BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
New RUSI Report Exposes Psychological Toll of Ransomware, Urges Action
/in General NewsA recent report by the Royal United Services Institute (RUSI) emphasized the need for all incident response stakeholders to address the psychological and physiological impact of ransomware attacks on individuals.
Cyware News – Latest Cyber News – Read More
RCE, DoS Exploits Found in Rockwell PanelView Plus: Patch Now
/in General NewsMicrosoft has exposed two significant vulnerabilities in Rockwell Automation’s PanelView Plus devices that could be exploited by attackers to execute remote code and launch denial-of-service attacks.
Cyware News – Latest Cyber News – Read More
ASUS and NordVPN Partner to Integrate VPN Service into Routers
/in General NewsEnhanced Security and Privacy for Users with Integrated NordVPN in ASUS Routers!
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Millions of Apple Applications Were Vulnerable to CocoaPods Supply Chain Attack
/in General NewsThe vulnerabilities have since been patched, but had quietly persisted since the CocoaPods migration in 2014.
Security | TechRepublic – Read More
Intel CPUs Face Spectre-Like ‘Indirector’ Attack That Leaks Data
/in General News“Indirector” targets a speculative execution component in silicon that previous research has largely overlooked.
darkreading – Read More
US car dealerships are recovering from massive cyberattack: 3 things you should know
/in General NewsA notorious extortion group held critical car sales software for ransom, and it’s still causing major headaches for car sales and car service.
Latest stories for ZDNET in Security – Read More
Secator: Open-Source Pentesting Swiss Army Knife
/in General NewsSecator is an open-source task and workflow runner designed for security assessments to streamline the use of various security tools for pen testers and security researchers.
Cyware News – Latest Cyber News – Read More
Vulnerabilities in CocoaPods: The Achilles’ Heel of the Apple App Ecosystem
/in General NewsCyware News – Latest Cyber News – Read More
New Ransomware Group Uses Phone Calls to Pressure Victims, Researchers Say
/in General NewsResearchers have identified a new ransomware group called Volcano Demon responsible for two recent successful attacks on companies in the manufacturing and logistics sectors.
Cyware News – Latest Cyber News – Read More
Understanding the FakeBat Loader: Distribution Tactics and Cybercriminal Infrastructure
/in General NewsIn the early part of 2024, the FakeBat loader, also known as EugenLoader or PaykLoader, emerged as a significant threat utilizing the drive-by download technique to spread malware.
Cyware News – Latest Cyber News – Read More