BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Wing Security SaaS Pulse: Continuous Security & Actionable Insights — For Free
/in General NewsDesigned to be more than a one-time assessment— Wing Security’s SaaS Pulse provides organizations with actionable insights and continuous oversight into their SaaS security posture—and it’s free!
Introducing SaaS Pulse: Free Continuous SaaS Risk Management
Just like waiting for a medical issue to become critical before seeing a doctor, organizations can’t afford to overlook the constantly
The Hacker News – Read More
LummaC2 Stealer and Malicious Chrome Extension Wreak Havoc
/in General NewsThis attack begins with victims unknowingly downloading a malicious ZIP archive containing an installer file that sideloads a malicious DLL. This DLL then downloads the LummaC2 Stealer and a PowerShell script from a command-and-control server.
Cyware News – Latest Cyber News – Read More
Feds Warn Health Sector to Patch Apache Tomcat Flaws
/in General NewsThe Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center highlighted the ongoing discovery of vulnerabilities in Tomcat that pose a risk to organizations.
Cyware News – Latest Cyber News – Read More
Unmasking PackXOR: The FIN7 Packer Exposed
/in General NewsDespite its connection to FIN7, other threat actors have also employed PackXOR to distribute payloads like XMRig cryptominer and R77 rootkit, often in conjunction with SilentCryptoMiner.
Cyware News – Latest Cyber News – Read More
One Million US Kaspersky Customers Transferred to Pango’s UltraAV
/in General NewsKaspersky’s customers in the US are being acquired by cybersecurity firm Pango and will be offered UltraAV antimalware software.
The post One Million US Kaspersky Customers Transferred to Pango’s UltraAV appeared first on SecurityWeek.
SecurityWeek – Read More
New Android SpyAgent Malware Uses OCR to Steal Crypto Wallet Recovery Keys
/in General NewsAndroid device users in South Korea have emerged as a target of a new mobile malware campaign that delivers a new type of threat dubbed SpyAgent.
The malware “targets mnemonic keys by scanning for images on your device that might contain them,” McAfee Labs researcher SangRyol Ryu said in an analysis, adding the targeting footprint has broadened in scope to include the U.K.
The campaign makes use
The Hacker News – Read More
Absolute Purchases Syxsense to Tackle Cyber Vulnerabilities
/in General NewsAbsolute Security has acquired Syxsense, an endpoint and vulnerability management provider, to enhance its cyber resilience platform. The acquisition aims to simplify patching and remediation through automated workloads.
Cyware News – Latest Cyber News – Read More
Critical Flaw in IBM webMethods Integration Demand Immediate Action
/in General NewsIBM webMethods Integration Server is hit by a critical flaw (CVE-2024-45076) with a CVSS score of 9. 9, demanding urgent attention. This flaw allows authenticated users to execute arbitrary commands, escalate privileges, and access sensitive files.
Cyware News – Latest Cyber News – Read More
Red Hat Issues Critical Patch for Pulpcore Authentication Bypass Flaw (CVE-2024-7923)
/in General NewsRed Hat has issued a critical security advisory for an authentication bypass vulnerability (CVE-2024-7923) in Pulpcore, a content management system used in Red Hat Satellite deployments.
Cyware News – Latest Cyber News – Read More
What is a TPM, and why does Windows 11 require one?
/in General NewsOfficially, Windows 11 requires a Trusted Platform Module. Here’s what it does and how you can work around that requirement if your old PC doesn’t have one.
Latest stories for ZDNET in Security – Read More