BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Ingram Micro says ongoing outage caused by ransomware attack
/in General NewsIngram Micro is one of the largest distributors of tech and cloud products.
Security News | TechCrunch – Read More
SatanLock Ransomware Ends Operations, Says Stolen Data Will Be Leaked
/in General NewsSatanLock ransomware gang shuts down after weeks of attacks and plans to leak stolen victim data. Group linked to Babuk-Bjorka and GD Lockersec families.
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
Manufacturing Security: Why Default Passwords Must Go
/in General NewsIf you didn’t hear about Iranian hackers breaching US water facilities, it’s because they only managed to control a single pressure station serving 7,000 people. What made this attack noteworthy wasn’t its scale, but how easily the hackers gained access — by simply using the manufacturer’s default password “1111.” This narrow escape prompted CISA to urge manufacturers to
The Hacker News – Read More
⚡ Weekly Recap: Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More
/in General NewsEverything feels secure—until one small thing slips through. Even strong systems can break if a simple check is missed or a trusted tool is misused. Most threats don’t start with alarms—they sneak in through the little things we overlook. A tiny bug, a reused password, a quiet connection—that’s all it takes.
Staying safe isn’t just about reacting fast. It’s about catching these early signs
The Hacker News – Read More
Malware Surge Hits Android: Adware, Trojans and Crypto Theft Lead Q2 Threats
/in General NewsDr.Web reports Android malware surge in Q2 with adware, banking trojans and crypto theft hidden in fake apps, firmware and spyware targeting users.
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors
/in General NewsA hacking group with ties other than Pakistan has been found targeting Indian government organizations with a modified variant of a remote access trojan (RAT) called DRAT.
The activity has been attributed by Recorded Future’s Insikt Group to a threat actor tracked as TAG-140, which it said overlaps with SideCopy, an adversarial collective assessed to be an operational sub-cluster within
The Hacker News – Read More
How Digital Executive Protection Shields Top Leaders from Modern Threats
/in General NewsCybersecurity threats have emerged so quickly that most companies struggle to keep up and executives are often the…
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
Android May Soon Warn You About Fake Cell Towers
/in General NewsPlus: Iran-linked hackers threaten to release Trump campaign emails, Chinese hackers still in US telecoms networks, and an abusive deepfake website plans an expansion.
Security Latest – Read More
Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties
/in General NewsTaiwan’s National Security Bureau (NSB) has warned that China-developed applications like RedNote (aka Xiaohongshu), Weibo, TikTok, WeChat, and Baidu Cloud pose security risks due to excessive data collection and data transfer to China.
The alert comes following an inspection of these apps carried out in coordination with the Ministry of Justice Investigation Bureau (MJIB) and the Criminal
The Hacker News – Read More
Alert: Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS
/in General NewsThreat actors are weaponizing exposed Java Debug Wire Protocol (JDWP) interfaces to obtain code execution capabilities and deploy cryptocurrency miners on compromised hosts.
“The attacker used a modified version of XMRig with a hard-“coded configuration, allowing them to avoid suspicious command-line arguments that are often flagged by defenders,” Wiz researchers Yaara Shriki and Gili
The Hacker News – Read More