Over Security

Over Security

31463 bookmarks
Custom sorting
Google disrupts IPIDEA residential proxy networks fueled by malware
Google disrupts IPIDEA residential proxy networks fueled by malware
IPIDEA, one of the largest residential proxy networks used by threat actors, was disrupted earlier this week by Google Threat Intelligence Group (GTIG) in collaboration with industry partners.
·bleepingcomputer.com·
Google disrupts IPIDEA residential proxy networks fueled by malware
I'm locked in!
I'm locked in!
Hazel reflects on how to find balance while staying informed, then delivers practical updates and insights on the latest cybersecurity threats.
·blog.talosintelligence.com·
I'm locked in!
Match Group breach exposes data from Hinge, Tinder, OkCupid, and Match
Match Group breach exposes data from Hinge, Tinder, OkCupid, and Match
Match Group, the owner of multiple popular online dating services, Tinder, Match.com, Meetic, OkCupid, and Hinge, confirmed a cybersecurity incident that compromised user data.
·bleepingcomputer.com·
Match Group breach exposes data from Hinge, Tinder, OkCupid, and Match
Marquis blames ransomware breach on SonicWall cloud backup hack
Marquis blames ransomware breach on SonicWall cloud backup hack
Marquis Software Solutions, a Texas-based financial services provider, is blaming a ransomware attack that impacted its systems and affected dozens of U.S. banks and credit unions in August 2025 on a security breach reported by SonicWall a month later.
·bleepingcomputer.com·
Marquis blames ransomware breach on SonicWall cloud backup hack
Clawdbot diventa Moltbot, l’infostealer camuffato da Agentic AI cambia pelle: come proteggersi
Clawdbot diventa Moltbot, l’infostealer camuffato da Agentic AI cambia pelle: come proteggersi
Le preoccupazioni relative alla sicurezza del nuovo strumento di Agentic AI, precedentemente noto come Clawdbot, permangono, nonostante il rebranding richiesto da Anthropic per motivi legati al marchio registrato. Ecco i principali rischi di un malware infostealer camuffato da assistente personale AI open source e come mitigarli
·cybersecurity360.it·
Clawdbot diventa Moltbot, l’infostealer camuffato da Agentic AI cambia pelle: come proteggersi
OpenSSL ha fixato 12 vulnerabilità scoperte da AISLE
OpenSSL ha fixato 12 vulnerabilità scoperte da AISLE
Pochi giorni fa OpenSSL ha rilasciato alcune patch per risolvere 12 vulnerabilità individuate, con l'aiuto dell'IA, dalla compagnia di sicurezza AISLE.
·securityinfo.it·
OpenSSL ha fixato 12 vulnerabilità scoperte da AISLE
Not a Kids Game: From Roblox Mod to Compromising Your Company
Not a Kids Game: From Roblox Mod to Compromising Your Company
Seemingly harmless game mods can hide infostealer malware that quietly steals identities. Flare shows how Roblox mods can turn a home PC infection into corporate compromise.
·bleepingcomputer.com·
Not a Kids Game: From Roblox Mod to Compromising Your Company
Supply chain attack on eScan antivirus: detecting and remediating malicious updates
Supply chain attack on eScan antivirus: detecting and remediating malicious updates
On January 20, Kaspersky solutions detected malware used in eScan antivirus supply chain attack. In this article we provide available information on the threat: indicators of compromise, threat hunting and mitigating tips, etc.
·securelist.com·
Supply chain attack on eScan antivirus: detecting and remediating malicious updates
New Microsoft Teams feature will let you report suspicious calls
New Microsoft Teams feature will let you report suspicious calls
Microsoft plans to introduce a call reporting feature in Teams by mid-March, allowing users to flag suspicious or unwanted calls as potential scams or phishing attempts.
·bleepingcomputer.com·
New Microsoft Teams feature will let you report suspicious calls
Aisuru botnet sets new record with 31.4 Tbps DDoS attack
Aisuru botnet sets new record with 31.4 Tbps DDoS attack
The Aisuru/Kimwolf botnet launched a new massive distributed denial of service (DDoS) attack in December 2025, peaking at 31.4 Tbps and 200 million requests per second.
·bleepingcomputer.com·
Aisuru botnet sets new record with 31.4 Tbps DDoS attack
Microsoft releases update to address zero-day vulnerability in Microsoft Office
Microsoft releases update to address zero-day vulnerability in Microsoft Office
Microsoft has published three out-of-band (OOB) updates so far in January 2026. One of these updates was released to address a vulnerability, CVE-2026-21509, affecting Microsoft Office that has been reportedly exploited in the wild.
·blog.talosintelligence.com·
Microsoft releases update to address zero-day vulnerability in Microsoft Office
France fines unemployment agency €5 million over data breach
France fines unemployment agency €5 million over data breach
The French data protection authority fined the national employment agency €5 million (nearly €6 million) for failing to secure job seekers' data, which allowed hackers to steal the personal information of 43 million people.
·bleepingcomputer.com·
France fines unemployment agency €5 million over data breach
Google rolls out Android theft protection feature updates
Google rolls out Android theft protection feature updates
​Google has introduced stronger Android authentication safeguards and enhanced recovery tools to make smartphones more challenging targets for thieves.
·bleepingcomputer.com·
Google rolls out Android theft protection feature updates
Telecamere private: quando la sicurezza diventa sorveglianza illegittima
Telecamere private: quando la sicurezza diventa sorveglianza illegittima
Con il provvedimento del 23 ottobre 2025, il Garante Privacy, intervenendo su un caso di videosorveglianza privata protrattasi per anni, in assenza di un reale presidio giuridico e tecnico, ha ribadito le regole per le telecamere private. Ecco cosa comporta la ripresa continuativa di aree condominiali e strade
·cybersecurity360.it·
Telecamere private: quando la sicurezza diventa sorveglianza illegittima
Mega Breaches in 2026
Mega Breaches in 2026
Here’s a collection of the main mega breaches (that is data breaches with more than one million records compromised and possibly leaked) during 2026. The information is derived from the cyber attac…
·hackmageddon.com·
Mega Breaches in 2026
Dissecting UAT-8099: New persistence mechanisms and regional focus
Dissecting UAT-8099: New persistence mechanisms and regional focus
Cisco Talos has identified a new, regionally targeted campaign by UAT-8099 that leverages advanced persistence techniques and custom BadIIS malware variants to compromise IIS servers, particularly in Thailand and Vietnam.
·blog.talosintelligence.com·
Dissecting UAT-8099: New persistence mechanisms and regional focus
Le professioni cyber più richieste nel 2026: le 5 sfide che devono affrontare
Le professioni cyber più richieste nel 2026: le 5 sfide che devono affrontare
Al Richmond Cyber resilience forum, a cui hanno partecipato CISO, manager e professionisti della sicurezza, il report Cybersecurity Statistics 2025 ha delineato le principali tendenze cyber del 2026, a partire dalle figure professionali più richieste. Ecco cosa è emerso, mentre ransomware, supply chain e fattore umano si confermano come principali vettori di rischio
·cybersecurity360.it·
Le professioni cyber più richieste nel 2026: le 5 sfide che devono affrontare
I 5 pilastri della conformità SOC 2: la bussola per navigare sicuri nel mondo digitale
I 5 pilastri della conformità SOC 2: la bussola per navigare sicuri nel mondo digitale
La certificazione SOC 2 offre una garanzia concreta e verificata da un revisore indipendente, non solo una semplice promessa. Ecco perché è diventato quasi obbligatorio per chiunque gestisca dati sensibili, soprattutto nel cloud
·cybersecurity360.it·
I 5 pilastri della conformità SOC 2: la bussola per navigare sicuri nel mondo digitale