Over Security

Over Security

31463 bookmarks
Custom sorting
ClickFix: la nuova frontiera del social engineering, tra DNS e Google Ads
ClickFix: la nuova frontiera del social engineering, tra DNS e Google Ads
È stata identificata una nuova variante del malware ClickFix che, usando lo staging via DNS per distribuire payload su sistemi Windows e Google Ads per indurre le vittime a eseguire comandi malevoli, sta di fatto trasformando l’utente nel vero vettore di infezione. Ecco tutti i dettagli
·cybersecurity360.it·
ClickFix: la nuova frontiera del social engineering, tra DNS e Google Ads
Indicatori di compromissione
Indicatori di compromissione
Managed Detection & Response services (MDR) 24/7 for network, endpoint, cloud, SaaS and OT, against every type of cyber attack
·certego.net·
Indicatori di compromissione
La compliance che non protegge. Quando il GDPR resta solo sulla carta
La compliance che non protegge. Quando il GDPR resta solo sulla carta
Il GDPR diventa inefficace se ridotto a un insieme di adempimenti scollegati dalle decisioni che modellano realmente l’organizzazione. Da sola, la conformità formale non è una garanzia. Ecco come trasformare la compliance in tutela effettiva delle persone e in qualità reale delle organizzazioni
·cybersecurity360.it·
La compliance che non protegge. Quando il GDPR resta solo sulla carta
CarMax - 431,371 breached accounts
CarMax - 431,371 breached accounts
In January 2026, data allegedly sourced from US automotive retailer CarMax was published online following a failed extortion attempt. The data included 431k unique email addresses along with names, phone numbers and physical addresses.
·haveibeenpwned.com·
CarMax - 431,371 breached accounts
PromptSpy is the first Android malware to use generative AI at runtime
PromptSpy is the first Android malware to use generative AI at runtime
Researchers have discovered the first known Android malware to use generative AI in its execution flow, using Google's Gemini model to adapt its persistence across different devices.
·bleepingcomputer.com·
PromptSpy is the first Android malware to use generative AI at runtime
Using AI to defeat AI
Using AI to defeat AI
In this week’s newsletter Martin considers how defenders can turn offensive AI tools against themselves.
·blog.talosintelligence.com·
Using AI to defeat AI
Google blocked over 1.75 million Play Store app submissions in 2025
Google blocked over 1.75 million Play Store app submissions in 2025
Google says that through 2025, it blocked more than 255,000 Android apps from obtaining excessive access to sensitive user data and rejected over 1.75 million apps from being published on Google Play due to policy violations.
·bleepingcomputer.com·
Google blocked over 1.75 million Play Store app submissions in 2025
Attacco hacker cinese al Viminale: una violazione mirata per esfiltrare identità di agenti Digos
Attacco hacker cinese al Viminale: una violazione mirata per esfiltrare identità di agenti Digos
La violazione, definita "mirata" e non distruttiva - finalizzata cioè all'acquisizione silenziosa di informazioni strategiche piuttosto che al sabotaggio dei sistemi -ha comportato l’esfiltrazione di dati relativi a circa 5mila agenti della Digos. Ecco cosa sappiamo
·cybersecurity360.it·
Attacco hacker cinese al Viminale: una violazione mirata per esfiltrare identità di agenti Digos
Flaw in Grandstream VoIP phones allows stealthy eavesdropping
Flaw in Grandstream VoIP phones allows stealthy eavesdropping
A critical vulnerability in Grandstream GXP1600 series VoIP phones allows a remote, unauthenticated attacker to gain root privileges and silently eavesdrop on communications.
·bleepingcomputer.com·
Flaw in Grandstream VoIP phones allows stealthy eavesdropping
Cisco Live 2026
Cisco Live 2026
Premetto che non ero presente all’evento di Amsterdam da cui manco ormai da qualche annetto ma c’era Andrea :-) e visto che eravamo anche in ritardo per la registrazione della puntata p…
·roccosicilia.com·
Cisco Live 2026
Uso dei recapiti telefonici dei pazienti per gli screening: ecco le nuove regole privacy
Uso dei recapiti telefonici dei pazienti per gli screening: ecco le nuove regole privacy
Con il provvedimento del 12 febbraio 2026, il Garante per la protezione dei dati ha approvato le linee guida a tutela dei pazienti. Ecco cosa potranno fare le aziende sanitarie per promuovere l’adesione a campagne di screening. Anche in assenza dell’informativa. Facciamo il punto
·cybersecurity360.it·
Uso dei recapiti telefonici dei pazienti per gli screening: ecco le nuove regole privacy
Sex toys maker Tenga says hacker stole customer information
Sex toys maker Tenga says hacker stole customer information
The Japanese sex toy maker said a hacker broke into an employee's inbox and stole customer names, email addresses, and correspondence, including order details and customer service inquiries.
·techcrunch.com·
Sex toys maker Tenga says hacker stole customer information
CISA orders feds to patch actively exploited Dell flaw within 3 days
CISA orders feds to patch actively exploited Dell flaw within 3 days
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered government agencies to patch their systems within three days against a maximum-severity Dell vulnerability that has been under active exploitation since mid-2024.
·bleepingcomputer.com·
CISA orders feds to patch actively exploited Dell flaw within 3 days
How infostealers turn stolen credentials into real identities
How infostealers turn stolen credentials into real identities
Infostealer dumps increasingly tie stolen credentials to real identities, linking usernames, cookies, and behavior across personal and enterprise accounts. Specops explains how analyzing 90,000 dumps shows reuse fuels enterprise risk and how continuous AD scanning disrupts that cycle.
·bleepingcomputer.com·
How infostealers turn stolen credentials into real identities
Cyber Frontiers 2026
Cyber Frontiers 2026
Prima qualche dato tecnico: “CyberFrontiers nasce dall’idea di professionisti appassionati di sicurezza informatica e tecnologia, con l’obiettivo di creare unponte tra il mondo tecnico e quel…
·roccosicilia.com·
Cyber Frontiers 2026
Intelligence italiana sempre più cyber: ecco le nuove figure professionali più ricercate
Intelligence italiana sempre più cyber: ecco le nuove figure professionali più ricercate
DIS, AISE e AISI cercano figure capaci di operare su più livelli simultaneamente: dalla comprensione delle tattiche, tecniche e procedure della minaccia cibernetica fino alle attività di reverse engineering e malware analysis. Ecco le figure professionali più ricercate per il reclutamento nei servizi
·cybersecurity360.it·
Intelligence italiana sempre più cyber: ecco le nuove figure professionali più ricercate
An Incident Doesn’t Have to Be a Crisis
An Incident Doesn’t Have to Be a Crisis
They’re about creating a world where: bad things are contained disruptions are minimized data stays protected operations keep running the business can breathe Incidents are evidence that adversaries (and accidents) exist. Crises are evidence that impact was achieved. When you don’t have clear impact-based triage and a practiced response motion, you get: frantic context switching because no one knows what to focus on first exhausted analysts because every alert becomes a sprint leadership whiplash (“is this the big one ?”) playbooks that exist on paper but fall apart under pressure a culture where people hesitate to surface issues because they don’t want to trigger chaos Chaos leads to stress. The better objective for most enterprises is: Prevent impact events. Impact events are the moments that actually change your week, your quarter, or your career: Operational Disruption Financial Losses Regulatory or Legal Recourse Brand Damage Health and Safety Many incidents never get close to these outcomes, especially when your program is doing its job. They are incidents and if it is contained before an impact event, They’re proof the system is working. Impact-first detection: what it looks like in practice This doesn’t mean “ignore the early stuff.” It means connect early signals to impact paths and respond proportionally. Classify events by their proximity to impact Ask: How close is this activity to something that would matter to the business? Far from impact: recon noise, commodity scans, blocked malware, low-confidence alerts On the path to impact: suspicious auth patterns, privilege escalation signals, persistence behaviors Near impact: encryption behaviors, mass file access anomalies, high-volume egress, admin actions on crown-jewel systems Your detections should increasingly prioritize “near impact” behavior, not just “interesting” behavior. Tune response around outcomes, not adrenaline Not every alert needs a war room2 Build response tiers that map to consequences: “Investigate and watch” “Contain and validate” “Eradicate and recover” “Escalate to crisis response” (rare and reserved for actual impact risk) 3. Because it lets you focus on the work that creates leverage: visibility into identity and privilege misuse telemetry that actually supports investigations response actions that reduce blast radius fast detection coverage for data movement and encryption behaviors faster root cause analysis and hardening loops In other words: the things that stop bad days, not just bad signals. How to start shifting your program this quarter If you want to operationalize “incident doesn’t have to be a crisis,” try these moves: Define impact events explicitly for your environment (ransomware, exfil, fraud, destructive acts, critical outages). Map your top attack paths to those impact events (identity > privilege > lateral movement > data access > egress). Audit your alert queue: what percentage of alerts are tied to impact paths vs “interesting but low consequence”. Build response tiers that align to business impact, not alert severity labels. That’s what a modern detection and response program should deliver: composure speed containment and most importantly… no meaningful impact Because incidents are inevitable.
·binarydefense.com·
An Incident Doesn’t Have to Be a Crisis
Nigerian man gets eight years in prison for hacking tax firms
Nigerian man gets eight years in prison for hacking tax firms
A Nigerian national was sentenced to eight years in prison for hacking multiple tax preparation firms in Massachusetts and filing fraudulent tax returns seeking over $8.1 million in refunds.
·bleepingcomputer.com·
Nigerian man gets eight years in prison for hacking tax firms