Over Security

Over Security

31463 bookmarks
Custom sorting
Suspected RedLine infostealer malware admin extradited to US
Suspected RedLine infostealer malware admin extradited to US
An Armenian suspect was extradited to the United States to face criminal charges for allegedly helping manage RedLine, one of the most prolific infostealer malware operations in recent years.
·bleepingcomputer.com·
Suspected RedLine infostealer malware admin extradited to US
An AI gateway designed to steal your data
An AI gateway designed to steal your data
Dissecting the supply-chain attack on LiteLLM – a multifunctional gateway used in many AI agents. Explaining the dangers of the malicious code and how to protect yourself.
·securelist.com·
An AI gateway designed to steal your data
1-15 March 2026 Cyber Attacks Timeline
1-15 March 2026 Cyber Attacks Timeline
In the first half of March 2026 I collected 95 events (6.34 events/day) with a threat landscape dominated by malware once ahead of account takeovers and ransomware.
·hackmageddon.com·
1-15 March 2026 Cyber Attacks Timeline
Resilienza digitale 2.0: integrare l’AI nel perimetro di sicurezza DORA
Resilienza digitale 2.0: integrare l’AI nel perimetro di sicurezza DORA
Il passaggio alla Resilienza 2.0 non è più solo una scelta competitiva, ma un imperativo metodologico. Ecco come possiamo integrare l'AI nel perimetro di sicurezza senza che questa diventi il "punto di rottura" sistemico previsto dal legislatore
·cybersecurity360.it·
Resilienza digitale 2.0: integrare l’AI nel perimetro di sicurezza DORA
La nuova Cyber Strategy USA va oltre i confini nazionali: i 6 pilastri operativi
La nuova Cyber Strategy USA va oltre i confini nazionali: i 6 pilastri operativi
La strategia tocca temi centrali per l'intero ecosistema cyber globale: dalla postura offensiva nella gestione delle minacce, alla deregolamentazione del settore privato, fino alla supremazia nelle tecnologie emergenti come intelligenza artificiale e crittografia post-quantistica. Ecco i 6 pillar della Cyber Strategy nazionale della Casa Bianca
·cybersecurity360.it·
La nuova Cyber Strategy USA va oltre i confini nazionali: i 6 pilastri operativi
Attacco alla sanità: ecco perché una cartella clinica vale fino a mille euro nel dark web
Attacco alla sanità: ecco perché una cartella clinica vale fino a mille euro nel dark web
I dati sanitari non sono solo dati sottratti, ma una chiave capace di aprire molte porte. Ed è proprio questa versatilità criminale a determinarne il valore di una cartella clinica che, in seguito ad un cyber attacco, finisce nel dark web
·cybersecurity360.it·
Attacco alla sanità: ecco perché una cartella clinica vale fino a mille euro nel dark web
Coruna: the framework used in Operation Triangulation
Coruna: the framework used in Operation Triangulation
Kaspersky GReAT experts look into the Coruna exploit kit targeting iPhones. We discovered that the kernel exploit for CVE-2023-32434 and CVE-2023-38606 is an updated version of the Operation Triangulation exploit.
·securelist.com·
Coruna: the framework used in Operation Triangulation
Scuf Gaming - 128,683 breached accounts
Scuf Gaming - 128,683 breached accounts
In June 2015, custom gaming controller maker Scuf Gaming suffered a data breach. The incident exposed 129k unique email addresses along with usernames, display names, IP addresses and password hashes.
·haveibeenpwned.com·
Scuf Gaming - 128,683 breached accounts
Sound Radix - 292,993 breached accounts
Sound Radix - 292,993 breached accounts
In March 2026, the audio production tools company Sound Radix disclosed a data breach that they subsequently self-submitted to HIBP. Attributed to unauthorised access to a customer support platform, the incident impacted 293k unique email addresses and names of users who had interacted with their support team. Sound Radix advised that whilst there is no evidence their broader user database was accessed, it is possible that additional data including hashed passwords may have been exposed. No financial or credit card information was impacted.
·haveibeenpwned.com·
Sound Radix - 292,993 breached accounts
Magento sotto attacco: PolyShell, sfruttamento di massa in pochi giorni
Magento sotto attacco: PolyShell, sfruttamento di massa in pochi giorni
La vulnerabilità “PolyShell” in Magento Open Source e Adobe Commerce è passata dalla disclosure alla compromissione su larga scala in tempi estremamente rapidi: secondo Sansec, azienda specializzata in sicurezza informatica, lo sfruttamento di massa è iniziato il 19 marzo 2026, appena due giorni dopo la divulgazione pubblica, e oggi le tracce di attacco risultano presenti …
·securityinfo.it·
Magento sotto attacco: PolyShell, sfruttamento di massa in pochi giorni
GitHub adds AI-powered bug detection to expand security coverage
GitHub adds AI-powered bug detection to expand security coverage
GitHub is adopting AI-based scanning for its Code Security tool to expand vulnerability detections beyond the CodeQL static analysis and cover more languages and frameworks.
·bleepingcomputer.com·
GitHub adds AI-powered bug detection to expand security coverage
PolyShell attacks target 56% of all vulnerable Magento stores
PolyShell attacks target 56% of all vulnerable Magento stores
Attacks leveraging the 'PolyShell' vulnerability in version 2 of Magento Open Source and Adobe Commerce installations are underway, targeting more than half of all vulnerable stores.
·bleepingcomputer.com·
PolyShell attacks target 56% of all vulnerable Magento stores
Bubble AI app builder abused to steal Microsoft account credentials
Bubble AI app builder abused to steal Microsoft account credentials
Threat actors are evading phishing detection in campaigns targeting Microsoft accounts by abusing the no-code app-building platform Bubble to generate and host malicious web apps.
·bleepingcomputer.com·
Bubble AI app builder abused to steal Microsoft account credentials
New Torg Grabber infostealer malware targets 728 crypto wallets
New Torg Grabber infostealer malware targets 728 crypto wallets
A new info-stealing malware called Torg Grabber is stealing sensitive data from 850 browser extensions, more than 700 of them for cryptocurrency wallets.
·bleepingcomputer.com·
New Torg Grabber infostealer malware targets 728 crypto wallets