The threat actor known as Space Pirates has been linked to a malicious campaign targeting Russian information technology (IT) organizations with a previously undocumented malware called LuckyStrike Agent.
The activity was detected in November 2024 by Solar, the cybersecurity arm of Russian state-owned telecom company Rostelecom. It’s tracking the activity under the name Erudite Mogwai.
The
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-02-27 14:06:502025-02-27 14:06:50Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware
A WIRED investigation reveals that criminals who make billions from scam compounds in Myanmar—where tens of thousands of people are enslaved—are using Starlink to get online.
Security-oriented news often stays within the security community, that is until it hits home, or often millions of homes. We’ve most recently heard about breaches at National Public Data and Ticketmaster, but there are names from the past that might provoke a twitch or send a chill in those who have been following the industry […]
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-02-27 11:06:532025-02-27 11:06:53Failure, Rinse, Repeat: Why do Both History and Security Seem Doomed to Repeat Themselves?
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-02-27 11:06:532025-02-27 11:06:53FBI Says North Korea Hacked Bybit as Details of $1.5B Heist Emerge
You.com launches ARI, a cutting-edge AI research agent that processes over 400 sources in minutes—revolutionizing market research and empowering faster, more accurate business decision-making.Read More
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-02-27 11:06:522025-02-27 11:06:52You.com unveils AI research agent that processes 400+ sources at once
A new malware campaign has been observed targeting edge devices from Cisco, ASUS, QNAP, and Synology to rope them into a botnet named PolarEdge since at least the end of 2023.
French cybersecurity company Sekoia said it observed the unknown threat actors leveraging CVE-2023-20118 (CVSS score: 6.5), a critical security flaw impacting Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-02-27 10:06:472025-02-27 10:06:47PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices
A software engineer for the Disney Company unwittingly downloaded a piece of malware that turned his life upside down. Was his password manager to blame?
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-02-27 10:06:462025-02-27 10:06:46Hackers stole this engineer’s 1Password database. Could it happen to you?
Trends in cybersecurity across 2024 showed less malware and phishing, though more social engineering. CrowdStrike offers tips on securing your business.
BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
The Hidden Cost of Compliance: When Regulations Weaken Security
/in General NewsThe current state of regulation and the overwhelming burden it brings to most enterprises is a discussion worth having
The post The Hidden Cost of Compliance: When Regulations Weaken Security appeared first on SecurityWeek.
SecurityWeek – Read More
Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware
/in General NewsThe threat actor known as Space Pirates has been linked to a malicious campaign targeting Russian information technology (IT) organizations with a previously undocumented malware called LuckyStrike Agent.
The activity was detected in November 2024 by Solar, the cybersecurity arm of Russian state-owned telecom company Rostelecom. It’s tracking the activity under the name Erudite Mogwai.
The
The Hacker News – Read More
Elon Musk’s Starlink Is Keeping Modern Slavery Compounds Online
/in General NewsA WIRED investigation reveals that criminals who make billions from scam compounds in Myanmar—where tens of thousands of people are enslaved—are using Starlink to get online.
Security Latest – Read More
Cisco Patches Vulnerabilities in Nexus Switches
/in General NewsCisco has patched command injection and DoS vulnerabilities affecting some of its Nexus switches, including a high-severity flaw.
The post Cisco Patches Vulnerabilities in Nexus Switches appeared first on SecurityWeek.
SecurityWeek – Read More
Failure, Rinse, Repeat: Why do Both History and Security Seem Doomed to Repeat Themselves?
/in General NewsSecurity-oriented news often stays within the security community, that is until it hits home, or often millions of homes. We’ve most recently heard about breaches at National Public Data and Ticketmaster, but there are names from the past that might provoke a twitch or send a chill in those who have been following the industry […]
The post Failure, Rinse, Repeat: Why do Both History and Security Seem Doomed to Repeat Themselves? appeared first on SecurityWeek.
SecurityWeek – Read More
FBI Says North Korea Hacked Bybit as Details of $1.5B Heist Emerge
/in General NewsThe FBI has attributed the Bybit hack to a North Korean group named TraderTraitor as more technical details of the attack have come to light.
The post FBI Says North Korea Hacked Bybit as Details of $1.5B Heist Emerge appeared first on SecurityWeek.
SecurityWeek – Read More
You.com unveils AI research agent that processes 400+ sources at once
/in General NewsYou.com launches ARI, a cutting-edge AI research agent that processes over 400 sources in minutes—revolutionizing market research and empowering faster, more accurate business decision-making.Read More
Security News | VentureBeat – Read More
PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices
/in General NewsA new malware campaign has been observed targeting edge devices from Cisco, ASUS, QNAP, and Synology to rope them into a botnet named PolarEdge since at least the end of 2023.
French cybersecurity company Sekoia said it observed the unknown threat actors leveraging CVE-2023-20118 (CVSS score: 6.5), a critical security flaw impacting Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and
The Hacker News – Read More
Hackers stole this engineer’s 1Password database. Could it happen to you?
/in General NewsA software engineer for the Disney Company unwittingly downloaded a piece of malware that turned his life upside down. Was his password manager to blame?
Latest stories for ZDNET in Security – Read More
CrowdStrike Security Report: Generative AI Powers Social Engineering Attacks
/in General NewsTrends in cybersecurity across 2024 showed less malware and phishing, though more social engineering. CrowdStrike offers tips on securing your business.
Security | TechRepublic – Read More