BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
75 million deepfakes blocked: Persona leads the corporate fight against hiring fraud
/in General NewsPersona blocks 75 million fake job candidates as AI hiring fraud explodes across corporate America, forcing companies to deploy advanced identity verification tools to combat deepfake infiltration.Read More
Security News | VentureBeat – Read More
2 clever ways Android 16 guards your security – but you need to enable them
/in General NewsOnce you turn on these new Android 16 security features, your information and phone will be better protected against harm.
Latest stories for ZDNET in Security – Read More
US bans WhatsApp from House of Representatives staff devices
/in General NewsThe U.S. government has banned WhatsApp from devices used by U.S. House of Representatives staff, saying the app poses potential security risks.
Security News | TechCrunch – Read More
Prometei Botnet Activity Spikes
/in General NewsPalo Alto Networks has observed a spike in Prometei activity since March 2025, pointing to a resurgence of the botnet.
The post Prometei Botnet Activity Spikes appeared first on SecurityWeek.
SecurityWeek – Read More
Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network
/in General NewsMisconfigured Docker instances are the target of a campaign that employs the Tor anonymity network to stealthily mine cryptocurrency in susceptible environments.
“Attackers are exploiting misconfigured Docker APIs to gain access to containerized environments, then using Tor to mask their activities while deploying crypto miners,” Trend Micro researchers Sunil Bharti and Shubham Singh said in an
The Hacker News – Read More
Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives
/in General NewsThe future of secure digital engagement depends on continuous identity verification and proofing that can scale with risk.
The post Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives appeared first on SecurityWeek.
SecurityWeek – Read More
Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play
/in General NewsNewly discovered spyware has sneaked into Apple’s App Store and Google Play to steal images from users’ mobile devices.
The post Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play appeared first on SecurityWeek.
SecurityWeek – Read More
U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues
/in General NewsThe U.S. House of Representatives has formally banned congressional staff members from using WhatsApp on government-issued devices, citing security concerns.
The development was first reported by Axios.
The decision, according to the House Chief Administrative Officer (CAO), was motivated by worries about the app’s security.
“The Office of Cybersecurity has deemed WhatsApp a high-risk to users
The Hacker News – Read More
Chinese APT Hacking Routers to Build Espionage Infrastructure
/in General NewsA Chinese APT has been infecting SOHO routers with the ShortLeash backdoor to build stealthy espionage infrastructure.
The post Chinese APT Hacking Routers to Build Espionage Infrastructure appeared first on SecurityWeek.
SecurityWeek – Read More
Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams
/in General NewsTech support scammers are using sponsored ads and search parameter injection to trick users into calling them.
The post Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams appeared first on SecurityWeek.
SecurityWeek – Read More