BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
ICS Ransomware Danger Rages Despite Fewer Attacks
/in General NewsRefined tactics, increased collaboration between groups, and continued success exploiting zero-days is helping ICS ransomware attackers inflict more damage, researchers find.
darkreading – Read More
Pegasus Spyware Targets Togolese Journalists’ Mobile Devices
/in General NewsAn investigation into 2021 intrusions uncovered multiple infections on the phones of journalists in the African country.
darkreading – Read More
CISO Corner: Deep Dive Into SecOps, Insurance, & CISOs’ Evolving Role
/in General NewsOur collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps.
darkreading – Read More
Redefining Cybersecurity for a Comprehensive Security Posture
/in General NewsThe integration of different disciplines of cybersecurity and fraud management is a necessary evolution in the face of increasingly sophisticated digital threats.
darkreading – Read More
In Other News: Secure Use of AI, HHS Hacking, CISA Director Swatting
/in General NewsNoteworthy stories that might have slipped under the radar: guidance on secure use of AI, HHS grant money stolen by hackers, CISA director target of swatting.
The post In Other News: Secure Use of AI, HHS Hacking, CISA Director Swatting appeared first on SecurityWeek.
SecurityWeek – Read More
Westermo Switch Vulnerabilities Can Facilitate Attacks on Industrial Organizations
/in General NewsCISA informs organizations that Westermo Lynx switches are affected by eight vulnerabilities and some devices are reportedly exposed to the internet.
The post Westermo Switch Vulnerabilities Can Facilitate Attacks on Industrial Organizations appeared first on SecurityWeek.
SecurityWeek – Read More
Critical Jenkins Vulnerability Leads to Remote Code Execution
/in General NewsA critical vulnerability in Jenkins’ built-in CLI allows remote attackers to obtain cryptographic keys and execute arbitrary code.
The post Critical Jenkins Vulnerability Leads to Remote Code Execution appeared first on SecurityWeek.
SecurityWeek – Read More
Local Governments in Colorado, Pennsylvania, and Missouri Dealing with Ransomware Incidents
/in General NewsThe cyber incidents have affected emergency communication systems, court services, public transit agencies, and library operations, prompting responses from state and federal agencies as well as cybersecurity professionals.
Cyware News – Latest Cyber News – Read More
US Regulators Have Done Little to Address Firmware Vulnerabilities, Think Tank Argues
/in General NewsFirmware connects the hardware and software of a device, but efforts to protect it have been absent in many of the government’s recent cybersecurity initiatives, according to a new report by the Foundation for Defense of Democracies.
Cyware News – Latest Cyber News – Read More
Tesla Hacked, 24 Zero-Days Demoed at Pwn2Own Automotive 2024
/in General NewsThe Synacktiv Team earned $100,000 for chaining three zero-day bugs to gain root permissions on a Tesla Modem and an additional $120,000 for hacking other EV charging stations.
Cyware News – Latest Cyber News – Read More