BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Attack on Consumer Electronics Manufacturer boAt Leaks Data on 7.5M Customers
/in General NewsIn a cyberattack more reminiscent of the 2010s, a seemingly lone hacker fleeced a major corporation for millions of open customer records.
darkreading – Read More
New Threat Actor Starry Addax Targets Human Rights Defenders in North Africa
/in General NewsAccording to Cisco’s Talos threat research team, Starry Addax has been active since January 2024, orchestrating spear-phishing campaigns aimed at individuals sympathetic to the Sahrawi Arab Democratic Republic (SADR) cause.
Cyware News – Latest Cyber News – Read More
Thousands of LG TVs Possibly Exposed to Remote Hacking
/in General NewsMany LG TVs may be vulnerable to remote hacking due to a series of vulnerabilities found by Bitdefender researchers.
The post Thousands of LG TVs Possibly Exposed to Remote Hacking appeared first on SecurityWeek.
SecurityWeek – Read More
Sidestepping SharePoint Security: Two New Techniques to Evade Exfiltration Detection
/in General NewsThese techniques can bypass the detection and enforcement policies of traditional tools, such as cloud access security brokers, data loss prevention, and SIEMs, by hiding downloads as less suspicious access and sync events.
Cyware News – Latest Cyber News – Read More
Researchers Uncover First Native Spectre v2 Exploit Against Linux Kernel
/in General NewsCybersecurity researchers have disclosed what they say is the “first native Spectre v2 exploit” against the Linux kernel on Intel systems that could be exploited to read sensitive data from the memory.
The exploit, called Native Branch History Injection (BHI), can be used to leak arbitrary kernel memory at 3.5 kB/sec by bypassing existing Spectre v2/BHI mitigations, researchers from Systems and
The Hacker News – Read More
Researchers Discover New Ransomware Gang ‘Muliaka’ Attacking Russian Businesses
/in General NewsThe gang, which researchers at the Moscow-based cybersecurity company F.A.C.C.T. have dubbed “Muliaka,” or Muddy Water in English, has left minimal traces from its attacks but has likely been active since at least December 2023.
Cyware News – Latest Cyber News – Read More
6 Best Open Source Password Managers for Mac in 2024
/in General NewsExplore the top open-source password managers available for Mac users. Find the best one that suits your needs and secure your online accounts effectively.
Security | TechRepublic – Read More
530k Impacted by Data Breach at Wisconsin Healthcare Organization
/in General NewsThe personal information of 500,000 people was compromised in a data breach at Group Health Cooperative of South Central Wisconsin.
The post 530k Impacted by Data Breach at Wisconsin Healthcare Organization appeared first on SecurityWeek.
SecurityWeek – Read More
Microsoft Patches Two Zero-Days Exploited for Malware Delivery
/in General NewsMicrosoft patches CVE-2024-29988 and CVE-2024-26234, two zero-day vulnerabilities exploited by threat actors to deliver malware.
The post Microsoft Patches Two Zero-Days Exploited for Malware Delivery appeared first on SecurityWeek.
SecurityWeek – Read More
Webinar: Learn How to Stop Hackers from Exploiting Hidden Identity Weaknesses
/in General NewsWe all know passwords and firewalls are important, but what about the invisible threats lurking beneath the surface of your systems?
Identity Threat Exposures (ITEs) are like secret tunnels for hackers – they make your security way more vulnerable than you think.
Think of it like this: misconfigurations, forgotten accounts, and old settings are like cracks in your digital fortress walls. Hackers
The Hacker News – Read More