BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Zero Trust Policy
/in General NewsThe concept of zero trust implies organizations must work under a constant worst-case scenario. This means assuming breaches are inevitable and that no entity or users — coming from within or from outside the organization — should ever be trusted. This “never trust, always verify” approach significantly reduces the attack surface and minimizes the potential …
Security | TechRepublic – Read More
Nigerian Faces Prison in US After BEC Fraud Conviction
/in General NewsNigerian national Ebuka Raphael Umeti was convicted in the US for operating a business email compromise (BEC) scheme.
The post Nigerian Faces Prison in US After BEC Fraud Conviction appeared first on SecurityWeek.
SecurityWeek – Read More
Amazon-Powered AI Cameras Used to Detect Emotions of Unwitting UK Train Passengers
/in General NewsCCTV cameras and AI are being combined to monitor crowds, detect bike thefts, and spot trespassers.
Security Latest – Read More
Hackers Exploit Legitimate Websites to Deliver BadSpace Windows Backdoor
/in General NewsLegitimate-but-compromised websites are being used as a conduit to deliver a Windows backdoor dubbed BadSpace under the guise of fake browser updates.
“The threat actor employs a multi-stage attack chain involving an infected website, a command-and-control (C2) server, in some cases a fake browser update, and a JScript downloader to deploy a backdoor into the victim’s system,” German
The Hacker News – Read More
Hamas Hackers Sling Stealthy Spyware Across Egypt, Palestine
/in General NewsThe Arid Viper APT group is deploying AridSpy malware with Trojanized messaging applications and second-stage data exfiltration.
darkreading – Read More
NiceRAT Malware Targets South Korean Users via Cracked Software
/in General NewsThreat actors have been observed deploying a malware called NiceRAT to co-opt infected devices into a botnet.
The attacks, which target South Korean users, are designed to propagate the malware under the guise of cracked software, such as Microsoft Windows, or tools that purport to offer license verification for Microsoft Office.
“Due to the nature of crack programs, information sharing amongst
The Hacker News – Read More
Can governments turn AI safety talk into action?
/in General NewsIndustry players and governments discuss guardrails for AI, but aren’t deploying them. Here’s what’s missing.
Latest stories for ZDNET in Security – Read More
How to Spot a Business Email Compromise Scam
/in General NewsIn this common email scam, a criminal pretending to be your boss or coworker emails you asking for a favor involving money. Here’s what do to when a bad actor lands in your inbox.
Security Latest – Read More
Let Slip the Robot Dogs of War
/in General NewsThe United States and China appear locked in a race to weaponize four-legged robots for military applications.
Security Latest – Read More
U.K. Hacker Linked to Notorious Scattered Spider Group Arrested in Spain
/in General NewsLaw enforcement authorities have allegedly arrested a key member of the notorious cybercrime group called Scattered Spider.
The individual, a 22-year-old man from the United Kingdom, was arrested this week in the Spanish city of Palma de Mallorca as he attempted to board a flight to Italy. The move is said to be a joint effort between the U.S. Federal Bureau of Investigation (FBI) and the
The Hacker News – Read More