#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Escuela Universitaria Diseno - Spain hacked by Fr0664/FCA, 26740 emails/passwords Dumped !

Escuela Universitaria Diseno - Spain hacked by Fr0664/FCA, 26740 emails/passwords Dumped !

May 01, 2011
Escuela Universitaria Diseno - Spain hacked by Fr0664/FCA , 26740 emails/passwords Dumped ! 26740 emails/passwords Preview : https://pastebin.com/AQGxDJgD Full : https://rapidshare.com/files/460080122/esne.edu.7z
Trinity Campus college's website hacked by RdH0X

Trinity Campus college's website hacked by RdH0X

May 01, 2011
Trinity Campus college 's website hacked by RdH0X Trinity Campus college's website hacked and the vulnerabilities reported to the admins and system administrators of the institute. College authority is involving me in their team so as to take adequate steps to secure the website. HACKED SITE :  https://www.trinitycampus.in/uploads/RdH0X_tnt.htm
Code Keepers: Mastering Non-Human Identity Management

Code Keepers: Mastering Non-Human Identity Management

Apr 12, 2024DevSecOps / Identity Management
Identities now transcend human boundaries. Within each line of code and every API call lies a non-human identity. These entities act as programmatic access keys, enabling authentication and facilitating interactions among systems and services, which are essential for every API call, database query, or storage account access. As we depend on multi-factor authentication and passwords to safeguard human identities, a pressing question arises: How do we guarantee the security and integrity of these non-human counterparts? How do we authenticate, authorize, and regulate access for entities devoid of life but crucial for the functioning of critical systems? Let's break it down. The challenge Imagine a cloud-native application as a bustling metropolis of tiny neighborhoods known as microservices, all neatly packed into containers. These microservices function akin to diligent worker bees, each diligently performing its designated task, be it processing data, verifying credentials, or
The PSN hackers logs fresh from EFNET IRC Server !

The PSN hackers logs fresh from EFNET IRC Server !

May 01, 2011
The PSN hackers logs fresh from EFNET IRC Server ! Logs of PS Hackers :  https://173.255.232.215/logs/efnet/ps3dev/2011-02-16 Alternate Link For Logs :  https://pastebin.com/yXP7TDJ3 All Logs from EFNET IRC Server : https://173.255.232.215/logs/efnet/ps3dev/ IRC server Stats :  https://173.255.232.215/logs/efnet/ps3dev/stats
cyber security

WATCH: The SaaS Security Challenge in 90 Seconds

websiteAdaptive ShieldSaaS Security / Cyber Threat
Discover how you can overcome the SaaS security challenge by securing your entire SaaS stack with SSPM.
Anonymous Vs Sony : Word By Word Q/A b/w Reporters and Sony during Conference !

Anonymous Vs Sony : Word By Word Q/A b/w Reporters and Sony during Conference !

May 01, 2011
Anonymous Vs Sony : Word By Word Q/A b/w Reporters and Sony during Conference ! Q. The accuracy of approximately 10 million credit flow A. There is no firm evidence of leakage. Cannot say wether a leak or not. There is no report so far. Q. prospect of resuming services. A. We want to restart the service country/region base. Basically approx within a week schedule. (a week from today?.. previously we heard about same "a week matter..) Q. How was it the effect to the business so far? A. Cannot tell it yet, many things to handle one at the time. Q. What was the condition when you firstly sense the trouble? A. Hacking with the high skill technique was undergoing, was confirmed. But we still dont know data was stolen / taken Q. Why did you announce privacy data was stolen then? A. The possibility existed, what/when/how was it still under investigation. account numbers is between 7700000 to 7800000 accounts plus there are double accounts. Q. What was your damage report
Holes in FBI cyber security !!

Holes in FBI cyber security !!

May 01, 2011
About a third of the FBI agents working on cyber investigations lack the networking and counterintelligence expertise to investigate national security intrusions, the Justice Department's inspector general concluded in a new report. The report said the FBI's practice of rotating agents among different offices to promote a variety of work experiences hinders the ability to investigate national security cyber intrusions. The inspector general's audit, based on interviews of 36 agents in 10 offices, emphasized the need for a strong cyber security work force in federal government "is more urgent than ever," said Sen. Susan Collins, the top Republican on the Senate Homeland Security and Governmental Affairs Committee. The FBI has a comprehensive instructional plan in place that includes 12 core courses an agent must take along with on-the-job training. According to the inspector general's report, many agents said training was helpful but that they did not have the time to take the req
Cybersecurity Resources