BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Chinese State Hackers Main Suspect in Recent Ivanti CSA Zero-Day Attacks
/in General NewsFortinet believes state-sponsored threat actors are behind the recent attacks involving exploitation of Ivanti CSA zero-days.
The post Chinese State Hackers Main Suspect in Recent Ivanti CSA Zero-Day Attacks appeared first on SecurityWeek.
SecurityWeek – Read More
Gryphon Healthcare, Tri-City Medical Center Disclose Significant Data Breaches
/in General NewsGryphon Healthcare and Tri-City Medical Center have disclosed data breaches collectively impacting over 500,000 individuals.
The post Gryphon Healthcare, Tri-City Medical Center Disclose Significant Data Breaches appeared first on SecurityWeek.
SecurityWeek – Read More
Iranian Cyberspies Exploiting Recent Windows Kernel Vulnerability
/in General NewsThe Iran-linked APT OilRig has intensified cyber operations against the United Arab Emirates and the broader Gulf region.
The post Iranian Cyberspies Exploiting Recent Windows Kernel Vulnerability appeared first on SecurityWeek.
SecurityWeek – Read More
5 Steps to Boost Detection and Response in a Multi-Layered Cloud
/in General NewsThe link between detection and response (DR) practices and cloud security has historically been weak. As global organizations increasingly adopt cloud environments, security strategies have largely focused on “shift-left” practices—securing code, ensuring proper cloud posture, and fixing misconfigurations. However, this approach has led to an over-reliance on a multitude of DR tools spanning
The Hacker News – Read More
Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration
/in General NewsA suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti Cloud Service Appliance (CSA) a zero-day to perform a series of malicious actions.
That’s according to findings from Fortinet FortiGuard Labs, which said the vulnerabilities were abused to gain unauthenticated access to the CSA, enumerate users configured in the appliance, and attempt to access the
The Hacker News – Read More
Recent Firefox Zero-Day Exploited Against Tor Browser Users
/in General NewsTor browser version 13.5.7 is rolling out with patches for an exploited zero-day vulnerability recently addressed in Firefox.
The post Recent Firefox Zero-Day Exploited Against Tor Browser Users appeared first on SecurityWeek.
SecurityWeek – Read More
From Cloud to Home: Is Self-Hosting Right for You?
/in General NewsThere are many reasons nowadays to consider getting rid of cloud storage completely. In one recent example, Google Cloud wiped out a customer account and its backups. At stake were millions of Australians’ pension funds, and the affected party was UniSuper, a $135 billion pension account. Without getting into technical details, when the news hit it turned out it was a misconfiguration or human…
Source
TechSplicer – Read More
Juniper Networks Patches Dozens of Vulnerabilities
/in General NewsJuniper Networks has announced patches for dozens of vulnerabilities in Junos OS, Junos OS Evolved, and third-party components.
The post Juniper Networks Patches Dozens of Vulnerabilities appeared first on SecurityWeek.
SecurityWeek – Read More
Casio Confirms Data Breach as Ransomware Group Leaks Files
/in General NewsCasio has shared more information on the recent cyberattack, for which a ransomware group has now taken credit.
The post Casio Confirms Data Breach as Ransomware Group Leaks Files appeared first on SecurityWeek.
SecurityWeek – Read More
Critical Veeam Vulnerability Exploited to Spread Akira and Fog Ransomware
/in General NewsThreat actors are actively attempting to exploit a now-patched security flaw in Veeam Backup & Replication to deploy Akira and Fog ransomware.
Cybersecurity vendor Sophos said it has been tracking a series of attacks in the past month leveraging compromised VPN credentials and CVE-2024-40711 to create a local account and deploy the ransomware.
CVE-2024-40711, rated 9.8 out of 10.0 on the
The Hacker News – Read More