BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks
/in General NewsMicrosoft has addressed four security flaws impacting its artificial intelligence (AI), cloud, enterprise resource planning, and Partner Center offerings, including one that it said has been exploited in the wild.
The vulnerability that has been tagged with an “Exploitation Detected” assessment is CVE-2024-49035 (CVSS score: 8.7), a privilege escalation flaw in partner.microsoft[.]com.
“An
The Hacker News – Read More
The US Army’s Vision of Soldiers in Exoskeletons Lives On
/in General NewsFollowing decades of failed attempts and dashed dreams, the US Army is once again trying out powered exoskeletons to help soldiers haul munitions and equipment in the field.
Security Latest – Read More
Phishing-as-a-Service “Rockstar 2FA” Targets Microsoft 365 Users with AiTM Attacks
/in General NewsCybersecurity researchers are warning about malicious email campaigns leveraging a phishing-as-a-service (PhaaS) toolkit called Rockstar 2FA with an aim to steal Microsoft 365 account credentials.
“This campaign employs an AitM [adversary-in-the-middle] attack, allowing attackers to intercept user credentials and session cookies, which means that even users with multi-factor authentication (MFA)
The Hacker News – Read More
U.S. Citizen Sentenced for Spying on Behalf of China’s Intelligence Agency
/in General NewsA 59-year-old U.S. citizen who immigrated from the People’s Republic of China (PRC) has been sentenced to four years in prison for conspiring to act as a spy for the country and sharing sensitive information about his employer with China’s principal civilian intelligence agency.
Ping Li, 59, of Wesley Chapel, Florida, is said to have served as a cooperative contact for the Ministry of State
The Hacker News – Read More
Over Two Dozen Flaws Identified in Advantech Industrial Wi-Fi Access Points – Patch ASAP
/in General NewsNearly two dozen security vulnerabilities have been disclosed in Advantech EKI industrial-grade wireless access point devices, some of which could be weaponized to bypass authentication and execute code with elevated privileges.
“These vulnerabilities pose significant risks, allowing unauthenticated remote code execution with root privileges, thereby fully compromising the confidentiality,
The Hacker News – Read More
11 arrested in Europol shutdown of illegal IPTV streaming networks
/in General NewsIn the takedown announced on Wednesday, Europol said it investigated 102 suspects and arrested 11 of them on accusations they were distributing content from streaming services illegally.
The Record from Recorded Future News – Read More
NordPass password manager is now 56% off for Black Friday
/in General NewsThe NordPass password manager is a great tool for preserving your privacy. Ahead of Black Friday, subscriptions are available with a massive discount for individuals and families.
Latest stories for ZDNET in Security – Read More
Propertyrec Leak Exposes Over Half a Million Background Check Records
/in General NewsSummary A critical data security lapse has left a massive trove of personal information vulnerable, raising concerns about…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
North Korean hackers have stolen billions in crypto by posing as VCs, recruiters and IT workers
/in General NewsSecurity researchers say North Korean hackers have infiltrated hundreds of organizations with the goal of taking money and stealing data to further the regime’s nuclear weapons program.
© 2024 TechCrunch. All rights reserved. For personal use only.
Security News | TechCrunch – Read More
The Future of Serverless Security in 2025: From Logs to Runtime Protection
/in General NewsServerless environments, leveraging services such as AWS Lambda, offer incredible benefits in terms of scalability, efficiency, and reduced operational overhead. However, securing these environments is extremely challenging. The core of current serverless security practices often revolves around two key components: log monitoring and static analysis of code or system configuration. But here is
The Hacker News – Read More