http://br2.go.th/header.php defaced by 3n_byt3
http://br2.go.th/header.php defaced by 3n_byt3
http://province.m-culture.go.th/udothani/ defaced by 3n_byt3
http://per.br2.go.th/templates/ defaced by 3n_byt3
http://bsai.br2.go.th/templates/ defaced by 3n_byt3
http://noenmakok.go.th/admin/ash.html defaced by Ashiyane Digital Security Team
Zero Day Initiative Advisory 11-340 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application parses font names embedded within an atom.
To State Dept., WikiLeaks or Not, Secrets Are Secrets New York Times WASHINGTON — The quarter-million confidential State Department cables obtained by WikiLeaks last year have been public on the Web for months. But don't tell the government.
Hacktivists with a virtual axe to grind got their fair share of the spotlight in 2011, most notably a group called LulzSec that managed to cause problems for organisations ranging from the CIA to Sony, thereby earning them a place in the top 10 influential.
Whitepaper called Hacking Dispositivos iOS.
http://www.nongrat.go.th/images/fbfiles/images/016.jpg defaced by Ashiyane Digital Security Team