BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Tuskira unifies and optimizes disparate cybersecurity tools
/in General NewsCyberattacks are on the rise, and the victims are high-profile. According to a KPMG survey, close to half of companies with $1 billion or more in annual revenue recently suffered a security breach. Surprisingly, an overabundance of security tools may be contributing to the problem. In a separate poll, 43% of businesses said their teams […]
© 2024 TechCrunch. All rights reserved. For personal use only.
Security News | TechCrunch – Read More
Android’s December 2024 Security Update Patches 14 Vulnerabilities
/in General NewsGoogle has released patches for 14 high-severity vulnerabilities as part of Android’s December 2024 security update.
The post Android’s December 2024 Security Update Patches 14 Vulnerabilities appeared first on SecurityWeek.
SecurityWeek – Read More
Solana Web3.js Library Backdoored in Supply Chain Attack
/in General NewsSupply chain attack leads to decentralized application developers downloading backdoored versions of the Solana Web3.js library.
The post Solana Web3.js Library Backdoored in Supply Chain Attack appeared first on SecurityWeek.
SecurityWeek – Read More
Law Enforcement Read Criminals’ Messages After Hacking Matrix Service
/in General NewsLaw enforcement has taken down yet another encrypted messaging service used by criminals, but not before spying on its users.
The post Law Enforcement Read Criminals’ Messages After Hacking Matrix Service appeared first on SecurityWeek.
SecurityWeek – Read More
FTC says AI company Evolv ‘falsely hyped’ its security scanners
/in General NewsEvolv’s scanners don’t work as well as it led schools to believe. Here’s what that means for children’s safety.
Latest stories for ZDNET in Security – Read More
Researchers Uncover Backdoor in Solana’s Popular Web3.js npm Library
/in General NewsCybersecurity researchers are alerting to a software supply chain attack targeting the popular @solana/web3.js npm library that involved pushing two malicious versions capable of harvesting users’ private keys with an aim to drain their cryptocurrency wallets.
The attack has been detected in versions 1.95.6 and 1.95.7. Both these versions are no longer available for download from the npm
The Hacker News – Read More
Joint Advisory Warns of PRC-Backed Cyber Espionage Targeting Telecom Networks
/in General NewsA joint advisory issued by Australia, Canada, New Zealand, and the U.S. has warned of a broad cyber espionage campaign undertaken by People’s Republic of China (PRC)-affiliated threat actors targeting telecommunications providers.
“Identified exploitations or compromises associated with these threat actors’ activity align with existing weaknesses associated with victim infrastructure; no novel
The Hacker News – Read More
Hackers Use Corrupted ZIPs and Office Docs to Evade Antivirus and Email Defenses
/in General NewsCybersecurity researchers have called attention to a novel phishing campaign that leverages corrupted Microsoft Office documents and ZIP archives as a way to bypass email defenses.
“The ongoing attack evades #antivirus software, prevents uploads to sandboxes, and bypasses Outlook’s spam filters, allowing the malicious emails to reach your inbox,” ANY.RUN said in a series of posts on X.
The
The Hacker News – Read More
Veeam Issues Patch for Critical RCE Vulnerability in Service Provider Console
/in General NewsVeeam has released security updates to address a critical flaw impacting Service Provider Console (VSPC) that could pave the way for remote code execution on susceptible instances.
The vulnerability, tracked as CVE-2024-42448, carries a CVSS score of 9.9 out of a maximum of 10.0. The company noted that the bug was identified during internal testing.
“From the VSPC management agent machine, under
The Hacker News – Read More
Critical SailPoint IdentityIQ Vulnerability Exposes Files to Unauthorized Access
/in General NewsA critical security vulnerability has been disclosed in SailPoint’s IdentityIQ identity and access management (IAM) software that allows unauthorized access to content stored within the application directory.
The flaw, tracked as CVE-2024-10905, has a CVSS score of 10.0, indicating maximum severity. It affects IdentityIQ versions 8.2. 8.3, 8.4, and other previous versions.
IdentityIQ “allows
The Hacker News – Read More