BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Ebury Botnet Malware Compromises 400,000 Linux Servers Over Past 14 Years
/in General NewsA malware botnet called Ebury is estimated to have compromised 400,000 Linux servers since 2009, out of which more than 100,000 were still compromised as of late 2023.
The findings come from Slovak cybersecurity firm ESET, which characterized it as one of the most advanced server-side malware campaigns for financial gain.
“Ebury actors have been pursuing monetization activities […],
The Hacker News – Read More
It’s Time to Master the Lift & Shift: Migrating from VMware vSphere to Microsoft Azure
/in General NewsWhile cloud adoption has been top of mind for many IT professionals for nearly a decade, it’s only in recent months, with industry changes and announcements from key players, that many recognize the time to make the move is now. It may feel like a daunting task, but tools exist to help you move your virtual machines (VMs) to a public cloud provider – like Microsoft Azure
The Hacker News – Read More
900k Impacted by Data Breach at Mississippi Healthcare Provider
/in General NewsSinging River Health System says the personal information of roughly 900,000 individuals was stolen in an August 2023 ransomware attack.
The post 900k Impacted by Data Breach at Mississippi Healthcare Provider appeared first on SecurityWeek.
SecurityWeek – Read More
VMware Fixed Zero-Day Flaws Demonstrated at Pwn2Own2024
/in General NewsVMware addressed four vulnerabilities, including three zero-day flaws demonstrated at the Pwn2Own Vancouver 2024 hacking contest, in its Workstation and Fusion desktop hypervisors.
Cyware News – Latest Cyber News – Read More
PoC Exploit Released for RCE Zero-Day in D-Link EXO AX4800 Routers
/in General NewsThe D-Link EXO AX4800 (DIR-X4860) router is vulnerable to remote unauthenticated command execution that could lead to complete device takeovers by attackers with access to the HNAP port.
Cyware News – Latest Cyber News – Read More
Ongoing Social Engineering Campaign Linked to Black Basta Ransomware Operators
/in General NewsThe threat actors then call the impacted users, posing as members of the organization’s IT team, and attempt to socially engineer the users into providing remote access to their computers through the use of legitimate RMM solutions.
Cyware News – Latest Cyber News – Read More
Senators Urge $32 Billion in Emergency Spending on AI After Finishing Yearlong Review
/in General NewsThe group recommends that Congress draft emergency spending legislation to boost U.S. investments in artificial intelligence, including new R&D and testing standards to understand the technology’s potential harms.
The post Senators Urge $32 Billion in Emergency Spending on AI After Finishing Yearlong Review appeared first on SecurityWeek.
SecurityWeek – Read More
ICS Patch Tuesday: Advisories Published by Siemens, Rockwell, Mitsubishi Electric
/in General NewsSeveral ICS vendors released advisories on Tuesday to inform customers about vulnerabilities found in their products.
The post ICS Patch Tuesday: Advisories Published by Siemens, Rockwell, Mitsubishi Electric appeared first on SecurityWeek.
SecurityWeek – Read More
BLint: Open-Source Tool to Check the Security Properties of Your Executables
/in General NewsBLint is a Binary Linter designed to evaluate the security properties and capabilities of executable files. It utilizes LIEF (Library for Executable and Instrumentation Format) for its operations.
Cyware News – Latest Cyber News – Read More
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
/in General NewsMicrosoft has addressed a total of 61 new security flaws in its software as part of its Patch Tuesday updates for May 2024, including two zero-days which have been actively exploited in the wild.
Of the 61 flaws, one is rated Critical, 59 are rated Important, and one is rated Moderate in severity. This is in addition to 30 vulnerabilities&
The Hacker News – Read More