BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
New Tricks in the Phishing Playbook: Cloudflare Workers, HTML Smuggling, GenAI
/in General NewsCybersecurity researchers are alerting of phishing campaigns that abuse Cloudflare Workers to serve phishing sites that are used to harvest users’ credentials associated with Microsoft, Gmail, Yahoo!, and cPanel Webmail.
The attack method, called transparent phishing or adversary-in-the-middle (AitM) phishing, “uses Cloudflare Workers to act as a reverse proxy server for a
The Hacker News – Read More
Fail2Ban: Ban hosts that cause multiple authentication errors
/in General NewsFail2Ban is an open-source tool that monitors log files and blocks IP addresses that exhibit repeated failed login attempts. It does this by updating firewall rules to reject new connections from those IP addresses for a configurable amount of time.
Cyware News – Latest Cyber News – Read More
AI-as-a-Service Platform Patches Critical RCE Vulnerability
/in General NewsAttackers could have exploited a now-mitigated critical vulnerability in the Replicate artificial intelligence platform to access private AI models and sensitive data, including proprietary knowledge and personally identifiable information.
Cyware News – Latest Cyber News – Read More
High-Severity Flaw Affects Cisco Firepower Management Center
/in General NewsCisco states that there are no workarounds that address this vulnerability. The IT giant has confirmed that this vulnerability does not affect Adaptive Security Appliance (ASA) Software or Firepower Threat Defense (FTD) Software.
Cyware News – Latest Cyber News – Read More
Pakistan-linked Hackers Deploy Python, Golang, and Rust Malware on Indian Targets
/in General NewsThe Pakistan-nexus Transparent Tribe actor has been linked to a new set of attacks targeting Indian government, defense, and aerospace sectors using cross-platform malware written in Python, Golang, and Rust.
“This cluster of activity spanned from late 2023 to April 2024 and is anticipated to persist,” the BlackBerry Research and Intelligence Team said in a technical report
The Hacker News – Read More
6 Facts About How Interpol Fights Cybercrime
/in General NewsSo you think you know Interpol? Here are some key details of how this international law enforcement entity disrupts cybercrime worldwide.
darkreading – Read More
Shut the back door: Understanding prompt injection and minimizing risk
/in General NewsThe bottom line on prompt injection: Take it seriously and minimize the risk, but don’t let it hold you back. Read More
Security News | VentureBeat – Read More
The modern CISO: Scapegoat or value creator?
/in General NewsWhy keeping pace with the latest technology and ensuring open and honest communications with non-cybersecurity stakeholders is imperative.Read More
Security News | VentureBeat – Read More
Data Leak Exposes 500GB of Indian Police, Military Biometric Data
/in General NewsBy Waqas
The records belonged to two separate India-based firms, ThoughtGreen Technologies and Timing Technologies. Both provide application development, RFID technology, and biometric verification services.
This is a post from HackRead.com Read the original post: Data Leak Exposes 500GB of Indian Police, Military Biometric Data
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Experts Find Flaw in Replicate AI Service Exposing Customers’ Models and Data
/in General NewsCybersecurity researchers have discovered a critical security flaw in an artificial intelligence (AI)-as-a-service provider Replicate that could have allowed threat actors to gain access to proprietary AI models and sensitive information.
“Exploitation of this vulnerability would have allowed unauthorized access to the AI prompts and results of all Replicate’s platform customers,”
The Hacker News – Read More