BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Spatial Computing Hack Exploits Apple Vision Pro Flaw to Fill Room With Spiders, Bats
/in General NewsA recently patched Vision Pro vulnerability was classified by Apple as a DoS issue, but a researcher has shown that it’s ‘scary’.
The post Spatial Computing Hack Exploits Apple Vision Pro Flaw to Fill Room With Spiders, Bats appeared first on SecurityWeek.
SecurityWeek – Read More
How to Use Tines’s SOC Automation Capability Matrix
/in General NewsCreated by John Tuckner and the team at automation and AI-powered workflow platform Tines, the SOC Automation Capability Matrix (SOC ACM) is a set of techniques designed to help security operations teams understand their automation capabilities and respond more effectively to incidents.
A customizable, vendor-agnostic tool featuring lists of automation opportunities, it’s
The Hacker News – Read More
Qilin Ransomware Leaks 400GB of NHS and Patient Data on Telegram
/in General NewsLearn about the impact of the Qilin ransomware attack on Synnovis and healthcare services. Discover the consequences of this cyber incident and its implications for patient care.
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Recent SolarWinds Serv-U Vulnerability Exploited in the Wild
/in General NewsThreat actors are exploiting a recent path traversal vulnerability in SolarWinds Serv-U using public PoC code.
The post Recent SolarWinds Serv-U Vulnerability Exploited in the Wild appeared first on SecurityWeek.
SecurityWeek – Read More
Personal and Chemical Facility Information Potentially Accessed in CISA Hack
/in General NewsCISA says CFATS program data was likely accessed after an Ivanti Connect Secure appliance was hacked in January.
The post Personal and Chemical Facility Information Potentially Accessed in CISA Hack appeared first on SecurityWeek.
SecurityWeek – Read More
Oyster Backdoor Spreading via Trojanized Popular Software Downloads
/in General NewsA malvertising campaign is leveraging trojanized installers for popular software such as Google Chrome and Microsoft Teams to drop a backdoor called Oyster (aka Broomstick and CleanUpLoader).
That’s according to findings from Rapid7, which identified lookalike websites hosting the malicious payloads that users are redirected to after searching for them on search engines like Google and Bing.
The
The Hacker News – Read More
SolarWinds Serv-U Vulnerability Under Active Attack – Patch Immediately
/in General NewsA recently patched high-severity flaw impacting SolarWinds Serv-U file transfer software is being actively exploited by malicious actors in the wild.
The vulnerability, tracked as CVE-2024-28995 (CVSS score: 8.6), concerns a directory transversal bug that could allow attackers to read sensitive files on the host machine.
Affecting all versions of the software prior to and including Serv-U 15.4.2
The Hacker News – Read More
How to Study Ethical Hacking as a Beginner
/in General NewsImmersing yourself in best practices for ethical hacking, pen-testing and information security can set you up for a career or better-protected business.
Security | TechRepublic – Read More
Can AI detectors save us from ChatGPT? I tried 6 online tools to find out
/in General NewsWith the sudden arrival of ChatGPT, educators and editors face a worrying surge of automated content submissions. We look at the problem and what can be done about it.
Latest stories for ZDNET in Security – Read More
Disruptions at Many Car Dealerships Continue as CDK Hack Worsens
/in General NewsCar dealership software provider CDK Global was in the process of restoring services impacted by a cyberattack when it discovered an additional hack.
The post Disruptions at Many Car Dealerships Continue as CDK Hack Worsens appeared first on SecurityWeek.
SecurityWeek – Read More