#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Persistent XSS vulnerability in eBuddy Web Messenger

Persistent XSS vulnerability in eBuddy Web Messenger

Sep 02, 2011
Persistent XSS vulnerability in eBuddy Web Messenger A team member from Virtual Luminous Security , Russian Federation, has discovered a persistent XSS vulnerability in eBuddy (the biggest web IM solution in the world) by transmitting messages with embedded encoded javascript code. In-depth detail eBuddy Web Messenger suffers from an encoded-Persistent XSS vulnerability in the messaging function. (while sendingA message with embedded code to another authorized user in eBuddy WebMessenger). Exploit example Plain XSS (Not going to store, nor execute) <script>alert('eBuddy Persistent XSS');</script> Encoded text=%3Cscript%3Ealert%28'eBuddy%20Persistent%20XSS'%29%3C/script%3E [*] The attacker sends the encoded embedded code in an IM message. [*] The victim receives the message with the encoded embedded code and it executes on the victims browser.
The Hacker News Magazine September Issue - NO ONE IS SECURE

The Hacker News Magazine September Issue - NO ONE IS SECURE

Sep 01, 2011
The Hacker News Magazine September Issue - NO ONE IS SECURE Well folks, after this issue and the obvious intensity of the insecurity of the net, I have a few thoughts on the unfettered access to knowledge. It is more than apparent we all live in a time where the extensive dissemination of opinions, thoughts and ideas and information are done through a modern method of transmission. The simplicity and effectiveness by which computers and networks are used to assemble, store, search, associate, recover, and share information make computer technology especially risky to anyone who wishes to keep personal or protect information from the public sphere or out of the clutches of anyone who is perceived as a probable threat. As this issues explores, the evolving and more advanced capabilities of computer viruses, phishing, fraud schemes, spyware, and hacking activity springing up from every corner of the globe and the diversity of privacy-related issues engendered by computer technology h
Code Keepers: Mastering Non-Human Identity Management

Code Keepers: Mastering Non-Human Identity Management

Apr 12, 2024DevSecOps / Identity Management
Identities now transcend human boundaries. Within each line of code and every API call lies a non-human identity. These entities act as programmatic access keys, enabling authentication and facilitating interactions among systems and services, which are essential for every API call, database query, or storage account access. As we depend on multi-factor authentication and passwords to safeguard human identities, a pressing question arises: How do we guarantee the security and integrity of these non-human counterparts? How do we authenticate, authorize, and regulate access for entities devoid of life but crucial for the functioning of critical systems? Let's break it down. The challenge Imagine a cloud-native application as a bustling metropolis of tiny neighborhoods known as microservices, all neatly packed into containers. These microservices function akin to diligent worker bees, each diligently performing its designated task, be it processing data, verifying credentials, or
Two Suspected Anonymous/LulzSec hackers arrested by British police

Two Suspected Anonymous/LulzSec hackers arrested by British police

Sep 01, 2011
Two Suspected Anonymous/LulzSec hackers arrested by British police Officers from the Metropolitan Police Service's Central e-Crime Unit (PCeU) have today, 1 September, arrested two men for conspiring to commit offences under the Computer Misuse Act 1990. Two men, aged 20 and 24, have been arrested by British police in connection with Anonymous and LulzSec Members. The men were arrested separately at addresses in Mexborough, Doncaster, South Yorkshire and Warminster, Wiltshire. The Doncaster address was searched by police and computer equipment was removed for forensic examination. Kayla, alongside the likes of Sabu, Topiary and Tflow is considered to be one of the key figures in the LulzSec hacking gang. DI Mark Raymond from the PCeU said: " The arrests relate to our enquiries into a series of serious computer intrusions and online denial-of-service attacks recently suffered by a number of multi-national companies, public institutions and government and law enforcement
cyber security

WATCH: The SaaS Security Challenge in 90 Seconds

websiteAdaptive ShieldSaaS Security / Cyber Threat
Discover how you can overcome the SaaS security challenge by securing your entire SaaS stack with SSPM.
EA Game - Battlefield Heroes Accounts Hacked by 'Why So Serious?' Albanian Hacker

EA Game - Battlefield Heroes Accounts Hacked by 'Why So Serious?' Albanian Hacker

Sep 01, 2011
EA Game - Battlefield Heroes Accounts Hacked by ' Why So Serious? ' Albanian Hacker One of the most famous games over the world Battlefield Heroes which is created by EA Games is hacked by a new hacker named " Why So Serious? ". The hacker is from Albania. He made a post on Battlefield Heroes site & said: " Hello all Players and Admins. I'm Why So Serious?. Today I hacked some Battlefield Heroes accounts. I'm going to post them on this forum and on my Fan Page on Facebook: Why So Serious? . " Hacker Leaks the User Login passwords on pastebin from Battlefield Site. Hacker claim that he will hack another EA Games accounts and Jagex Games accounts and will post those accounts also today. Hacker also have a facebook page , where he publish the hack details. Hacked Website:  https://www.battlefieldheroes.com/
Texas law enforcement Hacked by #Antisec and #FreeAnons - 3GB of data leaked

Texas law enforcement Hacked by #Antisec and #FreeAnons - 3GB of data leaked

Sep 01, 2011
Texas law enforcement Hacked by #Antisec and  #FreeAnons  - 3GB of data leaked Texas Police Chiefs Association Website hacked by Anonymous Hackers for Antisec Operation. Hacker deface their website and post 3GB of data on it with Message " In retaliation for the arrests of dozens of alleged Anonymous suspects, weopened fire on dozens of Texas police departments and stole boatloads ofclassified police documents and police chief emails across the state. During theSan Jose courtdate we defaced and gave out live backdoor and admin access to thewebsite TexasPoliceChiefs.org while allied ships launched ddos attacks uponJustice.gov and other law enforcement websites. " Complete Message  here . All this done for #FreeAnons  Campaign. Texas law enforcement agencies (LEA), and includes the emails and personal information for 28 police chiefs posted here . The leaked messages are said to contain Internal Affairs related case details, as well as pornographic materials, anti-immigrant
Cybersecurity Resources