BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
EmEditor Homepage Download Button Served Malware for 4 Days
/in General NewsWarning for EmEditor users: A third-party breach tampered with the official download link between Dec 19–22, 2025. Learn how to identify the fake installer and protect your data from infostealer malware.
Hackread – Cybersecurity News, Data Breaches, AI, and More – Read More
8 Cybersecurity Acquisitions Surpassed $1 Billion Mark in 2025
/in General NewsThe total disclosed value for all the cybersecurity M&A deals announced in 2025 exceeded $84 billion.
The post 8 Cybersecurity Acquisitions Surpassed $1 Billion Mark in 2025 appeared first on SecurityWeek.
SecurityWeek – Read More
How to Integrate AI into Modern SOC Workflows
/in General NewsArtificial intelligence (AI) is making its way into security operations quickly, but many practitioners are still struggling to turn early experimentation into consistent operational value. This is because SOCs are adopting AI without an intentional approach to operational integration. Some teams treat it as a shortcut for broken processes. Others attempt to apply machine learning to problems
The Hacker News – Read More
Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit
/in General NewsThe threat actor uses a signed driver file containing two user-mode shellcodes to execute its ToneShell backdoor.
The post Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit appeared first on SecurityWeek.
SecurityWeek – Read More
Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware
/in General NewsThe threat actor known as Silver Fox has turned its focus to India, using income tax-themed lures in phishing campaigns to distribute a modular remote access trojan called ValleyRAT (aka Winos 4.0).
“This sophisticated attack leverages a complex kill chain involving DLL hijacking and the modular Valley RAT to ensure persistence,” CloudSEK researchers Prajwal Awasthi and Koushik Pal said in an
The Hacker News – Read More
Korean Air Data Compromised in Oracle EBS Hack
/in General NewsRoughly 30,000 Korean Air employees had their data stolen by hackers in a breach at former subsidiary KC&D.
The post Korean Air Data Compromised in Oracle EBS Hack appeared first on SecurityWeek.
SecurityWeek – Read More
Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor
/in General NewsThe Chinese hacking group known as Mustang Panda has leveraged a previously undocumented kernel-mode rootkit driver to deliver a new variant of backdoor dubbed TONESHELL in a cyber attack detected in mid-2025 targeting an unspecified entity in Asia.
The findings come from Kaspersky, which observed the new backdoor variant in cyber espionage campaigns mounted by the hacking group targeting
The Hacker News – Read More
AI killed the cloud-first strategy: Why hybrid computing is the only way forward now
/in General NewsFive years ago, cloud was the answer to everything. With AI, that’s no longer so clear.
Latest news – Read More
Why your coding skills are more essential than ever in the AI age
/in General NewsAI-generated code ‘demands more rigorous verification, not less.’
Latest news – Read More
Finally, Bluetooth trackers for Android users that function even better than AirTags (and they’re on sale)
/in General NewsChipolo’s One and Card Point trackers are tried-and-tested options for users who want to keep tabs on their personal items.
Latest news – Read More