BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Apple Patches AirPods Bluetooth Vulnerability That Could Allow Eavesdropping
/in General NewsApple has released a firmware update for AirPods that could allow a malicious actor to gain access to the headphones in an unauthorized manner.
Tracked as CVE-2024-27867, the authentication issue affects AirPods (2nd generation and later), AirPods Pro (all models), AirPods Max, Powerbeats Pro, and Beats Fit Pro.
“When your headphones are seeking a connection request to one of your previously
The Hacker News – Read More
Malicious JavaScript Snippets Served Due to Supply Chain Attack on Polyfills Site
/in General NewsThe polyfill.io domain, which offers JavaScript code to add functionality to older browsers, has been compromised and is infecting over 100,000 websites with malware. The domain was purchased by a Chinese organization earlier this year.
Cyware News – Latest Cyber News – Read More
Polyfill Supply Chain Attack Hits Over 100k Websites
/in General NewsMore than 100,000 websites are affected by a supply chain attack injecting malware via a Polyfill domain.
The post Polyfill Supply Chain Attack Hits Over 100k Websites appeared first on SecurityWeek.
SecurityWeek – Read More
Chinese and N. Korean Hackers Target Global Infrastructure with Ransomware
/in General NewsThreat actors with suspected ties to China and North Korea have been linked to ransomware and data encryption attacks targeting government and critical infrastructure sectors across the world between 2021 and 2023.
While one cluster of activity has been associated with the ChamelGang (aka CamoFei), the second cluster overlaps with activity previously attributed to Chinese and North Korean
The Hacker News – Read More
Practical Guidance For Securing Your Software Supply Chain
/in General NewsThe heightened regulatory and legal pressure on software-producing organizations to secure their supply chains and ensure the integrity of their software should come as no surprise. In the last several years, the software supply chain has become an increasingly attractive target for attackers who see opportunities to force-multiply their attacks by orders of magnitude. For example, look no
The Hacker News – Read More
UK and US Law Enforcement Put Qilin Ransomware Criminals in the Crosshairs
/in General NewsUK and US law enforcement agencies have collaborated to combat the Qilin ransomware gang, which has targeted the global healthcare industry through several recent attacks.
Cyware News – Latest Cyber News – Read More
Zeek: Open-Source Network Traffic Analysis, Security Monitoring
/in General NewsZeek is an open-source network analysis framework. Unlike an active security device such as a firewall, Zeek operates on a versatile ‘sensor’ that can be a hardware, software, virtual, or cloud platform.
Cyware News – Latest Cyber News – Read More
Exploitation Attempts Target New MOVEit Transfer Vulnerability
/in General NewsExploitation attempts targeting CVE-2024-5806, a critical MOVEit Transfer vulnerability patched recently, have started.
The post Exploitation Attempts Target New MOVEit Transfer Vulnerability appeared first on SecurityWeek.
SecurityWeek – Read More
New Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites
/in General NewsMultiple content management system (CMS) platforms like WordPress, Magento, and OpenCart have been targeted by a new credit card web skimmer called Caesar Cipher Skimmer.
A web skimmer refers to malware that is injected into e-commerce sites with the goal of stealing financial and payment information.
According to Sucuri, the latest campaign entails making malicious modifications to the
The Hacker News – Read More
‘ChamelGang’ APT Disguises Espionage Activities With Ransomware
/in General NewsThe China-nexus cyberthreat actor has been operating since at least 2019 and has notched victims in multiple countries.
darkreading – Read More