#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

BSNL System Hacked by Pakistan Cyber Army - Users info at risk

BSNL System Hacked by Pakistan Cyber Army - Users info at risk

Jul 26, 2011
BSNL System Hacked by Pakistan Cyber Army - Users info at risk Pakistan Cyber Army claims to hack the BSNL (Bharat Sanchar Nigam Ltd.- India's No. 1 Telecommunications Company)10,000 User information like name, email, phone number and location & BSNL's internal working of VPN ,detail of circuits and as well as more technical details. More Screenshots: Source: Email from PCA
Operation Intifada: Anonymous Prepares For DDOS Attack On Israel Parliament

Operation Intifada: Anonymous Prepares For DDOS Attack On Israel Parliament

Jul 26, 2011
Operation Intifada: Anonymous Prepares For DDOS Attack On Israel Parliament The latest target of Operation Anonymous, which following the dissolution of LulzSec is the last substantial non-amorphous hacker collective left out there, could lead to some substantial geopolitical fallout. That is because the target of the just announced upcoming DDOS attack is none other than the Israeli Parliament, the Knesset, and while Israel has allegedly been happy to dispense hack attacks in the past, the onslaught on the Iranian nuclear power plant courtesy of the Stuxnet virus coming to mind, we doubt it will as happy to be seen on the receiving end of decentralized computer warfare.
Recover from Ransomware in 5 Minutes—We will Teach You How!

Recover from Ransomware in 5 Minutes—We will Teach You How!

Apr 18, 2024Cyber Resilience / Data Protection
Super Low RPO with Continuous Data Protection: Dial Back to Just Seconds Before an Attack Zerto , a Hewlett Packard Enterprise company, can help you detect and recover from ransomware in near real-time. This solution leverages continuous data protection (CDP) to ensure all workloads have the lowest recovery point objective (RPO) possible. The most valuable thing about CDP is that it does not use snapshots, agents, or any other periodic data protection methodology. Zerto has no impact on production workloads and can achieve RPOs in the region of 5-15 seconds across thousands of virtual machines simultaneously. For example, the environment in the image below has nearly 1,000 VMs being protected with an average RPO of just six seconds! Application-Centric Protection: Group Your VMs to Gain Application-Level Control   You can protect your VMs with the Zerto application-centric approach using Virtual Protection Groups (VPGs). This logical grouping of VMs ensures that your whole applica
OSForensics – Digital investigations faster

OSForensics – Digital investigations faster

Jul 26, 2011
OSForensics – Digital investigations faster Here there is a new utility called OSForensics, currently it is freely available that I found very useful for conducting a computer forensics. OSForensics can retrieve data about recently accessed applications, documents, media and network shares by scanning locations in the registry which store a user's Most Recently Used (MRU) lists. The data which can be tracked by OSForensics includes files accessed in Microsoft Office applications, Microsoft Wordpad, Microsoft Paint, Microsoft Media Player, Windows Search, Connected Network Drives and the Windows Run command. Read More Here Download OSForensics 
cyber security

Today's Top 4 Identity Threat Exposures: Where To Find Them and How To Stop Them

websiteSilverfortIdentity Protection / Attack Surface
Explore the first ever threat report 100% focused on the prevalence of identity security gaps you may not be aware of.
90000 web pages infected by mass iFrame attack

90000 web pages infected by mass iFrame attack

Jul 26, 2011
90000 web pages infected by mass iFrame attack Security Experts Wayne Huang, Chris Hsiao, NightCola Lin discovered that more than 90000 web pages are infected by mass iFrame attack. There's been a mass scale injection ongoing recently, with the injected iframe pointing to willysy.com . Just Try a simple Google Search to find out the facts. Video Demonstration: Researchers at Armorize said the injected scripts redirect users to malicious Web domains that is launching attacks targeting known vulnerabilities in Java, Adobe's PDF, Microsoft's Internet Explorer and other common platforms, according to the report by Armorize experts Wayne Huang, Chris Hsiao and NightCola Lin. The campaign is targeting online commerce sites, the researchers found. Read more at Source .
Change.Gov Donor List 2010 leaked by #Antisec

Change.Gov Donor List 2010 leaked by #Antisec

Jul 26, 2011
Change.Gov Donor List 2010 leaked by #Antisec Anonymous Hackers today leak the list of 60804 Donors to Change.Gov via Twitter tweets. The list is uploaded on Mediafire Link . The data contains the Name, Employee,City, State, Zip and Donated Amount in a CSV file. Yesterday 300 Military and Government Accounts leaked by P0keu and  CNAIPIC - Italian government hacked by #Antisec , Various Confidential documents leaked.
Anonymous ,LulzSec & Stuxnet nominated for Pwnie Awards 2011 for Epic 0wnage

Anonymous ,LulzSec & Stuxnet nominated for Pwnie Awards 2011 for Epic 0wnage

Jul 25, 2011
Anonymous , LulzSec & Stuxnet nominated for Pwnie Awards 2011 for Epic 0wnage The nominees for the Pwnie Awards 2011 are finally selected today. Anonymous are nominated for hacking HBGary , LulzSec for hacking everyone & Stuxnet also nominated in  Epic 0wnage. More Details on Nominations Read Here Next week the judges will gather at an undisclosed location and vote on the winners, who will be announced during the awards ceremony on Aug 3rd in Las Vegas.
300 Military and Government Accounts leaked by P0keu

300 Military and Government Accounts leaked by P0keu

Jul 25, 2011
300 Military and Government Accounts leaked by P0keu In a tweet , P0keu posted a link to PasteBin which appears to be e-mail accounts and passwords of 300 military and government accounts used the same password as their actual e-mails, then the contents of their e-mail account will also be exposed. The PasteBin dump says it contains 290 accounts. A large number of them end in .mil and .gov. Just a point of clarification, this doesn't appear to be actual e-mail accounts and passwords, but rather, a website that uses people's e-mail accounts as a log-in name. So the account to the website is exposed. If the password used with the e-mail is the same as the password for that actual e-mail address, then that e-mail might also be exposed along with who knows what else that is tied to that account. Amongst those accounts that are exposed, there appears to be accounts from the Department of Justice, the FBI, the Deparment of Homeland Security, the NSA, the Pentagon and several others.
Red Hat Enterprise Linux 5.7 Released

Red Hat Enterprise Linux 5.7 Released

Jul 25, 2011
Red Hat Enterprise Linux 5.7 Released Red Hat has updated Enterprise Linux 5.7, which now includes several features from Red Hat Enterprise Linux 6. The operating system processors supports deployments on Intel, AMD, POWER and IBM System z architectures. Highlights of Red Hat Enterprise Linux 5.7 include: Hardware enablement Support for new hardware from Red Hat partners encompassing processors, chipsets and new drivers for storage, networking, and graphics allows Red Hat Enterprise Linux 5 deployments to benefit from new hardware platforms delivered in 2011, including Intel, AMD, POWER and IBM System z. Virtualization improvements Several virtualization enhancements in Red Hat Enterprise Linux 5.7 include improved migration performance for KVM, as well as several performance and scalability improvements for the Xen hypervisor. SCAP support OpenSCAP introduces support for the Security Content Automation Protocol, including a library and set of utilities, giving a stan
CNAIPIC - Italian government hacked by #Antisec , Various Confidential documents leaked

CNAIPIC - Italian government hacked by #Antisec , Various Confidential documents leaked

Jul 25, 2011
CNAIPIC  - Italian government hacked by Antisec , Various Confidential documents leaked CNAIPIC - Centro Nazionale Anticrimine Informatico per la Protezione delle Infrastrutture Critiche /National Anti-Crime Computer Centre for Critical Infrastructure Protection hacked by Anonymous Hackers for Antisec Operation. Various Documents has been leaked via a pastebin message .  Message By Hackers on Pastebin : Heynow, This is a prerelease of a series we are going to make to reveal the biggest in history of European LE cyber operation Evidence exploitation and abuse. Thing's gonna get published and twittered all over anonymous and lulzsec community. Today we were granted with the Italian law enforcement Pandora box, we really think it shall be a new era of "regreaissance" to the almighty Homeland Security Cyber Operation Unit in EU. So we decided to leak everything they got since they were established as a full scale cyber taskforce named CNAIPIC. This corrupted organizatio
VirtualBox 4.1 Final for Linux Released

VirtualBox 4.1 Final for Linux Released

Jul 25, 2011
VirtualBox 4.1 Final for Linux Released VirtualBox is a general-purpose full virtualizer for x86 hardware, targeted at server, desktop and embedded use. This version is a major update. The following major new features were added: Support for cloning of VMs (bug #5853, see the manual for more information): full clones can be created through the GUI and VBoxManage, linked clones only through VBoxManage GUI: enhanced wizard for creating new virtual disks GUI: new wizard for copying virtual disks GUI: keep the aspect ratio in scale mode (Windows and OSX hosts only; bug #7822) VMM: raised the memory limit for 64-bit hosts to 1TB Experimental support for PCI passthrough for Linux hosts, see the manual for more information Windows guests: Experimental WDDM graphics driver, supporting Windows Aero (bug #4607) and providing Direct3D support using a cleaner approach (no need to install the guest drivers in Safe Mode anymore) Guest Additions: status of modules and features can now be
Cybersecurity Resources