BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
New ValleyRAT Malware Variant Spreading via Fake Chrome Downloads
/in General NewsMorphisec uncovers a new ValleyRAT malware variant with advanced evasion tactics, multi-stage infection chains, and novel delivery methods…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Russian cyber research companies post alerts about infostealer, industrial threats
/in General NewsMoscow-based cybersecurity company BI.ZONE posted an analysis of the Nova infostealer as other Russian firms warned about cyber-espionage and threats against industrial facilities.
The Record from Recorded Future News – Read More
22 New Mac Malware Families Seen in 2024
/in General NewsNearly two dozen new macOS malware families were observed in 2024, including stealers, backdoors, downloaders and ransomware.
The post 22 New Mac Malware Families Seen in 2024 appeared first on SecurityWeek.
SecurityWeek – Read More
Malicious Go Package Exploits Module Mirror Caching for Persistent Remote Access
/in General NewsCybersecurity researchers have called attention to a software supply chain attack targeting the Go ecosystem that involves a malicious package capable of granting the adversary remote access to infected systems.
The package, named github.com/boltdb-go/bolt, is a typosquat of the legitimate BoltDB database module (github.com/boltdb/bolt), per Socket. The malicious version (1.3.1) was published to
The Hacker News – Read More
Managing Software Risk in a World of Exploding Vulnerabilities
/in General NewsOrganizations and development teams need to evolve from “being prepared” to “managing the risk” of security breaches.
darkreading – Read More
The best malware removal software of 2025: Expert tested and reviewed
/in General NewsIf you want additional ransomware protection on your machine, you should use one that offers thorough scans, a user-friendly interface, and compatibility with your preferred operating system.
Latest stories for ZDNET in Security – Read More
How to Prevent Phishing Attacks with Multi-Factor Authentication
/in General NewsLearn how to protect yourself and your sensitive information from phishing attacks by implementing multi-factor authentication.
Security | TechRepublic – Read More
AMD Patches CPU Vulnerability Found by Google
/in General NewsAMD has released patches for a microprocessor vulnerability that could allow an attacker to load malicious microcode.
The post AMD Patches CPU Vulnerability Found by Google appeared first on SecurityWeek.
SecurityWeek – Read More
SpyCloud Pioneers the Shift to Holistic Identity Threat Protection
/in General NewsAustin, TX, USA, 4th February 2025, CyberNewsWire
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
N. Korean ‘FlexibleFerret’ Malware Hits macOS with Fake Zoom, Job Scams
/in General NewsN. Korean ‘FlexibleFerret’ malware targets macOS with fake Zoom apps, job scams, and bug report comments, deceiving users…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More