BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Chrome Extension Hijacked to Deliver Malware, Steal Crypto Wallets
/in General NewsA compromised Chrome extension with 7,000 users was updated to deploy malware, strip security headers, and steal cryptocurrency wallet seed phrases.
The post Chrome Extension Hijacked to Deliver Malware, Steal Crypto Wallets appeared first on TechRepublic.
Security Archives – TechRepublic – Read More
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
/in General NewsThreat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack.
The intrusions, identified by Huntress last month across five partner organizations, involved the threat actors using email spam as lures, followed by a phone call from
The Hacker News – Read More
Hacked traffic cams and hijacked TVs: How cyber operations supported the war against Iran
/in General NewsAfter U.S. and Israeli forces started bombing Iran, reports say cyber operations have disrupted communications, supporting surveillance activities, and have been used in psychological operations.
Security News | TechCrunch – Read More
The new MacBook Pro gives you M5 Pro and Max power now – for a bigger price
/in General NewsThe MacBook Pro gets a 2026 refresh with new chips and more memory and storage.
Latest news – Read More
Hacktivists Claim DHS Breach, Leak 6,600+ ICE Contractor Records
/in General NewsHacktivists claim they breached DHS systems, leaking records tied to 6,681 ICE contractor applicants, including major tech and defense firms.
The post Hacktivists Claim DHS Breach, Leak 6,600+ ICE Contractor Records appeared first on TechRepublic.
Security Archives – TechRepublic – Read More
Linux PC booting slowly? This handy tool shows why in seconds – here’s how
/in General NewsIf your Linux machine is taking its own sweet time booting, you have a built-in tool to help discover where the problem lies.
Latest news – Read More
The new MacBook Air M5 costs $100 more – here’s what that gets you
/in General NewsApple’s thinnest, lightest laptop gets an update for 2026.
Latest news – Read More
Fig Security Launches With $38 Million to Bolster SecOps Resilience
/in General NewsThe company was founded in March 2025 and it has now emerged from stealth mode.
The post Fig Security Launches With $38 Million to Bolster SecOps Resilience appeared first on SecurityWeek.
SecurityWeek – Read More
Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow
/in General NewsEvery CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time are the people with the least experience. Tier 1 analysts sit at the front line of detection, and yet they are also the most vulnerable to the cognitive and organizational pressures that quietly erode SOC performance over time.
The Paradox at the Gate:
The Hacker News – Read More
Florida woman gets 2 year sentence for trafficking Microsoft software labels
/in General NewsAccording to court documents, the defendant purchased millions of dollars of labels but did not sell them with the corresponding software.
The Record from Recorded Future News – Read More