BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
5 Apple devices you definitely shouldn’t buy this month (and 7 to get instead)
/in General NewsBefore you click buy on that shiny new Apple gadget, check out where it fits into Apple’s product release plans.
Latest news – Read More
Malwarebytes vs Norton (2025): Which Antivirus Solution Is Better?
/in General NewsRead this guide to find out which one is better in terms of features, performance, and protection against malware.
Security | TechRepublic – Read More
I switched to this paper-like TCL phone for a week, and my tired eyes finally got a break
/in General NewsThe TCL 60 XE Nxtpaper 5G is an affordable Android that stands out for its unique screen, even if serious trade-offs come with the price.
Latest news – Read More
PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads
/in General NewsCybersecurity researchers have discovered a nascent Android remote access trojan (RAT) called PlayPraetor that has infected more than 11,000 devices, primarily across Portugal, Spain, France, Morocco, Peru, and Hong Kong.
“The botnet’s rapid growth, which now exceeds 2,000 new infections per week, is driven by aggressive campaigns focusing on Spanish and French speakers, indicating a strategic
The Hacker News – Read More
How to get another 15GB of Gmail storage for free (and without losing old files)
/in General NewsWith this quick, no-fuss method, you can back up all your Google messages and media for free — regardless of your account type.
Latest news – Read More
Unplugging these 7 common household devices helped reduce my electricity bills
/in General NewsYou’ve probably heard of vampire devices, but you may be surprised to hear just how many of the ones in your home fit the bill.
Latest news – Read More
Why I still recommend this $180 Bluetooth speaker even a year after its release
/in General NewsThe Fender Rockster Cross is a seriously powerful Bluetooth speaker that can fill big rooms with amazing sound.
Latest news – Read More
New Attack Uses Windows Shortcut Files to Install REMCOS Backdoor
/in General NewsSecurity firm Point Wild has exposed a new malware campaign using malicious LNK files to install the REMCOS backdoor. This report details how attackers disguise files to gain full system control.
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign
/in General NewsTelecommunications organizations in Southeast Asia have been targeted by a state-sponsored threat actor known as CL-STA-0969 to facilitate remote control over compromised networks.
Palo Alto Networks Unit 42 said it observed multiple incidents in the region, including one aimed at critical telecommunications infrastructure between February and November 2024.
The attacks are characterized by the
The Hacker News – Read More
New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft
/in General NewsCybersecurity researchers have flagged a previously undocumented Linux backdoor dubbed Plague that has managed to evade detection for a year.
“The implant is built as a malicious PAM (Pluggable Authentication Module), enabling attackers to silently bypass system authentication and gain persistent SSH access,” Nextron Systems researcher Pierre-Henri Pezier said.
Pluggable Authentication Modules
The Hacker News – Read More