#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Cyber War : Another 7000 Israel credit cards Exposed on Internet

Cyber War : Another 7000 Israel credit cards Exposed on Internet

Jan 18, 2012
Cyber War : Another 7000 Israel credit cards Exposed on Internet This week has began under worse auspices worse for Israel, which, despite its attention to the cyber threats posed by cyber-space, has been victim of a series of attacks that have checkmated the government of Jerusalem. Kosova Hacker's Security Group of Hackers today claim to release another Another 7000 Israel credit cards on Internet. Last week  xOmar from  "group-xp"  threatened the Israeli people by exposing millions of credit cards. After that Israel said that it will respond to cyber-attacks in the same way it responds to violent terrorist acts, by striking back with force against hackers who threaten the Jewish state.  The Dump of these 7000 Cards are posted on Tinypaste  by Kisova Hackers. Th3 Dir3ctorY, ThEtA.Nu, & X|CRIPO, three hackers from  Kosova Hacker's Security  Group posted all the credentials including full name of the card holder, CCV, card no, expiry date. More, Saudi cybe
INNA - Romanian singer's Site Defaced by DARKDevilz Crew

INNA - Romanian singer's Site Defaced by DARKDevilz Crew

Jan 18, 2012
INNA - Romanian singer 's Site Defaced by DARKDevilz Crew After Hack of Official Website ( www.innaofficial.com and www.inna.ro ) of INNA by DARKDevilz Crew Hackers., Million of her Fans Redirected to another defaced page at  https://meb.zgokalp.k12.tr/tok.html  as shown above. Below we upload a screenshot of Source code of URL :  https://www.innaofficial.com/videos/  . Here you can see the Refresh-Metatag that redirecting webpage to another site that contains a message posted by Hacker. Mirror of Hack is also available here : Mirror 1 & Mirror 2 . [ Source ]
Recover from Ransomware in 5 Minutes—We will Teach You How!

Recover from Ransomware in 5 Minutes—We will Teach You How!

Apr 18, 2024Cyber Resilience / Data Protection
Super Low RPO with Continuous Data Protection: Dial Back to Just Seconds Before an Attack Zerto , a Hewlett Packard Enterprise company, can help you detect and recover from ransomware in near real-time. This solution leverages continuous data protection (CDP) to ensure all workloads have the lowest recovery point objective (RPO) possible. The most valuable thing about CDP is that it does not use snapshots, agents, or any other periodic data protection methodology. Zerto has no impact on production workloads and can achieve RPOs in the region of 5-15 seconds across thousands of virtual machines simultaneously. For example, the environment in the image below has nearly 1,000 VMs being protected with an average RPO of just six seconds! Application-Centric Protection: Group Your VMs to Gain Application-Level Control   You can protect your VMs with the Zerto application-centric approach using Virtual Protection Groups (VPGs). This logical grouping of VMs ensures that your whole applica
UniOFuzz 0.1.2-beta - Universal fuzzing tool Released

UniOFuzz 0.1.2-beta - Universal fuzzing tool Released

Jan 18, 2012
UniOFuzz  0.1.2-beta  - Universal fuzzing tool Released UniOFuzz version 0.1.2-beta - the universal fuzzing tool for browsers, web services, files, programs and network services/ports released by  nullsecurity team . Video Demonstration:  pigtail23, Developer of UniOFuzz demonstrated the tool in above Video. Download UniOFuzz
cyber security

Today's Top 4 Identity Threat Exposures: Where To Find Them and How To Stop Them

websiteSilverfortIdentity Protection / Attack Surface
Explore the first ever threat report 100% focused on the prevalence of identity security gaps you may not be aware of.
Book Review: IPhone Applications Tune-up

Book Review: IPhone Applications Tune-up

Jan 18, 2012
Book Review: IPhone Applications Tune-up Packt recently published a new book- IPhone Applications Tune-up . The book is of course about programming for the iPhone. But there is one chapter on maintainability that is far broader applicability than just the iPhone. This review was written by Wes Boudville . Read more about the book or download a free Sample Chapter here: Sample Chapter Moses explains several general aspects of programming that can and should be adhered to by most participants. Experienced programmers already know this. But if you are starting professional coding, you should pay serious heed. Specifically Moses says you should comment your source code. However, it is "likely a developer's least exercised skill". Learn to regularly put into the source code intelligent comments that explain the context of the source lines they are next to. Especially if the source is intricate. Moses disposes of the objection that some say, that the time taken to write comm
100 Kenya government websites breached by Indonesian hacker

100 Kenya government websites breached by Indonesian hacker

Jan 18, 2012
100 Kenya government websites breached by Indonesian hacker An Indonesian hacker on Tuesday attacked and defaced more than 100 Kenya government websites Among the ministries affected include the Ministries of Local Government, Livestock, Environment, Fisheries, Housing, and Industrialisation in a major cyber security breach. A Kenyan expert aware of the incident said an Indonesian hacker known as direxer was responsible for the hacking. The hacker, referred to as Direxer , broke into the sites and defaced them to show that he had managed to access them. Others hacked sites are ministries of Finance, Education, Public Health, Youth Affairs, National Heritage and Roads; as well as sensitive departments such as Administration Police, Immigration, Prisons and various city, municipal and county councils. Check List here . A Cyber Incidence Response Team (CIRT) based at the Communications Commission of Kenya (CCK) has moved into action and was making efforts to restore the affected webs
The Undead “Corporations” by Patti Galle

The Undead "Corporations" by Patti Galle

Jan 18, 2012
The Undead  "Corporations" by Patti Galle  The Hacker News Editor " Patti Galle " share her views about Corporations in THN Magazine December Edition . We would like to share same article with our blog Readers. Enjoy the interesting read : Corporations are soulless entities possessing privileges and the rights of citizenship that actual people have; all the while not having to shoulder any of the natural responsibilities. Undead Corporations have concentrated the essence of avarice, rage and fury to form their corporate structure. And as these covetous Corporations have accumulated immeasurable wealth they have methodically utilized this wealth and power to procure, infiltrate, and seize control of the influential and powerful American government and many governments across the world vigorously fusing them into a globe-encompassing non-living aberration, now rightfully called or labeled as Corporatocracy. At present, on an ever escalating level, world governments are vi
Cybersecurity Resources