https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-06-07 12:08:032024-06-07 12:08:03AirMDR Raises $5 Million for AI-Powered Managed Detection and Response
Traditional SCAs Are Broken: Did You Know You Are Missing Critical Pieces?
Application Security professionals face enormous challenges securing their software supply chains, racing against time to beat the attacker to the mark.
Software Composition Analysis (SCA) tools have become a basic instrument in the application security arsenal in the last 7 years. Although essential, many platforms
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-06-07 12:08:032024-06-07 12:08:03Cyber Landscape is Evolving – So Should Your SCA
Google is urging third-party Android app developers to incorporate generative artificial intelligence (GenAI) features in a responsible manner.
The new guidance from the search and advertising giant is an effort to combat problematic content, including sexual content and hate speech, created through such tools.
To that end, apps that generate content using AI must ensure they don’t create
Frontier Communications has started notifying over 750,000 individuals that their personal information was stolen in a recent data breach. The telecommunications giant says it identified the incident on April 14, when it was forced to shut down certain systems to contain it. By mid-May, the company had restored all impacted systems. Right from the start, […]
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-06-07 11:07:582024-06-07 11:07:58750k Impacted by Frontier Communications Data Breach
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-06-07 11:07:572024-06-07 11:07:57SolarWinds Patches High-Severity Vulnerability Reported by NATO Pentester
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-06-07 10:07:352024-06-07 10:07:35Apple Says iPhones Will Get Security Updates for at Least 5 Years
The U.S. Federal Bureau of Investigation (FBI) has disclosed that it’s in possession of more than 7,000 decryption keys associated with the LockBit ransomware operation to help victims get their data back at no cost.
“We are reaching out to known LockBit victims and encouraging anyone who suspects they were a victim to visit our Internet Crime Complaint Center at ic3.gov,” FBI Cyber Division
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks targeting defense forces in the country with a malware called SPECTR as part of an espionage campaign dubbed SickSync.
The agency attributed the attacks to a threat actor it tracks under the moniker UAC-0020, which is also called Vermin and is assessed to be associated with security agencies of the Luhansk
The threat actor known as Commando Cat has been linked to an ongoing cryptojacking attack campaign that leverages poorly secured Docker instances to deploy cryptocurrency miners for financial gain.
“The attackers used the cmd.cat/chattr docker image container that retrieves the payload from their own command-and-control (C&C) infrastructure,” Trend Micro researchers Sunil Bharti and Shubham
BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
AirMDR Raises $5 Million for AI-Powered Managed Detection and Response
/in General NewsAI-powered MDR startup AirMDR has raised $5 million in seed funding from Foundation Capital and Storm Ventures.
The post AirMDR Raises $5 Million for AI-Powered Managed Detection and Response appeared first on SecurityWeek.
SecurityWeek – Read More
Cyber Landscape is Evolving – So Should Your SCA
/in General NewsTraditional SCAs Are Broken: Did You Know You Are Missing Critical Pieces?
Application Security professionals face enormous challenges securing their software supply chains, racing against time to beat the attacker to the mark.
Software Composition Analysis (SCA) tools have become a basic instrument in the application security arsenal in the last 7 years. Although essential, many platforms
The Hacker News – Read More
The AI Debate: Google’s Guidelines, Meta’s GDPR Dispute, Microsoft’s Recall Backlash
/in General NewsGoogle is urging third-party Android app developers to incorporate generative artificial intelligence (GenAI) features in a responsible manner.
The new guidance from the search and advertising giant is an effort to combat problematic content, including sexual content and hate speech, created through such tools.
To that end, apps that generate content using AI must ensure they don’t create
The Hacker News – Read More
FCC Proposes BGP Security Reporting for Broadband Providers
/in General NewsThe FCC proposes that broadband providers plan for BGP security and provide quarterly reports on implemented risk mitigations.
The post FCC Proposes BGP Security Reporting for Broadband Providers appeared first on SecurityWeek.
SecurityWeek – Read More
750k Impacted by Frontier Communications Data Breach
/in General NewsFrontier Communications has started notifying over 750,000 individuals that their personal information was stolen in a recent data breach. The telecommunications giant says it identified the incident on April 14, when it was forced to shut down certain systems to contain it. By mid-May, the company had restored all impacted systems. Right from the start, […]
The post 750k Impacted by Frontier Communications Data Breach appeared first on SecurityWeek.
SecurityWeek – Read More
SolarWinds Patches High-Severity Vulnerability Reported by NATO Pentester
/in General NewsSolarWinds has released patches for high-severity vulnerabilities in Serv-U and the SolarWinds Platform.
The post SolarWinds Patches High-Severity Vulnerability Reported by NATO Pentester appeared first on SecurityWeek.
SecurityWeek – Read More
Apple Says iPhones Will Get Security Updates for at Least 5 Years
/in General NewsTo comply with new UK government regulations, Apple has specified that iPhones will get at least 5 years of security updates.
The post Apple Says iPhones Will Get Security Updates for at Least 5 Years appeared first on SecurityWeek.
SecurityWeek – Read More
FBI Distributes 7,000 LockBit Ransomware Decryption Keys to Help Victims
/in General NewsThe U.S. Federal Bureau of Investigation (FBI) has disclosed that it’s in possession of more than 7,000 decryption keys associated with the LockBit ransomware operation to help victims get their data back at no cost.
“We are reaching out to known LockBit victims and encouraging anyone who suspects they were a victim to visit our Internet Crime Complaint Center at ic3.gov,” FBI Cyber Division
The Hacker News – Read More
SPECTR Malware Targets Ukraine Defense Forces in SickSync Campaign
/in General NewsThe Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks targeting defense forces in the country with a malware called SPECTR as part of an espionage campaign dubbed SickSync.
The agency attributed the attacks to a threat actor it tracks under the moniker UAC-0020, which is also called Vermin and is assessed to be associated with security agencies of the Luhansk
The Hacker News – Read More
Commando Cat Cryptojacking Attacks Target Misconfigured Docker Instances
/in General NewsThe threat actor known as Commando Cat has been linked to an ongoing cryptojacking attack campaign that leverages poorly secured Docker instances to deploy cryptocurrency miners for financial gain.
“The attackers used the cmd.cat/chattr docker image container that retrieves the payload from their own command-and-control (C&C) infrastructure,” Trend Micro researchers Sunil Bharti and Shubham
The Hacker News – Read More