BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
SonicWall Investigating Potential SSL VPN Zero-Day After 20+ Targeted Attacks Reported
/in General NewsSonicWall said it’s actively investigating reports to determine if there is a new zero-day vulnerability following reports of a spike in Akira ransomware actors in late July 2025.
“Over the past 72 hours, there has been a notable increase in both internally and externally reported cyber incidents involving Gen 7 SonicWall firewalls where SSLVPN is enabled,” the network security vendor said in a
The Hacker News – Read More
People are using ChatGPT to write their text messages – here’s how you can tell
/in General NewsIs ChatGPT the new Hallmark?
Latest news – Read More
Crypto ATMs fueling criminal activity, Treasury warns
/in General NewsThe Treasury Department warned that the massive increase in the number of crypto ATMs — convertible virtual currency kiosks — has been accompanied by a spike in the number of operators who fail to comply with anti-money laundering rules.
The Record from Recorded Future News – Read More
Nvidia Patches Critical RCE Vulnerability Chain
/in General NewsThe flaws in the company’s Triton Inference Server enables model theft, data leaks, and response manipulation.
darkreading – Read More
Could Apple create an AI search engine to rival Gemini and ChatGPT? Here’s how it could succeed
/in General NewsApple has been trying to catch up in the AI race. Can this AI search engine be the catalyst?
Latest news – Read More
You can use T-Mobile’s Starlink service to send images, audio, and video now – here’s how
/in General NewsT-Satellite now offers MMS on select Android phones. And, soon, it’ll support app data from optimized third-party apps.
Latest news – Read More
Threat Actors Increasingly Leaning on GenAI Tools
/in General NewsFrom “eCrime” actors to fake IT tech workers, CrowdStrike researchers found that adversaries are using AI to enhance their offensive cyber operations.
darkreading – Read More
Cisco Talos Researcher Reveals Method That Causes LLMs to Reveal Training Data
/in General NewsIn this TechRepublic interview, researcher Amy Chang details the decomposition method and shares how organizations can protect themselves from LLM data extraction.
Security | TechRepublic – Read More
42% of Developers Using AI Say Their Codebase is Now Mostly AI-Generated
/in General NewsPost Content
darkreading – Read More
This Linux distro makes Slackware easier than ever
/in General NewsSlackware isn’t exactly the most user-friendly, but Slackel opens it up to the masses – offering four spins to choose from.
Latest news – Read More