BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Hackers Using Fake Microsoft ADFS Login Pages to Steal Credentials
/in General NewsA global phishing campaign is actively exploiting a legacy Microsoft authentication system to steal user credentials and bypass multi-factor authentication (MFA), targeting over 150 organizations.
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers
/in General NewsThe Taiwanese hardware maker says it has no plans patch the flaws impacting legacy router models
© 2024 TechCrunch. All rights reserved. For personal use only.
Security News | TechCrunch – Read More
CISA Issues Exploitation Warning for .NET Vulnerability
/in General NewsCISA has added CVE-2024-29059, a flaw affecting Microsoft .NET, to its Known Exploited Vulnerabilities catalog.
The post CISA Issues Exploitation Warning for .NET Vulnerability appeared first on SecurityWeek.
SecurityWeek – Read More
Zyxel Issues ‘No Patch’ Warning for Exploited Zero-Days
/in General NewsMultiple Zyxel legacy DSL CPE products are affected by exploited zero-day vulnerabilities that will not be patched.
The post Zyxel Issues ‘No Patch’ Warning for Exploited Zero-Days appeared first on SecurityWeek.
SecurityWeek – Read More
CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25
/in General NewsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.
The list of vulnerabilities is as follows –
CVE-2024-45195 (CVSS score: 7.5/9.8) – A forced browsing vulnerability in Apache OFBiz that allows a remote attacker to obtain unauthorized
The Hacker News – Read More
Researchers warn of risks tied to abandoned cloud storage buckets
/in General NewsCloud storage tools used by military, government and even cybersecurity organizations around the world have been left abandoned by their users, exposing them to a wide variety of security risks.
The Record from Recorded Future News – Read More
Sophos Acquires Secureworks for $859 Million
/in General NewsSophos has completed its acquisition of managed cyber security services provider Secureworks.
Security | TechRepublic – Read More
Credential Theft Becomes Cybercriminals’ Favorite Target
/in General NewsResearchers measured a threefold increase in credential stealing between 2023 and 2024, with more than 11.3 million such thefts last year.
darkreading – Read More
U.K. Announces ‘World-First’ Cyber Code of Practice for Companies Developing AI
/in General NewsThe Cyber Code of Practice applies to developers, system operators, and organisations that create, deploy, or manage AI systems.
Security | TechRepublic – Read More
Ferret Malware Added to ‘Contagious Interview’ Campaign
/in General NewsTargets are lured into a fake interview process that convinces them to download malware needed for a virtual interview.
darkreading – Read More