Over Security

Over Security

31461 bookmarks
Custom sorting
Privacy sotto assedio: anche in guerra i dati dei civili non devono diventare armi
Privacy sotto assedio: anche in guerra i dati dei civili non devono diventare armi
Nel nuovo dominio della guerra ibrida, la protezione dei dati civili si colloca all’incrocio tra GDPR, Diritto Internazionale Umanitario e sicurezza nazionale. Serve una cornice tecnico-giuridica integrata per prevenire l’abuso dell’identità digitale in tempo di guerra
·cybersecurity360.it·
Privacy sotto assedio: anche in guerra i dati dei civili non devono diventare armi
CISA orders feds to patch DarkSword iOS flaws exploited attacks
CISA orders feds to patch DarkSword iOS flaws exploited attacks
CISA ordered U.S. government agencies to patch three iOS vulnerabilities targeted in cryptocurrency theft and cyberespionage attacks using the DarkSword exploit kit.
·bleepingcomputer.com·
CISA orders feds to patch DarkSword iOS flaws exploited attacks
New KB5085516 emergency update fixes Microsoft account sign-in
New KB5085516 emergency update fixes Microsoft account sign-in
Microsoft has released an emergency update to address a major issue that breaks sign-ins with Microsoft accounts across multiple Microsoft apps, including Teams and OneDrive.
·bleepingcomputer.com·
New KB5085516 emergency update fixes Microsoft account sign-in
VoidStealer malware steals Chrome master key via debugger trick
VoidStealer malware steals Chrome master key via debugger trick
An information stealer called VoidStealer uses a new approach to bypass Chrome's Application-Bound Encryption (ABE) and extract the master key for decrypting sensitive data stored in the browser.
·bleepingcomputer.com·
VoidStealer malware steals Chrome master key via debugger trick
Trivy vulnerability scanner breach pushed infostealer via GitHub Actions
Trivy vulnerability scanner breach pushed infostealer via GitHub Actions
The Trivy vulnerability scanner was compromised in a supply-chain attack by threat actors known as TeamPCP, which distributed credential-stealing malware through official releases and GitHub Actions.
·bleepingcomputer.com·
Trivy vulnerability scanner breach pushed infostealer via GitHub Actions
Google adds ‘Advanced Flow’ for safe APK sideloading on Android
Google adds ‘Advanced Flow’ for safe APK sideloading on Android
Google has announced a new mechanism in Android called Advanced Flow that will allow sideloading APKs from unverified developers for power users in a more secure way.
·bleepingcomputer.com·
Google adds ‘Advanced Flow’ for safe APK sideloading on Android
Microsoft Azure Monitor alerts abused in callback phishing campaigns
Microsoft Azure Monitor alerts abused in callback phishing campaigns
Microsoft Azure Monitor alerts are being abused to send callback phishing emails that impersonate warnings from the Microsoft Security Team about unauthorized charges on your account.
·bleepingcomputer.com·
Microsoft Azure Monitor alerts abused in callback phishing campaigns
FBI links Signal phishing attacks to Russian intelligence services
FBI links Signal phishing attacks to Russian intelligence services
The FBI has issued a public service announcement warning that Russian intelligence-linked threat actors are actively targeting users of encrypted messaging apps such as Signal and WhatsApp in phishing campaigns that have already compromised thousands of accounts.
·bleepingcomputer.com·
FBI links Signal phishing attacks to Russian intelligence services
Oracle pushes emergency fix for critical Identity Manager RCE flaw
Oracle pushes emergency fix for critical Identity Manager RCE flaw
Oracle has released an out-of-band security update to fix a critical unauthenticated remote code execution vulnerability in Identity Manager and Web Services Manager tracked as CVE-2026-21992.
·bleepingcomputer.com·
Oracle pushes emergency fix for critical Identity Manager RCE flaw
Modifiche a Cybersecurity Act 2 e NIS2: da EDPB-EDPS un richiamo ai principi del GDPR
Modifiche a Cybersecurity Act 2 e NIS2: da EDPB-EDPS un richiamo ai principi del GDPR
EDPB ed EDPS hanno dato il via libera alle modifiche del Cybersecurity Act e della Direttiva NIS2, ma con un richiamo costante ai principi del GDPR: l’espansione degli strumenti di raccolta e condivisione delle informazioni deve rimanere entro le regole della normativa sulla protezione dati. I punti cardine
·cybersecurity360.it·
Modifiche a Cybersecurity Act 2 e NIS2: da EDPB-EDPS un richiamo ai principi del GDPR
CISA orders feds to patch max-severity Cisco flaw by Sunday
CISA orders feds to patch max-severity Cisco flaw by Sunday
The Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to patch a maximum-severity vulnerability, CVE-2026-20131, in Cisco Secure Firewall Management Center (FMC) by Sunday, March 22.
·bleepingcomputer.com·
CISA orders feds to patch max-severity Cisco flaw by Sunday
L’evergreen dell’ingegneria sociale
L’evergreen dell’ingegneria sociale
Quando si parla di nuove campagne d'attacco, molto spesso c'è il comune denominatore dell'impiego di tecniche di ingegneria sociale, dallo studio dei contesti al pretexting per creare la trappola perfetta. Trappola che può essere disinnescata con una cooperazione fra operatori e organizzazioni
·cybersecurity360.it·
L’evergreen dell’ingegneria sociale
Fornitori ad alto rischio da escludere nel 5G: un equilibrio fra sovranità europea e nazionale
Fornitori ad alto rischio da escludere nel 5G: un equilibrio fra sovranità europea e nazionale
Il 19 marzo 2026, l'avvocata generale della Corte di giustizia dell'Unione europea ha depositato le proprie conclusioni nella caso Elisa Eesti, operatore estone di TLC. Ecco quali sono le misure adottate nell'esclusione dei fornitori ad alto rischio di 2G-4G e 5G nelle infrastrutture critiche, per tutelare la sicurezza nazionale ed europea, all'insegna della proporzionalità
·cybersecurity360.it·
Fornitori ad alto rischio da escludere nel 5G: un equilibrio fra sovranità europea e nazionale
How CISOs Can Survive the Era of Geopolitical Cyberattacks
How CISOs Can Survive the Era of Geopolitical Cyberattacks
Geopolitical tensions are driving destructive cyberattacks designed to disrupt operations, not demand ransom. CISOs must limit lateral movement and contain breaches to reduce the impact of wiper campaigns.
·bleepingcomputer.com·
How CISOs Can Survive the Era of Geopolitical Cyberattacks