Over Security

Over Security

31462 bookmarks
Custom sorting
Panera Bread - 5,112,502 breached accounts
Panera Bread - 5,112,502 breached accounts
In January 2026, Panera Bread suffered a data breach that exposed 14M records. After an attempted extortion failed, the attackers published the data publicly, which included 5.1M unique email addresses along with associated account information such as names, phone numbers and physical addresses. Panera Bread subsequently confirmed that "the data involved is contact information" and that authorities were notified.
·haveibeenpwned.com·
Panera Bread - 5,112,502 breached accounts
How China’s “Walled Garden” is Redefining the Cyber Threat Landscape
How China’s “Walled Garden” is Redefining the Cyber Threat Landscape
In our latest webinar, Flashpoint unpacks the architecture of Chinese threat actor cyber ecosystem—a parallel offensive stack fueled by government mandates and commercialized hacker-for-hire industry.
·flashpoint.io·
How China’s “Walled Garden” is Redefining the Cyber Threat Landscape
Microsoft to disable NTLM by default in future Windows releases
Microsoft to disable NTLM by default in future Windows releases
Microsoft announced that it will disable the 30-year-old NTLM authentication protocol by default in upcoming Windows releases due to security vulnerabilities that expose organizations to cyberattacks.
·bleepingcomputer.com·
Microsoft to disable NTLM by default in future Windows releases
Cybersecurity ed energia
Cybersecurity ed energia
Managed Detection & Response services (MDR) 24/7 for network, endpoint, cloud, SaaS and OT, against every type of cyber attack
·certego.net·
Cybersecurity ed energia
Giochi Olimpici Invernali
Giochi Olimpici Invernali
Managed Detection & Response services (MDR) 24/7 for network, endpoint, cloud, SaaS and OT, against every type of cyber attack
·certego.net·
Giochi Olimpici Invernali
La sicurezza cyber non è una one-shot
La sicurezza cyber non è una one-shot
Affrontare la complessità della sicurezza cyber richiede un approccio che sappia abbandonare l'illusione che tutto possa risolversi in una logica di one-shot, anche perché le minacce e gli imprevisti tendono ad avere una persistenza decisamente più estesa di un singolo istante
·cybersecurity360.it·
La sicurezza cyber non è una one-shot
Malware diffusi su LinkedIn. Cosa sapere e a cosa fare attenzione
Malware diffusi su LinkedIn. Cosa sapere e a cosa fare attenzione
I cyber criminali sfruttano i messaggi privati di LinkedIn per diffondere malware contenuti in finti documenti aziendali dai nomi pertinenti con le aziende e le attività professionali delle vittime designate. Cosa sapere, cosa fare e cosa non fare
·cybersecurity360.it·
Malware diffusi su LinkedIn. Cosa sapere e a cosa fare attenzione
ROSI: ecco perché il ritorno sull’investimento cyber non è un esercizio universitario
ROSI: ecco perché il ritorno sull’investimento cyber non è un esercizio universitario
Nella cyber security c’è un paradosso: il ROI è comodo, il ROSI sembra un incubo. Ma se fatto bene, il ritorno sull'investimento in sicurezza diventa un traduttore simultaneo tra linguaggio del rischio e linguaggio del business. Ecco perché
·cybersecurity360.it·
ROSI: ecco perché il ritorno sull’investimento cyber non è un esercizio universitario
La crisi di senso del GDPR: dal mito della privacy al governo del potere informativo
La crisi di senso del GDPR: dal mito della privacy al governo del potere informativo
Il GDPR non è una semplice normativa sulla privacy, associata a vincoli, adempimenti e complessità burocratiche, bensì un sistema di protezione delle persone e di legittimazione del potere esercitato attraverso i dati. Ecco come superare questo fraintendimento e ricostruirne le conseguenze culturali e organizzative, ripartendo da una chiarificazione terminologica
·cybersecurity360.it·
La crisi di senso del GDPR: dal mito della privacy al governo del potere informativo
Microsoft links Windows 11 boot failures to failed December 2025 update
Microsoft links Windows 11 boot failures to failed December 2025 update
Microsoft has linked recent reports of Windows 11 boot failures after installing the January 2026 updates to previously failed attempts to install the December 2025 security update, which left systems in an "improper state."
·bleepingcomputer.com·
Microsoft links Windows 11 boot failures to failed December 2025 update
Ivanti warns of two EPMM flaws exploited in zero-day attacks
Ivanti warns of two EPMM flaws exploited in zero-day attacks
Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that were exploited in zero-day attacks.
·bleepingcomputer.com·
Ivanti warns of two EPMM flaws exploited in zero-day attacks
Hugging Face abused to spread thousands of Android malware variants
Hugging Face abused to spread thousands of Android malware variants
A new Android malware campaign is using the Hugging Face platform as a repository for thousands of variations of an APK payload that collects credentials for popular financial and payment services.
·bleepingcomputer.com·
Hugging Face abused to spread thousands of Android malware variants
The Five Phases of the Threat Intelligence Lifecycle
The Five Phases of the Threat Intelligence Lifecycle
We examine five phases of the threat intelligence lifecycle and how fraud, physical, and cybersecurity programs embed it in their operations.
·flashpoint.io·
The Five Phases of the Threat Intelligence Lifecycle
Google disrupts IPIDEA residential proxy networks fueled by malware
Google disrupts IPIDEA residential proxy networks fueled by malware
IPIDEA, one of the largest residential proxy networks used by threat actors, was disrupted earlier this week by Google Threat Intelligence Group (GTIG) in collaboration with industry partners.
·bleepingcomputer.com·
Google disrupts IPIDEA residential proxy networks fueled by malware