BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Airbnb Scammers Pose as Hosts, Redirect Users to Fake Tripadvisor Site
/in General NewsThe scammers use emails and fake websites to trick users into making off-platform bookings and sharing their payment card details. Airbnb warns against off-platform activity and urges users to be cautious of emails and websites impersonating it.
Cyware News – Latest Cyber News – Read More
Kali Linux 2024.1 Released with New Tools, New Look, New Kali NetHunter Kernels
/in General NewsThe latest release of Kali Linux, version 2024.1, includes new tools, an updated kernel, and improvements to the desktop environments. The release also features updates to the Kali NetHunter mobile platform.
Cyware News – Latest Cyber News – Read More
Here Come the AI Worms
/in General NewsSecurity researchers created an AI worm in a test environment that can automatically spread between generative AI agents—potentially stealing data and sending spam emails along the way.
Security Latest – Read More
Lazarus Hackers Exploited Windows Zero-Day to Gain Kernel Privileges
/in General NewsThe exploit allowed Lazarus to enhance its FudModule rootkit, enabling it to evade detection and disable security protections. Additionally, a previously undocumented remote access trojan (RAT) used by Lazarus was discovered.
Cyware News – Latest Cyber News – Read More
GitHub Rolls Out Default Secret Scanning Push Protection for Public Repositories
/in General NewsGitHub on Thursday announced that it’s enabling secret scanning push protection by default for all pushes to public repositories.
“This means that when a supported secret is detected in any push to a public repository, you will have the option to remove the secret from your commits or, if you deem the secret safe, bypass the block,” Eric Tooley and Courtney Claessens said.
Push protection&
The Hacker News – Read More
Infrastructure Cyberattacks, AI-Powered Threats Pummel Africa
/in General NewsConvincing phishing emails, synthetic identities, and deepfakes all have been spotted in cyberattacks on the continent.
darkreading – Read More
CutOut.Pro AI Tool Data Breach: Hacker Leak 20 Million User Info
/in General NewsBy Waqas
In an exclusive statement to Hackread.com, CutOut.Pro denied the breach and labeled the leak as a ‘clear scam.’
This is a post from HackRead.com Read the original post: CutOut.Pro AI Tool Data Breach: Hacker Leak 20 Million User Info
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Dashlane Free vs. Premium: Which Plan Is Best For You?
/in General NewsCompare the features and benefits of Dashlane’s free and premium versions to determine which option is best for your password management needs.
Security | TechRepublic – Read More
The UK’s GPS Tagging of Migrants Has Been Ruled Illegal
/in General NewsThe UK’s privacy regulator says the government did not take into account the intrusiveness of ankle tags that continuously monitor a person’s location.
Security Latest – Read More
NordPass Free vs. Premium: Is It Worth the Upgrade?
/in General NewsNordPass offers both Free and Premium versions. Learn about the differences and features of each version to determine which one is right for you.
Security | TechRepublic – Read More