Auxia secures $23.5M to help enterprises leverage first-party data with AI agents, boosting customer lifetime value by 84% and solving the costly customer reacquisition problem.Read More
Dark Caracal, a group suspected of cyber mercenary activities, appeared to shift to a new espionage tool in a campaign aimed at Latin American targets, according to researchers.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-04 14:07:032025-03-04 14:07:03Dark Caracal group might have refreshed its malware, researchers say
Salesforce launches AgentExchange, a new AI marketplace that lets businesses deploy automated AI agents to streamline work, enhance productivity, and tap into the $6 trillion digital labor market.Read More
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-04 13:07:022025-03-04 13:07:02Salesforce’s AgentExchange launches with 200+ partners to automate your boring work tasks
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-04 12:07:112025-03-04 12:07:11Google Patches Pair of Exploited Vulnerabilities in Android
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-04 12:07:102025-03-04 12:07:10New Chinese Zhong Stealer Infects Fintech via Customer Support
Internet service providers (ISPs) in China and the West Coast of the United States have become the target of a mass exploitation campaign that deploys information stealers and cryptocurrency miners on compromised hosts.
The findings come from the Splunk Threat Research Team, which said the activity also led to the delivery of various binaries that facilitate data exfiltration as well as offer
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-04 11:07:132025-03-04 11:07:13Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-04 11:07:122025-03-04 11:07:12Exploitation Long Known for Most of CISA’s Latest KEV Additions
Threat hunters are calling attention to a new highly-targeted phishing campaign that singled out “fewer than five” entities in the United Arab Emirates (U.A.E.) to deliver a previously undocumented Golang backdoor dubbed Sosano.
The malicious activity was specifically directed against aviation and satellite communications organizations, according to Proofpoint, which detected it in late October
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-04 11:07:122025-03-04 11:07:12Suspected Iranian Hackers Used Compromised Indian Firm’s Email to Target U.A.E. Aviation Sector
BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Auxia raises $23.5 million to tackle enterprise marketing’s ‘reacquisition treadmill’
/in General NewsAuxia secures $23.5M to help enterprises leverage first-party data with AI agents, boosting customer lifetime value by 84% and solving the costly customer reacquisition problem.Read More
Security News | VentureBeat – Read More
Dark Caracal group might have refreshed its malware, researchers say
/in General NewsDark Caracal, a group suspected of cyber mercenary activities, appeared to shift to a new espionage tool in a campaign aimed at Latin American targets, according to researchers.
The Record from Recorded Future News – Read More
Broadcom Patches 3 VMware Zero-Days Exploited in the Wild
/in General NewsBroadcom patched VMware zero-days CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226 after Microsoft warned it of exploitation.
The post Broadcom Patches 3 VMware Zero-Days Exploited in the Wild appeared first on SecurityWeek.
SecurityWeek – Read More
Salesforce’s AgentExchange launches with 200+ partners to automate your boring work tasks
/in General NewsSalesforce launches AgentExchange, a new AI marketplace that lets businesses deploy automated AI agents to streamline work, enhance productivity, and tap into the $6 trillion digital labor market.Read More
Security News | VentureBeat – Read More
Vulnerabilities Patched in Qualcomm, Mediatek Chipsets
/in General NewsChip makers Qualcomm and Mediatek have released patches for many vulnerabilities across their products.
The post Vulnerabilities Patched in Qualcomm, Mediatek Chipsets appeared first on SecurityWeek.
SecurityWeek – Read More
Google Patches Pair of Exploited Vulnerabilities in Android
/in General NewsAndroid’s March 2025 security update addresses over 40 vulnerabilities, including two actively exploited in the wild.
The post Google Patches Pair of Exploited Vulnerabilities in Android appeared first on SecurityWeek.
SecurityWeek – Read More
New Chinese Zhong Stealer Infects Fintech via Customer Support
/in General NewsA new malware threat called Zhong Stealer has surfaced from China, and it’s already slipping into businesses through…
Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News – Read More
Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers
/in General NewsInternet service providers (ISPs) in China and the West Coast of the United States have become the target of a mass exploitation campaign that deploys information stealers and cryptocurrency miners on compromised hosts.
The findings come from the Splunk Threat Research Team, which said the activity also led to the delivery of various binaries that facilitate data exfiltration as well as offer
The Hacker News – Read More
Exploitation Long Known for Most of CISA’s Latest KEV Additions
/in General NewsExploitation has been known for months or years for most of the latest vulnerabilities added by CISA to its KEV catalog.
The post Exploitation Long Known for Most of CISA’s Latest KEV Additions appeared first on SecurityWeek.
SecurityWeek – Read More
Suspected Iranian Hackers Used Compromised Indian Firm’s Email to Target U.A.E. Aviation Sector
/in General NewsThreat hunters are calling attention to a new highly-targeted phishing campaign that singled out “fewer than five” entities in the United Arab Emirates (U.A.E.) to deliver a previously undocumented Golang backdoor dubbed Sosano.
The malicious activity was specifically directed against aviation and satellite communications organizations, according to Proofpoint, which detected it in late October
The Hacker News – Read More