BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Chrome 133, Firefox 135 Updates Patch High-Severity Vulnerabilities
/in General NewsGoogle and Mozilla resolve high-severity memory safety vulnerabilities with the latest Chrome and Firefox security updates.
The post Chrome 133, Firefox 135 Updates Patch High-Severity Vulnerabilities appeared first on SecurityWeek.
SecurityWeek – Read More
New Snake Keylogger Variant Leverages AutoIt Scripting to Evade Detection
/in General NewsA new variant of the Snake Keylogger malware is being used to actively target Windows users located in China, Turkey, Indonesia, Taiwan, and Spain.
Fortinet FortiGuard Labs said the new version of the malware has been behind over 280 million blocked infection attempts worldwide since the start of the year.
“Typically delivered through phishing emails containing malicious attachments or links,
The Hacker News – Read More
Sanctioned entities fueled $16 billion in cryptocurrency activity last year, report says
/in General NewsThere were billions of dollars’ worth of cryptocurrency transactions in 2024 by entities sanctioned by the United States, say researchers from Chainalysis in a new report.
The Record from Recorded Future News – Read More
Free Diagram Tool Aids Management of Complex ICS/OT Cybersecurity Decisions
/in General NewsAdmeritia has launched Cyber Decision Diagrams, a free tool designed to help organizations manage complex decisions related to ICS/OT cybersecurity.
The post Free Diagram Tool Aids Management of Complex ICS/OT Cybersecurity Decisions appeared first on SecurityWeek.
SecurityWeek – Read More
Lee Enterprises Newspaper Disruptions Caused by Ransomware
/in General NewsLee Enterprises has shared more details on the recent cyberattack, saying the attackers encrypted and stole files.
The post Lee Enterprises Newspaper Disruptions Caused by Ransomware appeared first on SecurityWeek.
SecurityWeek – Read More
Xerox Versalink Printers Vulnerabilities Could Let Hackers Steal Credentials
/in General NewsXerox Versalink printers are vulnerable to pass-back attacks. Rapid7 discovers LDAP & SMB flaws (CVE-2024-12510 & CVE-2024-12511). Update…
Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News – Read More
How Russian Hackers Are Exploiting Signal ‘Linked Devices’ Feature for Real-Time Spying
/in General NewsMandiant warns that multiple Russian APTs are abusing a nifty Signal Messenger feature to surreptitiously spy on encrypted conversations.
The post How Russian Hackers Are Exploiting Signal ‘Linked Devices’ Feature for Real-Time Spying appeared first on SecurityWeek.
SecurityWeek – Read More
Trojanized Game Installers Deploy Cryptocurrency Miner in Large-Scale StaryDobry Attack
/in General NewsUsers who are on the lookout for popular games were lured into downloading trojanized installers that led to the deployment of a cryptocurrency miner on compromised Windows hosts.
The large-scale activity has been codenamed StaryDobry by Russian cybersecurity company Kaspersky, which first detected it on December 31, 2024. It lasted for a month.
Targets of the campaign include individuals and
The Hacker News – Read More
A Signal Update Fends Off a Phishing Technique Used in Russian Espionage
/in General NewsGoogle warns that hackers tied to Russia are tricking Ukrainian soldiers with fake QR codes for Signal group invites that let spies steal their messages. Signal has pushed out new safeguards.
Security Latest – Read More
CISA Adds Palo Alto Networks and SonicWall Flaws to Exploited Vulnerabilities List
/in General NewsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Palo Alto Networks PAN-OS and SonicWall SonicOS SSLVPN to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
The flaws are listed below –
CVE-2025-0108 (CVSS score: 7.8) – An authentication bypass vulnerability in the Palo Alto Networks PAN-OS
The Hacker News – Read More