BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
How CISA Plans to Measure Trust in Open-Source Software
/in General NewsThe CISA is developing a new framework to assess the trustworthiness of open-source software projects. The agency’s open-source software security roadmap aims to increase visibility into OSS use and risks across the federal government.
Cyware News – Latest Cyber News – Read More
Google Adds Passkeys to Advanced Protection Program for High-Risk Users
/in General NewsGoogle on Wednesday announced that it’s making available passkeys for high-risk users to enroll in its Advanced Protection Program (APP).
“Users traditionally needed a physical security key for APP — now they can choose a passkey to secure their account,” Shuvo Chatterjee, product lead of APP, said.
Passkeys are considered a more secure and phishing-resistant alternative to passwords. Based on
The Hacker News – Read More
Blast RADIUS Attack can Bypass Authentication for Clients
/in General NewsThis vulnerability, known as Blast RADIUS and rated 7.5 out of 10 on the severity scale, affects the RADIUS networking protocol, potentially granting unauthorized access to network devices and services without credentials.
Cyware News – Latest Cyber News – Read More
Monocle: Open-Source LLM for Binary Analysis Search
/in General NewsMonocle is an open-source tool powered by an LLM for searching natural language in compiled binaries. It can analyze binaries based on criteria like authentication code or password strings, using Ghidra headless for decompilation.
Cyware News – Latest Cyber News – Read More
UK Government Advises Best Practices for Embedded Device Security
/in General NewsThe cybersecurity arm of the UK government, RITICS, has released a new guide to assist companies in enhancing the security of their operational technology (OT) and industrial control system (ICS) hardware.
Cyware News – Latest Cyber News – Read More
Persistent npm Campaign Shipping Trojanized jQuery
/in General NewsApproximately 68 malicious packages were created between May 26 and June 23, 2024, with deceptive names like cdnjquery and jquertyi. These packages were manually crafted, unlike automated attacks, allowing the threat actor to steal website form data.
Cyware News – Latest Cyber News – Read More
Unsecured Database Exposed 39 Million Sensitive Legal Records Online
/in General NewsMillions of Legal Documents Exposed Online! Sensitive data leak raises security concerns for the legal industry. Learn how…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Hackers Target WordPress Calendar Plugin Used by 150,000 Sites
/in General NewsHackers are targeting a vulnerability in the Modern Events Calendar WordPress plugin found on over 150,000 websites to upload files and execute code remotely. The plugin by Webnus is used to manage events.
Cyware News – Latest Cyber News – Read More
Google Is Adding Passkey Support for Its Most Vulnerable Users
/in General NewsGoogle is bringing the password-killing “passkey” tech to its Advanced Protection Program users more than a year after rolling them out broadly.
Security Latest – Read More
Google Targets Passkey Support to High-Risk Execs, Civil Society
/in General NewsThe tech giant has rolled out passkey support for account authentication within its Advanced Protection Program to complement existing compatibility with FIDO2 hardware keys.
darkreading – Read More