#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Insider Risk Management

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Danish Government database of 1,000,000 companies private info leaked by #Antisec

Danish Government database of 1,000,000 companies private info leaked by #Antisec

Aug 21, 2011
Danish Government database of 1,000,000 companies private info leaked by #Antisec Anonymous Hackers upload a file on Torrent contain of the snapshot the the Danish Government database of companies. The contents of the database is currently browsable on the cvr.dk website, but the database is not available in bulk unless you purchase a license. The snapshot was obtained during the summer of 2011 by systematically harvesting data from the public parts of the cvr.dk website. The Leak Include : CVRfull.zip : Archive containing xml files with company information, including html from cvr.dk CVRCompact: As above, but without html cvr: CVR-number (8-digit unique id, last digit is a checksum) corporationtype: Integer denoting type of company incorporated: Date of registration dissolved: Date of dissolution, if dissolved industry: Code of the company main areas of business documentcontent: Html of company page from cvr.dk (minus header and footer) The other fields are nam
350,000 Epson Korea customers data breached

350,000 Epson Korea customers data breached

Aug 21, 2011
350,000 Epson Korea customers data breached Epson Korea Co., Ltd. said that hackers had breached the personal data of its 350,000 registered customers last week. An official at the South Korean affiliate of Seiko Epson Corp. said the company has reported the case to the communications regulator. It said personal information, including phone numbers, email addresses, names and coded data of customers registered on its website had been compromised. " We are still investigating the case and tracking down the attackers, " said the official, who declined to be named. Late last month, hackers who the state-run Korea Communications Commission alleged were from China attacked the Nate Internet portal and the Cyworld blogging site, both run by SK Comms, accessing the personal information of up to 35 million users in the country's biggest cyber attack so far.
Nepal Telecommunications Authority Hacked by w3bd3f4c3r

Nepal Telecommunications Authority Hacked by w3bd3f4c3r

Aug 21, 2011
Nepal Telecommunications Authority Hacked by w3bd3f4c3r Hacker with name "w3bd3f4c3r" or "T34mT!g3R" today hack into the Nepal Telecommunications Authority website using SQL injection Vulnerability. The Vulnerability Information and screenshot is posted by hacker on pastebin : The Leaked info include the various database and tables of Nepal Telecommunications Authority website and Administrator password in Hashes as shown below:
cyber security

Want to Bolster Your CI/CD Pipeline?

websiteWizSecurity Auditing / Container Security
This cheat sheet covers best practices with actionable items in Infrastructure security, code security, secrets management, access and authentication, and monitoring and response.
How to Make Your Employees Your First Line of Cyber Defense

How to Make Your Employees Your First Line of Cyber Defense

May 01, 2024Security Awareness Training
There's a natural human desire to avoid threatening scenarios. The irony, of course, is if you hope to attain any semblance of security, you've got to remain prepared to confront those very same threats. As a decision-maker for your organization, you know this well. But no matter how many experts or trusted cybersecurity tools your organization has a standing guard, you're only as secure as your weakest link. There's still one group that can inadvertently open the gates to unwanted threat actors—your own people. Security must be second nature for your first line of defense For your organization to thrive, you need capable employees. After all, they're your source for great ideas, innovation, and ingenuity. However, they're also human. And humans are fallible. Hackers understand no one is perfect, and that's precisely what they seek to exploit. This is why your people must become your first line of defense against cyber threats. But to do so, they need to learn how to defend thems
Skype zero day HTML/(Javascript) code injection

Skype zero day HTML/(Javascript) code injection

Aug 21, 2011
Skype zero day HTML/(Javascript) code injection Noptri Public Security Advisory has publised a working skype zero day vulnerability with POC for skype. Skype users need be aware of this vulnerability. Affected Software: Software: Skype <= 5.5.0.113 Affected Platforms: Windows (XP, Vista, 7) Problem Description: Skype suffers from a persistent code injection vulnerability due to a lack of input validation and output sanitization of following profile entries:     [+] home     [+] office     [+] mobile Proof of Concept: The following HTML codes can be used to trigger the described vulnerability: --- SNIP ---     [+] Home Phone Number:     <b>INJECTION HERE</b>     [+] Office Phone Number:     <center><i>INJECTION HERE</i></center>     [+] Mobile Phone Number:     <a href="#">INJECTION HERE</a> Impact: An attacker could for example inject HTML/Javascript code. It has not been verified though, if it's po
Libya Registry & Telecom websites hacked by Electr0n

Libya Registry & Telecom websites hacked by Electr0n

Aug 21, 2011
Libya Registry & Telecom websites hacked by Electr0n A Hacker with codename " Electr0n " has deface the two Important websites of Libya. One is Domain Registry website and Other one is Telecom Website . Both sites had same deface page as shown above. You can check cache link here . Its not confirm that  Electr0n is in support of Anonymous or not, But According to Defacement page, the hack is performed for some other reason, rather than operation Libya by Anonymous.
Cybersecurity
Expert Insights
Cybersecurity Resources