BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Fortinet VPN Zero-Day Exploited in Malware Attacks Remains Unpatched: Report
/in General NewsThe DeepData malware framework was seen exploiting a Fortinet VPN client for Windows zero-day that remains unpatched.
The post Fortinet VPN Zero-Day Exploited in Malware Attacks Remains Unpatched: Report appeared first on SecurityWeek.
SecurityWeek – Read More
Mozilla 0Din Warns of ChatGPT Sandbox Flaws Enabling Python Execution
/in General NewsMozilla’s 0Din uncovers critical flaws in ChatGPT’s sandbox, allowing Python code execution and access to internal configurations. OpenAI…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 11 – Nov 17)
/in General NewsWhat do hijacked websites, fake job offers, and sneaky ransomware have in common? They’re proof that cybercriminals are finding smarter, sneakier ways to exploit both systems and people.
This week makes one thing clear: no system, no person, no organization is truly off-limits. Attackers are getting smarter, faster, and more creative—using everything from human trust to hidden flaws in
The Hacker News – Read More
Proton VPN review: A very solid free VPN with robust leak protection
/in General NewsProton VPN is our pick for the best free VPN. Here’s why, based on our testing.
Latest stories for ZDNET in Security – Read More
Beyond Compliance: The Advantage of Year-Round Network Pen Testing
/in General NewsIT leaders know the drill—regulators and cyber insurers demand regular network penetration testing to keep the bad guys out. But here’s the thing: hackers don’t wait around for compliance schedules.
Most companies approach network penetration testing on a set schedule, with the most common frequency being twice a year (29%), followed by three to four times per year (23%) and once per year (20%),
The Hacker News – Read More
Fake Discount Sites Exploit Black Friday to Hijack Shopper Information
/in General NewsA new phishing campaign is targeting e-commerce shoppers in Europe and the United States with bogus pages that mimic legitimate brands with the goal of stealing their personal information ahead of the Black Friday shopping season.
“The campaign leveraged the heightened online shopping activity in November, the peak season for Black Friday discounts. The threat actor used fake discounted products
The Hacker News – Read More
T-Mobile Also Targeted in Chinese Telecom Hacking Campaign
/in General NewsT-Mobile has also been targeted by the Chinese group Salt Typhoon in a major espionage campaign targeting US telecom companies.
The post T-Mobile Also Targeted in Chinese Telecom Hacking Campaign appeared first on SecurityWeek.
SecurityWeek – Read More
Urgent: Critical WordPress Plugin Vulnerability Exposes Over 4 Million Sites
/in General NewsA critical authentication bypass vulnerability has been disclosed in the Really Simple Security (formerly Really Simple SSL) plugin for WordPress that, if successfully exploited, could grant an attacker to remotely gain full administrative access to a susceptible site.
The vulnerability, tracked as CVE-2024-10924 (CVSS score: 9.8), impacts both free and premium versions of the plugin. The
The Hacker News – Read More
3 leadership lessons we can learn from ethical hackers
/in General NewsHere’s how business leaders can use a hacker’s problem-solving approach to to improve their own leadership skills.Read More
Security News | VentureBeat – Read More
NSO Group Exploited WhatsApp to Install Pegasus Spyware Even After Meta’s Lawsuit
/in General NewsLegal documents released as part of an ongoing legal tussle between Meta’s WhatsApp and NSO Group have revealed that the Israeli spyware vendor used multiple exploits targeting the messaging app to deliver Pegasus, including one even after it was sued by Meta for doing so.
They also show that NSO Group repeatedly found ways to install the invasive surveillance tool on the target’s devices as
The Hacker News – Read More