Over Security

Over Security

31462 bookmarks
Custom sorting
Microsoft Teams phishing targets employees with backdoors
Microsoft Teams phishing targets employees with backdoors
Hackers contacted employees at financial and healthcare organizations over Microsoft Teams to trick them into granting remote access through Quick Assist and deploy a new piece of malware called A0Backdoor.
·bleepingcomputer.com·
Microsoft Teams phishing targets employees with backdoors
Google: Cloud attacks exploit flaws more than weak credentials
Google: Cloud attacks exploit flaws more than weak credentials
Hackers are increasingly exploiting newly disclosed vulnerabilities in third-party software to gain initial access to cloud environments, with the window for attacks shrinking from weeks to just days.
·bleepingcomputer.com·
Google: Cloud attacks exploit flaws more than weak credentials
Dutch govt warns of Signal, WhatsApp account hijacking attacks
Dutch govt warns of Signal, WhatsApp account hijacking attacks
Russian state-sponsored hackers have been linked to an ongoing Signal and WhatsApp phishing campaign targeting government officials, military personnel, and journalists to gain access to sensitive messages.
·bleepingcomputer.com·
Dutch govt warns of Signal, WhatsApp account hijacking attacks
Ericsson US discloses data breach after service provider hack
Ericsson US discloses data breach after service provider hack
Ericsson Inc., the U.S. subsidiary of Swedish networking and telecommunications giant Ericsson, says attackers have stolen data belonging to an undisclosed number of employees and customers after hacking one of its service providers.
·bleepingcomputer.com·
Ericsson US discloses data breach after service provider hack
Sicurezza dei dispositivi medici: i 3 pilastri cyber per competere con i mercati globali
Sicurezza dei dispositivi medici: i 3 pilastri cyber per competere con i mercati globali
La FDA ha pubblicato a febbraio una guidance rafforzata sulla cyber security dei dispositivi medici che introduce obblighi stringenti per i produttori. Ecco cosa cambia con le nuove linee guida FDA, perché l'Europa deve guardare oltreoceano e perché l'industria italiana deve colmare un gap, dopo il confronto con il quadro normativo europeo
·cybersecurity360.it·
Sicurezza dei dispositivi medici: i 3 pilastri cyber per competere con i mercati globali
ShinyHunters claims ongoing Salesforce Aura data theft attacks
ShinyHunters claims ongoing Salesforce Aura data theft attacks
Salesforce is warning customers that hackers are targeting websites with misconfigured Experience Cloud platforms that give guest users access to more data than intended. However, the ShinyHunters extortion gang claims to be actively exploiting a new bug to steal data from instances.
·bleepingcomputer.com·
ShinyHunters claims ongoing Salesforce Aura data theft attacks
Strategia cyber USA 2026: i sei pilastri di Trump per il dominio tecnologico USA
Strategia cyber USA 2026: i sei pilastri di Trump per il dominio tecnologico USA
La Casa Bianca ha pubblicato la sua Strategia cyber 2026, basata su azioni precise che mirano a contrastare le minacce informatiche grazie a un livello di coordinamento, impegno e volontà politica senza precedenti. Ecco le priorità dell’Amministrazione Trump riassunte in sei pilastri politici
·cybersecurity360.it·
Strategia cyber USA 2026: i sei pilastri di Trump per il dominio tecnologico USA
Detection e function hooking
Detection e function hooking
L’introduzione fatta ai concetti di detection mi serviva per iniziare a discutere del funzionamento degli EDR partendo da una base comune di comprensione dell’architettura. Come ho anti…
·roccosicilia.com·
Detection e function hooking
FBI warns of phishing attacks impersonating US city, county officials
FBI warns of phishing attacks impersonating US city, county officials
The Federal Bureau of Investigation (FBI) warns that criminals are impersonating U.S. officials in phishing attacks targeting businesses and individuals who request city and county planning and zoning permits.
·bleepingcomputer.com·
FBI warns of phishing attacks impersonating US city, county officials
Sospetto cyber attacco cinese contro l’FBI: le analogie con l’intrusione contro il Viminale
Sospetto cyber attacco cinese contro l’FBI: le analogie con l’intrusione contro il Viminale
Investigatori USA hanno rilevato movimenti sospetti su una rete dell'FBI dedicata alla gestione di metadati di intercettazioni e strumenti investigativi. A destare interesse è la natura delle informazioni coinvolte, ecco perché il caso del cyber attacco cinese ricorda quello contro il Viminale
·cybersecurity360.it·
Sospetto cyber attacco cinese contro l’FBI: le analogie con l’intrusione contro il Viminale
Why Password Audits Miss the Accounts Attackers Actually Want
Why Password Audits Miss the Accounts Attackers Actually Want
Password audits often focus on complexity rules but miss the accounts attackers actually target. Specops Software explains how breached passwords, orphaned users, and service accounts can leave organizations exposed.
·bleepingcomputer.com·
Why Password Audits Miss the Accounts Attackers Actually Want
Claude trova 22 bug critici in Firefox: l’IA ridisegna il futuro del vulnerability research
Claude trova 22 bug critici in Firefox: l’IA ridisegna il futuro del vulnerability research
In sole due settimane, Claude Opus 4.6 ha individuato 22 falle nel motore JavaScript e nel codice base di Firefox, 14 delle quali con elevato livello di gravità. È la dimostrazione che l'IA è ormai una risorsa operativa di primo piano per la sicurezza offensiva e difensiva. E cambia le regole del gioco, per tutti
·cybersecurity360.it·
Claude trova 22 bug critici in Firefox: l’IA ridisegna il futuro del vulnerability research
Microsoft still working to fix Windows Explorer white flashes
Microsoft still working to fix Windows Explorer white flashes
Microsoft has confirmed that it's still working to fully address a known issue that causes bright white flashes when opening the File Explorer on some Windows 11 systems.
·bleepingcomputer.com·
Microsoft still working to fix Windows Explorer white flashes
The Mystery of Nadia Marcinko: Epstein’s Alleged Right Hand and Her Digital Trail
The Mystery of Nadia Marcinko: Epstein’s Alleged Right Hand and Her Digital Trail
In the sprawling story of Jeffrey Epstein’s network, certain names surface again and again -some powerful, some elusive, and some occupying a far more ambiguous space between victim and participant. One of those names is Nadia Marcinko, also known as Nadia Marcinkova.Born in Slovakia, Marcinko would eventually become a licensed pilot and aviation entrepreneur. But before that transformation, according to testimony and court records, her path intersected with Jeffrey Epstein’s world under troubli
·osinord.com·
The Mystery of Nadia Marcinko: Epstein’s Alleged Right Hand and Her Digital Trail
Generative Application Firewall: un nuovo paradigma per la sicurezza dei sistemi basati su LLM
Generative Application Firewall: un nuovo paradigma per la sicurezza dei sistemi basati su LLM
L'era dell'intelligenza artificiale generativa richiede una nuova astrazione difensiva. I vettori di attacco semantici, come la prompt injection e il jailbreaking, che eludono i tradizionali meccanismi di protezione sintattica, rendendo necessario l'uso di un Generative Application Firewall (GAF). Ecco di cosa si tratta
·cybersecurity360.it·
Generative Application Firewall: un nuovo paradigma per la sicurezza dei sistemi basati su LLM
How AI Assistants are Moving the Security Goalposts
How AI Assistants are Moving the Security Goalposts
AI-based assistants or "agents" -- autonomous programs that have access to the user's computer, files, online services and can automate virtually any task -- are growing in popularity with developers and IT workers. But as so many eyebrow-raising headlines over…
·krebsonsecurity.com·
How AI Assistants are Moving the Security Goalposts