BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Your Simple Guide: How to Use Filmora’s Planar Tracker for Awesome Video Edits
/in General NewsEasily stick logos, text, or graphics onto moving surfaces with Filmora’s planar tracker. Just read this article to know how!
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
Critical Vulnerability Exposes Fortinet FortiWeb to Full Takeover (CVE-2025-25257)
/in General NewsWatchTowr Labs reveals CVE-2025-25257, a critical FortiWeb SQL injection allowing unauthenticated remote code execution. Patch your FortiWeb 7.0,…
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
GPUHammer: New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs
/in General NewsNVIDIA is urging customers to enable System-level Error Correction Codes (ECC) as a defense against a variant of a RowHammer attack demonstrated against its graphics processing units (GPUs).
“Risk of successful exploitation from RowHammer attacks varies based on DRAM device, platform, design specification, and system settings,” the GPU maker said in an advisory released this week.
Dubbed
The Hacker News – Read More
Grok-4 Falls to a Jailbreak Two days After Its Release
/in General NewsThe latest release of the xAI LLM, Grok-4, has already fallen to a sophisticated jailbreak.
The post Grok-4 Falls to a Jailbreak Two days After Its Release appeared first on SecurityWeek.
SecurityWeek – Read More
Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHub
/in General NewsCybersecurity researchers have discovered a serious security issue that allows leaked Laravel APP_KEYs to be weaponized to gain remote code execution capabilities on hundreds of applications.
“Laravel’s APP_KEY, essential for encrypting sensitive data, is often leaked publicly (e.g., on GitHub),” GitGuardian said. “If attackers get access to this key, they can exploit a deserialization flaw to
The Hacker News – Read More
4 Arrested Over Scattered Spider Hacking Spree
/in General NewsPlus: An “explosion” of AI-generated child abuse images is taking over the web, a Russian professional basketball player is arrested on ransomware charges, and more.
Security Latest – Read More
How passkeys work: Going passwordless with public key cryptography
/in General NewsWhat’s the Achilles’ heel of passwords? Shared secrets. Here’s how we eliminate them.
Latest stories for ZDNET in Security – Read More
DoNot APT Hits European Ministry with New LoptikMod Malware
/in General NewsTrellix reveals how the India-linked DoNot APT group launched a sophisticated spear-phishing attack on a European foreign affairs…
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
Moonshot AI’s Kimi K2 outperforms GPT-4 in key benchmarks — and it’s free
/in General NewsChinese AI startup Moonshot releases open-source Kimi K2 model that outperforms OpenAI and Anthropic on coding tasks with breakthrough agentic capabilities and competitive pricing.Read More
Security News | VentureBeat – Read More
Leaked Shellter Elite Tool Now Fueling Infostealer Attacks Worldwide
/in General NewsA new report details how the advanced hacking tool Shellter Elite was leaked and is now being used…
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More