BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
LinkedIn Halts AI Data Processing in UK Amid Privacy Concerns Raised by ICO
/in General NewsThe U.K. Information Commissioner’s Office (ICO) has confirmed that professional social networking platform LinkedIn has suspended processing users’ data in the country to train its artificial intelligence (AI) models.
“We are pleased that LinkedIn has reflected on the concerns we raised about its approach to training generative AI models with information relating to its U.K. users,” Stephen
The Hacker News – Read More
How Apple, Google, and Microsoft can save us from AI deepfakes
/in General NewsTo combat AI-driven disinformation, tech giants must collaborate to adopt these open standards. The absence of Apple and X raises concerns.
Latest stories for ZDNET in Security – Read More
Iranian Hackers Tried to Give Hacked Trump Campaign Emails to Dems
/in General NewsPlus: The FBI dismantles the largest-ever China-backed botnet, the DOJ charges two men with a $243 million crypto theft, Apple’s MacOS Sequoia breaks cybersecurity tools, and more.
Security Latest – Read More
Patch this Critical Safeguard for Privileged Passwords Authentication Bypass Flaw
/in General NewsResearchers have released technical details about CVE-2024-45488, a critical authentication bypass vulnerability affecting One Identity’s Safeguard for Privileged Passwords (SPP), which could allow attackers to gain full administrative access.
Cyware News – Latest Cyber News – Read More
Germany Seizes 47 Crypto Exchanges Used by Ransomware Gangs
/in General NewsThese exchanges allowed users to trade cryptocurrencies anonymously, creating a safe environment for cybercriminals to launder their proceeds without fear of prosecution.
Cyware News – Latest Cyber News – Read More
CISA Adds Windows, Apache HugeGraph-Server, Oracle JDeveloper, Oracle WebLogic Server, and MSSQL Server Bugs to its KEV Catalog
/in General NewsThese vulnerabilities can lead to remote code execution and privilege escalation, posing a significant risk to affected systems. For example, the Oracle JDeveloper vulnerability can allow attackers to compromise the software and take over the system.
Cyware News – Latest Cyber News – Read More
Clever ‘GitHub Scanner’ Campaign Abusing Repositories to Push Malware
/in General NewsA sophisticated campaign is using GitHub repositories to spread the Lumma Stealer malware, targeting users interested in open-source projects or receiving email notifications from them.
Cyware News – Latest Cyber News – Read More
Microsoft Entra ID’s Administrative Units Weaponized to Gain Stealthy Persistence
/in General NewsDatadog Security Labs recently revealed a security risk within Microsoft Entra ID, showing how its administrative units (AUs) can be weaponized by attackers to create persistent backdoor access.
Cyware News – Latest Cyber News – Read More
Adversarial attacks on AI models are rising: what should you do now?
/in General NewsWith AI’s growing influence across industries, malicious attackers continue to sharpen their tradecraft to exploit ML models.Read More
Security News | VentureBeat – Read More
Ivanti’s Cloud Service Appliance Attacked via Second Vuln
/in General NewsThe critical bug, CVE-2024-8963, can be used in conjunction with the prior known flaw to achieve remote code execution (RCE).
darkreading – Read More