BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Zero to Hero – A “Measured” Approach to Building a World-Class Offensive Security Program
/in General NewsA strong security program will sometimes require substantial organizational and cultural changes around security practices, and inevitably, a higher cost.
The post Zero to Hero – A “Measured” Approach to Building a World-Class Offensive Security Program appeared first on SecurityWeek.
SecurityWeek – Read More
Bridging the Gap Between the CISO & the Board of Directors
/in General NewsPositioning security leaders as more than risk managers turns them into business enablers, trusted advisers, and, eventually, integral members of the C-suite.
darkreading – Read More
Threat Actors Deploy WordPress Malware in ‘mu-plugins’ Directory
/in General NewsSucuri has discovered multiple malware families deployed in the WordPress mu-plugins directory to evade routine security checks.
The post Threat Actors Deploy WordPress Malware in ‘mu-plugins’ Directory appeared first on SecurityWeek.
SecurityWeek – Read More
Qakbot Resurfaces in Fresh Wave of ClickFix Attacks
/in General NewsAttackers post links to fake websites on LinkedIn to ask people to complete malicious CAPTCHA challenges that install malware.
darkreading – Read More
Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images
/in General NewsThreat actors are using the “mu-plugins” directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites.
mu-plugins, short for must-use plugins, refers to plugins in a special directory (“wp-content/mu-plugins”) that are automatically executed by WordPress without the need to enable them explicitly via the
The Hacker News – Read More
Hacker Leaks Samsung Customer Data
/in General NewsHacker leaks 270,000 customer tickets allegedly stolen from Samsung Germany using long-compromised credentials.
The post Hacker Leaks Samsung Customer Data appeared first on SecurityWeek.
SecurityWeek – Read More
5 Impactful AWS Vulnerabilities You’re Responsible For
/in General NewsIf you’re using AWS, it’s easy to assume your cloud security is handled – but that’s a dangerous misconception. AWS secures its own infrastructure, but security within a cloud environment remains the customer’s responsibility.
Think of AWS security like protecting a building: AWS provides strong walls and a solid roof, but it’s up to the customer to handle the locks, install the alarm systems,
The Hacker News – Read More
Part of EU’s New €1.3 Billion Investment Going to Cybersecurity
/in General NewsThe European Commission plans on investing €1.3 billion ($1.4 billion) in cybersecurity, artificial intelligence and digital skills.
The post Part of EU’s New €1.3 Billion Investment Going to Cybersecurity appeared first on SecurityWeek.
SecurityWeek – Read More
⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More
/in General NewsEvery week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a too-convenient cloud tool becomes the perfect entry point. But what happens when the hunters become the hunted? Or when old malware resurfaces with new tricks?
Step behind the curtain with us this week as we explore breaches born from routine oversights—and the unexpected
The Hacker News – Read More
CISA Analyzes Malware Used in Ivanti Zero-Day Attacks
/in General NewsCISA has published its analysis of Resurge, a SpawnChimera malware variant used in attacks targeting a recent Ivanti Connect Secure zero-day.
The post CISA Analyzes Malware Used in Ivanti Zero-Day Attacks appeared first on SecurityWeek.
SecurityWeek – Read More