BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Hackers target Ukraine’s potential conscripts with MeduzaStealer malware
/in General NewsHackers have targeted the devices of Ukraine’s draft-aged men with MeduzaStealer malware spread through Telegram, researchers have found.
The Record from Recorded Future News – Read More
OT Risk Management Firm DeNexus Raises $17.5 Million
/in General NewsDeNexus offers an AI and ML-driven data analytics platform that focuses on managing the cyber risk to the underserved operational technology of critical industries.
The post OT Risk Management Firm DeNexus Raises $17.5 Million appeared first on SecurityWeek.
SecurityWeek – Read More
What open-source AI models should your enterprise use? Endor Labs analyzes them all
/in General NewsThe new tool tells developers how popular and secure open-source, pre-built models are and how recently they were created and updated. Read More
Security News | VentureBeat – Read More
Dane Stuckey Joins OpenAI as CISO
/in General NewsFormer Palantir CISO joins ChatGPT maker OpenAI to lead cybersecurity efforts.
The post Dane Stuckey Joins OpenAI as CISO appeared first on SecurityWeek.
SecurityWeek – Read More
From Misuse to Abuse: AI Risks and Attacks
/in General NewsAI from the attacker’s perspective: See how cybercriminals are leveraging AI and exploiting its vulnerabilities to compromise systems, users, and even other AI applications
Cybercriminals and AI: The Reality vs. Hype
“AI will not replace humans in the near future. But humans who know how to use AI are going to replace those humans who don’t know how to use AI,” says Etay Maor, Chief Security
The Hacker News – Read More
AI Models in Cybersecurity: From Misuse to Abuse
/in General NewsExploring differences in AI models on security measures and unveiling threat actor tactics.
The post AI Models in Cybersecurity: From Misuse to Abuse appeared first on SecurityWeek.
SecurityWeek – Read More
CISA Flags Critical SolarWinds Web Help Desk Bug for In-the-Wild Exploitation
/in General NewsCISA warns that a critical-severity hardcoded credentials vulnerability in SolarWinds Web Help Desk is exploited in attacks.
The post CISA Flags Critical SolarWinds Web Help Desk Bug for In-the-Wild Exploitation appeared first on SecurityWeek.
SecurityWeek – Read More
Oracle Patches Over 200 Vulnerabilities With October 2024 CPU
/in General NewsOracle has released 334 new security patches to address roughly 220 unique CVEs as part of its October 2024 Critical Patch Update.
The post Oracle Patches Over 200 Vulnerabilities With October 2024 CPU appeared first on SecurityWeek.
SecurityWeek – Read More
Passkey News: FIDO Unveils New Specifications, Amazon Announces 175 Million Users
/in General NewsFIDO Alliance has published new specifications for securely moving passkeys across providers, as Amazon announced 175 million passkey users.
The post Passkey News: FIDO Unveils New Specifications, Amazon Announces 175 Million Users appeared first on SecurityWeek.
SecurityWeek – Read More
Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack
/in General NewsA new spear-phishing campaign targeting Brazil has been found delivering a banking malware called Astaroth (aka Guildma) by making use of obfuscated JavaScript to slip past security guardrails.
“The spear-phishing campaign’s impact has targeted various industries, with manufacturing companies, retail firms, and government agencies being the most affected,” Trend Micro said in a new analysis.
”
The Hacker News – Read More