#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Get the Free Newsletter
SaaS Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

12 American Websites Hacked

12 American Websites Hacked

May 01, 2011
12 American Websites Hacked Hacked sites List :  https://pastebin.com/a0pzskam
Escuela Universitaria Diseno - Spain hacked by Fr0664/FCA, 26740 emails/passwords Dumped !

Escuela Universitaria Diseno - Spain hacked by Fr0664/FCA, 26740 emails/passwords Dumped !

May 01, 2011
Escuela Universitaria Diseno - Spain hacked by Fr0664/FCA , 26740 emails/passwords Dumped ! 26740 emails/passwords Preview : https://pastebin.com/AQGxDJgD Full : https://rapidshare.com/files/460080122/esne.edu.7z
How to Accelerate Vendor Risk Assessments in the Age of SaaS Sprawl

How to Accelerate Vendor Risk Assessments in the Age of SaaS Sprawl

Mar 21, 2024SaaS Security / Endpoint Security
In today's digital-first business environment dominated by SaaS applications, organizations increasingly depend on third-party vendors for essential cloud services and software solutions. As more vendors and services are added to the mix, the complexity and potential vulnerabilities within the  SaaS supply chain  snowball quickly. That's why effective vendor risk management (VRM) is a critical strategy in identifying, assessing, and mitigating risks to protect organizational assets and data integrity. Meanwhile, common approaches to vendor risk assessments are too slow and static for the modern world of SaaS. Most organizations have simply adapted their legacy evaluation techniques for on-premise software to apply to SaaS providers. This not only creates massive bottlenecks, but also causes organizations to inadvertently accept far too much risk. To effectively adapt to the realities of modern work, two major aspects need to change: the timeline of initial assessment must shorte
Trinity Campus college's website hacked by RdH0X

Trinity Campus college's website hacked by RdH0X

May 01, 2011
Trinity Campus college 's website hacked by RdH0X Trinity Campus college's website hacked and the vulnerabilities reported to the admins and system administrators of the institute. College authority is involving me in their team so as to take adequate steps to secure the website. HACKED SITE :  https://www.trinitycampus.in/uploads/RdH0X_tnt.htm
cyber security

Automated remediation solutions are crucial for security

websiteWing SecurityShadow IT / SaaS Security
Especially when it comes to securing employees' SaaS usage, don't settle for a longer to-do list. Auto-remediation is key to achieving SaaS security.
The PSN hackers logs fresh from EFNET IRC Server !

The PSN hackers logs fresh from EFNET IRC Server !

May 01, 2011
The PSN hackers logs fresh from EFNET IRC Server ! Logs of PS Hackers :  https://173.255.232.215/logs/efnet/ps3dev/2011-02-16 Alternate Link For Logs :  https://pastebin.com/yXP7TDJ3 All Logs from EFNET IRC Server : https://173.255.232.215/logs/efnet/ps3dev/ IRC server Stats :  https://173.255.232.215/logs/efnet/ps3dev/stats
Anonymous Vs Sony : Word By Word Q/A b/w Reporters and Sony during Conference !

Anonymous Vs Sony : Word By Word Q/A b/w Reporters and Sony during Conference !

May 01, 2011
Anonymous Vs Sony : Word By Word Q/A b/w Reporters and Sony during Conference ! Q. The accuracy of approximately 10 million credit flow A. There is no firm evidence of leakage. Cannot say wether a leak or not. There is no report so far. Q. prospect of resuming services. A. We want to restart the service country/region base. Basically approx within a week schedule. (a week from today?.. previously we heard about same "a week matter..) Q. How was it the effect to the business so far? A. Cannot tell it yet, many things to handle one at the time. Q. What was the condition when you firstly sense the trouble? A. Hacking with the high skill technique was undergoing, was confirmed. But we still dont know data was stolen / taken Q. Why did you announce privacy data was stolen then? A. The possibility existed, what/when/how was it still under investigation. account numbers is between 7700000 to 7800000 accounts plus there are double accounts. Q. What was your damage report
Holes in FBI cyber security !!

Holes in FBI cyber security !!

May 01, 2011
About a third of the FBI agents working on cyber investigations lack the networking and counterintelligence expertise to investigate national security intrusions, the Justice Department's inspector general concluded in a new report. The report said the FBI's practice of rotating agents among different offices to promote a variety of work experiences hinders the ability to investigate national security cyber intrusions. The inspector general's audit, based on interviews of 36 agents in 10 offices, emphasized the need for a strong cyber security work force in federal government "is more urgent than ever," said Sen. Susan Collins, the top Republican on the Senate Homeland Security and Governmental Affairs Committee. The FBI has a comprehensive instructional plan in place that includes 12 core courses an agent must take along with on-the-job training. According to the inspector general's report, many agents said training was helpful but that they did not have the time to take the req
Cybersecurity Resources