BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
HUMINT: Diving Deep into the Dark Web
/in General NewsClear Web vs. Deep Web vs. Dark Web
Threat intelligence professionals divide the internet into three main components:
Clear Web – Web assets that can be viewed through public search engines, including media, blogs, and other pages and sites.
Deep Web – Websites and forums that are unindexed by search engines. For example, webmail, online banking, corporate intranets, walled gardens, etc. Some
The Hacker News – Read More
Apache Fixed a Source Code Disclosure Flaw in Apache HTTP Server
/in General NewsThis vulnerability, tracked as CVE-2024-39884 and caused by a regression, can lead to unintentional exposure of sensitive data when legacy content-type configurations are used.
Cyware News – Latest Cyber News – Read More
Splunk Addresses Critical Vulnerabilities in Enterprise and Cloud Platforms
/in General NewsSplunk has released a set of security updates to address 16 vulnerabilities in Splunk Enterprise and Cloud Platform, including high-severity issues. CVE-2024-36985 allows remote code execution via External Lookup in Splunk Enterprise.
Cyware News – Latest Cyber News – Read More
Increase in the Exploitation of Microsoft SmartScreen Vulnerability
/in General NewsCyble Research and Intelligence Labs (CRIL) has identified an increase in the exploitation of the Microsoft SmartScreen vulnerability (CVE-2024-21412) through an active campaign targeting regions like Spain, the US, and Australia.
Cyware News – Latest Cyber News – Read More
Critical Infrastructure Providers Seek Guardrails on Scope, Timeline for CIRCIA Rules
/in General NewsCritical infrastructure providers are urging federal officials for more flexibility in reporting cyber incidents within the first 72 hours under the Cyber Incident Reporting for Critical Infrastructure Act.
Cyware News – Latest Cyber News – Read More
Update: Network Segmentation Hobbled Midnight Blizzard’s Attack on TeamViewer
/in General NewsThe company revealed that their corporate IT network, production environment, and TeamViewer connectivity platform are segmented to prevent unauthorized access. Immediate remediation measures were effective in blocking suspicious activity.
Cyware News – Latest Cyber News – Read More
How to watch Samsung Unpacked Paris 2024 and what we’re expecting to be unveiled
/in General NewsSamsung’s summer launch event will take tomorrow, and the Galaxy Z Fold 6, Smart Ring, Buds 3 Pro, Watch Ultra, and more are on this year’s docket.
Latest news – Read More
Turning Jenkins Into a Cryptomining Machine From an Attacker’s Perspective
/in General NewsAttackers can leverage the Jenkins Script Console to execute malicious Groovy scripts, leading to cybercriminal activities such as the deployment of cryptocurrency miners.
Cyware News – Latest Cyber News – Read More
As Cyber Command Evolves, Its Novel Malware Alert System Fades Away
/in General NewsThe shift away from public disclosure on Twitter is part of an evolution in how the CNMF communicates cyber threat information. The command now focuses on working closely with industry partners to share information effectively and efficiently.
Cyware News – Latest Cyber News – Read More
CISA adds Cisco NX-OS Command Injection bug to its Known Exploited Vulnerabilities catalog
/in General NewsThe flaw allows an attacker to execute arbitrary commands as root on the affected device’s operating system. Only attackers with administrator credentials can successfully exploit this vulnerability.
Cyware News – Latest Cyber News – Read More