Over Security

Over Security

31463 bookmarks
Custom sorting
French police search X office in Paris, summons Elon Musk for questioning
French police search X office in Paris, summons Elon Musk for questioning
The Paris prosecutor’s office announced that it is expanding a criminal investigation into X for alleged crimes, including the possession and distribution of child sexual exploitation material.
·techcrunch.com·
French police search X office in Paris, summons Elon Musk for questioning
Iron Mountain: Data breach mostly limited to marketing materials
Iron Mountain: Data breach mostly limited to marketing materials
Iron Mountain, a leading data storage and recovery services company, says that a recent breach claimed by the Everest extortion gang is limited to mostly marketing materials.
·bleepingcomputer.com·
Iron Mountain: Data breach mostly limited to marketing materials
Il diario di bordo del CISO: costruire la propria difendibilità
Il diario di bordo del CISO: costruire la propria difendibilità
La difendibilità del CISO si costruisce prima dell'incidente, non dopo. Il Decision Log documenta rischi identificati, opzioni valutate, decisioni prese e approvazioni formali. Ecco quello che c’è da sapere per usarlo al meglio
·cybersecurity360.it·
Il diario di bordo del CISO: costruire la propria difendibilità
Cyber attacco agli Uffizi: cosa impariamo per mettere in sicurezza il patrimonio culturale
Cyber attacco agli Uffizi: cosa impariamo per mettere in sicurezza il patrimonio culturale
A poche ore dall'attacco a La Sapienza di Roma, mentre sale la tensione per le Olimpiadi invernali di Milano-Cortina 2026, un altro cyber attacco colpisce la Galleria degli Uffizi, simbolo del patrimonio culturale italiano. Ecco cosa sappiamo dell'azione degli hacker e come mettere in sicurezza il patrimonio culturale anche sotto il profilo cyber
·cybersecurity360.it·
Cyber attacco agli Uffizi: cosa impariamo per mettere in sicurezza il patrimonio culturale
NTLM verso lo “switch-off”: Microsoft si prepara a bloccarlo di default
NTLM verso lo “switch-off”: Microsoft si prepara a bloccarlo di default
Microsoft ha comunicato che l’autenticazione NTLM verrà disabilitata di default nelle future versioni, lasciando comunque il protocollo presente nel sistema operativo e riattivabile solo tramite policy quando davvero necessario. Perché NTLM è un bersaglio: relay, replay e pass-the-hash Il problema di NTLM non è soltanto la sua età, ma la sua esposizione a classi di …
·securityinfo.it·
NTLM verso lo “switch-off”: Microsoft si prepara a bloccarlo di default
AI Agent Identity Management: A New Security Control Plane for CISOs
AI Agent Identity Management: A New Security Control Plane for CISOs
Autonomous AI agents are creating a new identity blind spot as they operate outside traditional IAM controls. Token Security shows why managing the full lifecycle of AI agent identities is becoming a critical CISO priority.
·bleepingcomputer.com·
AI Agent Identity Management: A New Security Control Plane for CISOs
Hackers exploit critical React Native Metro bug to breach dev systems
Hackers exploit critical React Native Metro bug to breach dev systems
Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious payloads for Windows and Linux.
·bleepingcomputer.com·
Hackers exploit critical React Native Metro bug to breach dev systems
UK privacy watchdog probes Grok over AI-generated sexual images
UK privacy watchdog probes Grok over AI-generated sexual images
The United Kingdom's data protection authority launched a formal investigation into X and its Irish subsidiary over reports that the Grok AI assistant was used to generate nonconsensual sexual images.
·bleepingcomputer.com·
UK privacy watchdog probes Grok over AI-generated sexual images
Hackers exploit critical React Native Metro bug to breach dev systems
Hackers exploit critical React Native Metro bug to breach dev systems
Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious payloads for Windows and Linux.
·bleepingcomputer.com·
Hackers exploit critical React Native Metro bug to breach dev systems
Sapsan Terminal: AI-Powered BadUSB Script Generator
Sapsan Terminal: AI-Powered BadUSB Script Generator
Sapsan Terminal is an AI-driven online platform that simplifies payload generation for hardware-based attacks. Instead of manually writing scripts, you can describe your goal in plain language, and the AI will produce a ready-to-use script in the correct syntax.
·mobile-hacker.com·
Sapsan Terminal: AI-Powered BadUSB Script Generator
French prosecutors raid X offices, summon Musk over Grok deepfakes
French prosecutors raid X offices, summon Musk over Grok deepfakes
French prosecutors have raided X's offices in Paris on Tuesday as part of a criminal investigation into the platform's Grok AI tool, widely used to generate sexually explicit images.
·bleepingcomputer.com·
French prosecutors raid X offices, summon Musk over Grok deepfakes
16-31 January 2026 Cyber Attacks Timeline
16-31 January 2026 Cyber Attacks Timeline
Connect on Linkedin Follow me on X Follow me on Bluesky Connect on Mastodon EVENTS EVENTS/DAY 0 EVENTS 0 EVENTS/DAY 0 Motivations January H2 2026 No Data Found Attack Techniques January H2 2025 No …
·hackmageddon.com·
16-31 January 2026 Cyber Attacks Timeline
Supporting Wayland’s XDG activation protocol with Gtk/Glib
Supporting Wayland’s XDG activation protocol with Gtk/Glib
XDG activation protocol is a useful mechanism against focus stealing but it needs to be supported in applications. This describes the considerations required for applications based on Gtk/Glib.
·palant.info·
Supporting Wayland’s XDG activation protocol with Gtk/Glib
Prove forensi negli incidenti cyber: il ruolo del personale nella loro preservazione
Prove forensi negli incidenti cyber: il ruolo del personale nella loro preservazione
Nella prassi ordinaria, la distruzione di prove forensi non avviene quasi mai per dolo, ma spesso per errore, fretta o pressione organizzativa. Ecco perché formazione, disciplina e responsabilità condivisa sono oggi componenti essenziali della sicurezza richiesta dalla NIS 2
·cybersecurity360.it·
Prove forensi negli incidenti cyber: il ruolo del personale nella loro preservazione
The Notepad++ supply chain attack — unnoticed execution chains and new IoCs
The Notepad++ supply chain attack — unnoticed execution chains and new IoCs
Kaspersky GReAT experts discovered previously undocumented infection chains used in the Notepad++ supply chain attacks. The article provides new IoCs related to those incidents which employ DLL sideloading and Cobalt Strike Beacon delivery.
·securelist.com·
The Notepad++ supply chain attack — unnoticed execution chains and new IoCs
New GlassWorm attack targets macOS via compromised OpenVSX extensions
New GlassWorm attack targets macOS via compromised OpenVSX extensions
A new GlassWorm malware attack through compromised OpenVSX extensions focuses on stealing passwords, crypto-wallet data, and developer credentials and configurations from macOS systems.
·bleepingcomputer.com·
New GlassWorm attack targets macOS via compromised OpenVSX extensions
Russian hackers exploit recently patched Microsoft Office bug in attacks
Russian hackers exploit recently patched Microsoft Office bug in attacks
Ukraine's Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in multiple versions of Microsoft Office.
·bleepingcomputer.com·
Russian hackers exploit recently patched Microsoft Office bug in attacks
Malicious MoltBot skills used to push password-stealing malware
Malicious MoltBot skills used to push password-stealing malware
More than 230 malicious packages for the personal AI assistant OpenClaw (formerly known as Moltbot and ClawdBot) have been published in less than a week on the tool's official registry and on GitHub.
·bleepingcomputer.com·
Malicious MoltBot skills used to push password-stealing malware
Mozilla announces switch to disable all Firefox AI features
Mozilla announces switch to disable all Firefox AI features
In response to user feedback on AI integration, Mozilla announced today that the next Firefox release will let users disable AI features entirely or manage them individually.
·bleepingcomputer.com·
Mozilla announces switch to disable all Firefox AI features