#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Get the Free Newsletter
SaaS Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Yenepoya University Hacked by The INFERNAL DANTE

Yenepoya University Hacked by The INFERNAL DANTE

Apr 27, 2011
Yenepoya University Hacked by The INFERNAL DANTE Hacked Site Link : https://www.yenepoya.edu.in/notice_board.php More Hack Pictures : https://img691.imageshack.us/i/64275385.png/ https://img121.imageshack.us/i/90340593.png/ ​https://img839.imageshack.us/i/51799700.png/ ​https://img833.imageshack.us/i/44978948.png/ ​https://img696.imageshack.us/i/20967849.png/
Cambridge Networks hacked by Shak [PCA]

Cambridge Networks hacked by Shak [PCA]

Apr 27, 2011
Cambridge Networks hacked by Shak [PCA] Hacked Site : https://cambridge-networks.co.uk/ Mirror : https://zone-h.org/mirror/id/13556467 Hacked Site : https://cambridgewebworks.com/ Mirror : https://zone-h.org/mirror/id/1355
How to Accelerate Vendor Risk Assessments in the Age of SaaS Sprawl

How to Accelerate Vendor Risk Assessments in the Age of SaaS Sprawl

Mar 21, 2024SaaS Security / Endpoint Security
In today's digital-first business environment dominated by SaaS applications, organizations increasingly depend on third-party vendors for essential cloud services and software solutions. As more vendors and services are added to the mix, the complexity and potential vulnerabilities within the  SaaS supply chain  snowball quickly. That's why effective vendor risk management (VRM) is a critical strategy in identifying, assessing, and mitigating risks to protect organizational assets and data integrity. Meanwhile, common approaches to vendor risk assessments are too slow and static for the modern world of SaaS. Most organizations have simply adapted their legacy evaluation techniques for on-premise software to apply to SaaS providers. This not only creates massive bottlenecks, but also causes organizations to inadvertently accept far too much risk. To effectively adapt to the realities of modern work, two major aspects need to change: the timeline of initial assessment must shorte
WordPress 3.1.2 released – Security fixes !

WordPress 3.1.2 released – Security fixes !

Apr 27, 2011
WordPress 3.1.2 released – Security fixes ! The WordPress team just released a new version of WordPress (3.1.2) to fix a security issue where contributor-level users were allowed to publish posts. It is a small release, and everyone using WordPress should upgrade to it! From the WordPress site: WordPress 3.1.2 is now available and is a security release for all previous WordPress versions. This release addresses a vulnerability that allowed Contributor-level users to improperly publish posts. The issue was discovered by a member of our security team, WordPress developer Andrew Nacin, with Benjamin Balter. We suggest you update to 3.1.2 promptly, especially if you allow users to register as contributors or if you have untrusted users. This release also fixes a few bugs that missed the boat for version 3.1.1. Download 3.1.2 or update automatically from the Dashboard → Updates menu in your site's admin area. So do what they say and upgrade it asap! Download link: https://
cyber security

Automated remediation solutions are crucial for security

websiteWing SecurityShadow IT / SaaS Security
Especially when it comes to securing employees' SaaS usage, don't settle for a longer to-do list. Auto-remediation is key to achieving SaaS security.
Mageia 1 Beta 2 released [ Testing Edition ]

Mageia 1 Beta 2 released [ Testing Edition ]

Apr 27, 2011
Mageia 1 Beta 2 released [ Testing Edition ] Three weeks after the first beta arrived, the Mageia development team has announced the release of the second beta for version 1.0 of its Mandriva Linux fork. According to the project roadmap, Mageia 1 Beta 2 will be followed by a release candidate on 17 May – the first stable release is expected to arrive on 1 June. Based on the 2.6.38.4 Linux kernel, Mageia 1 Beta 2 features the latest KDE 4.6.2 desktop environment. Other changes over the previous beta include a variety of package updates, including version 12.0.742.0 of the Chromium web browser, Firefox 4.0 and LibreOffice 3.3.2. The developers also note that they froze the software package versions last week, meaning that "no new, big, upstream code changes will be accepted in Mageia until our final release in June". Moving forward, the developers will focus on fixing bugs and "refining and polishing the user experience". As with all development releases, use in
253 website defaced by imm0rt4l ( Indian hacking crew )

253 website defaced by imm0rt4l ( Indian hacking crew )

Apr 27, 2011
253 website defaced by imm0rt4l ( Indian hacking crew ) Imm0rt4l5 defaced 253 site , they are Indian hacking crew , with member names : Cybers4mur41 , C0br4 , T41p4n , rur0u1_bl4d3 The main defaces are :  https://www.pakistanrealestate.net/index.php and  edp.com.pk/update.php Message By them " We are warning to team ZHC not to deface Indian site , or else next defacement will be only off porkis !!!! " List of other websites are :  https://pastebin.com/r57UmqZ0
100's Beijing Government networks are vulnerable to cyber-attack !

100's Beijing Government networks are vulnerable to cyber-attack !

Apr 27, 2011
100's Beijing Government networks are vulnerable to Cyber-attack ! China is known as an aggressor in cyberspace, but hundreds of Beijing's own government networks are vulnerable to cyber-attack, says one security expert whose hobby is finding back doors into Chinese computer systems. Among the systems that hackers have penetrated is a database containing personal details - including email addresses, cellphone and passport numbers, and even psychological test results - of 11,000 people, including thousands of Americans. The database, maintained by the state agency that recruits foreign specialists to work in China, was breached by hackers last year, according to U.S. security researcher Dillon Beresford. But many of the Americans in the database did not know their details were there and had been accessed by hackers. Source
Cybersecurity Resources