Over Security

Over Security

31461 bookmarks
Custom sorting
Cloudflare misconfiguration behind recent BGP route leak
Cloudflare misconfiguration behind recent BGP route leak
Cloudflare has shared more details about a recent 25-minute Border Gateway Protocol (BGP) route leak affecting IPv6 traffic, which caused measurable congestion, packet loss, and approximately 12 Gbps of dropped traffic.
·bleepingcomputer.com·
Cloudflare misconfiguration behind recent BGP route leak
EU launches investigation into X over Grok-generated sexual images
EU launches investigation into X over Grok-generated sexual images
The European Commission is now investigating whether X properly assessed risks before deploying its Grok artificial intelligence tool, following its use to generate sexually explicit images.
·bleepingcomputer.com·
EU launches investigation into X over Grok-generated sexual images
Data Act, c’è un aggiornamento delle FAQ: cosa cambia per aziende e utenti
Data Act, c’è un aggiornamento delle FAQ: cosa cambia per aziende e utenti
La Commissione Europea aggiorna le FAQ sul Data Act, fornendo chiarimenti pratici su accesso e uso dei dati, interoperabilità dei servizi digitali e rispetto delle norme UE, tra cui il GDPR, per supportare aziende e professionisti nella compliance e nella gestione sicura dei dati. Tutto quello che c’è da sapere
·cybersecurity360.it·
Data Act, c’è un aggiornamento delle FAQ: cosa cambia per aziende e utenti
Nearly 800,000 Telnet servers exposed to remote attacks
Nearly 800,000 Telnet servers exposed to remote attacks
Internet security watchdog Shadowserver tracks nearly 800,000 IP addresses with Telnet fingerprints amid ongoing attacks exploiting a critical authentication bypass vulnerability in the GNU InetUtils telnetd server.
·bleepingcomputer.com·
Nearly 800,000 Telnet servers exposed to remote attacks
6 Okta security settings you might have overlooked
6 Okta security settings you might have overlooked
Okta misconfigurations can quietly weaken identity security as SaaS environments evolve. Nudge Security shows six Okta security settings teams often overlook and how to fix them.
·bleepingcomputer.com·
6 Okta security settings you might have overlooked
Attacco cyber russo alla Polonia: la guerra è in UE e nessuno si sorprende
Attacco cyber russo alla Polonia: la guerra è in UE e nessuno si sorprende
Negli ultimi dodici mesi l’attività cyber della Russia è aumentata contro Paesi Nato ed europei, colpendo più spesso infrastrutture critiche. Il caso più recente è l’attacco di fine dicembre 2025 alla rete elettrica polacca. La cosa più grave è che il conflitto si è normalizzato. Può essere un passo verso l'escalation
·cybersecurity360.it·
Attacco cyber russo alla Polonia: la guerra è in UE e nessuno si sorprende
Hackers can bypass npm’s Shai-Hulud defenses via Git dependencies
Hackers can bypass npm’s Shai-Hulud defenses via Git dependencies
The defense mechanisms that NPM introduced after the 'Shai-Hulud' supply-chain attacks have weaknesses that allow threat actors to bypass them via Git dependencies.
·bleepingcomputer.com·
Hackers can bypass npm’s Shai-Hulud defenses via Git dependencies
CISA says critical VMware RCE flaw now actively exploited
CISA says critical VMware RCE flaw now actively exploited
CISA has flagged a critical VMware vCenter Server vulnerability as actively exploited and ordered U.S. federal agencies to secure their servers within three weeks.
·bleepingcomputer.com·
CISA says critical VMware RCE flaw now actively exploited
L’eclissi della cifratura: AI, quantum e la sfida satellitare cinese nel 2026
L’eclissi della cifratura: AI, quantum e la sfida satellitare cinese nel 2026
La Cina sta blindando le proprie comunicazioni investendo nella cifratura quantistica, mentre sta potenziando la capacità di calcolo dedicata alla "decryption" dei sistemi altrui. Questa asimmetria dà vita a un rischio che molti sottovalutano, ma che è già operativo: la strategia "Harvest Now, Decrypt Later". Ecco il triangolo del rischio, fra AI, Quantum e spazio
·cybersecurity360.it·
L’eclissi della cifratura: AI, quantum e la sfida satellitare cinese nel 2026
ChatGPT Temporary chat feature is getting a much-needed upgrade
ChatGPT Temporary chat feature is getting a much-needed upgrade
OpenAI is testing a big upgrade for ChatGPT's temporary chat feature. The update will allow you to retain personalization in temporary chat, and still block temporary chat from influencing your account.
·bleepingcomputer.com·
ChatGPT Temporary chat feature is getting a much-needed upgrade
1Password adds pop-up warnings for suspected phishing sites
1Password adds pop-up warnings for suspected phishing sites
The 1Password digital vault and password manager has added built-in protection against phishing URLs to help users identify malicious pages and prevent them from sharing account credentials with threat actors.
·bleepingcomputer.com·
1Password adds pop-up warnings for suspected phishing sites
1Password adds pop-pup warnings for suspected phishing sites
1Password adds pop-pup warnings for suspected phishing sites
The 1Password digital vault and password manager has added built-in protection against phishing URLs to help users identify malicious pages and prevent them from sharing account credentials with threat actors.
·bleepingcomputer.com·
1Password adds pop-pup warnings for suspected phishing sites
Microsoft investigates Windows 11 boot failures after January updates
Microsoft investigates Windows 11 boot failures after January updates
Microsoft is investigating reports that some Windows 11 devices are failing to boot with "UNMOUNTABLE_BOOT_VOLUME" errors after installing the January 2026 Patch Tuesday security updates.
·bleepingcomputer.com·
Microsoft investigates Windows 11 boot failures after January updates
28 gennaio 2026, lo stato dell’arte e il trend della protezione dei dati
28 gennaio 2026, lo stato dell’arte e il trend della protezione dei dati
Dalle normative più severe e le crescenti minacce informatiche all'aumento delle aspettative dei clienti, il rischio per la privacy non è più un problema esclusivamente IT. È una priorità aziendale a livello di Consiglio di amministrazione
·cybersecurity360.it·
28 gennaio 2026, lo stato dell’arte e il trend della protezione dei dati
No Hat 2026 – 10/10/2026
No Hat 2026 – 10/10/2026
Anche quest’anno l’ass. Berghem-In-The-Middle sarà concentrata sull’organizzazione del nostro evento principale, No Hat Computer Security Conference, che in ogni edizione …
·hacklabg.net·
No Hat 2026 – 10/10/2026
GitLab as the backbone of IaC
GitLab as the backbone of IaC
GitLab has become the de facto standard for managing the software lifecycle within enterprises. It offers a huge number of features, adapts to almost any requirement, and for this reason it is a broad and complex piece of software.
·adainese.it·
GitLab as the backbone of IaC
Microsoft releases emergency OOB update to fix Outlook freezes
Microsoft releases emergency OOB update to fix Outlook freezes
Microsoft has released emergency, out-of-band updates on Saturday for Windows 10, Windows 11, and Windows Server to fix an issue that prevented Microsoft Outlook from opening when using PSTs stored in cloud storage.
·bleepingcomputer.com·
Microsoft releases emergency OOB update to fix Outlook freezes
Sandworm hackers linked to failed wiper attack on Poland’s energy systems
Sandworm hackers linked to failed wiper attack on Poland’s energy systems
A cyberattack targeting Poland's power grid in late December 2025 has been linked to the Russian state-sponsored hacking group Sandworm, which attempted to deploy a new destructive data-wiping malware dubbed DynoWiper during the attack..
·bleepingcomputer.com·
Sandworm hackers linked to failed wiper attack on Poland’s energy systems
Konni hackers target blockchain engineers with AI-built malware
Konni hackers target blockchain engineers with AI-built malware
The North Korean hacker group Konni (Opal Sleet, TA406) is using AI-generated PowerShell malware to target developers and engineers in the blockchain sector.
·bleepingcomputer.com·
Konni hackers target blockchain engineers with AI-built malware
Nuovo sito, stesso MuHack
Nuovo sito, stesso MuHack
Il primo hackerspace bresciano, nato per promuovere la cultura open-source tramite la condivisione di idee, risorse ed esperienze!
·muhack.org·
Nuovo sito, stesso MuHack
ShinyHunters claim to be behind SSO-account data theft attacks
ShinyHunters claim to be behind SSO-account data theft attacks
The ShinyHunters extortion gang claims it is behind a wave of ongoing voice phishing attacks targeting single sign-on (SSO) accounts at Okta, Microsoft, and Google, enabling threat actors to breach corporate SaaS platforms and steal company data for extortion.
·bleepingcomputer.com·
ShinyHunters claim to be behind SSO-account data theft attacks