BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
How to Protect Yourself From Phone Searches at the US Border
/in General NewsCustom and Border Protection has broad authority to search travelers’ devices when they cross into the United States. Here’s what you can do to protect your digital life while at the US border.
Security Latest – Read More
Lantronix Device Used in Critical Infrastructure Exposes Systems to Remote Hacking
/in General NewsLantronix’s XPort device is affected by a critical vulnerability that can be used for takeover and disruption, including in the energy sector.
The post Lantronix Device Used in Critical Infrastructure Exposes Systems to Remote Hacking appeared first on SecurityWeek.
SecurityWeek – Read More
Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery
/in General NewsCybersecurity researchers have disclosed a surge in “mass scanning, credential brute-forcing, and exploitation attempts” originating from IP addresses associated with a Russian bulletproof hosting service provider named Proton66.
The activity, detected since January 8, 2025, targeted organizations worldwide, according to a two-part analysis published by Trustwave SpiderLabs last week.
“Net
The Hacker News – Read More
Palantir exec defends company’s immigration surveillance work
/in General NewsOne of the founders of startup accelerator Y Combinator offered unsparing criticism this weekend of the controversial data analytics company Palantir, leading a company executive to offer an extensive defense of Palantir’s work. The back-and-forth came after federal filings showed that U.S. Immigration and Customs Enforcement (ICE) — tasked with carrying out the Trump administration’s […]
Security News | TechCrunch – Read More
APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures
/in General NewsThe Russian state-sponsored threat actor known as APT29 has been linked to an advanced phishing campaign that’s targeting diplomatic entities across Europe with a new variant of WINELOADER and a previously unreported malware loader codenamed GRAPELOADER.
“While the improved WINELOADER variant is still a modular backdoor used in later stages, GRAPELOADER is a newly observed initial-stage tool
The Hacker News – Read More
Chinese APT IronHusky Deploys Updated MysterySnail RAT on Russia
/in General NewsKaspersky researchers report the reappearance of MysterySnail RAT, a malware linked to Chinese IronHusky APT, targeting Mongolia and…
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
Cozy Bear’s Wine Lure Drops WineLoader Malware on EU Diplomats
/in General NewsMidnight Blizzard (APT29/Cozy Bear) targets European embassies and Ministries of Foreign Affairs with sophisticated phishing emails disguised as…
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems
/in General NewsCybersecurity researchers have uncovered three malicious packages in the npm registry that masquerade as a popular Telegram bot library but harbor SSH backdoors and data exfiltration capabilities.
The packages in question are listed below –
node-telegram-utils (132 downloads)
node-telegram-bots-api (82 downloads)
node-telegram-util (73 downloads)
According to supply chain
The Hacker News – Read More
Florida Man Enters the Encryption Wars
/in General NewsPlus: A US judge rules against police cell phone “tower dumps,” China names alleged NSA agents it says were involved in cyberattacks, and Customs and Border Protection reveals its social media spying tools.
Security Latest – Read More
ASUS Confirms Critical Flaw in AiCloud Routers; Users Urged to Update Firmware
/in General NewsASUS has disclosed a critical security flaw impacting routers with AiCloud enabled that could permit remote attackers to perform unauthorized execution of functions on susceptible devices.
The vulnerability, tracked as CVE-2025-2492, has a CVSS score of 9.2 out of a maximum of 10.0.
“An improper authentication control vulnerability exists in certain ASUS router firmware series,”
The Hacker News – Read More