Latest Hacking News # Around the Web

We aim to provide the latest credible, non-biased IT security news to ensure many are kept abreast of daily occurrences within this constantly evolving sector.

  • latesthackingnews.com was formed as part of a collaboration of experts specialising in networking, forensics, programming and ethical hacking.
Intel Patched A Vulnerability Leaking Intel ME Encryption Keys

Despite continuous patches, Intel CPUs keep making the news for one or another vulnerabilities being spotted by researchers. While numerous Intel Patched A Vulnerability (...)

16 September
Morpheus –TCP/UDP Manipulation Framework

Morpheus is an open source framework that can launch multiple attacks on the network using applications, such as ettercap, msgsnarf, Morpheus –TCP/UDP Manipulation Framework (...)

16 September
New Cold Boot Attacks Can Evade Current Mitigations

Many people tend to put laptops to ‘Sleep’ instead of shutting it down. Whether you’re at home, or at your New Cold Boot Attacks Can Evade Current Mitigations on Latest Hacking (...)

16 September
Microsoft September Patch Fixed 61 Vulnerabilities Including A Zero-Day

Last month, Microsoft Patch Tuesday addressed 60 vulnerabilities that also included two zero-day flaws. This month also, the tech giant Microsoft September Patch Fixed 61 (...)

16 September
Lin.Security – Vulnhub CTF Challenge Walkthrough

Lin Security is available at Vulnhub. This VM is made for “Beginners” to master Privilege Escalation in Linux Environment using Lin.Security – Vulnhub CTF Challenge Walkthrough (...)

16 September
Veeam Left Nearly Half-A-Billion! Records Exposed

Veeam, A company that handles backup disaster recovery and intelligent data management software based in Switzerland markets itself as one Veeam Left Nearly Half-A-Billion! (...)

14 September
XSStrike – XSS Detection and Exploitation Suite

XSStrike is an open source tool that detects Cross Site Scripting vulnerabilities and exploits them. The tool is equipped with XSStrike – XSS Detection and Exploitation Suite (...)

14 September
Cyberry – Vulnhub CTF Challenge Walkthrough

Cyberry is available at Vulnhub. This machine works on both VMware and Virtualbox. This VM is intended for “intermediates” and Cyberry – Vulnhub CTF Challenge Walkthrough on (...)

14 September
New Ransomware Named PyLocky Discovered

Security experts at Trend Micro have found a new Ransomware strain named PyLocky which has been involved in attacks between July New Ransomware Named PyLocky Discovered on (...)

14 September
Latest Hacking News Podcast #121

Cold Boot attacks are back, a Nigerian email scammer gets sentenced and 2 billion devices still vulnerable to old Bluetooth flaws on episode 121 of the Latest Hacking News (...)

13 September

Latest articles

We reject Julian Assange and everything he stands for

We reject Julian Assange and everything he stands for

It is with great concern that we find ourselves still associated in the eyes of the public with Julian Assange and what has become Wikiileaks. We do not support nor do we (...)


Barrett Brown's criticisms of Julian Assange are valid

Barrett Brown’s criticisms of Julian Assange are valid

A message from the Jeremy Hammond Defense Committee. Dear Courage Foundation: As an org that seeks to defend and protect whistleblowers and champion the rights of free (...)


Barrett Brown's statement about Julian Assange

Barrett Brown’s statement about Julian Assange

Regarding my banishment from the Courage Foundation at the behest of Julian Assange. This is the full statement I provided to The Daily Beast on the matter of the board of (...)


Naomi Colvin: I have been obliged to resign from Courage

Naomi Colvin: I have been obliged to resign from Courage

Naomi Colvin: “rather unfortunately, I have been obliged to resign from Courage.” On Thursday afternoon three of Courage’s trustees wrote to me demanding that I inform Barrett (...)


Join the resistance

Tor hidden-service - IRC.CyberGuerrilla

Tor Socks5: 9050 - Host: 6dvj6v5imhny3anf.onion - Port: 6697 - SSL
Webchat #OpNewBlood
Tor protects your privacy - Tor Browser is an easy-to-use, portable package of Tor. By downloading and using Tor, you can protect the people who need anonymity, like activists, journalists and bloggers...

Anonymous t-shirt

T-Shirt and Hooded Jacket
T-Shirt and Hooded Jacket
Tails
Tails is an irreplaceable security tool as it allows anyone to use computers safely
Tor Browser
Tor Browser
Tor protects your privacy
NordVPN
NordVPN
Protect your privacy

Secure your Internet Connection.

Read more NordVPN Close