BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Saflok Lock Vulnerability Can Be Exploited to Open Millions of Doors
/in General NewsVulnerability in Dormakaba’s Saflok electronic locks allow hackers to forge keycards and open millions of doors.
The post Saflok Lock Vulnerability Can Be Exploited to Open Millions of Doors appeared first on SecurityWeek.
SecurityWeek – Read More
API Environments Becoming Hotspots for Exploitation
/in General NewsA total of 29% of web attacks targeted APIs over 12 months (January through December 2023), indicating that APIs are a focus area for cybercriminals, according to Akamai.
Cyware News – Latest Cyber News – Read More
Red Teaming in the AI Era
/in General NewsUnlike previous types of software, AI models become more intelligent over time. This constant change means new risks can emerge at any moment, making them incredibly difficult to anticipate. A one-and-done approach to red teaming simply won’t work.
Cyware News – Latest Cyber News – Read More
New Sysrv Botnet Variant Makes Use of Google Subdomain to Spread XMRig Miner
/in General NewsSysrv is a well-documented botnet first identified in 2020, with the main payload being a worm written in Golang. It drops a cryptominer onto infected hosts before attempting to propagate itself using network vulnerabilities and other methods.
Cyware News – Latest Cyber News – Read More
Russian Hackers Target Ukrainian Telecoms with Upgraded ‘AcidPour’ Malware
/in General NewsThe data wiping malware called AcidPour may have been deployed in attacks targeting four telecom providers in Ukraine, new findings from SentinelOne show.
The cybersecurity firm also confirmed connections between the malware and AcidRain, tying it to threat activity clusters associated with Russian military intelligence.
“AcidPour’s expanded capabilities would enable it to better
The Hacker News – Read More
Tesla Hack Team Wins $200K and a New Car
/in General NewsZero Day Initiative awarded a total of $732,000 to researchers who found 19 unique cybersecurity vulnerabilities during the first day of Pwn2Own.
darkreading – Read More
Cross Tenant Microsoft 365 Migration
/in General NewsBy Uzair Amir
With the massive adoption of Microsoft 365, encountering complex environments involving multiple tenants is becoming increasingly common.
This is a post from HackRead.com Read the original post: Cross Tenant Microsoft 365 Migration
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Ivanti Keeps Security Teams Scrambling With 2 More Vulns
/in General NewsSince the beginning of this year, the company has disclosed some seven critical bugs so far, almost all of which attackers have quickly exploited in mass attacks.
darkreading – Read More
NIST’s Vuln Database Downshifts, Prompting Questions About Its Future
/in General NewsNVD may be in peril, and while alternatives exist, enterprise security managers will need to plan accordingly to stay on top of new threats.
darkreading – Read More
Changing Concepts of Identity Underscore ‘Perfect Storm’ of Cyber Risk
/in General NewsForgepoint Capital’s Alberto Yépez discusses how the concept of identity is changing: It doesn’t just mean “us” anymore.
darkreading – Read More