BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Strengthening Fraud Prevention with Real-Time Mobile Identity Signals
/in General NewsFraud is rising quickly in digital channels, making it harder for businesses to stay secure without adding customer friction. Deterministic, mobile-based identity signals provide the real-time, authoritative verification that outdated probabilistic tools can’t, enabling stronger fraud prevention with smoother onboarding.
The post Strengthening Fraud Prevention with Real-Time Mobile Identity Signals appeared first on TechRepublic.
Security Archives – TechRepublic – Read More
MuddyWater Deploys UDPGangster Backdoor in Targeted Turkey-Israel-Azerbaijan Campaign
/in General NewsThe Iranian hacking group known as MuddyWater has been observed leveraging a new backdoor dubbed UDPGangster that uses the User Datagram Protocol (UDP) for command-and-control (C2) purposes.
The cyber espionage activity targeted users in Turkey, Israel, and Azerbaijan, according to a report from Fortinet FortiGuard Labs.
“This malware enables remote control of compromised systems by allowing
The Hacker News – Read More
Your AirTag isn’t truly travel-ready unless it has this accessory – here’s why I vouch for it
/in General NewsElevation’s Tag Vault keychain and security cable will protect your AirTag from being easily detached from various things.
Latest news – Read More
Finally, a reliable multitool for under $30 and doesn’t feel like junk
/in General NewsI typically go for higher-end multitools, but the NexTool E1 stood out for its durable design and surprisingly accessible price.
Latest news – Read More
CMMC Final Assessment: What I Did Right, What I’d Change, and How You Can Prepare
/in General NewsWhen I started my organization’s CMMC journey, I knew I was stepping into one of the most important projects of my career. As a Department of Defense subcontractor, our business depends heavily on contract awards from large prime contractors. When I learned that CMMC would roll out in phases, where certified companies receive priority in Phase 1 and non-certified organizations could be excluded entirely in Phase 2.
I committed myself to:
That clarity of purpose fueled every decision I made. We ultimately succeeded, earning a CMMC Conditional Certification with only one POAM, and later achieving the full certification. But the journey wasn’t flawless. I am sharing what worked, what I would do differently, and how you can prepare for your own assessment.
What I Did Well
1. Taking the CMMC Certified Professional (CCP) Course
One of the best decisions I made early on was completing the CCP training. I was not trying to become an auditor—I wanted to understand how auditors think.
The course gave me:
This foundation removed guesswork and let me structure our implementation around defensible, auditable evidence instead of assumptions.
2. Following a Proven Audit Preparation Plan
Our Quality Manager (QM), who leads our AS9100 audits every year, gave us a plan that became the backbone of our preparation. It was simple, realistic, and highly effective:
Year-long audit readiness plan:
This phased approach made expectations clear and prevented surprises late in the journey.
3. Using an Auditing Firm We Already Knew
We selected the same audit organization that handles our other certifications.
That mattered because:
Relationships matter in this process. Familiarity reduced friction and helped us avoid misunderstandings during evidence inspection.
4. Implementing Requirements In-House (With Help)
We chose to implement the consultant’s findings ourselves rather than outsourcing every change. It wasn’t always fast—but it worked.
Benefits of the DIY approach:
Ironically, during our final assessment, we learned that our consultant’s other clients had more findings than we did. That validated our more hands-on approach.
5. Setting Realistic Expectations With Leadership
I made it clear early on that the goal wasn’t a perfect 110 score.
The real objective was:
This mindset kept leadership aligned and supportive. When we earned a conditional certification with one POAM, they understood it was a success, not a failure.
What I Wish I Had Done Differently
1. Securing an Executive-Level Champion
I reported to an IT Manager who didn’t have enough organizational influence to push company-wide changes. I was four levels down from the CEO, yet responsible for implementing policies that affected the entire organization.
Without a champion at the director/VP/C-suite level:
If I could start over, I would secure an executive sponsor from day one. It would be someone who could clear resistance and endorse changes from the top.
2. Defining a CMMC Enclave Early
Our leadership wanted the entire company to be certified instead of just the handful of employees who actually handle CUI. Looking back, this was one of our biggest inefficiencies.
The analogy I use is PCI compliance: Imagine certifying a 500-employee company for credit card handling when only 10 employees actually process payments. Now everyone—from custodians to executives—must take PCI training and follow PCI procedures.
That’s what we did with CMMC, and that added an excessive and unnecessary burden to everyone.
Yet, having a small, well-structured enclave would have:
I strongly recommend assessing whether your organization truly needs enterprise-wide certification—or if an enclave is the smarter path.
3. Involving the Quality Manager Earlier
Leadership was anxious about whether we would pass, so they instructed the QM to audit all evidence during the final month before the assessment.
The result?
If I had involved the QM throughout the entire program, the evidence format would have been clean, consistent, and audit-ready from the start.
The Final Result
We earned a CMMC Conditional Certification with one POAM during the final assessment period.
We closed that POAM within five months and achieved full CMMC Certification.
This journey pushed me professionally and personally, and I’m proud of the outcome. The lessons above aren’t hypothetical: they’re battle-tested. If you’re preparing for your own assessment, I hope these insights help you navigate your path more efficiently and with fewer surprises.
Closing Thoughts
CMMC is challenging, especially if you work for a small or mid-sized contractor. But with the right structure, the right people, and realistic expectations, it’s absolutely achievable.
If you’re getting ready for your final assessment:
And remember: the goal isn’t perfection—it’s certification.
Secjuice – Read More
SecjuiceCON 2026
/in General NewsSecjuiceCON is an online event for infosec and OSINT industry insiders, and we’d love for you to talk to our audience about your wisdom and learnings.
You might already know about our work, but Secjuice is the only non-profit, independent, and volunteer-led publication in the information security space.
We are a private members’ writing club focused on cybersecurity, information security, hacking, and open-source intelligence gathering.
We believe that our value as professionals lies in our ability to share our research and knowledge with others through the written word.
We mentor hackers and help them prepare their research for publication.
Our members feel a strong sense of civic duty; it’s what drives us to spread our knowledge and experiences with our community.
Defending the interests of those who hack is within our remit.
Conference Date
Planning for Sunday, May 31, 2026
12 PM Eastern Daylight Savings Time (EDT)
4 PM Coordinated Universal Time (UTC)
Venue
YouTube Premier Video
https://www.youtube.com/@secjuice
Topics
SecjuiceCON will cover the following topics and welcome speaker applications around these topics on any subject:
Call for Presenters
Please visit https://sessionize.com/SecjuiceCon2026/ to submit an abstract.
The deadline to submit is 1/31/2025.
Schedule and Presenters
The schedule uses the America/New_York or Eastern Daylight Time.
The schedule is tentative and subject to change.
Code Of Conduct
No drama, no hostility, maintain civility, or else.
Sponsors
We thank the following sponsors.
Gold Sponsors
Want to sponsor SecjuiceCON?
Please email
conferenceatsecjuicedotcomto get more details!!Secjuice – Read More
My favorite AirTag wallet alternative is lightweight, super thin, and surprisingly cheap
/in General NewsThe KeySmart SmartCard left a strong impression after just a few weeks of using it.
Latest news – Read More
Yes, you can make your AirTag last 10 years on a single battery – but you won’t like how it’s done
/in General NewsI have over a dozen AirTags in use, and my biggest problem is having to change the batteries every year or so. Elevation Lab said, ‘no worries.’
Latest news – Read More
Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach
/in General NewsBarts Health NHS confirms Cl0p ransomware breach via Oracle flaw. Invoice data exposed. Patient records and clinical systems remain unaffected.
Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More – Read More
Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
/in General NewsOver 30 security vulnerabilities have been disclosed in various artificial intelligence (AI)-powered Integrated Development Environments (IDEs) that combine prompt injection primitives with legitimate features to achieve data exfiltration and remote code execution.
The security shortcomings have been collectively named IDEsaster by security researcher Ari Marzouk (MaccariTA). They affect popular
The Hacker News – Read More