BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
CISA Warns of Actively Exploited Apache Flink Security Vulnerability
/in General NewsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting Apache Flink, the open-source, unified stream-processing and batch-processing framework, to the Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.
Tracked as CVE-2020-17519, the issue relates to a case of improper access control that
The Hacker News – Read More
WhatsApp Engineers Fear Encryption Flaw Exposes User Data, Memo
/in General NewsBy Deeba Ahmed
Is your WhatsApp privacy a myth? New reports reveal a vulnerability that could expose who you message to government agents.
This is a post from HackRead.com Read the original post: WhatsApp Engineers Fear Encryption Flaw Exposes User Data, Memo
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
He Trained Cops to Fight Crypto Crime—and Allegedly Ran a $100M Dark-Web Drug Market
/in General NewsThe strange journey of Lin Rui-siang, the 23-year-old accused of running the Incognito black market, extorting his own site’s users—and then refashioning himself as a legit crypto crime expert.
Security Latest – Read More
US Intelligence Agencies’ Embrace of Generative AI Is at Once Wary and Urgent
/in General NewsU.S. intelligence agencies are scrambling to embrace the AI revolution, believing they’ll be smothered by exponential data growth as sensor-generated surveillance tech further blankets the planet.
The post US Intelligence Agencies’ Embrace of Generative AI Is at Once Wary and Urgent appeared first on SecurityWeek.
SecurityWeek – Read More
Ransomware Attacks Exploit VMware ESXi Vulnerabilities in Alarming Pattern
/in General NewsRansomware attacks targeting VMware ESXi infrastructure following an established pattern regardless of the file-encrypting malware deployed.
“Virtualization platforms are a core component of organizational IT infrastructure, yet they often suffer from inherent misconfigurations and vulnerabilities, making them a lucrative and highly effective target for threat actors to abuse,”
The Hacker News – Read More
New Bitcoin Token Protocol “Runes” Carries Potential Phishing Risk
/in General NewsBy Owais Sultan
Is the innovative Runes protocol on Bitcoin a cybersecurity concern waiting to happen? Cybersecurity experts at Resonance Security…
This is a post from HackRead.com Read the original post: New Bitcoin Token Protocol “Runes” Carries Potential Phishing Risk
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Cybercriminals are Targeting Elections in India With Influence Campaigns
/in General NewsAround 16 different independent hacktivist groups are targeting Indian elections, including Anon Black Flag Indonesia, Anonymous Bangladesh, and Morocco Black Cyber Army, among others.
Cyware News – Latest Cyber News – Read More
A Leak of Biometric Police Data Is a Sign of Things to Come
/in General NewsThousands of fingerprints and facial images linked to police in India have been exposed online. Researchers say it’s a warning of what will happen as the collection of biometric data increases.
Security Latest – Read More
New Frontiers, Old Tactics: Chinese Espionage Group Targets Africa & Caribbean Govts
/in General NewsThe China-linked threat actor known as Sharp Panda has expanded their targeting to include governmental organizations in Africa and the Caribbean as part of an ongoing cyber espionage campaign.
“The campaign adopts Cobalt Strike Beacon as the payload, enabling backdoor functionalities like C2 communication and command execution while minimizing the exposure of their custom tools,” Check Point
The Hacker News – Read More
Chinese Hackers Hide on Military and Government Networks for Six Years
/in General NewsBitdefender researchers who discovered the threat group report that its operations align with Chinese geo-political interests, focusing on intelligence collection and espionage.
Cyware News – Latest Cyber News – Read More