BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
How Nation-State Cybercriminals Are Targeting the Enterprise
/in General NewsCombating nation-state threat actors at the enterprise level requires more than just cyber readiness and investment — it calls for a collaborative effort.
darkreading – Read More
Top AI Trends Every Software Development Company to Follow in 2025
/in General NewsThe software development industry is expanding tremendously. It drives up the need for technical people and new solutions.…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
In Other News: McDonald’s API Hacking, Netflix Fine, Malware Kills ICS Process
/in General NewsNoteworthy stories that might have slipped under the radar: McDonald’s API hacking, Netflix fined nearly $5 million in Netherlands, experimental malware killing ICS process.
The post In Other News: McDonald’s API Hacking, Netflix Fine, Malware Kills ICS Process appeared first on SecurityWeek.
SecurityWeek – Read More
Ransomware Group Claims Theft of Personal, Financial Data From Krispy Kreme
/in General NewsThe Play ransomware group claims to have stolen sensitive data from donut and coffee retail chain Krispy Kreme.
The post Ransomware Group Claims Theft of Personal, Financial Data From Krispy Kreme appeared first on SecurityWeek.
SecurityWeek – Read More
Botnet of 190,000 BadBox-Infected Android Devices Discovered
/in General NewsBitsight has discovered a BadBox botnet consisting of over 190,000 Android devices, mainly Yandex smart TVs and Hisense smartphones.
The post Botnet of 190,000 BadBox-Infected Android Devices Discovered appeared first on SecurityWeek.
SecurityWeek – Read More
Rockwell PowerMonitor Vulnerabilities Allow Remote Hacking of Industrial Systems
/in General NewsRockwell’s PowerMonitor is affected by critical vulnerabilities that can enable remote access to industrial systems for disruption or further attacks.
The post Rockwell PowerMonitor Vulnerabilities Allow Remote Hacking of Industrial Systems appeared first on SecurityWeek.
SecurityWeek – Read More
Sophos Issues Hotfixes for Critical Firewall Flaws: Update to Prevent Exploitation
/in General NewsSophos has released hotfixes to address three security flaws in Sophos Firewall products that could be exploited to achieve remote code execution and allow privileged system access under certain conditions.
Of the three, two are rated Critical in severity. There is currently no evidence that the shortcomings have been exploited in the wild. The list of vulnerabilities is as follows –
The Hacker News – Read More
Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack
/in General NewsThe developers of Rspack have revealed that two of their npm packages, @rspack/core and @rspack/cli, were compromised in a software supply chain attack that allowed a malicious actor to publish malicious versions to the official package registry with cryptocurrency mining malware.
Following the discovery, versions 1.1.7 of both libraries have been unpublished from the npm registry. The latest
The Hacker News – Read More
Hackers Exploiting Critical Fortinet EMS Vulnerability to Deploy Remote Access Tools
/in General NewsA now-patched critical security flaw impacting Fortinet FortiClient EMS is being exploited by malicious actors as part of a cyber campaign that installed remote desktop software such as AnyDesk and ScreenConnect.
The vulnerability in question is CVE-2023-48788 (CVSS score: 9.3), an SQL injection bug that allows attackers to execute unauthorized code or commands by sending specially crafted
The Hacker News – Read More
CISA Adds Critical Flaw in BeyondTrust Software to Exploited Vulnerabilities List
/in General NewsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) products to the Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.
The vulnerability, tracked as CVE-2024-12356 (CVSS score: 9.8), is a command injection flaw that
The Hacker News – Read More