An ongoing campaign is targeting npm developers with hundreds of typosquat versions of their legitimate counterparts in an attempt to trick them into running cross-platform malware.
The attack is notable for utilizing Ethereum smart contracts for command-and-control (C2) server address distribution, according to independent findings from Checkmarx, Phylum, and Socket published over the past few
Canadian law enforcement authorities have arrested an individual who is suspected to have conducted a series of hacks stemming from the breach of cloud data warehousing platform Snowflake earlier this year.
The individual in question, Alexander “Connor” Moucka (aka Judische and Waifu), was apprehended on October 30, 2024, on the basis of a provisional arrest warrant, following a request by the
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-05 07:07:292024-11-05 07:07:29Canadian Suspect Arrested Over Snowflake Data Breach and Extortion Attacks
The Iran-linked group Emennet Pasargad aims to undermine public confidence in Israeli and Western nations by using hack-and-leak campaigns and disrupting government services, including elections.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-05 07:07:282024-11-05 07:07:28Iranian APT Group Targets IP Cameras, Extends Attacks Beyond Israel
Google has warned that a security flaw impacting its Android operating system has come under active exploitation in the wild.
The vulnerability, tracked as CVE-2024-43093, has been described as a privilege escalation flaw in the Android Framework component that could result in unauthorized access to “Android/data,” “Android/obb,” and “Android/sandbox” directories and its sub-directories,
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-05 04:06:432024-11-05 04:06:43Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System
The Pakistan-based advanced persistent threat actor has been carrying on a cyber-espionage campaign targeting organizations on the subcontinent for more than a decade, and it’s now using a new and improved “ElizaRAT” malware.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-04 23:06:432024-11-04 23:06:43APT36 Refines Tools in Attacks on Indian Targets
UC San Diego and Tsinghua University researchers develop breakthrough AI method that teaches small language models when to use tools versus internal knowledge, achieving 28% better accuracy while using fewer resources than larger models like GPT-4.Read More
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-04 20:06:522024-11-04 20:06:52UC San Diego, Tsinghua University researchers just made AI way better at knowing when to ask for help
As businesses worry over deepfake scams and other AI attacks, organizations are adding guidance for cybersecurity teams on how to detect, and respond to, next-generation threats. That includes Exabeam, which was recently targeted by a deepfaked job candidate.
BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Malware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packages
/in General NewsAn ongoing campaign is targeting npm developers with hundreds of typosquat versions of their legitimate counterparts in an attempt to trick them into running cross-platform malware.
The attack is notable for utilizing Ethereum smart contracts for command-and-control (C2) server address distribution, according to independent findings from Checkmarx, Phylum, and Socket published over the past few
The Hacker News – Read More
Canadian Suspect Arrested Over Snowflake Data Breach and Extortion Attacks
/in General NewsCanadian law enforcement authorities have arrested an individual who is suspected to have conducted a series of hacks stemming from the breach of cloud data warehousing platform Snowflake earlier this year.
The individual in question, Alexander “Connor” Moucka (aka Judische and Waifu), was apprehended on October 30, 2024, on the basis of a provisional arrest warrant, following a request by the
The Hacker News – Read More
Iranian APT Group Targets IP Cameras, Extends Attacks Beyond Israel
/in General NewsThe Iran-linked group Emennet Pasargad aims to undermine public confidence in Israeli and Western nations by using hack-and-leak campaigns and disrupting government services, including elections.
darkreading – Read More
Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System
/in General NewsGoogle has warned that a security flaw impacting its Android operating system has come under active exploitation in the wild.
The vulnerability, tracked as CVE-2024-43093, has been described as a privilege escalation flaw in the Android Framework component that could result in unauthorized access to “Android/data,” “Android/obb,” and “Android/sandbox” directories and its sub-directories,
The Hacker News – Read More
Schneider Electric says hackers accessed internal project execution tracking platform
/in General NewsFrench multinational Schneider Electric confirmed on Monday that it is investigating a cyberattack following confirmation of a breach.
The Record from Recorded Future News – Read More
APT36 Refines Tools in Attacks on Indian Targets
/in General NewsThe Pakistan-based advanced persistent threat actor has been carrying on a cyber-espionage campaign targeting organizations on the subcontinent for more than a decade, and it’s now using a new and improved “ElizaRAT” malware.
darkreading – Read More
Okta Fixes Auth Bypass Bug After 3-Month Lull
/in General NewsThe bug affected accounts with 52-character user names, and had several pre-conditions that needed to be met in order to be exploited.
darkreading – Read More
Cisco notifies ‘limited set’ of customers after hacker accessed non-public files
/in General NewsThe company has said it didn’t suffer a breach, but announced a threat actor downloaded data on a public-facing DevHub environment.
The Record from Recorded Future News – Read More
UC San Diego, Tsinghua University researchers just made AI way better at knowing when to ask for help
/in General NewsUC San Diego and Tsinghua University researchers develop breakthrough AI method that teaches small language models when to use tools versus internal knowledge, achieving 28% better accuracy while using fewer resources than larger models like GPT-4.Read More
Security News | VentureBeat – Read More
OWASP Beefs Up GenAI Security Guidance Amid Growing Deepfakes
/in General NewsAs businesses worry over deepfake scams and other AI attacks, organizations are adding guidance for cybersecurity teams on how to detect, and respond to, next-generation threats. That includes Exabeam, which was recently targeted by a deepfaked job candidate.
darkreading – Read More