BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Military-themed Email Scam Spreads Malware to Infect Pakistani Users
/in General NewsCybersecurity researchers have shed light on a new phishing campaign that has been identified as targeting people in Pakistan using a custom backdoor.
Dubbed PHANTOM#SPIKE by Securonix, the unknown threat actors behind the activity have leveraged military-related phishing documents to activate the infection sequence.
“While there are many methods used today to deploy malware, the threat actors
The Hacker News – Read More
Securing Customers’ Trust With SOC 2 Type II Compliance
/in General NewsAudit compliance not only demonstrates commitment to data security and privacy but also builds trust with customers and stakeholders.
darkreading – Read More
Santander Employee Data Breach Linked to Snowflake Attack
/in General NewsSantander US is notifying over 12,000 employees that their personal information was compromised in a data breach.
The post Santander Employee Data Breach Linked to Snowflake Attack appeared first on SecurityWeek.
SecurityWeek – Read More
In Other News: Microsoft Email Spoofing, Snowflake Hack Ransoms, LogoFail Follow-Up
/in General NewsNoteworthy stories that might have slipped under the radar: Microsoft email spoofing vulnerability, Snowflake hack victims get ransom demands, LogoFail still around.
The post In Other News: Microsoft Email Spoofing, Snowflake Hack Ransoms, LogoFail Follow-Up appeared first on SecurityWeek.
SecurityWeek – Read More
Spatial Computing Hack Exploits Apple Vision Pro Flaw to Fill Room With Spiders, Bats
/in General NewsA recently patched Vision Pro vulnerability was classified by Apple as a DoS issue, but a researcher has shown that it’s ‘scary’.
The post Spatial Computing Hack Exploits Apple Vision Pro Flaw to Fill Room With Spiders, Bats appeared first on SecurityWeek.
SecurityWeek – Read More
How to Use Tines’s SOC Automation Capability Matrix
/in General NewsCreated by John Tuckner and the team at automation and AI-powered workflow platform Tines, the SOC Automation Capability Matrix (SOC ACM) is a set of techniques designed to help security operations teams understand their automation capabilities and respond more effectively to incidents.
A customizable, vendor-agnostic tool featuring lists of automation opportunities, it’s
The Hacker News – Read More
Qilin Ransomware Leaks 400GB of NHS and Patient Data on Telegram
/in General NewsLearn about the impact of the Qilin ransomware attack on Synnovis and healthcare services. Discover the consequences of this cyber incident and its implications for patient care.
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Recent SolarWinds Serv-U Vulnerability Exploited in the Wild
/in General NewsThreat actors are exploiting a recent path traversal vulnerability in SolarWinds Serv-U using public PoC code.
The post Recent SolarWinds Serv-U Vulnerability Exploited in the Wild appeared first on SecurityWeek.
SecurityWeek – Read More
Personal and Chemical Facility Information Potentially Accessed in CISA Hack
/in General NewsCISA says CFATS program data was likely accessed after an Ivanti Connect Secure appliance was hacked in January.
The post Personal and Chemical Facility Information Potentially Accessed in CISA Hack appeared first on SecurityWeek.
SecurityWeek – Read More
Oyster Backdoor Spreading via Trojanized Popular Software Downloads
/in General NewsA malvertising campaign is leveraging trojanized installers for popular software such as Google Chrome and Microsoft Teams to drop a backdoor called Oyster (aka Broomstick and CleanUpLoader).
That’s according to findings from Rapid7, which identified lookalike websites hosting the malicious payloads that users are redirected to after searching for them on search engines like Google and Bing.
The
The Hacker News – Read More