Over Security

Over Security

31461 bookmarks
Custom sorting
Wynn Resorts confirms employee data breach after extortion threat
Wynn Resorts confirms employee data breach after extortion threat
Wynn Resorts has confirmed that a hacker stole employee data from its systems after the company was listed on the ShinyHunters extortion gang's data leak site.
·bleepingcomputer.com·
Wynn Resorts confirms employee data breach after extortion threat
1Campaign platform helps malicious Google ads evade detection
1Campaign platform helps malicious Google ads evade detection
A newly identified cybercrime service known as 1Campaign is enabling threat actors to run malicious Google Ads that remain online for extended periods while evading scrutiny from security researchers.
·bleepingcomputer.com·
1Campaign platform helps malicious Google ads evade detection
CarGurus data breach exposes information of 12.4 million accounts
CarGurus data breach exposes information of 12.4 million accounts
The ShinyHunters extortion group has published personal information in more than 12 million records allegedly stolen from CarGurus, a U.S.-based digital auto platform.
·bleepingcomputer.com·
CarGurus data breach exposes information of 12.4 million accounts
Microsoft adds Copilot data controls to all storage locations
Microsoft adds Copilot data controls to all storage locations
Microsoft is expanding data loss prevention (DLP) controls to block the Microsoft 365 Copilot AI assistant from processing confidential Word, Excel, and PowerPoint documents, regardless of their location.
·bleepingcomputer.com·
Microsoft adds Copilot data controls to all storage locations
Sandworm_Mode: il “worm” della supply chain NPM
Sandworm_Mode: il “worm” della supply chain NPM
Un attacco che riprende la logica Shai-Hulud, ma sposta l’asticella sul toolchain moderno Una recente analisi dei  ricercatori di Socket, un’azienda specializzata in sicurezza informatica, ha svelato una nuova campagna d’attacco alla supply chain dello sviluppo software colpendo NPM, l’ecosistema dove risiedono migliaia di librerie Javascript largamente usate dai programmatori di tutto il mondo. L’attacco …
·securityinfo.it·
Sandworm_Mode: il “worm” della supply chain NPM
Identity-First AI Security: Why CISOs Must Add Intent to the Equation
Identity-First AI Security: Why CISOs Must Add Intent to the Equation
AI agents now provision infrastructure and approve actions, but many inherit over-scoped privileges without proper governance. Token Security explains why CISOs must treat agents as identities and add intent-based controls so access is granted only when purpose and context align.
·bleepingcomputer.com·
Identity-First AI Security: Why CISOs Must Add Intent to the Equation
UK fines Reddit $19 million for using children’s data unlawfully
UK fines Reddit $19 million for using children’s data unlawfully
The UK Information Commissioner's Office (ICO) has fined Reddit £14.47 million (over $19.5 million) for collecting and using the personal information of children under 13 without adequate safeguards.
·bleepingcomputer.com·
UK fines Reddit $19 million for using children’s data unlawfully
NightBeacon: Rapid Deployment of AI Capabilities
NightBeacon: Rapid Deployment of AI Capabilities
What NightBeacon Is NightBeacon is Binary Defense’s AI-powered threat analysis platform built to take real-world security inputs—logs, files, and emails—and turn them into clear, explainable risk signals that analysts can act on fast. Less than 24 hours later, the detection techniques described in that research were live in production inside NightBeacon, Binary Defense’s AI-powered threat analysis platform. This post breaks down exactly how that happened, focusing on the architecture, the detection logic, and the implementation details that allowed new threat research to become operational almost immediately.
·binarydefense.com·
NightBeacon: Rapid Deployment of AI Capabilities
PromptSpy e l’ingresso della GenAI nel malware per Android
PromptSpy e l’ingresso della GenAI nel malware per Android
PromptSpy è la prima minaccia Android a integrare l’AI generativa nel proprio flusso di attacco, impiegando direttamente il modello durante l’esecuzione del malware sul dispositivo della vittima e introducendo capacità di adattamento dinamico finora assenti negli strumenti tradizionali basati su script statici
·cybersecurity360.it·
PromptSpy e l’ingresso della GenAI nel malware per Android
ShinyHunters extortion gang claims Odido breach affecting millions
ShinyHunters extortion gang claims Odido breach affecting millions
The ShinyHunters extortion gang has claimed responsibility for breaching Dutch telecommunications provider Odido and stealing millions of user records from its compromised systems.
·bleepingcomputer.com·
ShinyHunters extortion gang claims Odido breach affecting millions