BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Hands-On Walkthrough: Microsegmentation For all Users, Workloads and Devices by Elisity
/in General NewsNetwork segmentation remains a critical security requirement, yet organizations struggle with traditional approaches that demand extensive hardware investments, complex policy management, and disruptive network changes. Healthcare and manufacturing sectors face particular challenges as they integrate diverse endpoints – from legacy medical devices to IoT sensors – onto their production networks.
The Hacker News – Read More
Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung Devices
/in General NewsCybersecurity researchers have detailed a now-patched security flaw impacting Monkey’s Audio (APE) decoder on Samsung smartphones that could lead to code execution.
The high-severity vulnerability, tracked as CVE-2024-49415 (CVSS score: 8.1), affects Samsung devices running Android versions 12, 13, and 14.
“Out-of-bounds write in libsaped.so prior to SMR Dec-2024 Release 1 allows remote
The Hacker News – Read More
How AI will transform cybersecurity in 2025 – and supercharge cybercrime
/in General NewsFrom AI-driven defense to evolving ransomware tactics, here’s what cybersecurity industry leaders and experts are preparing for this year.
Latest stories for ZDNET in Security – Read More
Chinese APT Group Is Ransacking Japan’s Secrets
/in General NewsSince 2019, MirrorFace has been stealing information from myriad Japanese organizations to gain leverage over Japan in the event of hostilities between the two countries, experts said.
darkreading – Read More
Banshee 2.0 Malware Steals Apple’s Encryption to Hide on Macs
/in General NewsThe most recent iteration of the open source infostealer skates by antivirus programs on Macs, using an encryption mechanism stolen from Apple’s own antivirus product.
darkreading – Read More
Candy Crush, Tinder, MyFitnessPal: See the Thousands of Apps Hijacked to Spy on Your Location
/in General NewsA hack of location data company Gravy Analytics has revealed which apps are—knowingly or not—being used to collect your information behind the scenes.
Security Latest – Read More
Rumble Among 15 Targets of Texas Attorney General’s Child Privacy Probe
/in General NewsTexas has become a leading enforcer of internet rules. Its latest probe includes some platforms that privacy experts describe as unusual suspects.
Security Latest – Read More
Hacking Group ‘Silk Typhoon’ Linked to US Treasury Breach
/in General NewsThe attack used a stolen remote support SaaS API key to exfiltrate data from workstations in the Treasury Department’s Office of Foreign Assets Control.
darkreading – Read More
What’s Next for Open Source Software Security in 2025?
/in General NewsHidden dependencies, social engineering attacks, and the complexity of foundation models can all contribute tothe insecure use of open-source software in 2025.
Security | TechRepublic – Read More
How the US TikTok Ban Would Actually Work
/in General NewsThe fate of TikTok now rests in the hands of the US Supreme Court. If a law banning the social video app this month is upheld, it won’t disappear from your phone—but it will get messy fast.
Security Latest – Read More