BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Southern Company Builds SBOM for Electric Power Substation
/in General NewsThe utility’s software bill of materials (SBOM) experiment aims to establish stronger supply chain security – and tighter defenses against potential cyberattacks.
darkreading – Read More
Vulnerability Risk Management for External Assets
/in General NewsBy Uzair Amir
Vulnerability risk management, unlike traditional approaches, factors in vulnerability criticality, exploit likelihood, and business impact, enhancing risk assessment and mitigation strategies.
This is a post from HackRead.com Read the original post: Vulnerability Risk Management for External Assets
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Hornetsecurity Buys Vade to Fuel Strength in France, Germany
/in General NewsThe joint company plans to integrate their products and teams by the end of 2024, enabling MSPs to manage security, compliance, and data loss prevention for Microsoft 365 from a single control portal.
Cyware News – Latest Cyber News – Read More
Fidelity Customers’ Financial Information Feared Stolen in Cyberattack
/in General NewsNearly 30,000 Fidelity Investments Life Insurance customers’ personal and financial information, including bank account and routing numbers, may have been stolen after criminals breached Infosys’ IT systems.
Cyware News – Latest Cyber News – Read More
New WogRAT Malware Abuses Online Notepad Service to Store Malicious Code
/in General NewsThe ‘WogRAT’ malware targets both Windows and Linux systems and uses the online notepad platform ‘aNotepad’ to store and retrieve malicious code, making its infection chain stealthy.
Cyware News – Latest Cyber News – Read More
Urgent VMware Updates Address Critical ESXi Sandbox Escape Bugs
/in General NewsThe addressed vulnerabilities include use-after-free flaws in XHCI and UHCI USB controllers, an out-of-bounds write vulnerability, and an information disclosure vulnerability.
Cyware News – Latest Cyber News – Read More
Urgent: Apple Issues Critical Updates for Actively Exploited Zero-Day Flaws
/in General NewsApple has released security updates to address several security flaws, including two vulnerabilities that it said have been actively exploited in the wild.
The shortcomings are listed below –
CVE-2024-23225 – A memory corruption issue in Kernel that an attacker with arbitrary kernel read and write capability can exploit to bypass kernel memory protections
CVE-2024-23296 – A memory
The Hacker News – Read More
Alert: GhostSec and Stormous Launch Joint Ransomware Attacks in Over 15 Countries
/in General NewsThe cybercrime group called GhostSec has been linked to a Golang variant of a ransomware family called GhostLocker.
“TheGhostSec and Stormous ransomware groups are jointly conducting double extortion ransomware attacks on various business verticals in multiple countries,” Cisco Talos researcher Chetan Raghuprasad said in a report shared with The Hacker News.
“GhostLocker and
The Hacker News – Read More
New APT Group ‘Lotus Bane’ Behind Recent Attacks on Vietnam’s Financial Entities
/in General NewsA financial entity in Vietnam was the target of a previously undocumented threat actor called Lotus Bane that was first detected in March 2023.
Singapore-headquartered Group-IB described the hacking outfit as an advanced persistent threat group that’s believed to have been active since at least 2022.
The exact specifics of the infection chain remain unknown as yet, but it involves the
The Hacker News – Read More
CrowdStrike to Acquire Flow Security
/in General NewsCrowdStrike says the acquisition of Flow Security will expand its cloud security capabilities with Data Security Posture Management.
The post CrowdStrike to Acquire Flow Security appeared first on SecurityWeek.
SecurityWeek – Read More