BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Leveraging DNS Tunneling for Tracking and Scanning
/in General NewsThreat actors are using DNS tunneling as a means to scan for network vulnerabilities and check the success of phishing campaigns, according to new research from Palo Alto Networks.
Cyware News – Latest Cyber News – Read More
INC Ransomware Source Code Selling on Hacking Forums for $300,000
/in General NewsThe source code of the INC ransomware-as-a-service (RaaS) operation, which has targeted organizations like Xerox Business Solutions, Yamaha Motor Philippines, and Scotland’s National Health Service (NHS), is being sold on hacking forums for $300,000.
Cyware News – Latest Cyber News – Read More
Dangerous Google Chrome Zero-Day Allows Sandbox Escape
/in General NewsExploit code is circulating for CVE-2024-4761, disclosed less than a week after a similar security vulnerability was disclosed as being used in the wild.
darkreading – Read More
Android Malware Poses as WhatsApp, Instagram, Snapchat to Steal Data
/in General NewsBy Deeba Ahmed
Android Security Alert- Hackers are disguising malware as popular apps like Instagram and Snapchat to steal your login details. Learn how to identify fake apps and protect yourself from this sneaky cyberattack.
This is a post from HackRead.com Read the original post: Android Malware Poses as WhatsApp, Instagram, Snapchat to Steal Data
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Adobe Patches Critical Flaws in Reader, Acrobat
/in General NewsAdobe documents multiple code execution flaws in a wide range of products, including the widely deployed Adobe Acrobat and Reader software.
The post Adobe Patches Critical Flaws in Reader, Acrobat appeared first on SecurityWeek.
SecurityWeek – Read More
Insider Threats Maintain a Rising Trend
/in General NewsInsider threats, including dishonest actions to obtain benefits through theft or deception, have seen a significant rise in the past year, driven by factors like rising cost of living, remote work, and the increasing sophistication of fraud tactics.
Cyware News – Latest Cyber News – Read More
New Chrome Zero-Day Vulnerability CVE-2024-4761 Under Active Exploitation
/in General NewsGoogle on Monday shipped emergency fixes to address a new zero-day flaw in the Chrome web browser that has come under active exploitation in the wild.
The high-severity vulnerability, tracked as CVE-2024-4761, is an out-of-bounds write bug impacting the V8 JavaScript and WebAssembly engine. It was reported anonymously on May 9, 2024.
Out-of-bounds write bugs could be typically
The Hacker News – Read More
Southeast Asian Scam Syndicates Stealing $64 Billion Annually, Researchers Find
/in General NewsResearchers have found that Southeast Asian scam syndicates are stealing an estimated $64 billion annually through various online fraud operations, with the majority of the losses occurring in Cambodia, Laos, and Myanmar.
Cyware News – Latest Cyber News – Read More
DNS Tunneling Used for Stealthy Scans and Email Tracking
/in General NewsBy Deeba Ahmed
Hackers are hiding malicious messages in everyday internet traffic! Learn how DNS tunneling works and how to protect yourself from this sneaky cyberattack. Stop hackers from scanning your network and tracking your clicks.
This is a post from HackRead.com Read the original post: DNS Tunneling Used for Stealthy Scans and Email Tracking
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Google Chrome Emergency Update Fixes Sixth Zero-Day Exploited in 2024
/in General NewsThe latest bug is tracked as CVE-2024-4761. It is an out-of-bounds write problem impacting Chrome’s V8 JavaScript engine, which is responsible for executing JS code in the application.
Cyware News – Latest Cyber News – Read More