BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Qakbot Resurfaces in Fresh Wave of ClickFix Attacks
/in General NewsAttackers post links to fake websites on LinkedIn to ask people to complete malicious CAPTCHA challenges that install malware.
darkreading – Read More
Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images
/in General NewsThreat actors are using the “mu-plugins” directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites.
mu-plugins, short for must-use plugins, refers to plugins in a special directory (“wp-content/mu-plugins”) that are automatically executed by WordPress without the need to enable them explicitly via the
The Hacker News – Read More
Hacker Leaks Samsung Customer Data
/in General NewsHacker leaks 270,000 customer tickets allegedly stolen from Samsung Germany using long-compromised credentials.
The post Hacker Leaks Samsung Customer Data appeared first on SecurityWeek.
SecurityWeek – Read More
5 Impactful AWS Vulnerabilities You’re Responsible For
/in General NewsIf you’re using AWS, it’s easy to assume your cloud security is handled – but that’s a dangerous misconception. AWS secures its own infrastructure, but security within a cloud environment remains the customer’s responsibility.
Think of AWS security like protecting a building: AWS provides strong walls and a solid roof, but it’s up to the customer to handle the locks, install the alarm systems,
The Hacker News – Read More
Part of EU’s New €1.3 Billion Investment Going to Cybersecurity
/in General NewsThe European Commission plans on investing €1.3 billion ($1.4 billion) in cybersecurity, artificial intelligence and digital skills.
The post Part of EU’s New €1.3 Billion Investment Going to Cybersecurity appeared first on SecurityWeek.
SecurityWeek – Read More
⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More
/in General NewsEvery week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a too-convenient cloud tool becomes the perfect entry point. But what happens when the hunters become the hunted? Or when old malware resurfaces with new tricks?
Step behind the curtain with us this week as we explore breaches born from routine oversights—and the unexpected
The Hacker News – Read More
CISA Analyzes Malware Used in Ivanti Zero-Day Attacks
/in General NewsCISA has published its analysis of Resurge, a SpawnChimera malware variant used in attacks targeting a recent Ivanti Connect Secure zero-day.
The post CISA Analyzes Malware Used in Ivanti Zero-Day Attacks appeared first on SecurityWeek.
SecurityWeek – Read More
170,000 Impacted by Data Breach at Chord Specialty Dental Partners
/in General NewsAn email security incident at Chord Specialty Dental Partners, a US dental service organization, has impacted more than 170,000 people.
The post 170,000 Impacted by Data Breach at Chord Specialty Dental Partners appeared first on SecurityWeek.
SecurityWeek – Read More
‘Crocodilus’ Android Banking Trojan Allows Device Takeover, Data Theft
/in General NewsThe newly identified Android banking trojan Crocodilus takes over devices, enabling overlay attacks, remote control, and keylogging.
The post ‘Crocodilus’ Android Banking Trojan Allows Device Takeover, Data Theft appeared first on SecurityWeek.
SecurityWeek – Read More
An AI Image Generator’s Exposed Database Reveals What People Really Used It For
/in General NewsAn unsecured database used by a generative AI app revealed prompts and tens of thousands of explicit images—some of which are likely illegal. The company deleted its websites after WIRED reached out.
Security Latest – Read More