BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools
/in General NewsCybersecurity researchers have disclosed a malicious campaign that leverages search engine optimization (SEO) poisoning techniques to deliver a known malware loader called Oyster (aka Broomstick or CleanUpLoader).
The malvertising activity, per Arctic Wolf, promotes fake websites hosting trojanized versions of legitimate tools like PuTTY and WinSCP, aiming to trick software professionals
The Hacker News – Read More
IT company Ingram Micro says ransomware targeted internal systems
/in General NewsIngram Micro published a statement on Saturday saying it discovered “ransomware on certain of its internal systems,” which it immediately took offline.
The Record from Recorded Future News – Read More
Chrome Store Features Extension Poisoned With Sophisticated Spyware
/in General NewsA color picker for Google’s browser with more than 100,000 downloads hijacks sessions every time a user navigates to a new webpage and also redirects them to malicious sites.
darkreading – Read More
Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks
/in General NewsThe notorious Hive successor ceases ransomware operations but pivots to pure data extortion under the new World Leaks brand.
The post Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks appeared first on SecurityWeek.
SecurityWeek – Read More
How Let’s Encrypt made the internet safer and HTTPS standard – and free
/in General NewsOver the last ten years, more than 600 million websites have been secured with free certificates from Let’s Encrypt. Here’s how it all began and why.
Latest stories for ZDNET in Security – Read More
Ingram Micro Scrambling to Restore Systems After Ransomware Attack
/in General NewsThe IT products and services giant did not say how the intrusion occurred or whether any data was stolen from its systems.
The post Ingram Micro Scrambling to Restore Systems After Ransomware Attack appeared first on SecurityWeek.
SecurityWeek – Read More
Ingram Micro says ongoing outage caused by ransomware attack
/in General NewsIngram Micro is one of the largest distributors of tech and cloud products.
Security News | TechCrunch – Read More
SatanLock Ransomware Ends Operations, Says Stolen Data Will Be Leaked
/in General NewsSatanLock ransomware gang shuts down after weeks of attacks and plans to leak stolen victim data. Group linked to Babuk-Bjorka and GD Lockersec families.
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
Manufacturing Security: Why Default Passwords Must Go
/in General NewsIf you didn’t hear about Iranian hackers breaching US water facilities, it’s because they only managed to control a single pressure station serving 7,000 people. What made this attack noteworthy wasn’t its scale, but how easily the hackers gained access — by simply using the manufacturer’s default password “1111.” This narrow escape prompted CISA to urge manufacturers to
The Hacker News – Read More
⚡ Weekly Recap: Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More
/in General NewsEverything feels secure—until one small thing slips through. Even strong systems can break if a simple check is missed or a trusted tool is misused. Most threats don’t start with alarms—they sneak in through the little things we overlook. A tiny bug, a reused password, a quiet connection—that’s all it takes.
Staying safe isn’t just about reacting fast. It’s about catching these early signs
The Hacker News – Read More