BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Azure Kubernetes Services Vulnerability Exposed Sensitive Information
/in General NewsA vulnerability in Azure Kubernetes Services could have allowed attackers to escalate privileges and access sensitive information on the clusters.
The post Azure Kubernetes Services Vulnerability Exposed Sensitive Information appeared first on SecurityWeek.
SecurityWeek – Read More
RCE Vulnerability in Atlassian Bamboo Data Center and Server
/in General NewsThis flaw, present in versions 9.1.0 through 9.6.0, allows authenticated attackers to execute arbitrary code within the Bamboo environment, posing risks to confidentiality, integrity, and availability.
Cyware News – Latest Cyber News – Read More
The 6 Best Malware Removal Software Providers for 2024
/in General NewsCompare the top six malware removal software for 2024. Bitdefender leads, with Norton and Malwarebytes as strong contenders.
Security | TechRepublic – Read More
New Msupedge Backdoor Targeting Taiwan Employs Stealthy Communications
/in General NewsHackers have been using a PHP vulnerability to deploy a stealthy backdoor called Msupedge. This backdoor was recently used in a cyberattack against an unnamed university in Taiwan.
Cyware News – Latest Cyber News – Read More
Unlocking the Power of AI in Cybersecurity
/in General NewsAs adversaries increasingly exploit AI, security practitioners must not fall behind. What does it take to unlock the full potential of AI in cybersecurity?
The post Unlocking the Power of AI in Cybersecurity appeared first on SecurityWeek.
SecurityWeek – Read More
Spring Security Flaw Leaves Applications Open to Unauthorized Access
/in General NewsA high-severity vulnerability (CVE-2024-38810) has been discovered in Spring Security, potentially allowing unauthorized access to sensitive data within affected applications. The vulnerability impacts Spring Security versions 6.3.0 and 6.3.1.
Cyware News – Latest Cyber News – Read More
Rising Abuse of URL Rewriting in Phishing
/in General NewsThe abuse of URL rewriting in phishing attacks has emerged as a new trend, allowing threat actors to hide malicious links behind trusted domains of security vendors. Exploiting these features enables bypassing detection mechanisms.
Cyware News – Latest Cyber News – Read More
Over 10,000 WordPress Sites at Risk: Critical File Deletion Flaw Found in InPost Plugins
/in General NewsThe vulnerability, known as CVE-2024-6500, affects the InPost PL and InPost for WooCommerce plugins, allowing attackers to read and delete sensitive files like the wp-config.php configuration file.
Cyware News – Latest Cyber News – Read More
Cyberattack Disrupts Microchip Technology Manufacturing Facilities
/in General NewsMicrochip Technology has disclosed a cyberattack impacting operations at some of its manufacturing facilities.
The post Cyberattack Disrupts Microchip Technology Manufacturing Facilities appeared first on SecurityWeek.
SecurityWeek – Read More
Unmasking Styx Stealer: How a Hacker’s Slip Led to an Intelligence Treasure Trove
/in General NewsStyx Stealer is based on the Phemedrone Stealer and is available for purchase online. It has the ability to steal passwords, cookies, crypto wallet data, and messenger sessions, as well as gather system information.
Cyware News – Latest Cyber News – Read More