BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Lynx Ransomware Group ‘Industrializes’ Cybercrime With Affiliates
/in General NewsThe ransomware group provides everything an affiliate could want to breach and attack victims, including a quality controlled recruitment system to engage even more criminals.
darkreading – Read More
Phishing Campaign Baits Hook With Malicious Amazon PDFs
/in General NewsIn their discovery, researchers found 31 PDF files linking to these phishing websites, none of which have been yet submitted to VirusTotal.
darkreading – Read More
Super Bowl LIX Could Be a Magnet for Cyberattacks
/in General NewsConcerns include everything from ransomware, malware, and phishing attacks on the game’s infrastructure to those targeting event sponsors and fans.
darkreading – Read More
VMware Warns of High-Risk Blind SQL Injection Bug in Avi Load Balancer
/in General NewsVMware warns that a malicious user with network access may be able to use specially crafted SQL queries to gain database access.
The post VMware Warns of High-Risk Blind SQL Injection Bug in Avi Load Balancer appeared first on SecurityWeek.
SecurityWeek – Read More
Ransomware attack kept major energy industry contractor out of some systems for 6 weeks
/in General NewsOklahoma-based ENGlobal Corporation said in an updated 8-K filing with the SEC that company officials were locked out of financial systems for six weeks because of a November ransomware attack.
The Record from Recorded Future News – Read More
Hackers Claim 2nd Breach at HP Enterprise, Plan to Sell Access
/in General NewsIntelBroker targets Hewlett-Packard Enterprise (HPE) again, claiming to have access to the company’s internal infrastructure and the possibility…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
This new Android feature protects your phone, even if someone has your PIN
/in General NewsIf you’re looking for an additional layer of security for your Android device, Google’s Identity Check might be just the ticket. Here’s how it works.
Latest stories for ZDNET in Security – Read More
Microsoft Edge offers new tool to combat scareware – here’s how it works
/in General NewsEdge’s new scareware blocker aims to protect you from malicious websites that try to scam you through fear tactics. Here’s how to opt in.
Latest stories for ZDNET in Security – Read More
Outsmarting AI-powered cyber attacks: A 2025 playbook for real-time endpoint defense
/in General NewsEndpoint, identity, and multi-domain attacks are dominating the enterprise threatscape today, fueled by new tradecraft invented using gen AI.Read More
Security News | VentureBeat – Read More
New TorNet Backdoor Exploits TOR Network in Advanced Phishing Attack
/in General NewsAdvanced phishing campaign targets Poland and Germany, delivering Agent Tesla, Snake Keylogger and newly identified TorNet backdoor via…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More