#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

HDFC Bank Database Hacked by zSecure team using SQL injection vulnerability

HDFC Bank Database Hacked by zSecure team using SQL injection vulnerability

Sep 02, 2011
HDFC Bank Database Hacked by zSecure team using SQL injection vulnerability zSecure team is back in news again, this time they have discovered a critical SQL injection vulnerability in HDFC Bank's Web Portal. Using this critical flaw HDFC Bank's various databases can be accessed and dumped as well. This critical flaw really affects the customer realtions of HDFC Bank's and this really questions the existing security in place within bank. HDFC Bank is the leading bank in India but they lack behind the basic security that needs to be implemented. zSecure team claimed in their blog post that even after sending them complete details about the vulnerability and even after conducting the vulnerability assessment from the third party service provider they were not able to discover this critical falw which existed in their web portal. This really raises a big question on their existing security policy. What would have happened if somone else would have gained acceess to this c
Anonymous Release Press Release for Operation Tarmageddon

Anonymous Release Press Release for Operation Tarmageddon

Sep 02, 2011
Anonymous Release Press Release for Operation Tarmageddon Early in July, Anonymous said it planned to attack oil firms and banks supporting the controversial extraction of oil from sand in Alberta, Canada. Exxon Mobil, ConocoPhillips, Canadian Oil Sands, Imperial Oil, and the Royal Bank of Scotland have been put on notice that they are likely to be targeted in Anonymous' latest operation, dubbed Project Tarmageddon. Complete Press Release : Early in July, deep below the radar of the Tar Sands Oil Industry, Anonymous and GreenSec boarded the LulzSub and began a journey of environmental justice. This journey had only one endpoint: success. With all the attention Anonymous recently had received , a sub was the sure choice to ensure maximum impact and minimum damage to the fleet. When Big Brother watches, you go under the surface. All July, we supported a protest against the Tar Sands oil industry, which ended in protesters dancing on the meeting table of the Governor of Montana
Recover from Ransomware in 5 Minutes—We will Teach You How!

Recover from Ransomware in 5 Minutes—We will Teach You How!

Apr 18, 2024Cyber Resilience / Data Protection
Super Low RPO with Continuous Data Protection: Dial Back to Just Seconds Before an Attack Zerto , a Hewlett Packard Enterprise company, can help you detect and recover from ransomware in near real-time. This solution leverages continuous data protection (CDP) to ensure all workloads have the lowest recovery point objective (RPO) possible. The most valuable thing about CDP is that it does not use snapshots, agents, or any other periodic data protection methodology. Zerto has no impact on production workloads and can achieve RPOs in the region of 5-15 seconds across thousands of virtual machines simultaneously. For example, the environment in the image below has nearly 1,000 VMs being protected with an average RPO of just six seconds! Application-Centric Protection: Group Your VMs to Gain Application-Level Control   You can protect your VMs with the Zerto application-centric approach using Virtual Protection Groups (VPGs). This logical grouping of VMs ensures that your whole applica
Indian Government Computers are also Corrupted like Government

Indian Government Computers are also Corrupted like Government

Sep 02, 2011
Indian Government Computers are also Corrupted like Government One of the Indian Hacker named " nomcat " claim to hack into the Indian Prime Ministers Office Computers and install R.A.T (remote administration tool ) in them. He also Expose the Vulnerability in Income Tax website and Database Information. Press Release By Hacker : Our team wanted to release this information with interests of the people and to expose out to the world how corrupt the Indian Government and this is one of the best examples ... The IT department of India is vulnerable to SQL injection it allows the "attacker" to view and edit all the databases ,tables ,columns and data stored within them since there a LOT of tables we are not yet done fully exploring them and we are letting out only the data we think is the least affecting to our country's security , But what we should learn is that this is one of the simplest hacking methods and most of the work can be done by point and click ap
cyber security

Today's Top 4 Identity Threat Exposures: Where To Find Them and How To Stop Them

websiteSilverfortIdentity Protection / Attack Surface
Explore the first ever threat report 100% focused on the prevalence of identity security gaps you may not be aware of.
Vulnerability Master 1.0 Released By MaxPain

Vulnerability Master 1.0 Released By MaxPain

Sep 02, 2011
Vulnerability Master 1.0 Released By MaxPain Video Demostartion Download Vulnerability Master 1.0
VBulletin Underground Website Hacked By 'Why So Serious'

VBulletin Underground Website Hacked By 'Why So Serious'

Sep 02, 2011
VBulletin Underground Website Hacked By ' Why So Serious ' Vbteam.info is underground vBulletin Hacking website. It provides free vBulletin. This website is hacked by a new hacker named as " Why So Serious? ". He also hacked EA Game - Battlefield Heroes Accounts . He leaked 1400+ accounts of the Vbteam.info forum in pastebin .
Persistent XSS vulnerability in eBuddy Web Messenger

Persistent XSS vulnerability in eBuddy Web Messenger

Sep 02, 2011
Persistent XSS vulnerability in eBuddy Web Messenger A team member from Virtual Luminous Security , Russian Federation, has discovered a persistent XSS vulnerability in eBuddy (the biggest web IM solution in the world) by transmitting messages with embedded encoded javascript code. In-depth detail eBuddy Web Messenger suffers from an encoded-Persistent XSS vulnerability in the messaging function. (while sendingA message with embedded code to another authorized user in eBuddy WebMessenger). Exploit example Plain XSS (Not going to store, nor execute) <script>alert('eBuddy Persistent XSS');</script> Encoded text=%3Cscript%3Ealert%28'eBuddy%20Persistent%20XSS'%29%3C/script%3E [*] The attacker sends the encoded embedded code in an IM message. [*] The victim receives the message with the encoded embedded code and it executes on the victims browser.
The Hacker News Magazine September Issue - NO ONE IS SECURE

The Hacker News Magazine September Issue - NO ONE IS SECURE

Sep 01, 2011
The Hacker News Magazine September Issue - NO ONE IS SECURE Well folks, after this issue and the obvious intensity of the insecurity of the net, I have a few thoughts on the unfettered access to knowledge. It is more than apparent we all live in a time where the extensive dissemination of opinions, thoughts and ideas and information are done through a modern method of transmission. The simplicity and effectiveness by which computers and networks are used to assemble, store, search, associate, recover, and share information make computer technology especially risky to anyone who wishes to keep personal or protect information from the public sphere or out of the clutches of anyone who is perceived as a probable threat. As this issues explores, the evolving and more advanced capabilities of computer viruses, phishing, fraud schemes, spyware, and hacking activity springing up from every corner of the globe and the diversity of privacy-related issues engendered by computer technology h
Two Suspected Anonymous/LulzSec hackers arrested by British police

Two Suspected Anonymous/LulzSec hackers arrested by British police

Sep 01, 2011
Two Suspected Anonymous/LulzSec hackers arrested by British police Officers from the Metropolitan Police Service's Central e-Crime Unit (PCeU) have today, 1 September, arrested two men for conspiring to commit offences under the Computer Misuse Act 1990. Two men, aged 20 and 24, have been arrested by British police in connection with Anonymous and LulzSec Members. The men were arrested separately at addresses in Mexborough, Doncaster, South Yorkshire and Warminster, Wiltshire. The Doncaster address was searched by police and computer equipment was removed for forensic examination. Kayla, alongside the likes of Sabu, Topiary and Tflow is considered to be one of the key figures in the LulzSec hacking gang. DI Mark Raymond from the PCeU said: " The arrests relate to our enquiries into a series of serious computer intrusions and online denial-of-service attacks recently suffered by a number of multi-national companies, public institutions and government and law enforcement
EA Game - Battlefield Heroes Accounts Hacked by 'Why So Serious?' Albanian Hacker

EA Game - Battlefield Heroes Accounts Hacked by 'Why So Serious?' Albanian Hacker

Sep 01, 2011
EA Game - Battlefield Heroes Accounts Hacked by ' Why So Serious? ' Albanian Hacker One of the most famous games over the world Battlefield Heroes which is created by EA Games is hacked by a new hacker named " Why So Serious? ". The hacker is from Albania. He made a post on Battlefield Heroes site & said: " Hello all Players and Admins. I'm Why So Serious?. Today I hacked some Battlefield Heroes accounts. I'm going to post them on this forum and on my Fan Page on Facebook: Why So Serious? . " Hacker Leaks the User Login passwords on pastebin from Battlefield Site. Hacker claim that he will hack another EA Games accounts and Jagex Games accounts and will post those accounts also today. Hacker also have a facebook page , where he publish the hack details. Hacked Website:  https://www.battlefieldheroes.com/
Texas law enforcement Hacked by #Antisec and #FreeAnons - 3GB of data leaked

Texas law enforcement Hacked by #Antisec and #FreeAnons - 3GB of data leaked

Sep 01, 2011
Texas law enforcement Hacked by #Antisec and  #FreeAnons  - 3GB of data leaked Texas Police Chiefs Association Website hacked by Anonymous Hackers for Antisec Operation. Hacker deface their website and post 3GB of data on it with Message " In retaliation for the arrests of dozens of alleged Anonymous suspects, weopened fire on dozens of Texas police departments and stole boatloads ofclassified police documents and police chief emails across the state. During theSan Jose courtdate we defaced and gave out live backdoor and admin access to thewebsite TexasPoliceChiefs.org while allied ships launched ddos attacks uponJustice.gov and other law enforcement websites. " Complete Message  here . All this done for #FreeAnons  Campaign. Texas law enforcement agencies (LEA), and includes the emails and personal information for 28 police chiefs posted here . The leaked messages are said to contain Internal Affairs related case details, as well as pornographic materials, anti-immigrant
Cybersecurity Resources