BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
How Anthropic’s ‘Projects’ and new sharing features are revolutionizing AI teamwork
/in General NewsAnthropic introduces new AI collaboration tools, Projects and Artifacts, enhancing workplace productivity and challenging tech giants with Claude’s advanced enterprise capabilities.Read More
Security News | VentureBeat – Read More
Android RAT SpyMax Targets Telegram Users
/in General NewsSpyMax does not require the targeted device to be rooted, making it easier for threat actors to cause damage. Once installed, SpyMax gathers personal information from the infected device without user consent and sends it to a remote threat actor.
Cyware News – Latest Cyber News – Read More
The Julian Assange Saga Is Finally Over
/in General NewsWikiLeaks founder Julian Assange has agreed to plead guilty to one count of espionage in US court on Wednesday, ending a years-long legal battle between the US government and a controversial publisher.
Security Latest – Read More
8 Best Enterprise Password Managers for 2024
/in General NewsExplore the best enterprise password managers that provide security and centralized control for managing and protecting passwords across your organization.
Security | TechRepublic – Read More
Key Takeaways From the British Library Cyberattack
/in General NewsKnowledge institutions with legacy infrastructure, limited resources, and digitized intellectual property must protect themselves from sophisticated and destructive cyberattacks.
darkreading – Read More
Recent Zyxel NAS Vulnerability Exploited by Botnet
/in General NewsA Mirai-like botnet has started exploiting a critical-severity vulnerability in discontinued Zyxel NAS products.
The post Recent Zyxel NAS Vulnerability Exploited by Botnet appeared first on SecurityWeek.
SecurityWeek – Read More
SnailLoad Attack can Exploit Remote Network Latency Measurements to Infer User Activity
/in General NewsUnlike previous methods, SnailLoad doesn’t require a person-in-the-middle attack or hacking the target’s Wi-Fi. Instead, it lets a remote attacker infer websites and content viewed by a user without accessing their network traffic directly.
Cyware News – Latest Cyber News – Read More
Hackers Steal Over $2 Million in Cryptocurrency From CoinStats Wallets
/in General NewsCoinStats says North Korean hackers drained $2 million in virtual assets from 1,590 cryptocurrency wallets.
The post Hackers Steal Over $2 Million in Cryptocurrency From CoinStats Wallets appeared first on SecurityWeek.
SecurityWeek – Read More
Boolka Group’s Modular Trojan BMANAGER Exposed
/in General NewsThe Boolka group is responsible for deploying advanced malware and conducting web attacks. They have been exploiting vulnerabilities using SQL injection attacks since 2022, targeting websites in various countries.
Cyware News – Latest Cyber News – Read More
New Attack Uses MSC Files and Windows XSS Flaw to Breach Networks
/in General NewsA new command execution technique called “GrimResource” has been discovered that leverages a combination of specially crafted Microsoft Saved Console (MSC) files and an unpatched Windows XSS flaw.
Cyware News – Latest Cyber News – Read More