Over Security

Over Security

31461 bookmarks
Custom sorting
How to Install OpenClaw on an Android Phone and Control It via WhatsApp
How to Install OpenClaw on an Android Phone and Control It via WhatsApp
In this post I’ll show you the exact steps I use to run OpenClaw on Android by installing Ubuntu inside Termux (no root), then launching the OpenClaw Gateway and chatting with it from WhatsApp, Telegram, or Discord. What is OpenClaw? OpenClaw is a self‑hosted agent framework with a Gateway that connects large language models to
·mobile-hacker.com·
How to Install OpenClaw on an Android Phone and Control It via WhatsApp
Come proteggere i dati biometrici
Come proteggere i dati biometrici
Le fughe di dati biometrici tendono ad avere conseguenze gravi tanto per le aziende che ne sono vittime quanto per le persone che le subiscono. Proteggere questo tipo di dati è possibile
·cybersecurity360.it·
Come proteggere i dati biometrici
Microsoft releases Windows 11 26H1 for select and upcoming CPUs
Microsoft releases Windows 11 26H1 for select and upcoming CPUs
Microsoft has announced Windows 11 26H1, but it's not for existing PCs. Instead, it will ship on devices with Snapdragon X2 processors and possibly other rumored ARM chips.w
·bleepingcomputer.com·
Microsoft releases Windows 11 26H1 for select and upcoming CPUs
New Linux botnet SSHStalker uses old-school IRC for C2 comms
New Linux botnet SSHStalker uses old-school IRC for C2 comms
A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations.
·bleepingcomputer.com·
New Linux botnet SSHStalker uses old-school IRC for C2 comms
North Korean hackers use new macOS malware in crypto-theft attacks
North Korean hackers use new macOS malware in crypto-theft attacks
North Korean hackers are running tailored campaigns using AI-generated video and the ClickFix technique to deliver malware for macOS and Windows to targets in the cryptocurrency sector.
·bleepingcomputer.com·
North Korean hackers use new macOS malware in crypto-theft attacks
Patch Tuesday, February 2026 Edition
Patch Tuesday, February 2026 Edition
Microsoft today released updates to fix more than 50 security holes in its Windows operating systems and other software, including patches for a whopping six "zero-day" vulnerabilities that attackers are already exploiting in the wild.
·krebsonsecurity.com·
Patch Tuesday, February 2026 Edition
Google sent personal and financial information of student journalist to ICE
Google sent personal and financial information of student journalist to ICE
The tech giant handed over the personal information of a journalist and student who attended a pro-Palestinian protest in 2024. This is the latest example of ICE using its controversial subpoena powers to target people critical of the Trump administration.
·techcrunch.com·
Google sent personal and financial information of student journalist to ICE
Microsoft releases Windows 10 KB5075912 extended security update
Microsoft releases Windows 10 KB5075912 extended security update
Microsoft has released the Windows 10 KB5075912 extended security update to fix February 2026 Patch Tuesday vulnerabilities, including six zero-days, and continue rolling out replacements for expiring Secure Boot certificates.
·bleepingcomputer.com·
Microsoft releases Windows 10 KB5075912 extended security update
Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws
Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws
Today is Microsoft's February 2026 Patch Tuesday with security updates for 58 flaws, including 6 actively exploited and three publicly disclosed zero-day vulnerabilities.
·bleepingcomputer.com·
Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws
Windows 11 KB5077181 & KB5075941 cumulative updates released
Windows 11 KB5077181 & KB5075941 cumulative updates released
Microsoft has released Windows 11 KB5077181 and KB5075941 cumulative updates for versions 25H2/24H2 and 23H2 to fix security vulnerabilities, bugs, and add new features.
·bleepingcomputer.com·
Windows 11 KB5077181 & KB5075941 cumulative updates released
La guerra informatica sta diventando parte dell’arsenale del Pentagono
La guerra informatica sta diventando parte dell’arsenale del Pentagono
Armi informatiche in mano al Pentagono sono state testate ad inizio anno dagli Stati Uniti in Venezuela, così come lo scorso anno in Iran durante gli attacchi agli impianti nucleari. Ora pare rafforzarsi l’intenzione di integrare le operazioni in campo con attacchi virtuali
·cybersecurity360.it·
La guerra informatica sta diventando parte dell’arsenale del Pentagono
Veicoli spaziali spia russi intercettano i satelliti europei: dati non crittografati
Veicoli spaziali spia russi intercettano i satelliti europei: dati non crittografati
I satelliti Luch-1 e Luch-2 da anni effettuano manovre sospette in orbita, avvicinandosi ripetutamente ad alcuni importanti satelliti geostazionari europei. Ecco quale rischio di spionaggio corrono i satelliti europei, dal momento che la crittografia non protegge i dati sensibili
·cybersecurity360.it·
Veicoli spaziali spia russi intercettano i satelliti europei: dati non crittografati
Shadow IT: se i dipendenti usano WeTransfer, il problema è la governance
Shadow IT: se i dipendenti usano WeTransfer, il problema è la governance
Portare alla luce lo Shadow IT permette di trasformare un rischio incontrollato in rischio gestito. Spesso si scopre che interi processi critici poggiano su macro Excel fatte in casa o su servizi SaaS gratuiti che potrebbero chiudere domani mattina. Riportare questi processi sotto il cappello della governance IT garantisce la continuità operativa del business stesso
·cybersecurity360.it·
Shadow IT: se i dipendenti usano WeTransfer, il problema è la governance
Volvo Group North America customer data exposed in Conduent hack
Volvo Group North America customer data exposed in Conduent hack
Volvo Group North America disclosed that it suffered an indirect data breach stemming from the compromise of IT systems at American business services giant Conduent, of which Volvo is a customer.
·bleepingcomputer.com·
Volvo Group North America customer data exposed in Conduent hack
HomeLab – Intro
HomeLab – Intro
Come detto in questo post su LinkedIn dedico qualche articolo (e video) al mio HomeLab con lo scopo di pubblicare i dettagli tecnici della struttura che ho scelto e renderlo replicabile per chiunqu…
·roccosicilia.com·
HomeLab – Intro
Microsoft 365 outage takes down admin center in North America
Microsoft 365 outage takes down admin center in North America
Microsoft is investigating an outage that blocks some administrators with business or enterprise subscriptions from accessing the Microsoft 365 admin center.
·bleepingcomputer.com·
Microsoft 365 outage takes down admin center in North America
~/CVE/CVE-2026-24061_telnetd
~/CVE/CVE-2026-24061_telnetd
Analisi approfondita del CVE-2026-24061 telnetd exploit. Scopri come una mancata sanificazione in GNU InetUtils permetta l'ottenimento di privilegi root...
·blog.lobsec.com·
~/CVE/CVE-2026-24061_telnetd
How to Automate AWS Incident Investigation with Tines and AI
How to Automate AWS Incident Investigation with Tines and AI
Cloud incidents drag on when analysts have to leave cases to hunt through AWS consoles and CLIs. Tines shows how automated agents pull AWS CLI data directly into cases, reducing MTTR and manual investigation work.
·bleepingcomputer.com·
How to Automate AWS Incident Investigation with Tines and AI