BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Aim Security Raises $18M to Secure Customers’ Implementation of AI Apps
/in General NewsAim Security has raised a total of $28 million to date and is on a mission to help companies to implement AI products with confidence.
The post Aim Security Raises $18M to Secure Customers’ Implementation of AI Apps appeared first on SecurityWeek.
SecurityWeek – Read More
Space: The Final Frontier for Cyberattacks
/in General NewsA failure to imagine — and prepare for — threats to outer-space related assets could be a huge mistake at a time when nation-states and private companies are rushing to deploy devices in a frantic new space race.
darkreading – Read More
Insurance Company Globe Life Investigating Data Breach
/in General NewsUS insurance company Globe Life is investigating a data breach involving unauthorized access to consumer and policyholder information.
The post Insurance Company Globe Life Investigating Data Breach appeared first on SecurityWeek.
SecurityWeek – Read More
UK Man Suspected of Being ‘Scattered Spider’ Leader Arrested
/in General NewsA British man has been arrested in Spain for allegedly being the ringleader of the notorious Scattered Spider cybercrime group.
The post UK Man Suspected of Being ‘Scattered Spider’ Leader Arrested appeared first on SecurityWeek.
SecurityWeek – Read More
Hackers Detail How They Allegedly Stole Ticketmaster Data From Snowflake
/in General NewsA ShinyHunters hacker tells WIRED that they gained access to Ticketmaster’s Snowflake cloud account—and others—by first breaching a third-party contractor.
Security Latest – Read More
Zero Trust Policy
/in General NewsThe concept of zero trust implies organizations must work under a constant worst-case scenario. This means assuming breaches are inevitable and that no entity or users — coming from within or from outside the organization — should ever be trusted. This “never trust, always verify” approach significantly reduces the attack surface and minimizes the potential …
Security | TechRepublic – Read More
Nigerian Faces Prison in US After BEC Fraud Conviction
/in General NewsNigerian national Ebuka Raphael Umeti was convicted in the US for operating a business email compromise (BEC) scheme.
The post Nigerian Faces Prison in US After BEC Fraud Conviction appeared first on SecurityWeek.
SecurityWeek – Read More
Amazon-Powered AI Cameras Used to Detect Emotions of Unwitting UK Train Passengers
/in General NewsCCTV cameras and AI are being combined to monitor crowds, detect bike thefts, and spot trespassers.
Security Latest – Read More
Hackers Exploit Legitimate Websites to Deliver BadSpace Windows Backdoor
/in General NewsLegitimate-but-compromised websites are being used as a conduit to deliver a Windows backdoor dubbed BadSpace under the guise of fake browser updates.
“The threat actor employs a multi-stage attack chain involving an infected website, a command-and-control (C2) server, in some cases a fake browser update, and a JScript downloader to deploy a backdoor into the victim’s system,” German
The Hacker News – Read More
Hamas Hackers Sling Stealthy Spyware Across Egypt, Palestine
/in General NewsThe Arid Viper APT group is deploying AridSpy malware with Trojanized messaging applications and second-stage data exfiltration.
darkreading – Read More