BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Round 2: Change Healthcare Targeted in Second Ransomware Attack
/in General NewsRansomHub, which is speculated to have some connection to ALPHV, has stolen 4TB of sensitive data from the beleaguered healthcare company.
darkreading – Read More
Wyden Releases Draft Legislation to End Federal Dependence on Insecure, Proprietary Software
/in General NewsPost Content
darkreading – Read More
Australian IT Skills Shortage: 2024 Is The Year To Self-Upskill
/in General NewsFind out why IT pros in Australia need to take the initiative to self-upskill, and learn how this could lead to salary increases and promotions.
Security | TechRepublic – Read More
XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor
/in General NewsRead about a supply chain attack that involves XZ Utils, a data compressor widely used in Linux systems, and learn how to protect from this threat.
Security | TechRepublic – Read More
All eyes on cyberdefense as elections enter the generative AI era
/in General NewsHumans are easier to breach than IT systems, and errant actors will use generative AI to exploit this opportunity.
Latest stories for ZDNET in Security – Read More
Hijacked Facebook Pages are pushing fake AI services to steal your data
/in General NewsAnd millions of Facebook users appear to be falling for it.
Latest stories for ZDNET in Security – Read More
The music industry must find a way to stay in tune with GenAI
/in General NewsArtificial intelligence can continue to amplify human creativity, if everyone plays by certain key principles.
Latest stories for ZDNET in Security – Read More
Fake Facebook MidJourney AI Page Promoted Malware to 1.2 Million People
/in General NewsHackers are using Facebook advertisements and hijacked pages to promote fake Artificial Intelligence services, such as MidJourney, OpenAI’s SORA and ChatGPT-5, and DALL-E, to infect unsuspecting users with password-stealing malware.
Cyware News – Latest Cyber News – Read More
Google Chrome Adds V8 Sandbox – A New Defense Against Browser Attacks
/in General NewsGoogle has announced support for what’s called a V8 Sandbox in the Chrome web browser in an effort to address memory corruption issues.
The sandbox, according to V8 Security technical lead Samuel Groß, aims to prevent “memory corruption in V8 from spreading within the host process.”
The search behemoth has described V8 Sandbox as a lightweight, in-process sandbox
The Hacker News – Read More
Escalation of Fake E-Shop Campaign Threatens Banking Security in Multiple Regions
/in General NewsThe threat actor behind the fake e-shop campaign leverages tools such as the open-source string obfuscator “Paranoid” and the Janus WebRTC module, showcasing a deep understanding of technological intricacies to evade detection and amplify impact.
Cyware News – Latest Cyber News – Read More