BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
The ‘Long-Term Danger’ of Trump Sending Troops to the LA Protests
/in General NewsPresident Trump’s deployment of more than 700 Marines to Los Angeles—following ICE raids and mass protests—has ignited a fierce national debate over state sovereignty and civil-military boundaries.
Security Latest – Read More
OpenAI Shuts Down 10 Malicious AI Ops Linked to China, Russia, Iran, N. Korea
/in General NewsOpenAI, a leading artificial intelligence company, has revealed it is actively fighting widespread misuse of its AI tools…
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
20 Top-Level Domain Names Abused by Hackers in Phishing Attacks
/in General NewsDisclosure: This article was provided by ANY.RUN. The information and analysis presented are based on their research and findings.
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
5 plead guilty to laundering nearly $37 million stolen through Cambodian cyber scam centers
/in General NewsThe scheme is based in Cambodia, where people residing in scam centers contact U.S. victims through phone calls, texts, dating apps and other avenues to promote fake cryptocurrency investments.
The Record from Recorded Future News – Read More
Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users
/in General NewsCybersecurity researchers have shed light on a previously undocumented Rust-based information stealer called Myth Stealer that’s being propagated via fraudulent gaming websites.
“Upon execution, the malware displays a fake window to appear legitimate while simultaneously decrypting and executing malicious code in the background,” Trellix security researchers Niranjan Hegde, Vasantha Lakshmanan
The Hacker News – Read More
Poisoned npm Packages Disguised as Utilities Aim for System Wipeout
/in General NewsBackdoors lurking in legitimate-looking code contain file-deletion commands that can destroy production systems and cause massive disruptions to software supply chains.
darkreading – Read More
Hundreds of Russian devices hit by Rare Werewolf crypto-mining attacks
/in General NewsThe campaign has affected hundreds of Russian users, particularly targeting industrial enterprises and engineering schools, with additional victims reported in Belarus and Kazakhstan.
The Record from Recorded Future News – Read More
Hackers Stole 300,000 Crash Reports From Texas Department of Transportation
/in General NewsThe Texas Department of Transportation has disclosed a data breach impacting the personal information included in 300,000 crash reports.
The post Hackers Stole 300,000 Crash Reports From Texas Department of Transportation appeared first on SecurityWeek.
SecurityWeek – Read More
Ongoing cyberattack at US grocery distributor giant UNFI affecting customer orders
/in General NewsUnited Natural Foods said it is “diligently managing through the cyber incident” that sparked disruption outages.
Security News | TechCrunch – Read More
Airlines Don’t Want You to Know They Sold Your Flight Data to DHS
/in General NewsA contract obtained by 404 Media shows that an airline-owned data broker forbids the feds from revealing it sold them detailed passenger data.
Security Latest – Read More