BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Code Keepers: Mastering Non-Human Identity Management
/in General NewsIdentities now transcend human boundaries. Within each line of code and every API call lies a non-human identity. These entities act as programmatic access keys, enabling authentication and facilitating interactions among systems and services, which are essential for every API call, database query, or storage account access. As we depend on multi-factor authentication and passwords to safeguard
The Hacker News – Read More
Microsoft Fixed Two Zero-Day Flaws Exploited in Malware Attacks
/in General NewsMicrosoft addressed two zero-day vulnerabilities, tracked as CVE-2024-29988 and CVE-2024-26234, that threat actors are exploiting to deliver malware payloads on vulnerable systems.
Cyware News – Latest Cyber News – Read More
Palo Alto Networks Fixed Multiple DoS Bugs in its Firewalls
/in General NewsPalo Alto Networks released security updates to address several high-severity vulnerabilities in its PAN-OS operating system, including CVE-2024-3385, CVE-2024-3384, CVE-2024-3382.
Cyware News – Latest Cyber News – Read More
Exploitation of Unpatched D-Link NAS Device Vulnerabilities Soars
/in General NewsSecond identifier, CVE-2024-3272, assigned to unpatched D-Link NAS device vulnerabilities, just as exploitation attempts soar.
The post Exploitation of Unpatched D-Link NAS Device Vulnerabilities Soars appeared first on SecurityWeek.
SecurityWeek – Read More
How Exposure Management Elevates Cyber Resilience
/in General NewsAttackers are adept at identifying and exploiting the most cost-effective methods of compromise, highlighting the critical need for organizations to implement asset identification and understand assets’ security posture in relation to the network.
Cyware News – Latest Cyber News – Read More
Iranian MuddyWater Hackers Adopt New C2 Tool ‘DarkBeatC2’ in Latest Campaign
/in General NewsThe Iranian threat actor known as MuddyWater has been attributed to a new command-and-control (C2) infrastructure called DarkBeatC2, becoming the latest such tool in its arsenal after SimpleHarm, MuddyC3, PhonyC2, and MuddyC2Go.
“While occasionally switching to a new remote administration tool or changing their C2 framework, MuddyWater’s methods remain constant,” Deep
The Hacker News – Read More
Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack
/in General NewsPalo Alto Networks is warning that a critical flaw impacting its PAN-OS software used in its GlobalProtect gateways is being exploited in the wild.
Tracked as CVE-2024-3400, the issue has a CVSS score of 10.0, indicating maximum severity.
“A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature
The Hacker News – Read More
CISA Alerts Organizations Regarding Cyber Incident at Global Data Analytics Company
/in General NewsCISA is taking an active role in collaborating with private industry partners to respond to this incident, especially as it relates to impacted critical infrastructure sector organizations.
Cyware News – Latest Cyber News – Read More
Palo Alto Networks Warns of Exploited Firewall Vulnerability
/in General NewsPalo Alto Networks warns of limited exploitation of a critical command injection vulnerability leading to code execution on firewalls.
The post Palo Alto Networks Warns of Exploited Firewall Vulnerability appeared first on SecurityWeek.
SecurityWeek – Read More
Credit Card Skimmer Hidden in Fake Facebook Pixel Tracker
/in General NewsIn recent months, Sucuri researchers encountered a number of cases where attackers inject malware into website software that allows for custom or miscellaneous code, such as the Magento admin panel or WordPress plugins.
Cyware News – Latest Cyber News – Read More