BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Malicious Apps Disguised as Banks and Government Agencies Targeting Indian Android Users
/in General NewsAndroid smartphone users in India are the target of a new malware campaign that employs social engineering lures to install fraudulent apps that are capable of harvesting sensitive data.
“Using social media platforms like WhatsApp and Telegram, attackers are sending messages designed to lure users into installing a malicious app on their mobile device by impersonating legitimate organizations,
The Hacker News – Read More
Mustang Panda Hackers Targets Philippines Government Amid South China Sea Tensions
/in General NewsThe China-linked Mustang Panda actor has been linked to a cyber attack targeting a Philippines government entity amid rising tensions between the two countries over the disputed South China Sea.
Palo Alto Networks Unit 42 attributed the adversarial collective to three campaigns in August 2023, primarily singling out organizations in the South Pacific.
“The campaigns leveraged legitimate software
The Hacker News – Read More
NetSupport RAT Infections on the Rise – Targeting Government and Business Sectors
/in General NewsThreat actors are targeting the education, government, and business services sectors with a remote access trojan called NetSupport RAT. The malware is typically downloaded onto a victim’s computer through deceptive websites and fake browser updates.
Cyware News – Latest Cyber News – Read More
Kinsing Hackers Exploit Apache ActiveMQ Vulnerability to Deploy Linux Rootkits
/in General NewsThe Kinsing threat actors are actively exploiting a critical security flaw in vulnerable Apache ActiveMQ servers to infect Linux systems with cryptocurrency miners and rootkits.
“Once Kinsing infects a system, it deploys a cryptocurrency mining script that exploits the host’s resources to mine cryptocurrencies like Bitcoin, resulting in significant damage to the infrastructure and a negative
The Hacker News – Read More
CISA Explains How to Apply Secure-By-Design Principles
/in General NewsThe CISA is pushing for manufacturers and vendors to take responsibility for the security of their products. CISA wants detailed data and logs from technology companies to prove they are incorporating security measures.
Cyware News – Latest Cyber News – Read More
Unusual “ZPAQ” Archive Format Delivers Malware
/in General NewsThe use of the ZPAQ compression format by threat actors in this malware campaign highlights the need for improved security measures and awareness regarding lesser-known archive tools.
Cyware News – Latest Cyber News – Read More
Popular Dragon Touch Tablet for Kids Infected with Corejava Malware
/in General NewsResearchers from the Electronic Frontier Foundation have discovered that the Dragon Touch KidzPad Y88X 10 tablet, sold on Amazon, contains malware and preinstalled riskware. The tablet also comes with an outdated parental control app called KIDOZ.
Cyware News – Latest Cyber News – Read More
Sumo Logic Completes Investigation Into Recent Security Breach
/in General NewsSumo Logic has completed its investigation into the recent security breach and found no evidence of impact to customer data.
The post Sumo Logic Completes Investigation Into Recent Security Breach appeared first on SecurityWeek.
SecurityWeek – Read More
Wireshark 4.2.0 released, open-source packet analysis gets even better
/in General NewsWireshark 4.2.0 introduces notable improvements, such as enhanced packet list sorting and smarter display filter autocomplete. It supports a wide range of new protocols, including HTTP/3, SAP protocols, Zigbee TLV, and VMware HeartBeat.
Cyware News – Latest Cyber News – Read More
Leveraging Sandbox and Threat Intelligence Feeds to Combat Cyber Threats
/in General NewsCombining a malware sandbox with threat intelligence feeds improves security detection, analysis, and response capabilities.
Dark Reading – Read More