Over Security

Over Security

31463 bookmarks
Custom sorting
Infostealer malware found stealing OpenClaw secrets for first time
Infostealer malware found stealing OpenClaw secrets for first time
With the massive adoption of the OpenClaw agentic AI assistant, information-stealing malware has been spotted stealing files associated with the framework that contain API keys, authentication tokens, and other secrets.
·bleepingcomputer.com·
Infostealer malware found stealing OpenClaw secrets for first time
Lo shotdown USA tarpa le ali alla CISA
Lo shotdown USA tarpa le ali alla CISA
Il blocco delle attività del Department of Homeland Security scattato alle 00:01 del 14 febbraio 2026 non spegne CISA, ma la costringe a lavorare con un organico drasticamente ridotto. In pratica l’agenzia resta in piedi solo per le funzioni considerate “essenziali” dall’Antideficiency Act, con 888 persone attive su 2.341, circa il 38% della forza lavoro. …
·securityinfo.it·
Lo shotdown USA tarpa le ali alla CISA
Passwords to passkeys: Staying ISO 27001 compliant in a passwordless era
Passwords to passkeys: Staying ISO 27001 compliant in a passwordless era
Password-based authentication is increasingly risky as organizations adopt passkeys to strengthen security and meet ISO/IEC 27001 requirements. Passwork explains how to align passwordless adoption with Annex A controls, risk assessments, and secure implementation practices.
·bleepingcomputer.com·
Passwords to passkeys: Staying ISO 27001 compliant in a passwordless era
Pexpect as a tool of last resort
Pexpect as a tool of last resort
Twenty years ago, when I started automating tasks on the distributed network I was managing, there were practically no automation tools available. I started with Expect , which is still my lifesaving tool today.
·adainese.it·
Pexpect as a tool of last resort
APOIA.se - 450,764 breached accounts
APOIA.se - 450,764 breached accounts
In December 2025, a database of the Brazilian crowdfunding platform APOIA.se was posted to an online forum. In January 2026, the company confirmed it had suffered a data breach. The incident exposed 451k unique email addresses along with names and physical addresses.
·haveibeenpwned.com·
APOIA.se - 450,764 breached accounts
Direttiva NIS2 nel settore alimentare: implicazioni per la cyber security
Direttiva NIS2 nel settore alimentare: implicazioni per la cyber security
La normativa NIS2 qualifica il settore alimentare come settore critico, comportandone l'assoggettamento a obblighi rigorosi per le imprese che soddisfano tale criterio merceologico, nonché i criteri dimensionali e di territorialità. Ecco che c'è da sapere
·cybersecurity360.it·
Direttiva NIS2 nel settore alimentare: implicazioni per la cyber security
Google patches first Chrome zero-day exploited in attacks this year
Google patches first Chrome zero-day exploited in attacks this year
Google has released emergency updates to fix a high-severity Chrome vulnerability exploited in zero-day attacks, marking the first such security flaw patched since the start of the year.
·bleepingcomputer.com·
Google patches first Chrome zero-day exploited in attacks this year
Google Chrome Fixes Actively Exploited CVE-2026-2441 Bug
Google Chrome Fixes Actively Exploited CVE-2026-2441 Bug
CVE-2026-2441 in Google Chrome enables Remote Code Execution via a CSS use-after-free bug. Google issued an emergency update to patch it.
·thecyberexpress.com·
Google Chrome Fixes Actively Exploited CVE-2026-2441 Bug
Canada Goose investigating as hackers leak 600K customer records
Canada Goose investigating as hackers leak 600K customer records
ShinyHunters, a well-known data extortion group, claims to have stolen more than 600,000 Canada Goose customer records containing personal and payment-related data. Canada Goose told BleepingComputer the dataset appears to relate to past customer transactions and that it has not found evidence of a breach of its own systems.
·bleepingcomputer.com·
Canada Goose investigating as hackers leak 600K customer records
Windows 11 KB5077181 fixes boot failures linked to failed updates
Windows 11 KB5077181 fixes boot failures linked to failed updates
Microsoft says it has resolved a Windows 11 bug that caused some commercial systems to fail to boot with an "UNMOUNTABLE_BOOT_VOLUME" error after installing recent security updates, with the fix delivered in the February 2026 Patch Tuesday update.
·bleepingcomputer.com·
Windows 11 KB5077181 fixes boot failures linked to failed updates
CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups
CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups
CTM360 reports 4,000+ malicious Google Groups and 3,500+ Google-hosted URLs used to spread the Lumma Stealer infostealing malware and a trojanized "Ninja Browser." The report details how attackers abuse trusted Google services to steal credentials and maintain persistence across Windows and Linux systems.
·bleepingcomputer.com·
CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups
Pastebin comments push ClickFix JavaScript attack to hijack crypto swaps
Pastebin comments push ClickFix JavaScript attack to hijack crypto swaps
Threat actors are abusing Pastebin comments to distribute a new ClickFix-style attack that tricks cryptocurrency users into executing malicious JavaScript in their browser, allowing attackers to hijack Bitcoin swap transactions and redirect funds to attacker-controlled wallets.
·bleepingcomputer.com·
Pastebin comments push ClickFix JavaScript attack to hijack crypto swaps
From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira
From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira
Overview Bumblebee malware has been an initial access tool used by threat actors since late 2021. In 2023 the malware was first reported as using SEO poisoning as a delivery mechanism. Recently in May of 2025 Cyjax reported on a campaign using this method again, impersonating various IT tools. We observed a similar campaign in […]
·thedfirreport.com·
From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira
Cat’s Got Your Files: Lynx Ransomware
Cat’s Got Your Files: Lynx Ransomware
Key Takeaways The DFIR Report Services Contact us today for pricing or a demo! The intrusion began in early March 2025 with a single successful Remote Desktop Protocol (RDP) logon to an internet-exposed system. Notably, there was no evidence of credential stuffing, brute forcing, or other failed authentication attempts from the source IP, indicating the […]
·thedfirreport.com·
Cat’s Got Your Files: Lynx Ransomware
One threat actor responsible for 83% of recent Ivanti RCE attacks
One threat actor responsible for 83% of recent Ivanti RCE attacks
Threat intelligence observations show that a single threat actor is responsible for most of the active exploitation of two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-21962 and CVE-2026-24061.
·bleepingcomputer.com·
One threat actor responsible for 83% of recent Ivanti RCE attacks
Snail mail letters target Trezor and Ledger users in crypto-theft attacks
Snail mail letters target Trezor and Ledger users in crypto-theft attacks
Threat actors are sending physical letters pretending to be from Trezor and Ledger, makers of cryptocurrency hardware wallets, to trick users into submitting recovery phrases in crypto theft attacks.
·bleepingcomputer.com·
Snail mail letters target Trezor and Ledger users in crypto-theft attacks
Fake job recruiters hide malware in developer coding challenges
Fake job recruiters hide malware in developer coding challenges
A new variation of the fake recruiter campaign from North Korean threat actors is targeting JavaScript and Python developers with cryptocurrency-related tasks.
·bleepingcomputer.com·
Fake job recruiters hide malware in developer coding challenges
Garante privacy e Inl: i 3 profili di illiceità nelle ispezioni su centri logistici di Amazon
Garante privacy e Inl: i 3 profili di illiceità nelle ispezioni su centri logistici di Amazon
Dopo le indagini di Report su software di tracciamento, telecamere pervasive e presunti dossier sui dipendenti, il Garante privacy e l’Ispettorato Nazionale del Lavoro avviano un’azione di vigilanza sui centri logistici Amazon di Passo Corese e Castel San Giovanni. Ecco cosa è finito sotto la lente degli ispettori e cosa rischia il colosso di Seattle
·cybersecurity360.it·
Garante privacy e Inl: i 3 profili di illiceità nelle ispezioni su centri logistici di Amazon
Fintech lending giant Figure confirms data breach
Fintech lending giant Figure confirms data breach
The company said hackers downloaded “a limited number of files” after breaking into an employee’s account. The hacking group ShinyHunters took responsibility for the breach.
·techcrunch.com·
Fintech lending giant Figure confirms data breach
Sex toys maker Tenga says hacker stole customer information
Sex toys maker Tenga says hacker stole customer information
The Japanese sex toy maker said a hacker broke into an employee's inbox and stole customer names, email addresses, and correspondence, including order details and customer service inquiries.
·techcrunch.com·
Sex toys maker Tenga says hacker stole customer information