#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Italian Intelligence agency CNAIPIC steals sensitive data from Indian Embassy

Italian Intelligence agency CNAIPIC steals sensitive data from Indian Embassy

Aug 02, 2011
Italian Intelligence Agency CNAIPIC steals sensitive data from Indian Embassy Sensitive defence information appears to have been stolen from the Indian embassy here by an Italian intelligence agency during the past two years. If the documents released by Anonymous Hackers are to be believed, the Italian cyber police - National Anti-Crime Computer Centre for Critical Infrastructure Protection (CNAIPIC) - was widely hacking Indian embassy's letters with Russian defence firms. Leaked Data which include the letters between the Indian embassy's Air Wing and a local company supplying spares for military aircraft. Izvestia said Italian cyber police had hacked on June 22, 2010 Deputy Air Attache D S Shekhavat's correspondence with Aviazapchast, a company specialising in the supply of aviation spares, complaining about delays in the shipment of 15 helicopter engines. A reply from the Aviazapchast representative in India written on the same day was also hacked by the CNAIPIC
On 4th August SAP systems will be hacked on internet in BlackHat USA 2011

On 4th August SAP systems will be hacked on internet in BlackHat USA 2011

Aug 02, 2011
On 4th August SAP systems will be hacked on internet in BlackHat USA 2011 On the 4th of august at the world largest technical security conference - BlackHat USA 2011, which will take place in Las Vegas, SAP security expert and CTO of ERPScan Alexander Polyakov will show how any malicious attacker can get access to the systems running on SAP via Internet using new critical vulnerability. SAP systems are used in more than 100 000 world companies to handle business-critical data and processes. Almost in each company from Forbes 500 system data are set for the handling of any process beginning from purchasing, human resources and financial reporting and ending with communication with other business systems. Thus receiving an access by the malicious attacker leads to complete control over the financial flow of the company, which can be used for espionage, sabotage and fraudful actions against hacked company. The given attack is possible due to dangerous vulnerability of the new type,
Code Keepers: Mastering Non-Human Identity Management

Code Keepers: Mastering Non-Human Identity Management

Apr 12, 2024DevSecOps / Identity Management
Identities now transcend human boundaries. Within each line of code and every API call lies a non-human identity. These entities act as programmatic access keys, enabling authentication and facilitating interactions among systems and services, which are essential for every API call, database query, or storage account access. As we depend on multi-factor authentication and passwords to safeguard human identities, a pressing question arises: How do we guarantee the security and integrity of these non-human counterparts? How do we authenticate, authorize, and regulate access for entities devoid of life but crucial for the functioning of critical systems? Let's break it down. The challenge Imagine a cloud-native application as a bustling metropolis of tiny neighborhoods known as microservices, all neatly packed into containers. These microservices function akin to diligent worker bees, each diligently performing its designated task, be it processing data, verifying credentials, or
30 China Government Sites Hacked By Hitcher

30 China Government Sites Hacked By Hitcher

Aug 02, 2011
30 China Government Sites Hacked By Hitcher Pakistani Hacker with code name " Hitcher " today hit 30 China Government websites as listed below : Hacker deface all these domains and Mirror of every defacement is available  here .  In past,  LUMS University Database was also Hacked By Hitcher.
cyber security

WATCH: The SaaS Security Challenge in 90 Seconds

websiteAdaptive ShieldSaaS Security / Cyber Threat
Discover how you can overcome the SaaS security challenge by securing your entire SaaS stack with SSPM.
Anonymous and Lulzsec stand for Jake Davis with #FreeTopiary Operation

Anonymous and Lulzsec stand for Jake Davis with #FreeTopiary Operation

Aug 01, 2011
Anonymous and Lulzsec stand for Jake Davis with #FreeTopiary Operation Two Days before Accused LulzSec hacker "Topiary" was got arrested and today he released on bail . Jake Davis, an 18-year-old from the Shetland Islands, was released on bail after being charged with five offences relating to computer attacks and break-ins by the LulzSec and Anonymous hacking groups. In his support today all Anonymous and Lulzsec hackers stand together once again with a new operation #FreeTopiary on Twitter. Anonymous Call everyone for Show their support to @atopiary  on IRC Chat . Anonymous also call for Anonymous Legal Help also. Quotes from Various Supporters : 1.) FreeTopiary an idea is the seed of human kind. 2.) Make no mistake, Topiary is a political prisoner. 3.) I love how kids are the ones showing multimillion/billion security companies how insecure they are... 4.) You cannot arrest an idea. UPDATE : Press Release for Opearation #FreeTopiary On an historical day
Another Government contractor - PCS Consultants (USA) got Hacked by #Antisec

Another Government contractor - PCS Consultants (USA) got Hacked by #Antisec

Aug 01, 2011
Another Government contractor - PCS Consultants (USA) got Hacked Another Government contractor - PCS Consultants (USA) got hacked by Anonymous Hackers & #Antisec operation Hackers. Database of website has been extracted and leaked on internet via tweeter on Pastebin .The leaked Data extracted Includes Admin's and 110 users emails, passwords in encrypted hashes. According to PCS website " PCS Consultants, Inc is a full-service Human Resources and Risk Management Compliance Company, offering support in recruitment and internal placement, position classification, employee relations, OSHA compliance programs, worker's compensation administration, and training for a variety of HR/Safety and EEO-related subjects.Providing support to all levels of government, our team of consultants are carefully selected to ensure they have the necessary knowledge and understanding of relevant Public Sector Acts and Standards and high level oral and written communication skills, excell
Accused LulzSec hacker Topiary released on bail

Accused LulzSec hacker Topiary released on bail

Aug 01, 2011
Accused LulzSec hacker Topiary released on bail Jake Davis, an 18-year-old from the Shetland Islands, was released on bail after being charged with five offences relating to computer attacks and break-ins by the LulzSec and Anonymous hacking groups. Davis was granted bail to stay with his mother at their new home in Spalding, Lincolnshire, on condition that he does not access the internet either directly or through anyone else. He also has to wear a tag to ensure a 10pm to 7am curfew. Davis, whom police believe used the online nickname " Topiary " and was a member of the LulzSec and Anonymous hacking groups, was arrested at 2.10pm last Wednesday in Mid Yell, an northern island of the Shetlands. Jake Davis allegedly had the login passwords of 750,000 people on his computer. He was charged on Sunday night with offences under the Computer Misuse Act, the Serious Crime Act, and the Criminal Law Act. Davis is accused of gathering data from National Health Service computers,
Cybersecurity Resources