BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data
/in General NewsThe threat actors behind a recently observed Qilin ransomware attack have stolen credentials stored in Google Chrome browsers on a small set of compromised endpoints.
The use of credential harvesting in connection with a ransomware infection marks an unusual twist, and one that could have cascading consequences, cybersecurity firm Sophos said in a Thursday report.
The attack, detected in July
The Hacker News – Read More
Degraded Performance Issue Sparks Concern Among CrowdStrike Customers
/in General NewsCrowdStrike has addressed a cloud service issue causing degraded performance and boot times for some of its customers.
The post Degraded Performance Issue Sparks Concern Among CrowdStrike Customers appeared first on SecurityWeek.
SecurityWeek – Read More
Best SEO Experts to Follow on Twitter (X) in 2025
/in General NewsTo improve your online visibility, it’s crucial to stay updated on the ever-evolving strategies and developments in Search…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Fraudulent Slack Ad Shows Malvertiser’s Patience and Skills
/in General NewsThe suspicious ad for Slack appeared legitimate but was likely malicious. Clicking on it would initially redirect to slack.com. However, after several days, it started redirecting to a click tracker, showing signs of a potentially malicious campaign.
Cyware News – Latest Cyber News – Read More
Russian Member of Karakurt Cyber Extortion Gang Charged in US
/in General NewsDeniss Zolotarjovs was charged in a US court for extorting victims and laundering cryptocurrency as part of the Karakurt cyber extortion group.
The post Russian Member of Karakurt Cyber Extortion Gang Charged in US appeared first on SecurityWeek.
SecurityWeek – Read More
PoC Exploit Released for RCE 0-day CVE-2024-41992 in Arcadyan FMIMG51AX000J Model
/in General NewsA PoC exploit has been released for a critical vulnerability (CVE-2024-41992) found in the Arcadyan FMIMG51AX000J model, as well as other devices using the same firmware version.
Cyware News – Latest Cyber News – Read More
FBI Fails to Secure Sensitive Storage Media Destined for Destruction, Audit Reveals
/in General NewsAudit finds weaknesses in FBI’s inventory management and disposition procedures for drives containing sensitive information.
The post FBI Fails to Secure Sensitive Storage Media Destined for Destruction, Audit Reveals appeared first on SecurityWeek.
SecurityWeek – Read More
New Opportunistic Campaign Exploit Log4j Vulnerability for Cryptomining and System Compromise
/in General NewsThis latest Log4j exploitation-based attack uses obfuscated LDAP requests to evade detection and executes malicious scripts, establishing persistence and exfiltrating data through encrypted channels.
Cyware News – Latest Cyber News – Read More
When War Came to Their Country, They Built a Map
/in General NewsThe Telegram channel and website Deep State uses public data and insider intelligence to power its live tracker of Ukraine’s ever-shifting front line.
Security Latest – Read More
Cybercriminals Exploit File Sharing Services to Advance Phishing Attacks
/in General NewsIn these file-sharing phishing attacks, cybercriminals impersonate colleagues or trusted services to trick targets into clicking on malicious links that can lead to data theft or malware infection.
Cyware News – Latest Cyber News – Read More