#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Insider Risk Management

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

More than 199 Indian govt websites defaced in last 6 months !

More than 199 Indian govt websites defaced in last 6 months !

Feb 23, 2011
The government today said 199 government websites have been defaced by foreign hackers in the last six months.  "The website of Central Bureau of Investigation (CBI) was defaced by a foreign hacker "Pakistan Cyber Army" on December 3, 2010. In addition to this, a total of 198 government websites were defaced by foreign hackers in the past six months," Minister of State for Communications and IT Gurudas Kamat said in a written reply to the Lok Sabha.  He added that several measures have been taken to detect and prevent cyber attacks.  This includes audit of all new government websites and applications and engaging National Informatics Centre (NIC) to improve safety posture etc.  Replying to another query, Kamat said a total of 420 cases were registered under the IT Act 2000 in 2009.  "A total of 217, 288 and 420 cases were registered under IT Act, 2000 during 2007, 2008 and 2009 respectively, thereby showing an increasing trend.  A total of 339, 176 and 276 case
#anonsec : Anonymous Hackers guide how to Mesh Network !

#anonsec : Anonymous Hackers guide how to Mesh Network !

Feb 23, 2011
#anonsec : Anonymous Hackers guide how to Mesh Network ! They Wrote the message : Yes, there is work to do. The idea is to write a how-to on building mesh networks. The n00bs must understand it. Mesh networks are usefull, as they cannot be censored nor shut down. Later on that How-to can become part of Anonymous' uber-secret handbook regarding safety. Version 0.2.0, a downloadable .pdf, can be found there https://goo.gl/SuY0f . Join irc.anonops.ru #anonsec where you find the mesh pad link in the /topic.
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Apr 29, 2024Exposure Management / Attack Surface
It comes as no surprise that today's cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics that attackers use demand the adoption of better, more holistic and consolidated ways to meet this non-stop challenge. Security teams constantly look for ways to reduce risk while improving security posture, but many approaches offer piecemeal solutions – zeroing in on one particular element of the evolving threat landscape challenge – missing the forest for the trees.  In the last few years, Exposure Management has become known as a comprehensive way of reigning in the chaos, giving organizations a true fighting chance to reduce risk and improve posture. In this article I'll cover what Exposure Management is, how it stacks up against some alternative approaches and why building an Exposure Management program should be on  your 2024 to-do list. What is Exposure Management?  Exposure Management is the systematic identification, evaluation,
Indishell (Indian Hacking Group) Got Hacked By N3t.Crack3R using XSS attack (Pakistani Hacker) !

Indishell (Indian Hacking Group) Got Hacked By N3t.Crack3R using XSS attack (Pakistani Hacker) !

Feb 23, 2011
Indishell (Indian Hacking Group) Got Hacked By N3t.Crack3R  (Pakistani Hacker) ! Indishell 's Official website Hacked By XSS attack , their forum member ' Chai ' (N3t.Crack3R) . This Hack can be seen within restricted login area so there is no ' zone-h ' Mirror, But ' N3t.Crack3R ' make a video of this hack. Download the Video : Click Here   (File size: 507.47 KB) Note : (Reload Page if 1st time you got error "File Temporarily no avaiblable")
cyber security

SaaS Security Buyers Guide

websiteAppOmniSaaS Security / Threat Detection
This guide captures the definitive criteria for choosing the right SaaS Security Posture Management (SSPM) vendor.
Insecure Magazine : Issue 28 available for Download !

Insecure Magazine : Issue 28 available for Download !

Feb 23, 2011
Insecure Magazine :  Issue 28 available for Download ! Database protocol exploits explained Review: MXI M700 Bio Measuring web application security coverage Inside backup and storage: The expert's view Combating the changing nature of online fraud Successful data security programs encompass processes, people, technology Sangria, tapas and hackers: SOURCE Barcelona 2010 What CSOs can learn from college basketball Network troubleshooting 101 America's cyber cold war RSA Conference Europe 2010 Bootkits - a new stage of development Download
Watcher v1.5.1 Web security testing tool and passive vulnerability scanner download !

Watcher v1.5.1 Web security testing tool and passive vulnerability scanner download !

Feb 23, 2011
Watcher is a Web security testing tool and passive vulnerability scanner. This tool is in continues development and has updated it features and capabilities. Watcher is a runtime passive-analysis tool for HTTP-based Web applications. Being passive means it won't damage production systems, it's completely safe to use in Cloud computing, shared hosting, and dedicated hosting environments. Watcher detects Web-application security issues as well as operational configuration issues. Watcher provides pen-testers hot-spot detection for vulnerabilities, developers quick sanity checks, and auditors PCI compliance auditing. It looks for issues related to mashups, user-controlled payloads (potential XSS), cookies, comments, HTTP headers, SSL, Flash, Silverlight, referrer leaks, information disclosure, Unicode, and more. Major Features: Passive detection  of security, privacy, and PCI compliance issues in HTTP, HTML, Javascript, CSS, and development frameworks (e.g. ASP.NET, JavaServer) Wor
Dorset HealthCare University NHS Foundation Trust website Hacked !

Dorset HealthCare University NHS Foundation Trust website Hacked !

Feb 23, 2011
HACKERS brought down a website for a health trust serving 700,000 NHS patients in Dorset. The attack, which disabled the site over the weekend, blocked access to the Dorset HealthCare University NHS Foundation Trust website. The trust provides treatment for mental health issues, addiction, dentistry, and some primary care services to patients across the county. Hackers posted a message on the site which read: "Don't mess with me. Site totally hacked" and a cartoon image of a penguin emerging from a shattered computer screen carrying a gun. A jumbled message posted by the hacker on the trust's website read: "You call this security. You must be kidding. If you don't want to get into trouble, patch your admin." Dr Paul Ton de Vrieze, a lecturer in web systems and technologies at  Bournemouth University , said such attacks were often made only for the hacker's satisfaction. "Sometimes people hack sites for their own bravura. They think it is fun to do and show the world that they are abl
Kaspersky Lab forecast for the IT threat landscape 2011 – 2020 !

Kaspersky Lab forecast for the IT threat landscape 2011 – 2020 !

Feb 23, 2011
Kaspersky Lab has released its forecast for the IT threat landscape for this decade (2011 – 2020). Kaspersky bases this forecast on an analysis of the main changes and issues in the sphere of IT security over the past decade, as well as emerging trends in the development of personal computers, mobile phones and operating systems. According to the company's analysts, the most significant trends of the last ten years (2001-2010) were: Mobility and miniaturisation . Smaller and smaller devices can now access the Internet from virtually any point on the globe; making wireless networks the most popular method of connecting to the web. The transformation of virus writing  into cybercrime (Crime committed using a computer and the internet to steal a person's identity, sell contraband, stalk victims or disrupt organisations with malevolent programs). Windows maintaining its leading position  as a vendor of operating systems for personal computers. Intense competition in the mobile platfor
Cybersecurity
Expert Insights
Cybersecurity Resources