BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
New Linux Rootkit PUMAKIT Uses Advanced Stealth Techniques to Evade Detection
/in General NewsCybersecurity researchers have uncovered a new Linux rootkit called PUMAKIT that comes with capabilities to escalate privileges, hide files and directories, and conceal itself from system tools, while simultaneously evading detection.
“PUMAKIT is a sophisticated loadable kernel module (LKM) rootkit that employs advanced stealth mechanisms to hide its presence and maintain communication with
The Hacker News – Read More
As the Mastermind of Far-Right ‘Active Clubs’ Goes to Prison, His Violent Movement Goes Global
/in General NewsThe white supremacist Robert Rundo faces years in prison. But the “Active Club” network he helped create has proliferated in countries around the world, from Eastern Europe to South America.
Security Latest – Read More
FBI Busts Rydox Marketplace with 7,600 PII Sales, Cryptocurrency Worth $225K Seized
/in General NewsThe U.S. Department of Justice (DoJ) on Thursday announced the shutdown of an illicit marketplace called Rydox (“rydox.ru” and “rydox[.]cc”) for selling stolen personal information, access devices, and other tools for conducting cybercrime and fraud.
In tandem, three Kosovo nationals and administrators of the service, Ardit Kutleshi, Jetmir Kutleshi, and Shpend Sokoli, have been arrested. Ardit
The Hacker News – Read More
‘Dubai Police’ Lures Anchor Wave of UAE Mobile Attacks
/in General NewsA sophisticated social engineering cybercrime campaign bent on financial gain was observed being run from Tencent servers in Singapore.
darkreading – Read More
Cleo urges customers to ‘immediately’ apply new patch as researchers discover new malware
/in General NewsThe bug was initially tagged as CVE-2024-50623 in October and patched by the company, but researchers from cybersecurity firm Huntress discovered that systems were still vulnerable even after applying the fix.
The Record from Recorded Future News – Read More
Professions That Are the Most Exposed to Cybersecurity Threats
/in General NewsExplore the professions most vulnerable to cybersecurity threats in 2025, from IT pros to crypto investors. Learn how…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
The Growing Importance of Secure Crypto Payment Gateways
/in General NewsLearn how cryptocurrency’s rapid growth brings risks like fake payment gateways and online scams. Discover tips to stay…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
336K Prometheus Instances Exposed to DoS, ‘Repojacking’
/in General NewsOpen source Prometheus servers and exporters are leaking plaintext passwords and tokens, along with API addresses of internal locations.
darkreading – Read More
Chinese Cops Caught Using Android Spyware to Track Mobile Devices
/in General NewsLaw enforcement across mainland China have been using EagleMsgSpy surveillance tool to collect mobile device data since at least 2017, new research shows.
darkreading – Read More
IoT Cloud Cracked by ‘Open Sesame’ Over-the-Air Attack
/in General NewsResearchers demonstrate how to hack Ruijie Reyee access points without Wi-Fi credentials or even physical access to the device.
darkreading – Read More