BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Chinese Tag Team APTs Keep Stealing Asian Gov’t Secrets
/in General NewsA PRC threat cluster known as “Crimson Palace” is demonstrating the benefits of having specialized units carry out distinct stages of a wider attack chain.
darkreading – Read More
Mustang Panda Deploys Advanced Malware to Spy on Asia-Pacific Governments
/in General NewsThe threat actor tracked as Mustang Panda has refined its malware arsenal to include new tools in order to facilitate data exfiltration and the deployment of next-stage payloads, according to new findings from Trend Micro.
The cybersecurity firm, which is monitoring the activity cluster under the name Earth Preta, said it observed “the propagation of PUBLOAD via a variant of the worm HIUPAN.”
The Hacker News – Read More
Cybercriminals Target Latin American Banks with Mekotio, BBTok, and Grandoreiro Trojans
/in General NewsThese campaigns aim to steal sensitive banking credentials using innovative tactics, expanding beyond traditional regions like Brazil and Argentina to industries such as manufacturing, retail, and financial services.
Cyware News – Latest Cyber News – Read More
Homeland Security Hopes to Scuttle Maritime Cyber-Threats
/in General NewsThe U.S. Department of Homeland Security (DHS) has issued a request for information to assess the security of technology at ports in order to develop a Maritime Port Resiliency and Security Research Testbed.
Cyware News – Latest Cyber News – Read More
Slim CD Data Breach Impacts 1.7 Million Individuals
/in General NewsSlim CD says the personal and credit card information of 1.7 million was compromised in a ten-month-long data breach.
The post Slim CD Data Breach Impacts 1.7 Million Individuals appeared first on SecurityWeek.
SecurityWeek – Read More
Seventh Sense Unveils Revolutionary Privacy-Preserving Face-Based Public Key Infrastructure and eID Solution
/in General NewsSingapore, SG, 10th September 2024, CyberNewsWire
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
CAMO Unveiled: How Cybercriminals Exploit Legitimate Software for Stealthy Attacks
/in General NewsCAMO, short for Commercial Applications, Malicious Operations, showcases how cybercriminals are increasingly utilizing legitimate IT tools to evade security measures and conduct stealthy attacks.
Cyware News – Latest Cyber News – Read More
Most Common Cybersecurity Threats to Avoid!
/in General NewsFrom phishing scams to ransomware attacks, discover what these threats look like and how you can protect yourself and your business.
Security | TechRepublic – Read More
10 Writing Tips for Cybersecurity Professionals
/in General NewsIt takes more than technical knowledge to write about cybersecurity in a way people want to read. It takes creativity, discipline, and other key skills.
darkreading – Read More
Poland’s Cybersecurity Experts Foil Russian and Belarussian Attacks
/in General NewsPoland’s security officials said they have foiled cyberattacks and online blackmail attempts by groups acting for Russian and Belarusian services.
The post Poland’s Cybersecurity Experts Foil Russian and Belarussian Attacks appeared first on SecurityWeek.
SecurityWeek – Read More