BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Details Disclosed for SCADA Flaws That Could Facilitate Industrial Attacks
/in General NewsPalo Alto Networks has shared details on several high-severity Mitsubishi Electric and Iconics SCADA vulnerabilities.
The post Details Disclosed for SCADA Flaws That Could Facilitate Industrial Attacks appeared first on SecurityWeek.
SecurityWeek – Read More
Following takedown operation, Garantex invites customers to ‘face-to-face’ Moscow meeting
/in General NewsRussian crypto exchange Garantex has yet to directly address the international law enforcement operation that resulted in the seizure of its domains, and criminal charges against two of its administrators.
© 2024 TechCrunch. All rights reserved. For personal use only.
Security News | TechCrunch – Read More
Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials
/in General NewsCybersecurity researchers have demonstrated a novel technique that allows a malicious web browser extension to impersonate any installed add-on.
“The polymorphic extensions create a pixel perfect replica of the target’s icon, HTML popup, workflows and even temporarily disables the legitimate extension, making it extremely convincing for victims to believe that they are providing credentials to
The Hacker News – Read More
Google Chrome is killing more extensions than you think – is your old favorite on the list?
/in General NewsGoogle’s Manifest V3 platform is clobbering many popular extensions. Here’s why and what you can do about it.
Latest stories for ZDNET in Security – Read More
Cobalt Strike Abuse Dropped 80% in Two Years
/in General NewsFortra has shared an update on the effects of actions taken to reduce the abuse of Cobalt Strike by threat actors.
The post Cobalt Strike Abuse Dropped 80% in Two Years appeared first on SecurityWeek.
SecurityWeek – Read More
When Seconds Count: How to Survive Fast-and-Furious DDoS Microbursts
/in General NewsIn the battle against two-minute micro-attacks that can knock out critical communication services, the difference between success and failure can literally come down to seconds.
darkreading – Read More
Developer Convicted for Hacking Former Employer’s Systems
/in General NewsDavis Lu was convicted of sabotaging his employer’s systems through malicious code, and deleting encrypted data.
The post Developer Convicted for Hacking Former Employer’s Systems appeared first on SecurityWeek.
SecurityWeek – Read More
Desert Dexter Targets 900 Victims Using Facebook Ads and Telegram Malware Links
/in General NewsThe Middle East and North Africa have become the target of a new campaign that delivers a modified version of a known malware called AsyncRAT since September 2024.
“The campaign, which leverages social media to distribute malware, is tied to the region’s current geopolitical climate,” Positive Technologies researchers Klimentiy Galkin and Stanislav Pyzhov said in an analysis published last week.
The Hacker News – Read More
Mass Exploitation of Critical PHP Vulnerability Begins
/in General NewsGreyNoise warns of mass exploitation of a critical vulnerability in PHP leading to remote code execution on vulnerable servers.
The post Mass Exploitation of Critical PHP Vulnerability Begins appeared first on SecurityWeek.
SecurityWeek – Read More
Google Paid Out $12 Million via Bug Bounty Programs in 2024
/in General NewsIn 2024, Google paid out nearly $12 million in bug bounties through its revamped vulnerability reward programs.
The post Google Paid Out $12 Million via Bug Bounty Programs in 2024 appeared first on SecurityWeek.
SecurityWeek – Read More