BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Meta Launches New Protection Tools as It Helps Disrupt Scam Centers
/in General NewsThe social media giant has disabled more than 150,000 accounts powering scam centers in Asia.
The post Meta Launches New Protection Tools as It Helps Disrupt Scam Centers appeared first on SecurityWeek.
SecurityWeek – Read More
After decades with Linux, I tried to use Windows 11 – and found 9 glaring issues
/in General NewsGoing from Linux to Windows felt like taking one step forward and two steps back. Here’s a list of what went wrong.
Latest news – Read More
Is there a Windows PC alternative to the Mac Mini? This one I tested is so close (yet so far)
/in General NewsThe palm-sized Blackview MP20 runs cool and quiet and handles everyday computing tasks – with a few notable drawbacks.
Latest news – Read More
Fake government and Starlink apps used in malware campaign targeting Brazil
/in General NewsThe malware, dubbed BeatBanker by Russian cybersecurity firm Kaspersky, infects smartphones through fake applications that mimic legitimate services, including the Starlink satellite internet app and the Brazilian government portal INSS Reembolso.
The Record from Recorded Future News – Read More
Splunk, Zoom Patch Severe Vulnerabilities
/in General NewsCritical- and high-severity flaws could be exploited to execute arbitrary shell commands or elevate privileges.
The post Splunk, Zoom Patch Severe Vulnerabilities appeared first on SecurityWeek.
SecurityWeek – Read More
JBL’s latest headphones offer an Auracast loophole Apple won’t be happy about
/in General NewsWith one simple app feature, JBL’s headphones open an otherwise closed-off feature to iOS fans.
Latest news – Read More
Why Moltbook and OpenClaw are the fool’s gold in our AI boom
/in General NewsCommentary: Whatever Meta and OpenAI paid, it was too much. Other, better programs can do the same jobs.
Latest news – Read More
Critical N8n Vulnerabilities Allowed Server Takeover
/in General NewsThe bugs allowed unauthenticated attackers to execute arbitrary code, steal credentials, and take over servers.
The post Critical N8n Vulnerabilities Allowed Server Takeover appeared first on SecurityWeek.
SecurityWeek – Read More
Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets
/in General NewsCybersecurity researchers have discovered half-a-dozen new Android malware families that come with capabilities to steal data from compromised devices and conduct financial fraud.
The Android malware range from traditional banking trojans like PixRevolution, TaxiSpy RAT, BeatBanker, Mirax, and Oblivion RAT to full-fledged remote administration tools such as SURXRAT.
PixRevolution, according to
The Hacker News – Read More
CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed
/in General NewsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting n8n to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
The vulnerability, tracked as CVE-2025-68613 (CVSS score: 9.9), concerns a case of expression injection that leads to remote code execution. The security shortcoming was patched
The Hacker News – Read More