#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Insider Risk Management

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Press Release - Who are Anonymous & What Anonymous represents !

Press Release - Who are Anonymous & What Anonymous represents !

Feb 26, 2011
Just now, Anonymous hackers Release a new press note for the people of world. The words are as given below : Dear Citizens of the World. There has been some confusion among the media about who/what anonymous is/represents.  There have also been questions asked about the input from Anonymous during the current global revolution. Anonymous is an online pool of consciousness, sometimes we create a force towards a similar direction which could manifest in revolution. Anonymous has NO leader.  We are one.  We are many.  One does not speak for many. Many do not speak for all.  No one speaks for all. We come from all walks of life. All age, race, sex, places.  We have no ideologies. We have every ideology imaginable. We have no goals.  We have every goal imaginable.  To understand Anonymous would be to understand our universe.  Anonymous can not be labelled, blamed or made a scapegoat. To blame Anonymous would be to blame the citizens of the world.  There is no discrimination in An
Chip.in - Technology Magazine website Hacked by TriCk & Assasin (ZHC & TeaMp0isoN)

Chip.in - Technology Magazine website Hacked by TriCk & Assasin (ZHC & TeaMp0isoN)

Feb 26, 2011
Chip.in - Technology Magazine website Hacked by TriCk & Assasin (ZHC & TeaMp0isoN) Link :  https://www.chip.in/forums/ Mirror :  https://mirror-az.com/mirror/?id=12689 News Source : TriCk & Assasin (ZHC & TeaMp0isoN)
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Apr 29, 2024Exposure Management / Attack Surface
It comes as no surprise that today's cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics that attackers use demand the adoption of better, more holistic and consolidated ways to meet this non-stop challenge. Security teams constantly look for ways to reduce risk while improving security posture, but many approaches offer piecemeal solutions – zeroing in on one particular element of the evolving threat landscape challenge – missing the forest for the trees.  In the last few years, Exposure Management has become known as a comprehensive way of reigning in the chaos, giving organizations a true fighting chance to reduce risk and improve posture. In this article I'll cover what Exposure Management is, how it stacks up against some alternative approaches and why building an Exposure Management program should be on  your 2024 to-do list. What is Exposure Management?  Exposure Management is the systematic identification, evaluation,
BlackHole RAT : Mac OS X backdoor Trojan !

BlackHole RAT : Mac OS X backdoor Trojan !

Feb 26, 2011
' BlackHole ' is the latest remote administration tool (RAT) and is available both in Windows and Mac. Hacktool such RAT employs client-server program that communicates to its victim's machine through its trojan server. The server application is installed on the victim while the client application is on the managing side. The version suggest that ' BlackHole ' is currently in its early stage. However, the author seems to start showcasing the following functionalities: Remote execution of shell commands. Opens webpage using user's default browser. Sends a message which is displayed on the victims screen. Creates a text file. It is capable to perform shutdown, restart and sleep operation. It is capable to request for admin privileges. Here is an excerpt from the default text that is displayed in the full screen window with the reboot button: "I am a Trojan Horse, so i have infected your Mac Computer. I know, most people think Macs can't be infected, but look, you ARE I
cyber security

Want to Bolster Your CI/CD Pipeline?

websiteWizSecurity Auditing / Container Security
This cheat sheet covers best practices with actionable items in Infrastructure security, code security, secrets management, access and authentication, and monitoring and response.
Motorola Xoom Gets Hacked In Under An Hour after Release !

Motorola Xoom Gets Hacked In Under An Hour after Release !

Feb 26, 2011
Despite just being released on February 24th, the Motorola Xoom has become the newest victim of developer rooting, and it took less than two hours to do it. Xeriouxly. The best part? The Clockwork Recovery running on it means that other developers can now create their own custom ROMs to hack whatever they want onto the tablet. Clockwork Recovery, also known as ClockworkMod, is a recovery console used on rooted Android Google devices, mainly using for flashing custom ROMs. It can make and restore backups, and it fairly straightforward to install too. The root was done by coder " Koushi ", pretty much as soon as he got his copy of the device home. In a blog post, he explained how he managed to get the custom root running so quickly. He got Clockwork Recovery running by building up a recovery (which he will not release yet due to the SD slot being non-functional at the moment) via  AOSP 's kernel and then using a ROM manager to get Superuser on the Xoom. He has a short ins
Indian United Nations & Football Association website's XSS Vulnerabilities found by TriCk (TeaMp0isoN)

Indian United Nations & Football Association website's XSS Vulnerabilities found by TriCk (TeaMp0isoN)

Feb 26, 2011
Indian United Nations & Football Association website's XSS  Vulnerabilities found by TriCk (TeaMp0isoN) 1.) The FA (The Football Association) XSS Vulnerability - TriCk - TeaMp0isoN Link : Click Here 2.) Indian United Nations XSS Vulnerability - TriCk - TeaMp0isoN Link : Click Here News Source : TriCk - TeaMp0isoN | Via Email
Hackers Could Exploit Federal Government Shutdown !

Hackers Could Exploit Federal Government Shutdown !

Feb 25, 2011
The federal government's list of emergency network security personnel has not been updated in 15 years, putting national security at high risk if a shutdown takes place on March 4. The possible government shutdown scheduled for March 4, 2011 could trigger a cyberwar emergency. If non-essential government employees end up being furloughed in early March, the federal government's computer systems will be run by a shortlist of critical-need employees. One major problem: The federal government's list of critical-need computer security employees has not been updated in over 15 years. According to the influential Nextgov website, the government's emergency call-up IT security list was last updated in 1995, ahead of the last federal government shutdown. "In 1995, we already had that decided," said Hord Tipton, a former Interior Department chief information officer who was Bureau of Land Management assistant director for resource use and protection during the
Xss venerability in 'The Times of India' website Found by Rahul Roshan !

Xss venerability in 'The Times of India' website Found by Rahul Roshan !

Feb 25, 2011
Xss venerability in ' The Times of India ' website Found by Rahul Roshan ! Link : Click Here
Extreme Exploits : Advanced Defenses Against Hardcore Hacks Ebook Download !

Extreme Exploits : Advanced Defenses Against Hardcore Hacks Ebook Download !

Feb 25, 2011
Extreme Exploits : Advanced Defenses Against Hardcore Hacks Ebook Download ! This cutting-edge volume takes network security professionals to the next level in protecting networks and web sites. Never-before-published advanced security techniques and concise explanations of core Internet infrastructure explain how to defend against devastating vulnerabilities in systems and the underlying network. With the authors' winning methodology for attack profiling and the theatre of war concept, you'll learn how to architect and prepare your network for threats that don't yet exist. By explaining specific in-depth technologies in use by not only the attackers, but also inside the applications they target, this book enables the reader to make better use of the tools available today, and to design new tools, techniques, and operational policies for the future. Download : Click Here
An Open Letter to PayPal from Anonymous Hackers !

An Open Letter to PayPal from Anonymous Hackers !

Feb 25, 2011
An Open Letter to PayPal from Anonymous Hackers ! Just Now  Anonymous Hackers Publish and open letter to Paypal , The Copy of Letter is as Given Below : Dear PayPal staff, In recent news (reference below) we took notice that you froze the account of Courage to Resist, the organization raising funds for legal support of U.S. Army Pfc. Bradley Manning. We regret to learn that after the massive protest in December 2010, PayPal has yet to appreciate  the untenable position they have found themselves in. PayPal stands at the epicenter of the  conflict of interests between the United States government and the First Amendment of the  United States Constitution. You are already aware that Bradley Manning's motives and reasoning  are politically grounded. However, his motives and/or reasoning are not and should not be any  concern to you. Additionally, by refusing to process the aforementioned legal funds you are  patently interfering with the defendant's financial and legal res
Cyber crime Complaints in US Fell by 10% in 2010 !

Cyber crime Complaints in US Fell by 10% in 2010 !

Feb 25, 2011
The U.S. agency that tracks complaints of criminal activity on the Internet reported Thursday that fewer people complained about Internet fraud in 2010 than in the previous year. The Internet Crime Complaint Center (IC3) runs a Web site where victims can report details of any cyberfraud. It shares the data with law enforcement agencies to help them hunt down criminals. Last year it received 303,809 complaints, almost 10 percent fewer than the previous year's total of 336,655. The IC3 is run by the U.S. Federal Bureau of Investigation and the National White Collar Crime Center. It released its annual report Thursday, based on data submitted in 2010. The largest single source of complaints was from people who had been duped by criminals posing as buyers and sellers. International scammers, preying on eBay and Craigslist users, have made millions over the past decade. Just last week, a Romanian national, Adrian Ghighina, pleaded guilty to his role in a scam that took in $2.7 milli
Google tweaks Search algorithm to reduce the search spam !

Google tweaks Search algorithm to reduce the search spam !

Feb 25, 2011
Google has warned that search rankings will be changing after it refined its systems to weed out content farms and other search spammers. Changes made in the last 24 hours have "noticeably impacts" on around 12 per cent of search queries. The changes are designed to block out so-called content farm – sites which contain a large amount of copied or poor quality content. Instead sites which contain original content, research and analysis will receive preferential treatment. " We can't make a major improvement without affecting rankings for many sites. It has to be that some sites will go up and some will go down ," said the  Google blog . "It is important for high-quality sites to be rewarded, and that's exactly what this change does." Google said that the changes had not been influenced by the results of its Chrome Blocklist extension, which was launched last week. However it said that the top few dozen sites it had downgraded matched the data from the extension by 84 per cent. The se
Anonymous Hackers send a video message to Westboro Baptist Church !

Anonymous Hackers send a video message to Westboro Baptist Church !

Feb 24, 2011
Anonymous doesn't kid around and the Westboro Baptist Church learned that the hard way. The hacktivist group took down their website and left a stern message. The two groups, the radical hackers which launch denial-of-service attacks and the radical religious organization which preaches its message about God by protesting military funerals, have been sparring through the Internet and online message boards. The feud began with a "letter" from Anonymous to Westboro Baptist Church, explaining if the church didn't stop their "benighted gospel of hatred" and "fascist views," Anonymous would target their websites. Then WBC responded to the letter telling Anonymous to "bring it." Anonymous followed that by explaining the initial letter was a trap set up by "attention whoring idiots." WBC took exception to that and said in reality, Anonymous had attempted, and failed, to hack their sites. WBC spokesperson Margie Phelps said the se
Cybersecurity
Expert Insights
Cybersecurity Resources