BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
US sanctions Chinese cyber firm for compromising ‘thousands’ of firewalls in 2020
/in General NewsSichuan Silence Information Technology Company and one of its employees, Guan Tianfeng, were the targets of the sanctions, and the Justice Department indicted Guan for his role in the attacks. The State Department also issued a $10 million reward for additional information on the company or Guan.
The Record from Recorded Future News – Read More
Wyden seeks stricter telecom cyber standards following Salt Typhoon breach
/in General NewsWyden’s bill would require the FCC to implement security requirements for telecom carriers that were originally included in a 1994 federal law but that the agency never fully acted upon.
The Record from Recorded Future News – Read More
Cybercrime Gangs Abscond With Thousands of AWS Credentials
/in General NewsThe Nemesis and ShinyHunters attackers scanned millions of IP addresses to find exploitable cloud-based flaws, though their operation ironically was discovered due to a cloud misconfiguration of their own doing.
darkreading – Read More
US Senator announces new bill to secure telecom companies in wake of Chinese hacks
/in General NewsU.S. Democratic Senator Ron Wyden announced a new draft bill with the goal of securing American telephone networks and Americans’ communications in response to the massive hack of telecom providers allegedly done by Chinese government hackers. In a press release on Tuesday, Wyden announced the Secure American Communications Act. The bill would order the Federal […]
© 2024 TechCrunch. All rights reserved. For personal use only.
Security News | TechCrunch – Read More
Cleo File Transfer Tool Vulnerability Exploited in Wild Against Enterprises
/in General NewsCVE-2024-50623, an improperly patched vulnerability affecting Cleo file transfer tools, has been exploited in the wild.
The post Cleo File Transfer Tool Vulnerability Exploited in Wild Against Enterprises appeared first on SecurityWeek.
SecurityWeek – Read More
Lessons From the Largest Software Supply Chain Incidents
/in General NewsThe software supply chain is a growing target, and organizations need to take special care to safeguard it.
darkreading – Read More
Hackers Target Job Seekers with AppLite Trojan Using Fake Job Emails
/in General NewsSUMMARY AppLite banking trojan is a newly discovered stealthy mobile malware threat targeting mobile devices. Learn about its…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Cybersecurity News Round-Up 2024: 10 Biggest Stories That Dominated the Year
/in General NewsTechRepublic looks back at the biggest cybersecurity stories of 2024, from record data breaches to rising ransomware threats and CISO burnout.
Security | TechRepublic – Read More
Cohesity completes its merger with Veritas; here’s how they’ll integrate
/in General NewsData protection startup Cohesity completed its merger with Veritas’ enterprise data protection business, creating one entity with 12,000 customers that is valued at $7 billion. The deal was originally announced in February 2024. Cohesity valued Carlyle-owned Veritas’ data protection business at $3 billion at the time, according to CRN reporting. Cohesity declined to comment on […]
© 2024 TechCrunch. All rights reserved. For personal use only.
Security News | TechCrunch – Read More
EU Cyber Resilience Act: What You Need to Know
/in General NewsManufacturers, importers, and distributors of products with digital components operating in the E.U. must comply.
Security | TechRepublic – Read More