BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
LSA Whisperer: Open-source tools for interacting with authentication packages
/in General NewsThe tool allows users to directly recover multiple types of credentials from the LSASS without accessing its memory. This includes recovering Kerberos tickets, SSO cookies, DPAPI credential keys, and NTLMv1 responses.
Cyware News – Latest Cyber News – Read More
Collection Agency FBCS Says Data Breach Exposed Nearly 2 million People
/in General NewsFinancial Business and Consumer Solutions (FBCS) says compromised information may include names, dates of birth, Social Security numbers, and account information.
The post Collection Agency FBCS Says Data Breach Exposed Nearly 2 million People appeared first on SecurityWeek.
SecurityWeek – Read More
Okta Warns of Unprecedented Scale in Credential Stuffing Attacks on Online Services
/in General NewsThe attacks recently observed by Okta route requests through anonymizing services like TOR and residential proxies such as NSOCKS, Luminati, and DataImpulse. The experts noticed that millions of requests have been routed through these services.
Cyware News – Latest Cyber News – Read More
US Post Office Phishing Sites Get as Much Traffic as the Real One
/in General NewsSecurity researchers analyzing phishing campaigns that target United States Postal Service (USPS) saw that the traffic to the fake domains is typically similar to what the legitimate site records and it is even higher during holidays.
Cyware News – Latest Cyber News – Read More
Analysis of Native Process CLR Hosting Used by AgentTesla
/in General NewsThe initial infection vector is a Word document that downloads and executes a 64-bit Rust-compiled binary. This binary then downloads an encoded shellcode containing the AgentTesla payload.
Cyware News – Latest Cyber News – Read More
Japanese police create fake support scam payment cards to warn victims
/in General NewsThe cards are labeled “Virus Trojan Horse Removal Payment Card” and “Unpaid Bill Late Fee Payment Card,” and were created by the Echizen Police in the Fukui prefecture in Japan as an alert mechanism.
Cyware News – Latest Cyber News – Read More
Hackers Claim to Have Infiltrated Belarus’ Main Security Service
/in General NewsA Belarusian hacker activist group claims to have infiltrated the network of the country’s main KGB security agency and accessed personnel files of over 8,600 employees.
The post Hackers Claim to Have Infiltrated Belarus’ Main Security Service appeared first on SecurityWeek.
SecurityWeek – Read More
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
/in General NewsIdentity and access management (IAM) services provider Okta has warned of a spike in the “frequency and scale” of credential stuffing attacks aimed at online services.
These unprecedented attacks, observed over the last month, are said to be facilitated by “the broad availability of residential proxy services, lists of previously stolen credentials (‘combo lists’), and scripting tools,” the
The Hacker News – Read More
9 Best Password Managers (2024): Features, Pricing, and Tips
/in General NewsKeep your logins locked down with our favorite password management apps for PC, Mac, Android, iPhone, and web browsers.
Security Latest – Read More
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
/in General NewsCybersecurity researchers have discovered a targeted operation against Ukraine that has been found leveraging a nearly seven-year-old flaw in Microsoft Office to deliver Cobalt Strike on compromised systems.
The attack chain, which took place at the end of 2023 according to Deep Instinct, employs a PowerPoint slideshow file (“signal-2023-12-20-160512.ppsx”) as the starting point, with
The Hacker News – Read More