BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
UK’s secret iCloud backdoor order triggers civil rights challenge
/in General NewsThe U.K. government’s secret order to Apple demanding it backdoor the end-to-end encrypted version of its iCloud storage service has now been challenged by two civil rights groups, Liberty and Privacy International, which filed complaints Thursday. They called the order “unacceptable and disproportionate” and warned of “global consequences” as the access order is thought to […]
© 2024 TechCrunch. All rights reserved. For personal use only.
Security News | TechCrunch – Read More
A New Era of Attacks on Encryption Is Starting to Heat Up
/in General NewsThe UK, France, Sweden, and EU have made fresh attacks on end-to-end encryption. Some of the attacks are more “crude” than those in recent years, experts say.
Security Latest – Read More
Recent Fortinet Vulnerabilities Exploited in ‘SuperBlack’ Ransomware Attacks
/in General NewsThe newly discovered SuperBlack ransomware has been exploiting two vulnerabilities in Fortinet firewalls.
The post Recent Fortinet Vulnerabilities Exploited in ‘SuperBlack’ Ransomware Attacks appeared first on SecurityWeek.
SecurityWeek – Read More
New MassJacker Malware Targets Piracy Users, Hijacking Cryptocurrency Transactions
/in General NewsUsers searching for pirated software are the target of a new malware campaign that delivers a previously undocumented clipper malware called MassJacker, according to findings from CyberArk.
Clipper malware is a type of cryware (as coined by Microsoft) that’s designed to monitor a victim’s clipboard content and facilitate cryptocurrency theft by substituting copied cryptocurrency wallet addresses
The Hacker News – Read More
OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection
/in General NewsA new malware campaign has been observed leveraging social engineering tactics to deliver an open-source rootkit called r77.
The activity, condemned OBSCURE#BAT by Securonix, enables threat actors to establish persistence and evade detection on compromised systems. It’s currently not known who is behind the campaign.
The rootkit “has the ability to cloak or mask any file, registry key or task
The Hacker News – Read More
Ransomware attack takes down health system network in Micronesia
/in General NewsOne of the four states that make up the Pacific nation of Micronesia is battling against ransomware hackers who have forced all of the computers used by its government health agency offline.
The Record from Recorded Future News – Read More
AI Chatbot DeepSeek R1 Can Be Manipulated to Create Malware
/in General NewsTenable Research reveals that AI chatbot DeepSeek R1 can be manipulated to generate keyloggers and ransomware code. While…
Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News – Read More
FBI, CISA Raise Alarms As Medusa Ransomware Attacks Grow
/in General NewsMedusa developers have been targeting a wide variety of critical infrastructure sectors, from healthcare and technology to manufacturing and insurance, racking up its victim count as it seemingly adds to its numbers of affiliates.
darkreading – Read More
OBSCURE#BAT Malware Highlights Risks of API Hooking
/in General NewsResearchers discovered an attack chain that uses several layers of obfuscated batch files and PowerShell scripts to deliver an advanced and persistent rootkit.
darkreading – Read More
FBI and CISA Urge Enabling 2FA to Counter Medusa Ransomware
/in General NewsFBI and CISA warn of Medusa ransomware attacks impacting critical infrastructure. Learn about Medusa’s tactics, prevention tips, and…
Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News – Read More