BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Well-Established Cybercriminal Ecosystem Blooms in Iraq
/in General NewsResearchers have uncovered a well-established cybercriminal ecosystem connected to a Telegram bot, with over 90,000 Arabic messages dating back to 2022, enabling a sophisticated network offering social media manipulation and financial theft services.
Cyware News – Latest Cyber News – Read More
How to use your iPhone with one hand
/in General NewsApple offers several accessibility options to help you if you can’t use your iPhone with both hands.
Latest news – Read More
Oracle Patches 240 Vulnerabilities With July 2024 CPU
/in General NewsOracle releases 386 new security patches to resolve roughly 240 unique CVEs as part of its July 2024 Critical Patch Update.
The post Oracle Patches 240 Vulnerabilities With July 2024 CPU appeared first on SecurityWeek.
SecurityWeek – Read More
China-linked APT17 Targets Italian Companies with 9002 RAT Malware
/in General NewsA China-linked threat actor called APT17 has been observed targeting Italian companies and government entities using a variant of a known malware referred to as 9002 RAT.
The two targeted attacks took place on June 24 and July 2, 2024, Italian cybersecurity company TG Soft said in an analysis published last week.
“The first campaign on June 24, 2024 used an Office document, while the second
The Hacker News – Read More
Beware of BadPack: One Weird Trick Being Used Against Android Devices
/in General NewsBadPack is an APK file intentionally packaged in a malicious way. In most cases, this means an attacker has maliciously altered header information used in the compressed file format for APK files.
Cyware News – Latest Cyber News – Read More
Kubernetes Exposed: Exploiting the Kubelet API
/in General NewsReal-world attacks have been observed where attackers target the Kubelet API to steal secrets and gain control over clusters. Various techniques, such as environment discovery, network scanning, and secrets collection, have been utilized by hackers.
Cyware News – Latest Cyber News – Read More
Rite Aid Says Hack Impacts 2.2M People as Ransomware Gang Threatens to Leak Data
/in General NewsPharmacy chain Rite Aid says 2.2 million people are impacted by a recent data breach for which the RansomHub group has taken credit.
The post Rite Aid Says Hack Impacts 2.2M People as Ransomware Gang Threatens to Leak Data appeared first on SecurityWeek.
SecurityWeek – Read More
Safety guidelines provide necessary first layer of data protection in AI gold rush
/in General NewsFrameworks and principles will help mitigate potential risks as businesses test generative artificial intelligence.
Latest news – Read More
Scattered Spider Adopts RansomHub and Qilin Ransomware for Cyber Attacks
/in General NewsThe infamous cybercrime group known as Scattered Spider has incorporated ransomware strains such as RansomHub and Qilin into its arsenal, Microsoft has revealed.
Scattered Spider is the designation given to a threat actor that’s known for its sophisticated social engineering schemes to breach targets and establish persistence for follow-on exploitation and data theft. It also has a history of
The Hacker News – Read More
IDF Has Rebuffed 3B Cyberattacks Since Oct. 7, Colonel Claims
/in General NewsIsrael’s military computer systems have been under constant barrage in recent months.
darkreading – Read More