Over Security

Over Security

31463 bookmarks
Custom sorting
Windows Defender ACL Blocking: A Silent Technique With Serious Impact
Windows Defender ACL Blocking: A Silent Technique With Serious Impact
What matters to defenders (TL;DR) The PoC modifies ACLs to add Deny ACEs against kernel32.dll for targeted service identities. We did observe Windows Security Event IDs 4670 (high fidelity) and 4663 (lower fidelity) as useful pivots for detection. With administrator privileges, the tool changes the Access Control List (ACL) on kernel32.dll to introduce Deny entries for specific service identities. Quick refresher: ACLs, ACEs, and Deny entries An ACL is made up of Access Control Entries (ACEs) that Allow or Deny a user/group/process access to an object (file, registry key, etc.). A Deny ACE is powerful, especially when applied to a foundational library and aimed at a service identity, because it can override otherwise valid permissions. The key is filtering to: Object: kernel32.dll Change type: introduction of Deny ACEs Subject: service SIDs (commonly under S-1-5-80-* ) The annoying part: 4670 gives service SIDs, not service names Event 4670 includes the SID of the affected service identity rather than a friendly service name. However, for Windows services, the SID can be derived deterministically: Take the uppercase service name Encode as UTF-16 (little endian) Compute SHA1 Reformat bytes into the Service SID structure If you know the targeted services (as you do for the PoC defaults), you can precompute the mapping and hunt for those service SIDs directly or generate them on the fly inside KQL. Parsing SDDL to identify Deny ACEs The ACL data in 4670 is represented using SDDL (Security Descriptor Definition Language). Deny entries are uncommon generally, and extremely rare for kernel32.dll , making false positives unlikely in most environments Event 4670 includes both OldSd and NewSd, allowing “diff-like” analysis.
·binarydefense.com·
Windows Defender ACL Blocking: A Silent Technique With Serious Impact
Ukrainian man pleads guilty to running AI-powered fake ID site
Ukrainian man pleads guilty to running AI-powered fake ID site
A Ukrainian man has pleaded guilty to operating OnlyFake, an AI-powered website that generated and sold more than 10,000 photos of fake identification documents to customers worldwide.
·bleepingcomputer.com·
Ukrainian man pleads guilty to running AI-powered fake ID site
GDPR: governare i trattamenti di dati personali per generare fiducia
GDPR: governare i trattamenti di dati personali per generare fiducia
Il GDPR, nel suo significato più profondo, è un’infrastruttura di governo che orienta linguaggio, responsabilità e scelte strategiche. Ecco esempi concreti, dalle decisioni automatizzate alla profilazione, dalla gestione dei diritti alle crisi, ricostruendo il passaggio dalla compliance alla fiducia operativa
·cybersecurity360.it·
GDPR: governare i trattamenti di dati personali per generare fiducia
Google API Keys: le chiavi pubbliche diventano credenziali sensibili
Google API Keys: le chiavi pubbliche diventano credenziali sensibili
L’introduzione di funzionalità di intelligenza artificiale generativa nelle piattaforme cloud sta ridefinendo il perimetro di sicurezza delle credenziali applicative. Un caso emblematico è stato scoperto dai ricercatori di Truffle Security Co. e riguarda l’ecosistema Google Cloud dove le tradizionali API key — storicamente considerate semplici identificatori di progetto — hanno acquisito nuovi privilegi con l’arrivo …
·securityinfo.it·
Google API Keys: le chiavi pubbliche diventano credenziali sensibili
Odido - 316,912 breached accounts
Odido - 316,912 breached accounts
In February 2026, the Dutch telco Odido was the victim of a data breach and subsequent extortion attempt. Following the incident, 1M records containing 317k unique email addresses was published publicly, with a threat by the attackers to continue leaking more data in the following days. The data also included names, physical addresses, phone numbers, bank account numbers and notes about customers left by service operators. Odido has published a disclosure notice detailing the extent of the incident, providing an FAQ and advising the incident also impacted dates of birth, passport and drivers licence numbers.
·haveibeenpwned.com·
Odido - 316,912 breached accounts
Previously harmless Google API keys now expose Gemini AI data
Previously harmless Google API keys now expose Gemini AI data
Google API keys for services like Maps embedded in accessible client-side code could be used to authenticate to the Gemini AI assistant and access private data.
·bleepingcomputer.com·
Previously harmless Google API keys now expose Gemini AI data
Trend Micro warns of critical Apex One code execution flaws
Trend Micro warns of critical Apex One code execution flaws
Trend Micro has patched two critical Apex One vulnerabilities that allow attackers to gain remote code execution (RCE) on vulnerable Windows systems.
·bleepingcomputer.com·
Trend Micro warns of critical Apex One code execution flaws
Critical Juniper Networks PTX flaw allows full router takeover
Critical Juniper Networks PTX flaw allows full router takeover
A critical vulnerability in the Junos OS Evolved network operating system running on PTX Series routers from Juniper Networks could allow an unauthenticated attacker to execute code remotely with root privileges.
·bleepingcomputer.com·
Critical Juniper Networks PTX flaw allows full router takeover
Attacchi con la GenAI offensiva, compromessi oltre 600 firewall: come proteggersi
Attacchi con la GenAI offensiva, compromessi oltre 600 firewall: come proteggersi
Amazon accusa criminali informatici russi di aver sferrato cyber attacchi via AI generativa offensiva al fine di violare oltre 600 firewall FortiGate di Fortinet. Ecco come mitigare i rischi di intrusione con la GenAI
·cybersecurity360.it·
Attacchi con la GenAI offensiva, compromessi oltre 600 firewall: come proteggersi
Olympique Marseille confirms 'attempted' cyberattack after data leak
Olympique Marseille confirms 'attempted' cyberattack after data leak
French professional football club Olympique de Marseille has confirmed a cyberattack after a threat actor claimed on Monday that it breached the club's systems earlier this month.
·bleepingcomputer.com·
Olympique Marseille confirms 'attempted' cyberattack after data leak
Ransomware payment rate drops to record low as attacks surge
Ransomware payment rate drops to record low as attacks surge
The number of ransomware victims paying threat actors has dropped to 28% last year, an all-time low, despite a significant increase in the number of claimed attacks.
·bleepingcomputer.com·
Ransomware payment rate drops to record low as attacks surge
Apache ActiveMQ Exploit Leads to LockBit Ransomware
Apache ActiveMQ Exploit Leads to LockBit Ransomware
Key Takeaways An audio version of this report can be found on Spotify, Apple, YouTube, Audible, & Amazon.  This intrusion began in mid-February 2024 after a threat actor exploited a vulnerability (CVE-2023-46604) on an exposed Apache ActiveMQ server. The threat actor was able to perform remote code execution (RCE) by using a Java Spring class and a custom Java Spring […]
·thedfirreport.com·
Apache ActiveMQ Exploit Leads to LockBit Ransomware
What to Know About the Notepad++ Supply-Chain Attack
What to Know About the Notepad++ Supply-Chain Attack
A critical Notepad++ supply-chain flaw (CVE-2025-15556) enabled stealthy APT access. Understand the attack chain and how to defend your systems.
·flashpoint.io·
What to Know About the Notepad++ Supply-Chain Attack
Cyber security industriale: gli elementi essenziali per creare un SOC ad alte prestazioni
Cyber security industriale: gli elementi essenziali per creare un SOC ad alte prestazioni
Il SOC è il centro nevralgico della protezione informatica di un’organizzazione, che monitora, rileva e risponde continuamente alle minacce. Negli ambienti industriali è essenziale che sia proattivo e basato sull'intelligence, oltre il monitoraggio tradizionale. Ecco come realizzare un SOC ad alte prestazioni
·cybersecurity360.it·
Cyber security industriale: gli elementi essenziali per creare un SOC ad alte prestazioni