BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
ShinyHunters-Branded Extortion Activity Expands, Escalates
/in General NewsHackers rely on evolved vishing and login harvesting to compromise SSO credentials for unauthorized MFA enrollment.
The post ShinyHunters-Branded Extortion Activity Expands, Escalates appeared first on SecurityWeek.
SecurityWeek – Read More
Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack
/in General NewsA hacker published malicious versions of four established VS Code extensions to distribute a GlassWorm malware loader.
The post Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack appeared first on SecurityWeek.
SecurityWeek – Read More
I tried a Claude Code alternative that’s local, open source, and completely free – how it works
/in General NewsI was curious if Block’s Goose agent, paired with Ollama and the Qwen3-coder model, could really replace Claude Code. Here’s how I got started.
Latest news – Read More
Spotify and Major Music Labels Sue Anna’s Archive for $13 Trillion
/in General NewsSpotify and the Big Three labels have filed a record-breaking $13 trillion lawsuit against Anna’s Archive over a massive music data scrape. Find out what this means for the future of digital music.
Hackread – Cybersecurity News, Data Breaches, AI, and More – Read More
Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities
/in General NewsPoland’s CERT has published a report on the recent attack, providing new details on targeted ICS and attribution.
The post Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities appeared first on SecurityWeek.
SecurityWeek – Read More
Notepad++ hijacked by suspected state-sponsored hackers
/in General NewsIn a security update posted on the project’s website, the development team said the attack did not exploit a flaw in the editor’s source code itself. Instead, the compromise occurred at the infrastructure level, involving systems used to deliver software updates.
The Record from Recorded Future News – Read More
Hackers attempt to extort parents after school refuses to pay ransom fee
/in General NewsThe attackers are believed to have gained access to the internal networks of OLV Pulhof, a secondary school in the Berchem district of Antwerp, shortly after the Christmas break.
The Record from Recorded Future News – Read More
Cyber Insights 2026: Malware and Cyberattacks in the Age of AI
/in General NewsSecurity leaders share how artificial intelligence is changing malware, ransomware, and identity-led intrusions, and how defenses must evolve.
The post Cyber Insights 2026: Malware and Cyberattacks in the Age of AI appeared first on SecurityWeek.
SecurityWeek – Read More
3 security gadgets I never leave home without (and they’re more affordable than you’d think)
/in General NewsThese must-have tools help protect against hacking and data loss, without costing an arm and a leg.
Latest news – Read More
The best online collaboration software of 2026: Expert tested
/in General NewsCollaborating online means communication, file sharing, and task management. Here are the tools to stay connected with teammates without sacrificing personal boundaries.
Latest news – Read More