BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
RondoDox Botnet Exploiting React2Shell Vulnerability
/in General NewsIn December, the botnet’s operators focused on weaponizing the flaw to compromise vulnerable Next.js servers.
The post RondoDox Botnet Exploiting React2Shell Vulnerability appeared first on SecurityWeek.
SecurityWeek – Read More
The ROI Problem in Attack Surface Management
/in General NewsAttack Surface Management (ASM) tools promise reduced risk. What they usually deliver is more information.
Security teams deploy ASM, asset inventories grow, alerts start flowing, and dashboards fill up. There is visible activity and measurable output. But when leadership asks a simple question, “Is this reducing incidents?” the answer is often unclear.
This gap between effort and
The Hacker News – Read More
Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign
/in General NewsCybersecurity researchers have disclosed details of a phishing campaign that involves the attackers impersonating legitimate Google-generated messages by abusing Google Cloud’s Application Integration service to distribute emails.
The activity, Check Point said, takes advantage of the trust associated with Google Cloud infrastructure to send the messages from a legitimate email address (”
The Hacker News – Read More
How we test portable power stations at ZDNET in 2026
/in General NewsWe’ve tested over 100 portable power stations in recent years. Here’s how we make sure they’re worth recommending to you.
Latest news – Read More
How Protesters Became Content for the Cops
/in General NewsThe tactics behind protest policing are changing—from one of cooperation to intentional antagonism for political marketing purposes.
Security Latest – Read More
My new favorite keychain tool gets just about any job done – at a reasonable price
/in General NewsThe K3 Ultramulti EDC keychain tool is multifunctional, combining a flashlight, laser pointer, and lighter into one convenient device.
Latest news – Read More
How Webflow Helps Companies Move Faster Without Sacrificing Brand Control
/in General NewsConventional development frequently results in a trade-off between speed and brand consistency, which harms reputation by causing delays…
Hackread – Cybersecurity News, Data Breaches, AI, and More – Read More
ThreatsDay Bulletin: GhostAd Drain, macOS Attacks, Proxy Botnets, Cloud Exploits, and 12+ Stories
/in General NewsThe first ThreatsDay Bulletin of 2026 lands on a day that already feels symbolic — new year, new breaches, new tricks. If the past twelve months taught defenders anything, it’s that threat actors don’t pause for holidays or resolutions. They just evolve faster. This week’s round-up shows how subtle shifts in behavior, from code tweaks to job scams, are rewriting what “cybercrime” looks like in
The Hacker News – Read More
This new Linux desktop runs like an app on your existing desktop – and I highly recommend it
/in General NewsPortable and modular, Orbitiny runs on top of your existing window manager – such as KDE Plasma or GNOME – like a regular app.
Latest news – Read More
The most premium work laptop I tested in 2025 lets you finally ditch Wi-Fi for good
/in General NewsMicrosoft’s Surface Laptop 5G combines a positively premium build with an always-on connection.
Latest news – Read More