BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks
/in General NewsThe loader-as-a-service (LaaS) known as FakeBat has become one of the most widespread loader malware families distributed using the drive-by download technique this year, findings from Sekoia reveal.
“FakeBat primarily aims to download and execute the next-stage payload, such as IcedID, Lumma, RedLine, SmokeLoader, SectopRAT, and Ursnif,” the company said in a Tuesday analysis.
Drive-by attacks
The Hacker News – Read More
Cybersecurity is Now a Top Concern for Auto Industry, Report Finds
/in General NewsAccording to a survey by Rockwell Automation, vehicle and automotive supply manufacturers ranked cybersecurity as their biggest external concern. Cyberattacks resulted in $11.8 billion in damages during the first half of 2023 alone.
Cyware News – Latest Cyber News – Read More
Polyglot Files Enable Cyber Attack Chains and Methods for Detection & Disarmament
/in General NewsHackers are using polyglot files, which can fit into multiple file formats and evade detection by endpoint detection and response systems. Research indicates that some commercial EDR tools have a 0% detection rate for malicious polyglots.
Cyware News – Latest Cyber News – Read More
South Africa National Healthcare Lab Still Reeling from Ransomware Attack
/in General NewsThe cyberattack disrupted national laboratory services, which could slow response to disease outbreaks such as mpox, experts warn.
darkreading – Read More
Israeli Entities Targeted by Cyberattack Using Donut and Sliver Frameworks
/in General NewsCybersecurity researchers have discovered an attack campaign that targets various Israeli entities with publicly-available frameworks like Donut and Sliver.
The campaign, believed to be highly targeted in nature, “leverage target-specific infrastructure and custom WordPress websites as a payload delivery mechanism, but affect a variety of entities across unrelated verticals, and rely on
The Hacker News – Read More
South Korean ERP Vendor’s Server Hacked to Spread Xctdoor Malware
/in General NewsAn unnamed South Korean enterprise resource planning (ERP) vendor’s product update server has been found to be compromised to deliver a Go-based backdoor dubbed Xctdoor.
The AhnLab Security Intelligence Center (ASEC), which identified the attack in May 2024, did not attribute it to a known threat actor or group, but noted that the tactics overlap with that of Andariel, a sub-cluster within the
The Hacker News – Read More
3 Ways to Chill Attacks on Snowflake
/in General NewsMultifactor authentication is a good first step, but businesses should look to collect and analyze data to hunt for threats, manage identities more closely, and limit the impact of attacks.
darkreading – Read More
Fintech Frenzy: Affirm & Others Emerge as Victims in Evolve Breach
/in General NewsA ransomware attack has become a supply chain issue, thanks to the victim’s partnerships with other financial services companies.
darkreading – Read More
Passkey Redaction Attacks Subvert GitHub, Microsoft Authentication
/in General NewsAdversary-in-the-middle attacks can strip out the passkey option from login pages that users see, leaving targets with only authentication choices that force them to give up credentials.
darkreading – Read More
5 ChromeOS settings you should change for a more secure Chromebook – here’s how
/in General NewsCan you improve Google’s default security settings? You sure can! Lock down your laptop with these quick and easy tweaks.
Latest stories for ZDNET in Security – Read More