BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
New Android Hook Malware Variant Locks Devices With Ransomware
/in General NewsZimperium’s research reveals the Hook Android malware is now a hybrid threat, using ransomware and spyware to steal…
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
Docker Desktop Vulnerability Leads to Host Compromise
/in General NewsA critical vulnerability in Docker Desktop allows attackers to modify the filesystem of Windows hosts to become administrators.
The post Docker Desktop Vulnerability Leads to Host Compromise appeared first on SecurityWeek.
SecurityWeek – Read More
Aembit Extends Secretless CI/CD with Credential Lifecycle Management for GitLab
/in General NewsSilver Spring, USA / Maryland, 26th August 2025, CyberNewsWire
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
AI Systems Vulnerable to Prompt Injection via Image Scaling Attack
/in General NewsResearchers show how popular AI systems can be tricked into processing malicious instructions by hiding them in images.
The post AI Systems Vulnerable to Prompt Injection via Image Scaling Attack appeared first on SecurityWeek.
SecurityWeek – Read More
Hundreds of Thousands Affected by Auchan Data Breach
/in General NewsAuchan confirms that the personal information of hundreds of thousands of customers was stolen in a data breach.
The post Hundreds of Thousands Affected by Auchan Data Breach appeared first on SecurityWeek.
SecurityWeek – Read More
Break Into Cybersecurity with 38 Hours of Training — Now Less Than $25 for Life
/in General NewsBuild job-ready cybersecurity skills with 38 hours of self-paced training from this lifetime bundle.
Security | TechRepublic – Read More
Organizations Warned of Exploited Git Vulnerability
/in General NewsCISA urges federal agencies to immediately patch an exploited arbitrary file write vulnerability in Git that leads to remote code execution.
The post Organizations Warned of Exploited Git Vulnerability appeared first on SecurityWeek.
SecurityWeek – Read More
Finally, my ultimate smart home setup is complete thanks to this display gadget
/in General NewsIf you own a Eufy security system, the Security E10 smart display is a natural companion – offering handy features that enhance your setup.
Latest news – Read More
CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git
/in General NewsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws impacting Citrix Session Recording and Git to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
The list of vulnerabilities is as follows –
CVE-2024-8068 (CVSS score: 5.1) – An improper privilege management vulnerability in Citrix Session Recording
The Hacker News – Read More
Google to Verify All Android Developers in 4 Countries to Block Malicious Apps
/in General NewsGoogle has announced plans to begin verifying the identity of all developers who distribute apps on Android, even for those who distribute their software outside the Play Store.
“Android will require all apps to be registered by verified developers in order to be installed by users on certified Android devices,” the company said. “This creates crucial accountability, making it much harder for
The Hacker News – Read More