#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Insider Risk Management

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

VirtualBox 4.1 Final for Linux Released

VirtualBox 4.1 Final for Linux Released

Jul 25, 2011
VirtualBox 4.1 Final for Linux Released VirtualBox is a general-purpose full virtualizer for x86 hardware, targeted at server, desktop and embedded use. This version is a major update. The following major new features were added: Support for cloning of VMs (bug #5853, see the manual for more information): full clones can be created through the GUI and VBoxManage, linked clones only through VBoxManage GUI: enhanced wizard for creating new virtual disks GUI: new wizard for copying virtual disks GUI: keep the aspect ratio in scale mode (Windows and OSX hosts only; bug #7822) VMM: raised the memory limit for 64-bit hosts to 1TB Experimental support for PCI passthrough for Linux hosts, see the manual for more information Windows guests: Experimental WDDM graphics driver, supporting Windows Aero (bug #4607) and providing Direct3D support using a cleaner approach (no need to install the guest drivers in Safe Mode anymore) Guest Additions: status of modules and features can now be
Ani Shell v1.3 Released -- Mail Bomber (with less spam detection) & PHP Decoder

Ani Shell v1.3 Released -- Mail Bomber (with less spam detection) & PHP Decoder

Jul 24, 2011
Ani Shell v1.3 Released -- Mail Bomber (with less spam detection) & PHP Decoder Introduction Ani-Shell is a simple PHP shell with some unique features like Mass Mailer , A simple Web-Server Fuzzer , DDoser, Back Connect , Bind Shell etc etc ! This shell has immense capabilities and have been written with some coding standards in mind for better editing and customization. Customisation 1. Email Trace back is set to Off as default and emails will not be sent , If you are setting this feature on make sure you change the default email address (lionaneesh@gmail.com) to Your email address , Please Change it before using. 2. Username and Passwords are set to lionaneesh and lionaneesh respectively , Please change them for better security. 3. As a default Lock Mode is set to on! This should not be change unless you want your shell exposed. Default Login Username : lionaneesh Password : lionaneesh Features Shell Platform Independent Mass - Mailer Small Web-Server Fuzz
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Apr 29, 2024Exposure Management / Attack Surface
It comes as no surprise that today's cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics that attackers use demand the adoption of better, more holistic and consolidated ways to meet this non-stop challenge. Security teams constantly look for ways to reduce risk while improving security posture, but many approaches offer piecemeal solutions – zeroing in on one particular element of the evolving threat landscape challenge – missing the forest for the trees.  In the last few years, Exposure Management has become known as a comprehensive way of reigning in the chaos, giving organizations a true fighting chance to reduce risk and improve posture. In this article I'll cover what Exposure Management is, how it stacks up against some alternative approaches and why building an Exposure Management program should be on  your 2024 to-do list. What is Exposure Management?  Exposure Management is the systematic identification, evaluation,
Mallika Sherawat official website Defaced by KFMDD Teams Hackers

Mallika Sherawat official website Defaced by KFMDD Teams Hackers

Jul 24, 2011
Mallika Sherawat official website Defaced by KFMDD Teams Hackers Bollywood Star - Mallika Sherawat official website  mallikasherawatwow.com   get defaced by an Indian hacker " KFMDD Teams " . Hacker put " Tiranga " on the deface page as shown.
cyber security

SaaS Security Buyers Guide

websiteAppOmniSaaS Security / Threat Detection
This guide captures the definitive criteria for choosing the right SaaS Security Posture Management (SSPM) vendor.
Philippines Congress hacked by BashCrew for #AntiSec

Philippines Congress hacked by BashCrew for #AntiSec

Jul 24, 2011
Philippines Congress hacked by BashCrew for #AntiSec The Philippians Goverment has become the latest target in the #antisec operation with a hacker crew known by BashCrew , Congress.gov.ph being hacked and having some data leaked . The leak has personal information, emails, contact numbers etc via pastebin link .
Colombian Anonymous Hackers reveal personal data of Colombian police officials

Colombian Anonymous Hackers reveal personal data of Colombian police officials

Jul 24, 2011
Colombian Anonymous Hackers reveal personal data of Colombian police officials Colombian Anonymous Hackers announced that they had sent spam bombs to some 250 officials of Colombia's national Police ( https://colombiareports.com ) and revealed personal data of employees of the National Police inviting the public to harass the officials Here . In a statement published online, the hackers thanked the National Police " for keeping us submitted and trampled. " In the same statement, the group " Colombian Hackers " released personal information on hundreds of police officials, some with home addresses and identification numbers. Colombia Wednesday celebrated its 201st anniversary of its declaration of independence of Spain. The hackers had announced an independence offensive the day before.
English Defence League Facebook Page Deleted & Members Mobile Numbers Leaked

English Defence League Facebook Page Deleted & Members Mobile Numbers Leaked

Jul 24, 2011
English Defence League Facebook Page Deleted & Members Mobile Numbers Leaked TeaMp0isoN Hacking Crew Hack and Delete Official Facebook page of English Defence League was on  https://www.facebook.com/English.Defence.League.EDL  . Also  TeaMp0isoN Leaks the Phone numbers of Members of  English Defence League  via a pastie link . Screenshot of the Numbers are shown below :
Wireshark 1.6.1 and 1.4.8 Released

Wireshark 1.6.1 and 1.4.8 Released

Jul 23, 2011
Wireshark 1.6.1 and 1.4.8 Released Wireshark 1.6.1 and 1.4.8 have been released. Installers for Windows, Mac OS X 10.5.5 and above (Intel and PPC), and source code are now available. In 1.6.1 Two vulnerabilities have been fixed. See the advisory for details . Many other bugs have been fixed. For a complete list of changes, please refer to the 1.6.1 release notes . In 1.4.8 Two vulnerabilities have been fixed. See the advisory for details . Many other bugs have been fixed. For a complete list of changes, please refer to the 1.4.8 release notes . Official releases download page
Android Passwords are stored in plain text on Disk

Android Passwords are stored in plain text on Disk

Jul 23, 2011
Android Passwords are stored in plain text on Disk A Android user complain that , All passwords are stored in plane text on Disk via a message on discussion board of Android. He said " The password for email accounts is stored into the SQLite DB which in turn stores it on the phone's file system in plain text.Encrypting or at least transforming the password would be desirable. " On this Android Support "Andy Stadler" Reply that : Hello- Thanks for the information and the feedback on this concern. First, I would like to reiterate the notes made by a couple of you, which is to remind users that if you are concerned about this issue, *please* simply click the star. Every time you respond "please fix" or "should be fixed!" it sends email to over 200 people. Second, please know that we take information security very seriously, and this is baked into the Android platform at multiple levels. Now, with respect to this particular
Apple MacBooks Can Be Hacked Through The Battery

Apple MacBooks Can Be Hacked Through The Battery

Jul 23, 2011
Apple MacBooks Can Be Hacked Through The Battery Security researcher Charlie Miller is quite well known for his works on Apple products. Today he has come up with a very interesting way to hack the MacBook using the battery. Laptop battery contains its own monitoring circuit which reports the status of the battery to the OS. It also ensure that the battery does not overcharge even when the laptop is turned off. Miller has discovered that on the MacBooks, the batteries are shipped with the default password set on the chips. It means that if someone knows the default password, the firmware of the battery can be controlled to do many things from simply ruining the battery to installing a malware which reinstalls whenever the OS boots. Miller said that it might even be possible to overload the battery so that it catches fire. This is what Miller said: These batteries just aren't designed with the idea that people will mess with them. What I'm showing is that it's possible to use the
Expert Insights
Cybersecurity Resources