BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Critical VMware Bugs Open Swaths of VMs to RCE, Data Theft
/in General NewsA trio of bugs could allow hackers to escalate privileges and remotely execute code on virtual machines deployed across cloud environments.
darkreading – Read More
Blackbaud Fined $6.75M After 2020 Ransomware Attack
/in General NewsThreat actors were able to breach Blackbaud’s systems and compromise sensitive data, largely because of the company’s poor cybersecurity practices and lack of encrypted data, the AG said.
darkreading – Read More
Cut & Paste Tactics Import Malware to Unwitting Victims
/in General News“ClearFake” and “ClickFix” attackers are tricking people into cutting and pasting malicious PowerShell scripts to infect their own machines with RATs and infostealers.
darkreading – Read More
Internet Computer Protocol Launches Walletless Verified Credentials for Public Trust
/in General NewsInternet Computer Protocol (ICP) introduces Verified Credentials (VCs), a walletless solution enhancing data sharing privacy. Unveiled at DICE 2024, VCs help combat bots and fake accounts on social media, ensuring secure and efficient verification.
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
BlackSuit Ransomware Leaks Kansas City Police Data in Failed Ransom Plot
/in General NewsBlackSuit Ransomware, known as the rebrand of the Conti ransomware gang, has leaked a trove of Kansas City Police data, including evidence records, investigation files, crime scene phones, and much more, after the department refused to pay the ransom.
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Signal Foundation Warns Against EU’s Plan to Scan Private Messages for CSAM
/in General NewsA controversial proposal put forth by the European Union to scan users’ private messages for detection child sexual abuse material (CSAM) poses severe risks to end-to-end encryption (E2EE), warned Meredith Whittaker, president of the Signal Foundation, which maintains the privacy-focused messaging service of the same name.
“Mandating mass scanning of private communications fundamentally
The Hacker News – Read More
Cybercriminals Exploit Free Software Lures to Deploy Hijack Loader and Vidar Stealer
/in General NewsThreat actors are luring unsuspecting users with free or pirated versions of commercial software to deliver a malware loader called Hijack Loader, which then deploys an information stealer known as Vidar Stealer.
“Adversaries had managed to trick users into downloading password-protected archive files containing trojanized copies of a Cisco Webex Meetings App (ptService.exe),” Trellix security
The Hacker News – Read More
Keeper vs LastPass (2024): Which Password Manager Is Better for Your Business?
/in General NewsKeeper and LastPass are some of the best password managers on the market, each offering advanced data protection and security features. Compare the two with our in-depth comparison guide before you buy.
Security | TechRepublic – Read More
The Software Licensing Disease Infecting Our Nation’s Cybersecurity
/in General NewsForcing Microsoft to compete fairly is the most important next step in building a better defense against foreign actors.
darkreading – Read More
Two Men Plead Guilty to Hacking Law Enforcement Database for Doxing
/in General NewsSagar Steven Singh and Nicholas Ceraolo pleaded guilty to hacking a database maintained by a US federal law enforcement agency.
The post Two Men Plead Guilty to Hacking Law Enforcement Database for Doxing appeared first on SecurityWeek.
SecurityWeek – Read More