AVG LinkScanner, admonishing users to burden from aperture a articulation back a blackmail is detected. With added than 72 actor associates and over 150 actor visitors per month, Netlog is one of the fastest-growing and best accepted amusing networking sites amidst European adolescence amid the ages of 18 and 25. The Aegis Center will be initially formed out to 24 actor Netlog users in the top six countries of
Network Threats: A Step-by-Step Attack Demonstration

Network Threats: A Step-by-Step Attack Demonstration

Apr 25, 2024Endpoint Security / Cyber Security
Follow this real-life network attack simulation, covering 6 steps from Initial Access to Data Exfiltration. See how attackers remain undetected with the simplest tools and why you need multiple choke points in your defense strategy. Surprisingly, most network attacks are not exceptionally sophisticated, technologically advanced, or reliant on zero-day tools that exploit edge-case vulnerabilities. Instead, they often use commonly available tools and exploit multiple vulnerability points. By simulating a real-world network attack, security teams can test their detection systems, ensure they have multiple choke points in place, and demonstrate the value of networking security to leadership. In this article, we demonstrate a real-life attack that could easily occur in many systems. The attack simulation was developed based on the MITRE ATT&CK framework, Atomic Red Team,  Cato Networks ' experience in the field, and public threat intel. In the end, we explain why a holistic secur
SourceForge Detects Targeted Attack, Resets Millions of Passwords !

SourceForge Detects Targeted Attack, Resets Millions of Passwords !

Feb 01, 2011
Last week, accessible antecedent computer application development and administration ability SourceForge the ambition of a directed attack. Once the advance was detected, the aggregation bound bottom ward the impacted hosts to abate the accident of accretion to added hosts. Thus, this prevented accessible abstracts acquisition activities, said SourceForge. was Consequently, it resulted in annual blow for CVS Hosting, ViewVC, Fresh Release upload capability, and ProjectWeb/shell. According to SourceForge, the aggregation assay baldheaded (among added things) a afraid SSH daemon, which was adapted to do countersign capture. Even admitting the aggregation has no affirmation to advance that the sniffing advance was acknowledged in accession passwords, it is demography a basic admeasurement of abandoning all SourceForge user annual passwords. "What we absolutely don't appetite is to acquisition out in two months that passwords were compromised and we didn't booty any action," as per t
cyber security

SaaS Security Buyers Guide

websiteAppOmniSaaS Security / Threat Detection
This guide captures the definitive criteria for choosing the right SaaS Security Posture Management (SSPM) vendor.
New PlayStation 3 Firmware Hacked Within 24 Hours of its Release !

New PlayStation 3 Firmware Hacked Within 24 Hours of its Release !

Feb 01, 2011
Sony's been arena cat-and-mouse with PS3 firmware crackers, and beneath than a day afterwards its adaptation 3.56 firmware was released, hackers accept baffled Sony's locks. If you've gotten acclimated to accepting custom firmware on your Sony PlayStation 3, the association over at KaKaRoToKS, accepted for custom PS3 firmware, accept absurd the most recent firmware (version 3.56) appear by Sony in beneath than 24 hours afterwards the update's release. While Sony's been attempting to abolish any fresh versions of custom 3.56 firmware via DMCA appraisal notices from Github, you can still get a authority of the most recent custom firmware (failOverFlow) done up by KaKaRoToKS over at Gitorious. The advantage abaft custom firmwares (some custom firmwares don't acquiesce you to charlatan games) is that they acquiesce you to install your own amalgamation files like the ones from Sony's PSN.
B.C. dating website hacked !

B.C. dating website hacked !

Feb 01, 2011
A hacker bankrupt into the online dating website Plenty of Fish aftermost week, auspiciously exporting hundreds of accounts. Markus Frind, CEO of the Vancouver-based company, said Monday all passwords accept been displace back the Jan. 18 aegis breach. He additionally said all annual users accept been contacted. However, in a blog column Monday, he accustomed 345 accounts were auspiciously exported. Steffani Cameron has had an annual with Plenty of Fish for four years. She affairs to annul her annual because she doesn't assurance the company's aegis measures. "When I was accepting my account chump affliction email, they were saying, 'You've got added matches and actuality is your password.' Anybody who sends passwords unencrypted in apparent argument in an email has some austere issues with compassionate what aegis absolutely means," she said. Approximately 28 actor bodies accept logged assimilate the Plenty of Fish website back its inception. I
WikiLeaks 'hacktivists' acknowledge war on the UK !

WikiLeaks 'hacktivists' acknowledge war on the UK !

Feb 01, 2011
Anonymous, the "hacktivist" aggregate abaft a alternation of pro-WikiLeaks cyber attacks, has declared war on the British Government afterward the arrest of bristles of its associates in the UK. In a account acquaint online, the organisation apprenticed supporters to hit Government websites with broadcast abnegation of account (DDoS) attacks – a way of calamity a ambition website with so abounding requests for advice that it is affected to shut down. The tactic has been acclimated by Anonymous activists with arresting success in the accomplished two months to briefly attenuate the websites of banking institutions or governments which accept criticised WikiLeaks in the deathwatch of the advertisement of bags of abstruse US admiral cables. The alarm to accoutrements raises the bogey of co-ordinated cyber attacks on Government online infrastructure. It has been advised austere abundant for GovCertUK, the advice aegis agency, to acquaint government websites to booty precaut
Union leader Crow claims phone was hacked !

Union leader Crow claims phone was hacked !

Feb 01, 2011
Firebrand abutment baton Bob Crow on Monday became the best recent accessible amount to accuse to the badge that his buzz has been afraid by journalists. Lawyers for Bob Crow, general-secretary of the Rail, Maritime and Carriage Workers' union, accept accounting to London's Metropolitan Badge allurement them to delving suspicions that his buzz ability accept been targeted as continued ago as 2000. "RMT has had suspicions that journalists may accept had admission to clandestine advice about my movements and my union?s activities that date aback to the year 2000," Crow said. "We are now allurement for the police, as allotment of their renewed investigation, to acknowledge to us any affirmation or advice that they may accept baldheaded in account of the Account of the World." Police launched a beginning analysis into buzz hacking by journalists at the Rupert Murdoch-owned Account of the World Sunday abridged aftermost anniversary afterwards accepting &q
Kaspersky’s security suite source code leaked, available for download !!

Kaspersky's security suite source code leaked, available for download !!

Jan 31, 2011
As a result of leakage of public access were sources of products from Kaspersky Lab.   And the company and to read the archive of the experts claim that it contained "a fragment of an older version of the antivirus engine, which had previously been circulated in closed hacking resources. A free file hosting Mlfat4arab posted the source code of the product Kaspersky Lab »- Kaspersky Internet Security. Rar-archive size of 182 MB of January 26, 2011 uploaded to the hosting user unknown, and at the time of this writing, the file has been downloaded 2071 times.   The archive contains a collection of files with code written in C + + tool in Visual C, and assembly files. Judging by the names of the folders in the archive, it contains the source code of the engine KLAVA, which is a work in Kaspersky Lab's entered the final phase in 2008, based on KLAVA all subsequent generations of the company's products, starting with the line in 2009, which appeared on the market autumn 2008
Nmap 5.50 latest Version out !

Nmap 5.50 latest Version out !

Jan 31, 2011
"Nmap ("Network Mapper") is a free and open source utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are avalable for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), and a uti
All about Microsoft Windows 8 !

All about Microsoft Windows 8 !

Jan 31, 2011
Only Microsoft knows how the abutting adaptation of its Windows operating arrangement will attending and what it will be called, but big changes could be advanced for the OS that assemblage accredit to as "Windows 8." At this year's Consumer Electronics Appearance in Las Vegas, Microsoft appear that Windows 8 will abutment system-on-a-chip architectures appliance ARM processors. Unlike the x86 architectonics that today's Windows laptops and desktops assignment with, ARM-based chips tend to run such low-power accessories as tablets and smartphones. In his CES keynote speech, Microsoft CEO Steve Ball­mer said, "This advertisement is absolutely all about enabling a fresh chic of hardware, and fresh silicon ally for Windows, to accompany the widest accessible ambit of anatomy factors to the market." In added words, Windows won't be aloof for laptops and desktops anymore. Actual Facts Microsoft's ARM advertisement represents the firm's abando
1600 New Web Sites Hacked by Hamdi HaCker ( The 077 ) !!

1600 New Web Sites Hacked by Hamdi HaCker ( The 077 ) !!

Jan 31, 2011
1600 New Web Sites Hacked by Hamdi HaCker ( The 077 ) !! List of Hacked sites :  https://pastebin.com/cdxbYKjz Zone-H Link :  https://www.zone-h.org/archive/notifier=The%20077 News Source : Hamdi HaCker ( The 077 ) | Via Fb msg
Smart Systems restore over hacked 295 websites !

Smart Systems restore over hacked 295 websites !

Jan 31, 2011
Over bisected of the websites, whose hostings are serviced by Smart Systems accept been restored. Currently, the aggregation gain with adjustment works. The server of Smart Systems was attacked by a accumulation of hackers, what has resulted in malfunction of 295 websites on January 29. Instead of the aboriginal content, the hackers acquaint anti-Armenian slogans in Turkish language. The websites of the Armenian Center for Contemporary Experimental Art, POPOK all-embracing announcement festival, School for Young Leaders, a ambit of online shops and bartering companies were amid those, which suffered from the attack. Besides, Armenian aperture of job announcements - job.am - and the website of Armenian accompanist Emmy, who will represent Armenia at Eurovision Song Contest 2011, were additionally down.
Cybersecurity Resources