Over Security

Over Security

31461 bookmarks
Custom sorting
OpenAI rolls out ChatGPT Library to store your personal files
OpenAI rolls out ChatGPT Library to store your personal files
OpenAI is rolling out a new feature called 'Library' for ChatGPT, which allows you to store your personal files or images on OpenAI's cloud storage, so you can reference those items in a future chat.
·bleepingcomputer.com·
OpenAI rolls out ChatGPT Library to store your personal files
RuneScape Boards - 222,762 breached accounts
RuneScape Boards - 222,762 breached accounts
In around 2011, the RuneScape Boards forum (also known as RSBoards) suffered a data breach that was later redistributed as part of a larger corpus of data. The vBulletin-based service exposed 223k unique email addresses along with usernames, IP addresses and salted MD5 password hashes.
·haveibeenpwned.com·
RuneScape Boards - 222,762 breached accounts
Mazda discloses security breach exposing employee and partner data
Mazda discloses security breach exposing employee and partner data
Mazda Motor Corporation (Mazda) announced that information belonging to its employees and business partners had been exposed in a security incident detected last December.
·bleepingcomputer.com·
Mazda discloses security breach exposing employee and partner data
TeamPCP deploys Iran-targeted wiper in Kubernetes attacks
TeamPCP deploys Iran-targeted wiper in Kubernetes attacks
The TeamPCP hacking group is targeting Kubernetes clusters with a malicious script that wipes all machines when it detects systems configured for Iran.
·bleepingcomputer.com·
TeamPCP deploys Iran-targeted wiper in Kubernetes attacks
Digital Omnibus e protezione dati: una riflessione politica sul futuro del GDPR
Digital Omnibus e protezione dati: una riflessione politica sul futuro del GDPR
EDPB ed EDPS ha sollevato un dubbio tutt’altro che teorico in merito al Digital Omnibus: nel tentativo di rendere più snello il quadro regolatorio europeo, si rischia di incidere proprio sul pilastro che lo ha reso solido, cioè il GDPR. Ecco i punti salienti dell’opinione congiunta
·cybersecurity360.it·
Digital Omnibus e protezione dati: una riflessione politica sul futuro del GDPR
Trivy supply-chain attack spreads to Docker, GitHub repos
Trivy supply-chain attack spreads to Docker, GitHub repos
The TeamPCP hackers behind the Trivy supply-chain attack continued to target Aqua Security, pushing malicious Docker images and hijacking the company's GitHub organization to tamper with dozens of repositories.
·bleepingcomputer.com·
Trivy supply-chain attack spreads to Docker, GitHub repos
‘CanisterWorm’ Springs Wiper Attack Targeting Iran
‘CanisterWorm’ Springs Wiper Attack Targeting Iran
A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran's time zone or have…
·krebsonsecurity.com·
‘CanisterWorm’ Springs Wiper Attack Targeting Iran
FBI says Iranian hackers are using Telegram to steal data in malware attacks
FBI says Iranian hackers are using Telegram to steal data in malware attacks
Hackers working for Iran’s government are using Telegram in hacking operations that use malware to target dissidents, opposition groups, and journalists who oppose its regime, according to the FBI.
·techcrunch.com·
FBI says Iranian hackers are using Telegram to steal data in malware attacks
Obblighi di trasparenza e privacy: l’EDPB costruisce i pilastri per la conformità futura
Obblighi di trasparenza e privacy: l’EDPB costruisce i pilastri per la conformità futura
L'European Data Protection Board ha lanciato la sua azione sul quadro coordinato di applicazione (CEF) per il 2026. A differenza dell’anno scorso, che era incentrato sul diritto alla cancellazione, l’attenzione quest’anno si sposta sul rispetto degli obblighi di trasparenza e di informazione previsti dal GDPR. I punti salienti
·cybersecurity360.it·
Obblighi di trasparenza e privacy: l’EDPB costruisce i pilastri per la conformità futura
IoT insicuro by design: le botnet smantellate dagli USA sono un sintomo, non la malattia
IoT insicuro by design: le botnet smantellate dagli USA sono un sintomo, non la malattia
Lo smantellamento delle botnet Aisuru, KimWolf, JackSkid e Mossad, con i loro tre milioni di dispositivi infetti, è una vittoria delle forze dell’ordine internazionali. Ma la vera notizia è che queste reti criminali hanno potuto crescere indisturbate per anni sfruttando un ecosistema IoT strutturalmente insicuro. E finché non risolviamo questo problema, ne arriveranno altre
·cybersecurity360.it·
IoT insicuro by design: le botnet smantellate dagli USA sono un sintomo, non la malattia
Varonis Atlas: Securing AI and the Data That Powers It
Varonis Atlas: Securing AI and the Data That Powers It
AI agents can access data directly, making data security the foundation of AI security. Learn more about how Varonis Atlas helps orgs see, secure, and control AI systems and the data they can reach.
·bleepingcomputer.com·
Varonis Atlas: Securing AI and the Data That Powers It
Beers with Talos breaks down the 2025 Talos Year in Review
Beers with Talos breaks down the 2025 Talos Year in Review
The Beers with Talos team unpack the biggest cybersecurity threats of 2025, from React2Shell to ransomware and identity abuse, and what it all means for defenders going forward.
·blog.talosintelligence.com·
Beers with Talos breaks down the 2025 Talos Year in Review
Microsoft Exchange Online service change causes email access issues
Microsoft Exchange Online service change causes email access issues
Microsoft is working to address an ongoing service issue that has intermittently prevented some users from accessing their cloud-based Exchange Online mailboxes via Outlook mobile and Mac desktop clients since Thursday.
·bleepingcomputer.com·
Microsoft Exchange Online service change causes email access issues
2025 Talos Year in Review: Speed, scale, and staying power
2025 Talos Year in Review: Speed, scale, and staying power
The 2025 Talos Year in Review is available now. Understand evolving adversary playbooks and how to strengthen your organization’s defenses.
·blog.talosintelligence.com·
2025 Talos Year in Review: Speed, scale, and staying power
FBI warns of Handala hackers using Telegram in malware attacks
FBI warns of Handala hackers using Telegram in malware attacks
The U.S. Federal Bureau of Investigation (FBI) warned network defenders that Iranian hackers linked to the country's Ministry of Intelligence and Security (MOIS) are using Telegram in malware attacks.
·bleepingcomputer.com·
FBI warns of Handala hackers using Telegram in malware attacks
Spoofing e chiamate abusive: i primi provvedimenti AGCOM, decisivi per il futuro
Spoofing e chiamate abusive: i primi provvedimenti AGCOM, decisivi per il futuro
AGCOM ha emanato due provvedimenti decisivi contro il CLI spoofing: una sanzione ad Agile Telecom per veicolazione di SMS fraudolenti e un’archiviazione per Telecom Italia Sparkle dopo l’implementazione di filtri e risoluzione di contratti irregolari. Un sistema multilivello contro spoofing e chiamate abusive che inizia a funzionare
·cybersecurity360.it·
Spoofing e chiamate abusive: i primi provvedimenti AGCOM, decisivi per il futuro