BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
/in General NewsCloud storage services provider Dropbox on Wednesday disclosed that Dropbox Sign (formerly HelloSign) was breached by unidentified threat actors, who accessed emails, usernames, and general account settings associated with all users of the digital signature product.
The company, in a filing with the U.S. Securities and Exchange Commission (SEC), said it became aware of the ”
The Hacker News – Read More
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw
/in General NewsA never-before-seen botnet called Goldoon has been observed targeting D-Link routers with a nearly decade-old critical security flaw with the goal of using the compromised devices for further attacks.
The vulnerability in question is CVE-2015-2051 (CVSS score: 9.8), which affects D-Link DIR-645 routers and allows remote attackers to execute arbitrary
The Hacker News – Read More
Vulnerability Exploits Triple as Initial Access Point for Breaches
/in General NewsAccording to Verizon’s 2024 Data Breach Investigations Report, this method of gaining unauthorized access leading to a breach accounted for 14% of malicious actors’ way into a network. It is the third most used after credential theft and phishing.
Cyware News – Latest Cyber News – Read More
SafeBase Raises $33M in Series B to Accelerate Vision for Friction-Free Security Reviews
/in General NewsElisity, a leader in identity-based microsegmentation, has secured $37 million in Series B funding from Insight Partners to enhance its AI capabilities for cyber threat anticipation.
Cyware News – Latest Cyber News – Read More
When is One Vulnerability Scanner Not Enough?
/in General NewsLike antivirus software, vulnerability scans rely on a database of known weaknesses.
That’s why websites like VirusTotal exist, to give cyber practitioners a chance to see whether a malware sample is detected by multiple virus scanning engines, but this concept hasn’t existed in the vulnerability management space.
The benefits of using multiple scanning engines
Generally speaking
The Hacker News – Read More
US Warns of Russian Hackers Targeting Operational Technology in Water Systems
/in General NewsThe alert says that water operators are employing poor security standards that have allowed the hackers to breach their networks, including the use of default passwords that are included when the water system management tools are first installed.
Cyware News – Latest Cyber News – Read More
Microsoft Graph API Emerges as a Top Attacker Tool to Plot Data Theft
/in General NewsWeaponizing Microsoft’s own services for command-and-control is simple and costless, and it helps attackers better avoid detection.
darkreading – Read More
Cyber Startup Oasis Secures $35 Million Series A Extension, Doubles Valuation
/in General NewsThe extension round was led by existing investors Accel, Cyberstarts, and Sequoia Capital, along with private investors. Oasis has now raised a total of $75 million, including its seed round and previous Series A.
Cyware News – Latest Cyber News – Read More
AI is Creating a New Generation of Cyberattacks
/in General NewsMost businesses see offensive AI fast becoming a standard tool for cybercriminals, with 93% of security leaders expecting to face daily AI-driven attacks, according to Netacea.
Cyware News – Latest Cyber News – Read More
Iranian Hackers Impersonate Journalists in Social Engineering Campaign
/in General NewsA hacking group linked to the intelligence wing of Iran’s Revolutionary Guard Corps impersonated journalists and human rights activists as part of a social engineering campaign, according to research released Wednesday by Mandiant and Google Cloud.
Cyware News – Latest Cyber News – Read More