Over Security

Over Security

31463 bookmarks
Custom sorting
Divine Skins - 105,814 breached accounts
Divine Skins - 105,814 breached accounts
In March 2026, the League of Legends custom skins service Divine Skins suffered a data breach. The incident was disclosed via the service's Discord server, where Divine Skins stated that an unauthorised third party accessed part of its systems, deleted all skins from the database and exposed email addresses and usernames. The data also contained a history of purchases made by users.
·haveibeenpwned.com·
Divine Skins - 105,814 breached accounts
Baydöner - 1,266,822 breached accounts
Baydöner - 1,266,822 breached accounts
In March 2026, the Turkish restaurant chain Baydöner suffered a data breach which was subsequently published to a public hacking forum. The incident exposed over 1.2M unique email addresses along with names, phone numbers, cities of residence and plaintext passwords. A small number of records also included Turkish national ID number and date of birth. In their disclosure notice, Baydöner stated that payment and financial data was not affected.
·haveibeenpwned.com·
Baydöner - 1,266,822 breached accounts
Microsoft releases Windows 11 OOB hotpatch to fix RRAS RCE flaw
Microsoft releases Windows 11 OOB hotpatch to fix RRAS RCE flaw
Microsoft has released an out-of-band (OOB) update to fix a security vulnerabilities affecting Windows 11 Enterprise devices that receive hotpatch updates instead of the regular Patch Tuesday cumulative updates.
·bleepingcomputer.com·
Microsoft releases Windows 11 OOB hotpatch to fix RRAS RCE flaw
Crimes against NTDLL - Implementing Early Cascade Injection
Crimes against NTDLL - Implementing Early Cascade Injection
A deep dive into building Early Cascade Injection in Rust using NTDLL shim engine internals, position-independent stubs, pointer encoding, and APC-based payload execution.
·fluxsec.red·
Crimes against NTDLL - Implementing Early Cascade Injection
Microsoft: Windows 11 users can't access C: drive on some Samsung PCs
Microsoft: Windows 11 users can't access C: drive on some Samsung PCs
Microsoft is investigating a new issue affecting some Samsung laptops running Windows 11 after installing the February 2026 security updates, in which users lose access to their C:\ drive and are unable to launch applications.
·bleepingcomputer.com·
Microsoft: Windows 11 users can't access C: drive on some Samsung PCs
FBI seeks victims of Steam games used to spread malware
FBI seeks victims of Steam games used to spread malware
The FBI is asking gamers who installed Steam titles containing malware to provide information as part of an ongoing investigation into eight malicious games uploaded to the gaming platform.
·bleepingcomputer.com·
FBI seeks victims of Steam games used to spread malware
Cyber Index PMI 2025: i 4 livelli di maturità del tessuto imprenditoriale italiano
Cyber Index PMI 2025: i 4 livelli di maturità del tessuto imprenditoriale italiano
Pmi italiane meno immature, ma strada ancora lunga da percorrere per asdottare le misure di protezione adeguate ai rischi cyber. Ecco cosa fotografa il Cyber Index PMI 2025 che misura l'indice di maturità delle Pmi
·cybersecurity360.it·
Cyber Index PMI 2025: i 4 livelli di maturità del tessuto imprenditoriale italiano
Poland's nuclear research centre targeted by cyberattack
Poland's nuclear research centre targeted by cyberattack
Poland's National Centre for Nuclear Research (NCBJ) says hackers targeted its IT infrastructure, but the attack was detected and blocked before causing any impact.
·bleepingcomputer.com·
Poland's nuclear research centre targeted by cyberattack
Fra report e realtà
Fra report e realtà
Sottovalutare l'importanza reportistica nella gestione della sicurezza cyber è un punto di fallimento inevitabile, anche perché non consente all'organizzazione di disporre di una chiara visione strategica e impedisce la predisposizione di misure di mitigazione del rischio adeguate
·cybersecurity360.it·
Fra report e realtà
Cyber attacco contro Stryker: sanità bersaglio di operazioni geopolitiche
Cyber attacco contro Stryker: sanità bersaglio di operazioni geopolitiche
Il gruppo hacker noto come Handala ha rivendicato un attacco informatico contro Stryker, multinazionale specializzata in dispositivi medici e tecnologie sanitarie utilizzate in ospedali di tutto il mondo. Ecco perché sembra un segnale di escalation nella dimensione digitale dello scontro
·cybersecurity360.it·
Cyber attacco contro Stryker: sanità bersaglio di operazioni geopolitiche
From VMware to what’s next: Protecting data during hypervisor migration
From VMware to what’s next: Protecting data during hypervisor migration
Hypervisor migrations can introduce hidden risks that threaten data availability and recovery. Acronis explains why verified backups and cross-platform recovery are essential during VMware transitions.
·bleepingcomputer.com·
From VMware to what’s next: Protecting data during hypervisor migration
Incredibile come i sistemi multi-agent possano aggirare i controlli, rubare segreti e diventare minacce
Incredibile come i sistemi multi-agent possano aggirare i controlli, rubare segreti e diventare minacce
L’adozione degli agenti AI nelle aziende sta accelerando ben oltre la fase sperimentale e finalmente sempre più organizzazioni stanno affidando a questi sistemi compiti operativi concreti. Purtroppo, spesso questo vuol dire anche dar loro accesso a dati interni, interazioni con strumenti di produttività, repository documentali, shell di sistema, workflow di automazione e persino funzioni di …
·securityinfo.it·
Incredibile come i sistemi multi-agent possano aggirare i controlli, rubare segreti e diventare minacce
Quando il quantum colpirà, l’agilità crittografica sarà il vero vantaggio competitivo
Quando il quantum colpirà, l’agilità crittografica sarà il vero vantaggio competitivo
Gli attaccanti stanno seguendo da vicino l’evoluzione del quantum perché i computer quantistici minacciano di demolire le basi della crittografia. Ecco cos'è l'agilità crittografica e quali sono i cinque livelli critici da valutare
·cybersecurity360.it·
Quando il quantum colpirà, l’agilità crittografica sarà il vero vantaggio competitivo
The Week in Vulnerabilities: SolarWinds, Ivanti, and Critical ICS Exposure
The Week in Vulnerabilities: SolarWinds, Ivanti, and Critical ICS Exposure
Critical SolarWinds, Ivanti EPMM, Microsoft Office, and Siemens ICS vulnerabilities are being discussed on underground forums, while 15 CISA ICS advisories impacted Energy and Critical Manufacturing sectors.
·cyble.com·
The Week in Vulnerabilities: SolarWinds, Ivanti, and Critical ICS Exposure