BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Ongoing Social Engineering Campaign Linked to Black Basta Ransomware Operators
/in General NewsThe threat actors then call the impacted users, posing as members of the organization’s IT team, and attempt to socially engineer the users into providing remote access to their computers through the use of legitimate RMM solutions.
Cyware News – Latest Cyber News – Read More
Senators Urge $32 Billion in Emergency Spending on AI After Finishing Yearlong Review
/in General NewsThe group recommends that Congress draft emergency spending legislation to boost U.S. investments in artificial intelligence, including new R&D and testing standards to understand the technology’s potential harms.
The post Senators Urge $32 Billion in Emergency Spending on AI After Finishing Yearlong Review appeared first on SecurityWeek.
SecurityWeek – Read More
ICS Patch Tuesday: Advisories Published by Siemens, Rockwell, Mitsubishi Electric
/in General NewsSeveral ICS vendors released advisories on Tuesday to inform customers about vulnerabilities found in their products.
The post ICS Patch Tuesday: Advisories Published by Siemens, Rockwell, Mitsubishi Electric appeared first on SecurityWeek.
SecurityWeek – Read More
BLint: Open-Source Tool to Check the Security Properties of Your Executables
/in General NewsBLint is a Binary Linter designed to evaluate the security properties and capabilities of executable files. It utilizes LIEF (Library for Executable and Instrumentation Format) for its operations.
Cyware News – Latest Cyber News – Read More
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
/in General NewsMicrosoft has addressed a total of 61 new security flaws in its software as part of its Patch Tuesday updates for May 2024, including two zero-days which have been actively exploited in the wild.
Of the 61 flaws, one is rated Critical, 59 are rated Important, and one is rated Moderate in severity. This is in addition to 30 vulnerabilities&
The Hacker News – Read More
Experts Warn the NVD Backlog Is Reaching a Breaking Point
/in General NewsNIST has only analyzed 2 of the nearly 2,000 new vulnerabilities received in May. The backlog is attributed to an increase in software and vulnerabilities, as well as a change in interagency support, according to NIST.
Cyware News – Latest Cyber News – Read More
Dutch Court Sentences Tornado Cash Co-Founder to 5 Years in Prison for Money Laundering
/in General NewsA Dutch court on Tuesday sentenced one of the co-founders of the now-sanctioned Tornado Cash cryptocurrency mixer service to 5 years and 4 months in prison.
While the name of the defendant was redacted in the verdict, it’s known that Alexey Pertsev, a 31-year-old Russian national, has been awaiting trial in the Netherlands on money laundering charges.
The Hacker News – Read More
Hacker claims to have stolen Dell customer data – here’s how to protect yourself
/in General NewsA hacker told TechCrunch he exploited flaws in two data breaches, giving him access to Dell customer names, phone numbers, email addresses, and physical addresses.
Latest stories for ZDNET in Security – Read More
MITRE EMB3D Improves Security for Embedded Devices
/in General NewsThe EMB3D model provides a common understanding of cyber threats to embedded devices and the security mechanisms needed to mitigate them. It is based on observations of threat actor activities, security research, and device vulnerability reports.
Cyware News – Latest Cyber News – Read More
Top 5 Most Dangerous Cyber Threats in 2024
/in General NewsSANS Institute experts weigh in on the top threat vectors faced by enterprises and the public at large.
darkreading – Read More