Over Security

Over Security

31462 bookmarks
Custom sorting
Dutch Police discloses security breach after phishing attack
Dutch Police discloses security breach after phishing attack
The Dutch National Police (Politie) says a security breach resulting from a successful phishing attack has had a limited impact and hasn't affected citizens' data.
·bleepingcomputer.com·
Dutch Police discloses security breach after phishing attack
ACN: a febbraio 2026 bisogna sommare il contesto geopolitico al combinato NIS2–Olimpiadi
ACN: a febbraio 2026 bisogna sommare il contesto geopolitico al combinato NIS2–Olimpiadi
L'operational summary dell'Acn a febbraio si focalizza su DDoS a basso impatto e sull’allargamento della platea di soggetti NIS2 notificanti. Ma, in realtà, secondo i nostri esperti, il rischio cyber sta peggiorando, guardando al contesto geopolitico della guerra in Iran e ai trend emersi negli ultimi rapporti europei, a partire da quello del Clusit 2026
·cybersecurity360.it·
ACN: a febbraio 2026 bisogna sommare il contesto geopolitico al combinato NIS2–Olimpiadi
BreachForums Verion 5 - 339,778 breached accounts
BreachForums Verion 5 - 339,778 breached accounts
In March 2026, a breach of one of the many iterations of the BreachForums hacking forum known as "Version 5" was publicly disclosed. The incident exposed 340k unique email addresses along with usernames and argon2 password hashes.
·haveibeenpwned.com·
BreachForums Verion 5 - 339,778 breached accounts
Web Shells: Types, Mitigation & Removal
Web Shells: Types, Mitigation & Removal
What is a web shell? Learn about the most common types, along with examples. We explain how shells work, what they do, and how to protect your site and clean up this malware from a hacked server.
·blog.sucuri.net·
Web Shells: Types, Mitigation & Removal
Ajax football club hack exposed fan data, enabled ticket hijack
Ajax football club hack exposed fan data, enabled ticket hijack
Dutch professional football club Ajax Amsterdam (AFC Ajax) disclosed that a hacker exploited vulnerabilities in its IT systems and accessed data belonging to a few hundred people.
·bleepingcomputer.com·
Ajax football club hack exposed fan data, enabled ticket hijack
CISA: New Langflow flaw actively exploited to hijack AI workflows
CISA: New Langflow flaw actively exploited to hijack AI workflows
The Cybersecurity and Infrastructure Security Agency (CISA) is warning that hackers are actively exploiting a critical vulnerability identified as CVE-2026-33017, which affects the Langflow framework for building AI agents.
·bleepingcomputer.com·
CISA: New Langflow flaw actively exploited to hijack AI workflows
TP-Link, Canva, HikVision vulnerabilities
TP-Link, Canva, HikVision vulnerabilities
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed a vulnerability in HikVision, as well as 10 in TP-Link, and 19 in Canva. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisco’s third-party vulnerability disclosure policy. For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets from Snort.org, and our latest Vulnerability Advisories are always posted on
·blog.talosintelligence.com·
TP-Link, Canva, HikVision vulnerabilities
A puppet made me cry and all I got was this t-shirt
A puppet made me cry and all I got was this t-shirt
In this week's newsletter, Amy draws parallels between the collaborative themes of "Project Hail Mary" and the massive team effort behind the newly released Talos Year in Review report.
·blog.talosintelligence.com·
A puppet made me cry and all I got was this t-shirt
Diventare resilienti by design: proteggere il perimetro non basta più
Diventare resilienti by design: proteggere il perimetro non basta più
Le organizzazioni si concentrano ancora troppo sulla sicurezza perimetrale, trascurando le minacce informatiche legate alle interconnessioni con le supply chain e le terze parti,come fornitori e partner: lo indicano i risultati dell’ultimo rapporto presentato da Zscaler, che pone l’attenzione anche sui rischi emergenti, tra cui intelligenza artificiale e sviluppi del quantum computing
·cybersecurity360.it·
Diventare resilienti by design: proteggere il perimetro non basta più
Gemini sul Dark Web: strumento di difesa o nuova frontiera del controllo?
Gemini sul Dark Web: strumento di difesa o nuova frontiera del controllo?
Google ha integrato Gemini in Google Threat Intelligence per monitorare automaticamente il Dark Web: fino a 10 milioni di post al giorno analizzati con una precisione dichiarata del 98%. Un salto tecnologico reale che pone domande scomode su cosa significhi affidare la nostra superficie di rischio a un’unica piattaforma commerciale
·cybersecurity360.it·
Gemini sul Dark Web: strumento di difesa o nuova frontiera del controllo?
UK sanctions Xinbi marketplace linked to Asian scam centers
UK sanctions Xinbi marketplace linked to Asian scam centers
The United Kingdom's Foreign, Commonwealth and Development Office (FCDO) has sanctioned Xinbi, a Chinese-language cryptocurrency-based online marketplace that sells stolen data and satellite internet equipment to scam networks in Southeast Asia.
·bleepingcomputer.com·
UK sanctions Xinbi marketplace linked to Asian scam centers
Top Dark Web Telegram Groups & Channels (2026)
Top Dark Web Telegram Groups & Channels (2026)
Discover how darknet Telegram channels operate, which channel types matter most for cyber defense, and what separates useful threat intelligence from noise.
·dexpose.io·
Top Dark Web Telegram Groups & Channels (2026)
WhatsApp rolls out more AI features, iOS multi-account support
WhatsApp rolls out more AI features, iOS multi-account support
WhatsApp is rolling out multiple features designed to make the app easier to use, including AI-powered message replies and photo retouching, support for two accounts on iOS, and chat history transfer between iOS and Android devices.
·bleepingcomputer.com·
WhatsApp rolls out more AI features, iOS multi-account support
Inside a Modern Fraud Attack: From Bot Signups to Account Takeovers
Inside a Modern Fraud Attack: From Bot Signups to Account Takeovers
Multi-stage fraud attacks chain bots, proxies, and stolen credentials from signup to takeover. IPQS shows why correlating IP, device, identity, and behavior is critical to stop it.
·bleepingcomputer.com·
Inside a Modern Fraud Attack: From Bot Signups to Account Takeovers
Coruna iOS exploit framework linked to Triangulation attacks
Coruna iOS exploit framework linked to Triangulation attacks
The Coruna exploit kit is an evolution of the framework used in the Operation Triangulation espionage campaign, which in 2023 targeted iPhones via zero-click iMessage exploits.
·bleepingcomputer.com·
Coruna iOS exploit framework linked to Triangulation attacks
Russia arrests suspected owner of LeakBase cybercrime forum
Russia arrests suspected owner of LeakBase cybercrime forum
Russian police arrested a Taganrog resident believed to be the owner of LeakBase, a major online forum used by cybercriminals to buy and sell stolen data and hacking tools.
·bleepingcomputer.com·
Russia arrests suspected owner of LeakBase cybercrime forum
Talos Takes: 2025 insights from Talos and Splunk
Talos Takes: 2025 insights from Talos and Splunk
This episode of Talos Takes breaks down the 2025 Year in Review as well as Splunk's Top 50 Cybersecurity Threats report.
·blog.talosintelligence.com·
Talos Takes: 2025 insights from Talos and Splunk