BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Critical SSTI Flaw in WPML Plugin Exposes Millions of WordPress Sites to RCE Attacks
/in General NewsThis vulnerability allows authorized users to inject and execute malicious code through the plugin’s shortcode feature, potentially leading to data theft and website takeover.
Cyware News – Latest Cyber News – Read More
Microsoft Fixes ASCII Smuggling Flaw That Enabled Data Theft from Microsoft 365 Copilot
/in General NewsDetails have emerged about a now-patched vulnerability in Microsoft 365 Copilot that could enable the theft of sensitive user information using a technique called ASCII smuggling.
“ASCII Smuggling is a novel technique that uses special Unicode characters that mirror ASCII but are actually not visible in the user interface,” security researcher Johann Rehberger said.
“This means that an attacker
The Hacker News – Read More
Google Warns of CVE-2024-7965 Chrome Security Flaw Under Active Exploitation
/in General NewsGoogle has revealed that a security flaw that was patched as part of a security update rolled out last week to its Chrome browser has come under active exploitation in the wild.
Tracked as CVE-2024-7965, the vulnerability has been described as an inappropriate implementation bug in the V8 JavaScript and WebAssembly engine.
“Inappropriate implementation in V8 in Google Chrome prior to
The Hacker News – Read More
How AI is helping cut the risks of breaches with patch management
/in General NewsAI/ML-driven patch management delivers real-time risk assessments, guiding IT and security teams to prioritize critical patches first.Read More
Security News | VentureBeat – Read More
Microsoft to Host Windows Security Summit in CrowdStrike Outage Aftermath
/in General NewsThe tech giant seeks to work with endpoint security partners, including CrowdStrike, on how to prevent an outage event of such gravity from happening again.
darkreading – Read More
Hackers Use Rare Stealth Techniques to Down Asian Military, Gov’t Orgs
/in General NewsA threat actor resembling APT41 performed “AppDomainManager Injection,” which is like DLL sideloading, but arguably easier and stealthier.
darkreading – Read More
Telegram CEO Pavel Durov’s Arrest Linked to Sweeping Criminal Investigation
/in General NewsFrench authorities detained Durov to question him as part of a probe into a wide range of alleged violations—including money laundering and CSAM—but it remains unclear if he will face charges.
Security Latest – Read More
Audit Finds Notable Security Gaps in FBI’s Storage Media Management
/in General NewsThe FBI lacks proper policies and controls for tracking and disposing of storage media, leading to risks of loss or theft. The audit also identified physical security gaps in the media destruction process at FBI facilities.
Cyware News – Latest Cyber News – Read More
Cybercriminals Tap Greasy Opal to Create 750M Fake Microsoft Accounts
/in General NewsSuch cyberattack enablement services let attackers breach security measures, establish new fake accounts, and brute-force servers.
darkreading – Read More
Vulnerability Prioritization is Only the Beginning
/in General NewsVulnerability prioritization is crucial in managing security threats but is only the beginning. Knowing which vulnerabilities to address is not enough; the focus should be on quickly addressing and mitigating them.
Cyware News – Latest Cyber News – Read More