BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Tennessee-based mortgage lender confirms December cyberattack
/in General NewsTennessee-based Mortgage Investors Group (MIG) did not outline how many customers were impacted by the attack but said they have hired a vendor to identify the affected individuals. The company said it expects to notify those customers directly once the process is completed in several weeks.
The Record from Recorded Future News – Read More
New Startups Focus on Deepfakes, Data-in-Motion & Model Security
/in General NewsIn times of unprecedented change, innovative mindsets and attentiveness of startup culture make for a community everyone can leverage to understand the world and guard against its dangers.
darkreading – Read More
Cyber Insights 2025: Cyber Threat Intelligence
/in General NewsCyber threat intelligence can inform decisions but is a complex issue. Where it is complete and accurate it is a huge boon.
The post Cyber Insights 2025: Cyber Threat Intelligence appeared first on SecurityWeek.
SecurityWeek – Read More
SAP Patches Critical Vulnerabilities in NetWeaver
/in General NewsSAP has released 14 security notes on January 2025 Patch Day, including two addressing critical vulnerabilities in NetWeaver.
The post SAP Patches Critical Vulnerabilities in NetWeaver appeared first on SecurityWeek.
SecurityWeek – Read More
North Korea stole over $659M in crypto heists during 2024, deploys fake job seekers
/in General NewsA joint international statement provides the first official confirmation that North Korea was behind the $235M hack of WazirX, India’s largest cryptocurrency exchange.
© 2024 TechCrunch. All rights reserved. For personal use only.
Security News | TechCrunch – Read More
Compromised AWS Keys Abused in Codefinger Ransomware Attacks
/in General NewsA ransomware group tracked as Codefinger is using compromised AWS keys to encrypt S3 bucket data using SSE-C.
The post Compromised AWS Keys Abused in Codefinger Ransomware Attacks appeared first on SecurityWeek.
SecurityWeek – Read More
Hackers Using Fake YouTube Links to Steal Login Credentials
/in General NewsCybercriminals exploit fake YouTube links to redirect users to phishing pages, stealing login credentials via URI manipulation and…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
CISA Warns of Second BeyondTrust Vulnerability Exploited in Attacks
/in General NewsAttackers have been exploiting a second vulnerability in BeyondTrust’s remote management solutions, CISA warns.
The post CISA Warns of Second BeyondTrust Vulnerability Exploited in Attacks appeared first on SecurityWeek.
SecurityWeek – Read More
New Codefinger Ransomware Abuses Amazon AWS to Encrypt S3 Buckets
/in General NewsThe Halcyon RISE Team has identified a new Codefinger ransomware campaign targeting Amazon S3 buckets. This attack leverages…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Critical Aviatrix Controller Vulnerability Exploited Against Cloud Environments
/in General NewsAttackers are exploiting a critical vulnerability in Aviatrix Controller to execute arbitrary code in AWS cloud environments.
The post Critical Aviatrix Controller Vulnerability Exploited Against Cloud Environments appeared first on SecurityWeek.
SecurityWeek – Read More