#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Sony 12th time Hacked : Database of Application Store at Sony Europe Leaked !

Sony 12th time Hacked : Database of Application Store at Sony Europe Leaked !

Jun 04, 2011
Sony 12th time Hacked : Database of Application Store at Sony Europe Leaked ! Okay ! The Idahc - Lebanese hacker is back to hit Sony. This time he claim to hack the Database of Application Store at Sony Europe  https://apps.pro.sony.eu/ . A new day, A new surprise for Sony ! Yesterday, Sony Pictures hacked and Database Leaked by LulzSec . Last time Sony Ericsson Got Hacked by Idahc - Lebanese hacker ,  Read Here .  The attack is same using SQL injection , Here the Proof : The data extracted by hacker have 120 users data , as posted on a public text sharing site Pastebin.com .
ACER Hacked : 40,000 Users Data, Source Codes & Server Compromised

ACER Hacked : 40,000 Users Data, Source Codes & Server Compromised

Jun 03, 2011
ACER Hacked : 40,000 Users Data, Source Codes & Server Compromised Update :  THN Report : ACER hacked because of their own stupidity This Week is Really with great UP-DOWNS in Cyber World. Mega hacks like  Sony Pictures hacked ,  Chinese Hacker Cracks 100's of Gmail accounts   , Public Broadcasting Service (PBS) Hacked , 10,000 E-mails of Iranian Government Leaked ,etc etc and lots more... Now here we have the latest Report on Huge Data breach at Server of ACER ( Europe )  acer-euro.com by well know hacking Group " Pakistan Cyber Army ". We got mail from PCA that they successfully hacked the FTP of ACER and Stole around 40,000 Users Data , Various Source Codes stored on server. For the Proof PCA provide some Screenshots of Hack : 1.) User data copied from server   2.) FTP Access on acer-euro.com   3.) 40,000 Customers data Country Wise Here is a  glimpse of  Source code Stealed : Project("{E24C65DC-7377-472B-9ABA-BC803B73C61A}") =
Recover from Ransomware in 5 Minutes—We will Teach You How!

Recover from Ransomware in 5 Minutes—We will Teach You How!

Apr 18, 2024Cyber Resilience / Data Protection
Super Low RPO with Continuous Data Protection: Dial Back to Just Seconds Before an Attack Zerto , a Hewlett Packard Enterprise company, can help you detect and recover from ransomware in near real-time. This solution leverages continuous data protection (CDP) to ensure all workloads have the lowest recovery point objective (RPO) possible. The most valuable thing about CDP is that it does not use snapshots, agents, or any other periodic data protection methodology. Zerto has no impact on production workloads and can achieve RPOs in the region of 5-15 seconds across thousands of virtual machines simultaneously. For example, the environment in the image below has nearly 1,000 VMs being protected with an average RPO of just six seconds! Application-Centric Protection: Group Your VMs to Gain Application-Level Control   You can protect your VMs with the Zerto application-centric approach using Virtual Protection Groups (VPGs). This logical grouping of VMs ensures that your whole applica
Hackers stole classified information from two Canadian ministries

Hackers stole classified information from two Canadian ministries

Jun 03, 2011
Hackers stole classified information from two Canadian ministries The hackers sent e-mails to staff that seemed to come from senior managers, the Canadian Broadcasting Corp. reported. When recipients opened the attachments, the hackers got a path into the federal network. Stockwell Day, then the Treasury Board president, told the CBC Thursday he was not told of the breach. "Certainly, on the information that I got, I had full confidence that the systems had moved quickly to shut down, that significant information had not in fact been carried away, and that the ongoing assessment of that by the technicians continues," he said. The Department of Finance and the Treasury Board were still restricting Internet access for their workers Thursday. The agencies now have separate computer stations disconnected from the main government network. A secret May 2010 memo from Canada's spy agency warned that cyberattacks on government, university and industry computers were gro
cyber security

Today's Top 4 Identity Threat Exposures: Where To Find Them and How To Stop Them

websiteSilverfortIdentity Protection / Attack Surface
Explore the first ever threat report 100% focused on the prevalence of identity security gaps you may not be aware of.
Anonymous Leaks 10,000 E-mails of Iranian Government

Anonymous Leaks 10,000 E-mails of Iranian Government

Jun 03, 2011
Anonymous Leaks 10,000 E-mails of Iranian Government A collection of 10,365 e-mails of the Iranian government were leaked by Anonymous OpIran on June 2, 2011. According to members of Anonymous the files were taken after the hacker accessed the Iranian Passport and Visa Office email center. These files consist mostly of the Iranian government alerting individuals of their visa application status. According to a member of Anonymous, the files were aimed more to damage the image of Iran in " both cyber space and the real world. " The 63 mb file was released quietly by Anonymous. It was posted to file-sharing websites across the Internet. Download The File and Rar password is :  opiranopiran
Chinese hackers having aim to Spying on U.S. Govt

Chinese hackers having aim to Spying on U.S. Govt

Jun 03, 2011
Chinese hackers having aim to Spying on U.S. Govt It's the second time Google has blamed a major computer hacking scheme on China . On 1st of June we have Reported that :  Chinese Hacker Cracks Hundreds of Gmail Accounts of U.S. & Asia .  This time Google says unknown hackers from Jinan, China, a city with a military command center, stole the personal Gmail passwords of hundreds of senior U.S .government officials. Google said the hackers' "goal" was to eavesdrop on the officials  "to monitor the content of the users' emails." The hackers did not steal any government-owned emails, but U.S. officials who work at home frequently use Gmail to do government business. White House teams often use Gmail to communicate where and when the President might travel. The risk is growing that too much secure information is being sent on non-secure systems. FBI is now investigating and this new revelation of hacking is adding heat to the growing frict
Sony Pictures hacked and Database Leaked by LulzSec

Sony Pictures hacked and Database Leaked by LulzSec

Jun 02, 2011
Sony Pictures hacked and Database Leaked by LulzSec YES ! Sony Hacked Again once more by Lulzsec. The Target is  SonyPictures.com and It compromised over 1,000,000 users'personal information, including passwords, email addresses, home addresses,dates of birth, and all Sony opt-in data associated with their accounts.Also compromised all admin details of Sony Pictures(including passwords) along with 75,000 "music codes" and 3.5 million "music coupons". SonyPictures.com was hacked by a very simple SQL injection , one of the most primitive and common vulnerabilities.From a single injection, They accessed whole database.  The worst thing is Sony stored over 1,000,000 passwords of its customers in plaintext, No md5 OR other type of Encryption. The Leaked Data included databases from Sony BMG Belgium & Netherlands .These also contain varied assortments of Sony user and staffer information. Message By Lulzsec: Our goal here is not to come across as m
Cybersecurity Resources