BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
After Mythos: New Playbooks For a Zero-Window Era
/in General NewsWhen patching isn’t fast enough, NDR helps contain the next era of threats.
If you’ve been tracking advancements in AI, you know the exploit window, the short buffer that organizations relied on to patch and protect after a vulnerability disclosure, is closing fast.
Anthropic’s new model, Claude Mythos, and its Project Glasswing, showed that finding exploitable vulnerabilities and subtle cracks
The Hacker News – Read More
The Role of Aggregated Liquidity in Modern Crypto Markets
/in General NewsAggregated liquidity improves crypto trading by combining multiple sources, offering better rates, deeper markets, and more reliable execution across assets.
Hackread – Cybersecurity News, Data Breaches, AI and More – Read More
Why Unofficial Download Sources Are Still a Security Risk in 2026
/in General NewsSecurity Risk in 2026: why unofficial download sources still put users at risk, and how to verify safe, official install paths before installing software.
Hackread – Cybersecurity News, Data Breaches, AI and More – Read More
Germany Suspects Russia Is Behind Signal Phishing That Targeted Top Officials
/in General NewsFederal prosecutors have been conducting a preliminary investigation since mid-February 2026 into alleged cyberattacks on Signal accounts.
The post Germany Suspects Russia Is Behind Signal Phishing That Targeted Top Officials appeared first on SecurityWeek.
SecurityWeek – Read More
Tabletop Simulations: Where Theory Meets Reality
/in General NewsOn paper, the vast majority of crisis plans look reasonable, actionable and complete. Once the rubber hits the road, however, chaos emerges quickly.
This is where tabletop simulations come into play. Tabletops Exercises (TTX) simulate real-world crises in a controlled environment. They introduce time pressure, incomplete information, and uncertainty, forcing teams to adapt and revealing whether plans hold up under stress.
Over the years we have facilitated many tabletop exercises, ranging from small teams of IT teams to full executive crisis staff. The scenarios vary, but the findings are remarkably consistent. Here are some of the most important learnings from the tabletop exercises and real incidents about what does and does not work.
Preparation Determines Survival
Will your warehouse sit empty because orders can’t be processed, or overflow because production is halted but shipments keep arriving? An incident is not the right time to define basic procedures or to fight over responsibilities and priorities. Having the most important parts prepared is key.
What we learned
An Incident Is a Business Problem, Not an Cyber Problem
Before one simulation, I overheard one participant remark that this will be easy, as ransomware is an IT problem. Once the TTX started, they quickly changed their mind. Incidents, and especially ransomware incidents, are mostly a business problem. IT is certainly involved, but it rarely is the sole solution.
What we learned
Communication Is Harder Than Expected
When email, phones, websites, and chat fail, communication collapses. How to reach out to external stakeholders and partners? How to remind employees where to forward press inquiries? No news will not be good news… Communication is hard at the best of times. When all the IT systems are down, communication is downright painful.
What we learned
Without Structure, Response Grinds to a Halt
First time tabletop simulations often turn into reactive role play. Participants respond to each new development as it appears, driven by the moment rather than by a commonly agreed plan. One or two voices dominating the discussion. Other topics fall on the wayside. And when we ask them for a summary of the current state, participants often cannot even tell how long the incident has been ongoing. Structuring the information flow and the meetings is one of the key parts of a good incident response plan. A major incident will still leave enough room for chaos.
What we learned
Ambiguity Kills Momentum
One of the more dangerous dynamics we see during tabletop simulation is when no one seems to be in charge, and everyone wants to be heard. I am reminded of the time when the participants spent 10 minutes on the very “critical” question of “Is this a medium or a high incident?” Which is understandable, as humans we like to discuss things we can control. But we need to make progress on the parts we do not control, or do not know how to solve. A crisis is no time for participative leadership. A crisis needs quick, decisive decisions. Sometimes imperfect decisions, but an imperfect decision is still better than no decision at all.
What we learned
Human Factors Matter
Incidents don’t pause life. Employees still have families, obligations, and personal stress outside work. For many participants, this will be one of the most stressful days of their career.
What we learned
Crisis situations change how people communicate. There will be fewer polite exchanges such as “would you mind”, “if you have time”, or “thank you”. Communication becomes short, direct, and task focused. This is normal and should not be interpreted as disrespect.
The Bottom Line
Tabletop simulations don’t just test your plan. They test your people, processes and challenge your hidden assumptions. The goal isn’t to succeed. It’s failing safely in a controlled environment.
Are you wondering how your organization really responds under pressure? A tabletop exercise is the safest place to discover uncomfortable truths before a real incident forces them into the open.
Compass Security Blog – Read More
Spectrum Security Emerges From Stealth Mode With $19 Million
/in General NewsThe threat detection startup will invest in accelerating its engineering and go-to-market efforts.
The post Spectrum Security Emerges From Stealth Mode With $19 Million appeared first on SecurityWeek.
SecurityWeek – Read More
Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks
/in General NewsA Chinese national accused of being a member of the Silk Typhoon hacking group has been extradited to the U.S. from Italy.
Xu Zewei, 34, was arrested in July 2025 by Italian authorities for his alleged links to the Chinese state-sponsored threat group and for orchestrating cyber attacks against American organizations and government agencies between February 2020 and June 2021, including
The Hacker News – Read More
Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover
/in General NewsAn administrative role meant for artificial intelligence (AI) agents within Microsoft Entra ID could enable privilege escalation and identity takeover attacks, according to new findings from Silverfort.
Agent ID Administrator is a privileged built-in role introduced by Microsoft as part of its agent identity platform to handle all aspects of an AI agent’s identity lifecycle operations in a
The Hacker News – Read More
Medtronic Hack Confirmed After ShinyHunters Threatens Data Leak
/in General NewsThe ShinyHunters cybercrime group claimed to have stolen 9 million records containing personal information from Medtronic.
The post Medtronic Hack Confirmed After ShinyHunters Threatens Data Leak appeared first on SecurityWeek.
SecurityWeek – Read More
Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202
/in General NewsMicrosoft on Monday revised its advisory for a now-patched, high-severity security flaw impacting Windows Shell to acknowledge that it has been actively exploited in the wild.
The vulnerability in question is CVE-2026-32202 (CVSS score: 4.3), a spoofing vulnerability that could allow an attacker to access sensitive information. It was addressed as part of its Patch Tuesday update for this
The Hacker News – Read More