BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
5 Emerging AI Threats Australian Cyber Pros Must Watch in 2025
/in General NewsAI cloning and deepfakes rank among the top challenges for Australian cybersecurity professionals in 2025.
Security | TechRepublic – Read More
CISA: Second BeyondTrust Vulnerability Added to KEV Catalog
/in General NewsBeyondTrust has patched all cloud instances of the vulnerability and has released patches for self-hosted versions.
darkreading – Read More
DORA’s Deadline Looms: Navigating the EU’s Mandate for Threat Led Penetration Testing
/in General NewsWith DORA’s January 2025 compliance deadline approaching, financial institutions must embrace rigorous testing, tailored threat profiles, and continuous vigilance to safeguard against cyber threats.
The post DORA’s Deadline Looms: Navigating the EU’s Mandate for Threat Led Penetration Testing appeared first on SecurityWeek.
SecurityWeek – Read More
US, Japan and S. Korea urge crypto industry to take action against North Korean hackers
/in General NewsThe governments said North Korea’s notorious Lazarus Group hackers “continue to demonstrate a pattern of malicious behavior in cyberspace by conducting numerous cybercrime campaigns to steal cryptocurrency and targeting exchanges, digital asset custodians, and individual users.”
The Record from Recorded Future News – Read More
Cyber Insights 2025: Open Source and Software Supply Chain Security
/in General NewsOpen source software (OSS) is a prime target for supply chain cyberattacks and protecting it remains a major challenge.
The post Cyber Insights 2025: Open Source and Software Supply Chain Security appeared first on SecurityWeek.
SecurityWeek – Read More
Patch Tuesday: January 2025 Security Update Patches Exploited Elevation of Privilege Attacks
/in General NewsMicrosoft’s monthly patches cover Hyper-V NT Kernel Integration VSPs, Git in Visual Studio, and more.
Security | TechRepublic – Read More
Google OAuth Flaw Leads to Account Takeover When Domain Ownership Changes
/in General NewsA vulnerability in Google’s OAuth implementation allows takeover of old employee accounts when domain ownership changes.
The post Google OAuth Flaw Leads to Account Takeover When Domain Ownership Changes appeared first on SecurityWeek.
SecurityWeek – Read More
OWASP’s New LLM Top 10 Shows Emerging AI Threats
/in General NewsUltimately, there is no replacement for an intuitive, security-focused developer working with the critical thinking required to drive down the risk of both AI and human error.
darkreading – Read More
Sweet Security Introduces Patent-Pending LLM-Powered Detection Engine, Reducing Cloud Detection Noise to 0.04%
/in General NewsTel Aviv, Israel, 15th January 2025, CyberNewsWire
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Chrome 132 Patches 16 Vulnerabilities
/in General NewsGoogle has released Chrome 132 with fixes for 16 vulnerabilities, including multiple high-severity security defects.
The post Chrome 132 Patches 16 Vulnerabilities appeared first on SecurityWeek.
SecurityWeek – Read More