BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Undocumented Radios Found in Solar-Powered Devices
/in General NewsThe US Transportation Department reportedly warns that solar-powered devices used in highway infrastructure have undocumented radios. Is the risk real?
darkreading – Read More
DELMIA Factory Software Vulnerability Exploited in Attacks
/in General NewsA deserialization of untrusted data in the MOM software allows attackers to achieve remote code execution.
The post DELMIA Factory Software Vulnerability Exploited in Attacks appeared first on SecurityWeek.
SecurityWeek – Read More
Apple just got FDA clearance for Hypertension Detection – does your watch support it?
/in General NewsHypertension Detection will roll out with WatchOS 26.
Latest news – Read More
Scattered Lapsus$ Hunters Hacker Group Announces Shutdown
/in General NewsScattered Lapsus$ Hunters, linked to the Jaguar Land Rover cyberattack, claims to shut down as experts suggest the…
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
Apple Sends Fresh Wave of Spyware Notifications to French Users
/in General NewsApple this year sent at least four rounds of notifications to French users potentially targeted by commercial spyware.
The post Apple Sends Fresh Wave of Spyware Notifications to French Users appeared first on SecurityWeek.
SecurityWeek – Read More
CISA: CVE Program to Focus on Vulnerability Data Quality
/in General NewsCISA says it is time for the CVE Program to focus on improving trust, responsiveness, and the caliber of vulnerability data.
The post CISA: CVE Program to Focus on Vulnerability Data Quality appeared first on SecurityWeek.
SecurityWeek – Read More
VMScape: Academics Break Cloud Isolation With New Spectre Attack
/in General NewsExploiting incomplete speculative execution attack mitigations extended to the branch predictor state, VMScape leaks arbitrary memory.
The post VMScape: Academics Break Cloud Isolation With New Spectre Attack appeared first on SecurityWeek.
SecurityWeek – Read More
Cloud-Native Security in 2025: Why Runtime Visibility Must Take Center Stage
/in General NewsThe security landscape for cloud-native applications is undergoing a profound transformation. Containers, Kubernetes, and serverless technologies are now the default for modern enterprises, accelerating delivery but also expanding the attack surface in ways traditional security models can’t keep up with.
As adoption grows, so does complexity. Security teams are asked to monitor sprawling hybrid
The Hacker News – Read More
Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm
/in General NewsKioSoft was notified about a serious NFC card vulnerability in 2023 and only recently claimed to have released a patch.
The post Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm appeared first on SecurityWeek.
SecurityWeek – Read More
Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories
/in General NewsA security weakness has been disclosed in the artificial intelligence (AI)-powered code editor Cursor that could trigger code execution when a maliciously crafted repository is opened using the program.
The issue stems from the fact that an out-of-the-box security setting is disabled by default, opening the door for attackers to run arbitrary code on users’ computers with their privileges.
”
The Hacker News – Read More