BackBox News
Latest news and insights on Security
Latest news and insights on Security
Health care lags behind other industries in API adoption, but digital transformation projects and regulatory requirements will spur usage.
Sivan Tehila, cybersecurity strategist at Perimeter 81, discusses climate change and the cyber-resilience lessons companies should take away from dealing with the pandemic.
To give enterprise defenders insight into their attack surface, Randori tells them which assets attackers are likely to target.
Cybersecurity is more than technology or safeguards like zero trust; mostly, it's about collaboration.
The move will bolster Mastercard's digital identity and security platform and framework.
Ukranian man pleaded guilty to conspiracy to commit wire fraud and one count of conspiracy to commit computer hacking.
XCSSET, a Mac malware targeting Xcode developers, was now re-engineered and employed in a campaign aimed at Apple’s new M1 chips. Experts from Trend Micro have uncovered a Mac malware campaign targeting Xcode developers that employed a re-engineered version of the XCSSET malware to support […]
Updated: Vulnerabilities are being exploited by Hafnium. Other cyberattackers are following suit.
A Mac malware campaign targeting Xcode developers has been retooled to add support for Apple's new M1 chips and expand its features to steal confidential information from cryptocurrency apps. XCSSET came into the spotlight in August 2020 after it was found to spread via modified Xcode IDE […]
A Ukrainian national arrested for his role in a hacking group that compromised millions of financial accounts was sentenced to a decade in prison, US prosecutors said Friday. read more
BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Latest video - watch now! We look at the recent FBI "webshell hacking" controversy from both sides.
The Center for Internet Security recently launched a free tool for private U.S. hospitals to block malicious activity.
Security experts said the recent upheaval in the job market makes it imperative to bolster separation protocols further.
Simply put: reading from RAM in your program could write to RAM in someone else's
Scammers are luring victims to a clone site that appears to sell scarce cryptomining equipment but actually steals bitcoins.