#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Poll Results : Prefer way b/w Whitehats & Blackhats ?

Poll Results : Prefer way b/w Whitehats & Blackhats ?

Feb 01, 2011
Poll Results :  Question : With whom/as whom you will Prefer to work ? a) Registered WhiteHat Hackers b) Unregistered BlackHat Hackers We have Total 457 Votes in 15 Days on our Sites. Finally today the result is out, and  Registered WhiteHat Hackers won by 72% Votes (331 Votes) , where  Unregistered BlackHat Hackers got 27% Votes (126 Votes) In last 15 days of open Voting. Thank you friends for voting and participating in this event of " The Hacker News " :D
AVG and Netlog Partner to Help More Than 24 Million Social Networking Users Stay Safe !

AVG and Netlog Partner to Help More Than 24 Million Social Networking Users Stay Safe !

Feb 01, 2011
AVG Technologies, developers of the world's best accepted chargeless anti-virus software, appear today that it has teamed up with Netlog to barrage a co-branded Aegis Center aural the accepted European amusing arrangement now accessible at https://www.netlog.com/go/helpdesk/security/. The Aegis Center powered by AVG, will acquaint and brainwash users about Internet security, accommodate tips and advice users assure themselves from malware, spyware and added attacks by cybercriminals while they cream online. Additionally, all links aural Netlog will be automatically scanned by AVG LinkScanner, admonishing users to burden from aperture a articulation back a blackmail is detected. With added than 72 actor associates and over 150 actor visitors per month, Netlog is one of the fastest-growing and best accepted amusing networking sites amidst European adolescence amid the ages of 18 and 25. The Aegis Center will be initially formed out to 24 actor Netlog users in the top six countries of
Network Threats: A Step-by-Step Attack Demonstration

Network Threats: A Step-by-Step Attack Demonstration

Apr 25, 2024Endpoint Security / Cyber Security
Follow this real-life network attack simulation, covering 6 steps from Initial Access to Data Exfiltration. See how attackers remain undetected with the simplest tools and why you need multiple choke points in your defense strategy. Surprisingly, most network attacks are not exceptionally sophisticated, technologically advanced, or reliant on zero-day tools that exploit edge-case vulnerabilities. Instead, they often use commonly available tools and exploit multiple vulnerability points. By simulating a real-world network attack, security teams can test their detection systems, ensure they have multiple choke points in place, and demonstrate the value of networking security to leadership. In this article, we demonstrate a real-life attack that could easily occur in many systems. The attack simulation was developed based on the MITRE ATT&CK framework, Atomic Red Team,  Cato Networks ' experience in the field, and public threat intel. In the end, we explain why a holistic secur
SourceForge Detects Targeted Attack, Resets Millions of Passwords !

SourceForge Detects Targeted Attack, Resets Millions of Passwords !

Feb 01, 2011
Last week, accessible antecedent computer application development and administration ability SourceForge the ambition of a directed attack. Once the advance was detected, the aggregation bound bottom ward the impacted hosts to abate the accident of accretion to added hosts. Thus, this prevented accessible abstracts acquisition activities, said SourceForge. was Consequently, it resulted in annual blow for CVS Hosting, ViewVC, Fresh Release upload capability, and ProjectWeb/shell. According to SourceForge, the aggregation assay baldheaded (among added things) a afraid SSH daemon, which was adapted to do countersign capture. Even admitting the aggregation has no affirmation to advance that the sniffing advance was acknowledged in accession passwords, it is demography a basic admeasurement of abandoning all SourceForge user annual passwords. "What we absolutely don't appetite is to acquisition out in two months that passwords were compromised and we didn't booty any action," as per t
cyber security

SaaS Security Buyers Guide

websiteAppOmniSaaS Security / Threat Detection
This guide captures the definitive criteria for choosing the right SaaS Security Posture Management (SSPM) vendor.
New PlayStation 3 Firmware Hacked Within 24 Hours of its Release !

New PlayStation 3 Firmware Hacked Within 24 Hours of its Release !

Feb 01, 2011
Sony's been arena cat-and-mouse with PS3 firmware crackers, and beneath than a day afterwards its adaptation 3.56 firmware was released, hackers accept baffled Sony's locks. If you've gotten acclimated to accepting custom firmware on your Sony PlayStation 3, the association over at KaKaRoToKS, accepted for custom PS3 firmware, accept absurd the most recent firmware (version 3.56) appear by Sony in beneath than 24 hours afterwards the update's release. While Sony's been attempting to abolish any fresh versions of custom 3.56 firmware via DMCA appraisal notices from Github, you can still get a authority of the most recent custom firmware (failOverFlow) done up by KaKaRoToKS over at Gitorious. The advantage abaft custom firmwares (some custom firmwares don't acquiesce you to charlatan games) is that they acquiesce you to install your own amalgamation files like the ones from Sony's PSN.
B.C. dating website hacked !

B.C. dating website hacked !

Feb 01, 2011
A hacker bankrupt into the online dating website Plenty of Fish aftermost week, auspiciously exporting hundreds of accounts. Markus Frind, CEO of the Vancouver-based company, said Monday all passwords accept been displace back the Jan. 18 aegis breach. He additionally said all annual users accept been contacted. However, in a blog column Monday, he accustomed 345 accounts were auspiciously exported. Steffani Cameron has had an annual with Plenty of Fish for four years. She affairs to annul her annual because she doesn't assurance the company's aegis measures. "When I was accepting my account chump affliction email, they were saying, 'You've got added matches and actuality is your password.' Anybody who sends passwords unencrypted in apparent argument in an email has some austere issues with compassionate what aegis absolutely means," she said. Approximately 28 actor bodies accept logged assimilate the Plenty of Fish website back its inception. I
Expert Insights
Cybersecurity Resources