BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
FICORA, CAPSAICIN Botnets Exploit Old D-Link Router Flaws for DDoS Attacks
/in General NewsMirai and Keksec botnet variants are exploiting critical vulnerabilities in D-Link routers. Learn about the impact, affected devices, and how to protect yourself from these attacks.
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Wiping your Android phone? Here’s the easiest way to erase all personal data
/in General NewsBefore you sell or trash your old Android phone, you should properly delete all sensitive information. Here’s the best (and simplest) way to do it.
Latest stories for ZDNET in Security – Read More
15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials
/in General NewsA high-severity flaw impacting select Four-Faith routers has come under active exploitation in the wild, according to new findings from VulnCheck.
The vulnerability, tracked as CVE-2024-12856 (CVSS score: 7.2), has been described as an operating system (OS) command injection bug affecting router models F3x24 and F3x36.
The severity of the shortcoming is lower due to the fact that it only works
The Hacker News – Read More
North Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaign
/in General NewsNorth Korean threat actors behind the ongoing Contagious Interview campaign have been observed dropping a new JavaScript malware called OtterCookie.
Contagious Interview (aka DeceptiveDevelopment) refers to a persistent attack campaign that employs social engineering lures, with the hacking crew often posing as recruiters to trick individuals looking for potential job opportunities into
The Hacker News – Read More
Cyberhaven says it was hacked to publish a malicious update to its Chrome extension
/in General NewsThe data-loss startup says it was targeted as part of a “wider campaign to target Chrome extension developers.”
© 2024 TechCrunch. All rights reserved. For personal use only.
Security News | TechCrunch – Read More
Deepfakes, Quantum Attacks Loom Over APAC in 2025
/in General NewsOrganizations in the region should expect to see threat actors accelerate their use of AI tools and mount ongoing “harvest now, decrypt later” attacks for various malicious use cases.
darkreading – Read More
Hackers Are Hot for Water Utilities
/in General NewsThe US water sector suffered a stream of cyberattacks over the past year and half, from a mix of cybercriminals, hacktivists, and nation-state hacking teams. Here’s how the industry and ICS/OT security experts are working to better secure vulnerable drinking and wastewater utilities.
darkreading – Read More
Record-breaking ransoms and breaches: A timeline of ransomware in 2024
/in General NewsFrom LoanDepot to Evolve Bank and Blue Yonder, these ransomware attacks affect tens of millions of people.
© 2024 TechCrunch. All rights reserved. For personal use only.
Security News | TechCrunch – Read More
Defining & Defying Cybersecurity Staff Burnout
/in General NewsSometimes it feels like burnout is an inevitable part of working in cybersecurity. But a little bit of knowledge can help you and your staff stay healthy.
darkreading – Read More
The Paper Passport Is Dying
/in General NewsSmartphones and face recognition are being combined to create new digital travel documents. The paper passport’s days are numbered—despite new privacy risks.
Security Latest – Read More