BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Hard-Coded Credentials Found in HPE Instant On Devices Allow Admin Access
/in General NewsHewlett-Packard Enterprise (HPE) has released security updates to address a critical security flaw affecting Instant On Access Points that could allow an attacker to bypass authentication and gain administrative access to susceptible systems.
The vulnerability, tracked as CVE-2025-37103, carries a CVSS score of 9.8 out of a maximum of 10.0.
“Hard-coded login credentials were found in HPE
The Hacker News – Read More
3,500 Websites Hijacked to Secretly Mine Crypto Using Stealth JavaScript and WebSocket Tactics
/in General NewsA new attack campaign has compromised more than 3,500 websites worldwide with JavaScript cryptocurrency miners, marking the return of browser-based cryptojacking attacks once popularized by the likes of CoinHive.
Although the service has since shuttered after browser makers took steps to ban miner-related apps and add-ons, researchers from the c/side said they found evidence of a stealthy
The Hacker News – Read More
Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
/in General NewsMicrosoft on Sunday released security patches for an actively exploited security flaw in SharePoint and also released details of another vulnerability that it said has been addressed with “more robust protections.”
The tech giant acknowledged it’s “aware of active attacks targeting on-premises SharePoint Server customers by exploiting vulnerabilities partially addressed by the July Security
The Hacker News – Read More
5 tips for building foundation models for AI
/in General NewsWhile some business leaders buy large language models, others build their own. Here are five things you need to know.
Latest news – Read More
EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware
/in General NewsThe financially motivated threat actor known as EncryptHub (aka LARVA-208 and Water Gamayun) has been attributed to a new campaign that’s targeting Web3 developers to infect them with information stealer malware.
“LARVA-208 has evolved its tactics, using fake AI platforms (e.g., Norlax AI, mimicking Teampilot) to lure victims with job offers or portfolio review requests,” Swiss cybersecurity
The Hacker News – Read More
SquidLoader Malware Campaign Hits Hong Kong Financial Firms
/in General NewsTrellix exposes SquidLoader malware targeting Hong Kong, Singapore, and Australia’s financial service institutions. Learn about its advanced evasion tactics and stealthy attacks.
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available
/in General NewsEnterprises running SharePoint servers should not wait for a fix for CVE-2025-53770 and should commence threat hunting to search for compromise immediately.
The post SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available appeared first on SecurityWeek.
SecurityWeek – Read More
Chinese Groups Launder $580M in India Using Fake Apps and Mule Accounts
/in General NewsCloudSEK’s new report uncovers how Chinese cyber syndicates are laundering over $600 million annually in India. Learn about…
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations
/in General NewsA critical security vulnerability in Microsoft SharePoint Server has been weaponized as part of an “active, large-scale” exploitation campaign.
The zero-day flaw, tracked as CVE-2025-53770 (CVSS score: 9.8), has been described as a variant of CVE-2025-49706 (CVSS score: 6.3), a spoofing bug in Microsoft SharePoint Server that was addressed by the tech giant as part of its July 2025 Patch Tuesday
The Hacker News – Read More
Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack
/in General NewsCybersecurity researchers have alerted to a supply chain attack that has targeted popular npm packages via a phishing campaign designed to steal the project maintainers’ npm tokens.
The captured tokens were then used to publish malicious versions of the packages directly to the registry without any source code commits or pull requests on their respective GitHub repositories.
The list of affected
The Hacker News – Read More