BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Marketing Trends: How to Use Big Data Effectively
/in General NewsWhat are the benefits of big data in marketing and SEO? Learn and find effective tactics for implementing…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations
/in General NewsThe Pioneer Kitten attackers are monetizing their access to compromised organizations’ networks by selling domain admin credentials and full domain control privileges on cybercrime marketplaces.
Cyware News – Latest Cyber News – Read More
Dragos Expands Asset Visibility in Latest Platform Update
/in General NewsThe latest release of the Dragos Platform provide industrial and critical infrastructure organizations with complete and enriched view of their OT environment.
darkreading – Read More
Critical Fortra FileCatalyst Workflow Vulnerability Patched (CVE-2024-6633)
/in General NewsThe flaw, known as CVE-2024-6633, involves the use of default credentials for the HSQL database, which could compromise the software’s confidentiality, integrity, and availability.
Cyware News – Latest Cyber News – Read More
Google Catches Russian APT Reusing Exploits From Spyware Merchants NSO Group, Intellexa
/in General NewsGoogle TAG publishes evidence showing identical or striking similarities between exploits using by Russia’s APT29 and commercial spyware vendors.
The post Google Catches Russian APT Reusing Exploits From Spyware Merchants NSO Group, Intellexa appeared first on SecurityWeek.
SecurityWeek – Read More
How AitM Phishing Attacks Bypass MFA and EDR—and How to Fight Back
/in General NewsAttackers are increasingly using new phishing toolkits (open-source, commercial, and criminal) to execute adversary-in-the-middle (AitM) attacks.
AitM enables attackers to not just harvest credentials but steal live sessions, allowing them to bypass traditional phishing prevention controls such as MFA, EDR, and email content filtering.
In this article, we’re going to look at what AitM phishing
The Hacker News – Read More
NordVPN vs Proton VPN (2024): Which VPN Should You Choose?
/in General NewsWhile Proton VPN’s strong focus on privacy is enticing, NordVPN’s fast-performing and all-around
VPN service is the better overall package between the two.
Security | TechRepublic – Read More
Unpatched AVTECH IP Camera Flaw Exploited by Hackers for Botnet Attacks
/in General NewsA years-old high-severity flaw impacting AVTECH IP cameras has been weaponized by malicious actors as a zero-day to rope them into a botnet.
CVE-2024-7029 (CVSS score: 8.7), the vulnerability in question, is a “command injection vulnerability found in the brightness function of AVTECH closed-circuit television (CCTV) cameras that allows for remote code execution (RCE),” Akamai researchers Kyle
The Hacker News – Read More
Iranian State Hackers Team Up with Ransomware Gangs in Attacks on US
/in General NewsState-Sponsored Espionage Meets Ransomware!
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
U.S. Agencies Warn of Iranian Hacking Group’s Ongoing Ransomware Attacks
/in General NewsU.S. cybersecurity and intelligence agencies have called out an Iranian hacking group for breaching multiple organizations across the country and coordinating with affiliates to deliver ransomware.
The activity has been linked to a threat actor dubbed Pioneer Kitten, which is also known as Fox Kitten, Lemon Sandstorm (formerly Rubidium), Parisite, and UNC757, which it described as connected to
The Hacker News – Read More