Over Security

Over Security

31463 bookmarks
Custom sorting
Fake enterprise VPN downloads used to steal company credentials
Fake enterprise VPN downloads used to steal company credentials
A threat actor tracked as Storm-2561 is distributing fake enterprise VPN clients from Ivanti, Cisco, and Fortinet to steal VPN credentials from unsuspecting users.
·bleepingcomputer.com·
Fake enterprise VPN downloads used to steal company credentials
Police sinkholes 45,000 IP addresses in cybercrime crackdown
Police sinkholes 45,000 IP addresses in cybercrime crackdown
An international law enforcement action codenamed "Operation Synergia III" has sinkholed tens of thousands of IP addresses and seized servers linked to cybercrime operations worldwide.
·bleepingcomputer.com·
Police sinkholes 45,000 IP addresses in cybercrime crackdown
Banca Intesa Sanpaolo, maxi sanzione privacy: perché il problema è la base giuridica
Banca Intesa Sanpaolo, maxi sanzione privacy: perché il problema è la base giuridica
L’Autorità garante per la protezione dei dati ha comminato una sanzione di oltre 17 milioni di euro all'istitutodi credito Intesa Sanpaolo per aver profilato illegittimamente quasi 2,5 milioni di correntisti, in una cessione, a favore di una controllata al 100%. Ecco le gravi le violazioni privacy riscontrate
·cybersecurity360.it·
Banca Intesa Sanpaolo, maxi sanzione privacy: perché il problema è la base giuridica
Veeam Fixes RCE Bugs in Critical Backup & Replication Platform
Veeam Fixes RCE Bugs in Critical Backup & Replication Platform
An important Veeam security patch to address multiple vulnerabilities in its Backup & Replication platform that potentially allowed attackers to execute malicious code remotely, has been released.
·thecyberexpress.com·
Veeam Fixes RCE Bugs in Critical Backup & Replication Platform
AI e linguistica: il rischio di bias profondi occulti e il ruolo della privacy
AI e linguistica: il rischio di bias profondi occulti e il ruolo della privacy
Esistono bias linguistici profondi occulti nei large language models (LLM). Ecco le implicazioni concettuali, progettuali e normative, con particolare attenzione alla privacy intesa come tutela delle traiettorie identitarie future
·cybersecurity360.it·
AI e linguistica: il rischio di bias profondi occulti e il ruolo della privacy
Oltre l’RSA: la migrazione verso la crittografia post-quantum secondo gli standard NIST
Oltre l’RSA: la migrazione verso la crittografia post-quantum secondo gli standard NIST
I settori con un'alta ritenzione del dato (sanità, finanza, difesa, telco) affrontano un orizzonte di esposizione catastrofico se la migrazione non viene avviata immediatamente, vanificando la confidenzialità a lungo termine. Ecco come garantire la Crypto-Agility che permetterà all'azienda di sopravvivere incolume alle tempeste crittografiche del futuro
·cybersecurity360.it·
Oltre l’RSA: la migrazione verso la crittografia post-quantum secondo gli standard NIST
Canadian retail giant Loblaw notifies customers of data breach
Canadian retail giant Loblaw notifies customers of data breach
Still, out of an abundance of caution, Loblaw says it has automatically logged out all customers from their accounts. Account holders who need to access the company's digital services will have to log in again.
·bleepingcomputer.com·
Canadian retail giant Loblaw notifies customers of data breach
England Hockey investigating ransomware data breach
England Hockey investigating ransomware data breach
England Hockey, the governing body for field hockey in England, is investigating a potential data breach after the AiLock ransomware gang listed it as a victim on its data leak site.
·bleepingcomputer.com·
England Hockey investigating ransomware data breach
AI-generated Slopoly malware used in Interlock ransomware attack
AI-generated Slopoly malware used in Interlock ransomware attack
A new malware strain dubbed Slopoly, likely created using generative AI tools, allowed a threat actor to remain on a compromised server for more than a week and steal data in an Interlock ransomware attack.
·bleepingcomputer.com·
AI-generated Slopoly malware used in Interlock ransomware attack
This one’s for you, Mom
This one’s for you, Mom
This week, Joe talks about allyship and how being aware of an issue is the first step in helping to fix it.
·blog.talosintelligence.com·
This one’s for you, Mom
Law enforcement shuts down botnet made of tens of thousands of hacked routers
Law enforcement shuts down botnet made of tens of thousands of hacked routers
An international law enforcement operation shut down a service called SocksEscort, which allegedly helped cybercriminals all over the world launch ransomware and DDoS attacks, as well as distribute child sexual abuse material.
·techcrunch.com·
Law enforcement shuts down botnet made of tens of thousands of hacked routers
Veeam warns of critical flaws exposing backup servers to RCE attacks
Veeam warns of critical flaws exposing backup servers to RCE attacks
Data protection company Veeam Software has patched multiple flaws in its Backup & Replication solution, including four critical remote code execution (RCE) vulnerabilities.
·bleepingcomputer.com·
Veeam warns of critical flaws exposing backup servers to RCE attacks