BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV
/in General NewsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.
The vulnerability, tracked as CVE-2026-31431 (CVSS score: 7.8), is a case of local privilege escalation (LPE) flaw that could allow an
The Hacker News – Read More
Why I own 4 different pairs of headphones, and how I effectively use each one
/in General NewsWhile a true ‘all-in-one’ pair of headphones may not exist for every user, these four come pretty close.
Latest news – Read More
Google AppSheet Exploited in 30,000-User Facebook Phishing Operation
/in General NewsScammers are abusing Google AppSheet and Google Drive to bypass security filters and steal thousands of Facebook Business accounts globally.
Hackread – Cybersecurity News, Data Breaches, AI and More – Read More
2 US Cybersecurity Experts Jailed for Aiding ALPHV (BlackCat) Ransomware
/in General NewsTwo US cybersecurity experts jailed for aiding BlackCat ransomware group, extorting victims worldwide and exploiting insider access for profit.
Hackread – Cybersecurity News, Data Breaches, AI and More – Read More
New Bluekit Phishing Kit Features AI Assistant
/in General NewsStill under development, Bluekit provides users with automated domain registration and an AI Assistant.
The post New Bluekit Phishing Kit Features AI Assistant appeared first on SecurityWeek.
SecurityWeek – Read More
Disneyland Now Uses Face Recognition on Visitors
/in General NewsPlus: The NSA tests Anthropic’s Mythos Preview to find vulnerabilities, a Finnish teen is charged over the Scattered Spider hacking spree, and more.
Security Latest – Read More
Trellix Confirms Source Code Breach With Unauthorized Repository Access
/in General NewsCybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a “portion” of its source code.
It said it “recently identified” the compromise of its source code repository and that it began working with “leading forensic experts” to resolve the matter immediately. It also said it has notified law enforcement of the matter.
Trellix did not disclose the
The Hacker News – Read More
45,000 Attacks, 5,300+ Backdoors Tied to China-Linked Cybercrime Operation
/in General NewsSOCRadar researchers have uncovered a massive Chinese cybercrime operation using the OpenClaw and Paperclip systems to automate global attacks.
Hackread – Cybersecurity News, Data Breaches, AI and More – Read More
Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers
/in General NewsThe exploit, dubbed CopyFail and tracked as CVE-2026-31431, allows hackers to take over PCs and data center servers. The Linux vulnerabilities have been patched—but many machines remain at risk.
Security Latest – Read More
76% of All Crypto Stolen in 2026 Is Now in North Korea
/in General NewsNorth Korean threat actors are pulling off historic cryptocurrency heists on a yearly, sometimes weekly basis now. AI might be helping them.
darkreading – Read More