Over Security

Over Security

31463 bookmarks
Custom sorting
You Got Phished? Of Course! You're Human...
You Got Phished? Of Course! You're Human...
Phishing succeeds not because users are careless, but because attackers exploit human timing, context, and emotion. Flare shows how modern phishing has become industrialized, scalable, and increasingly hard to spot.
·bleepingcomputer.com·
You Got Phished? Of Course! You're Human...
Hackers exploit security testing apps to breach Fortune 500 firms
Hackers exploit security testing apps to breach Fortune 500 firms
Threat actors are exploiting misconfigured web applications used for security training and internal penetration testing, such as DVWA, OWASP Juice Shop, Hackazon, and bWAPP, to gain access to cloud environments of Fortune 500 companies and security vendors.
·bleepingcomputer.com·
Hackers exploit security testing apps to breach Fortune 500 firms
Termini perentori per le sanzioni GDPR: la sentenza della Cassazione che cambia tutto
Termini perentori per le sanzioni GDPR: la sentenza della Cassazione che cambia tutto
La Corte di Cassazione con una recente sentenza si pronuncia su una annosa questione, e non solo in teoria, concernente la natura dei termini entro i quali l’Autorità Garante per la protezione dei dati deve, a pena di decadenza, emettere il provvedimento sanzionatorio. Vediamo il ragionamento
·cybersecurity360.it·
Termini perentori per le sanzioni GDPR: la sentenza della Cassazione che cambia tutto
Tesla hacked, 37 zero-days demoed at Pwn2Own Automotive 2026
Tesla hacked, 37 zero-days demoed at Pwn2Own Automotive 2026
Security researchers have hacked the Tesla Infotainment System and earned $516,500 after exploiting 37 zero-days on the first day of the Pwn2Own Automotive 2026 competition.
·bleepingcomputer.com·
Tesla hacked, 37 zero-days demoed at Pwn2Own Automotive 2026
NIS 2 e gestione incidenti: correre all’ultimo minuto significa non essere pronti
NIS 2 e gestione incidenti: correre all’ultimo minuto significa non essere pronti
In varie aziende e PA l’avvicinarsi di gennaio 2026, periodo di avvio dell’obbligo di notifica degli incidenti di sicurezza all’ACN, ha prodotto una corsa affannosa alla redazione di procedure “di facciata”: documenti formalmente corretti, ma lontani dalla logica operativa della NIS 2. Invece, serve meno carta e più capacità reale di governo dell’incidente
·cybersecurity360.it·
NIS 2 e gestione incidenti: correre all’ultimo minuto significa non essere pronti
Under Armour - 72,742,892 breached accounts
Under Armour - 72,742,892 breached accounts
In November 2025, the Everest ransomware group claimed Under Armour as a victim and attempted to extort a ransom, alleging they had obtained access to 343GB of data. In January 2026, customer data from the incident was published publicly on a popular hacking forum, including 72M email addresses. Many records also contained additional personal information such as names, dates of birth, genders, geographic locations and purchase information.
·haveibeenpwned.com·
Under Armour - 72,742,892 breached accounts
Zero Trust e AI, i punti deboli di un connubio che sembra ineffabile
Zero Trust e AI, i punti deboli di un connubio che sembra ineffabile
I sistemi Zero Trust supportati dalle AI sono una negazione in termini. Infatti, tendono a estendere il concetto di fiducia a quelle intelligenze artificiali alle quali, almeno per principio, occorrerebbe guardare con sospetto per la salvaguardia della sicurezza. Come uscire da questa impasse. Molto pericolosa
·cybersecurity360.it·
Zero Trust e AI, i punti deboli di un connubio che sembra ineffabile
OpenAI's ChatGPT Atlas browser is testing actions feature
OpenAI's ChatGPT Atlas browser is testing actions feature
Chromium-based ChatGPT Atlas browser is testing a new feature likely called "Actions," and it can also understand videos, which is why you might see ChatGPT generating timestamps for videos.
·bleepingcomputer.com·
OpenAI's ChatGPT Atlas browser is testing actions feature
ACF plugin bug gives hackers admin on 50,000 WordPress sites
ACF plugin bug gives hackers admin on 50,000 WordPress sites
A critical-severity vulnerability in the Advanced Custom Fields: Extended (ACF Extended) plugin for WordPress can be exploited remotely by unauthenticated attackers to obtain administrative permissions.
·bleepingcomputer.com·
ACF plugin bug gives hackers admin on 50,000 WordPress sites
VoidLink cloud malware shows clear signs of being AI-generated
VoidLink cloud malware shows clear signs of being AI-generated
The recently discovered cloud-focused VoidLink malware framework is believed to have been developed by a single person with the help of an artificial intelligence model.
·bleepingcomputer.com·
VoidLink cloud malware shows clear signs of being AI-generated
EU plans cybersecurity overhaul to block foreign high-risk suppliers
EU plans cybersecurity overhaul to block foreign high-risk suppliers
The European Commission has proposed new cybersecurity legislation mandating the removal of high-risk suppliers to secure telecommunications networks and strengthening defenses against state-backed and cybercrime groups targeting critical infrastructure.
·bleepingcomputer.com·
EU plans cybersecurity overhaul to block foreign high-risk suppliers
Simulare per difendersi: come i cyber digital twin rivoluzionano la sicurezza informatica
Simulare per difendersi: come i cyber digital twin rivoluzionano la sicurezza informatica
I cyber digital twin rivoluzionano la sicurezza: repliche digitali sempre aggiornate delle infrastrutture per simulare attacchi senza impattare la produzione. La difesa passa da reattiva a predittiva con enormi vantaggi per le PMI: test continui, prioritizzazione delle vulnerabilità e tempi ridotti
·cybersecurity360.it·
Simulare per difendersi: come i cyber digital twin rivoluzionano la sicurezza informatica
Gemini AI assistant tricked into leaking Google Calendar data
Gemini AI assistant tricked into leaking Google Calendar data
Using only natural language instructions, researchers were able to bypass Google Gemini's defenses against malicious prompt injection and create misleading events to leak private Calendar data.
·bleepingcomputer.com·
Gemini AI assistant tricked into leaking Google Calendar data
Minacce hi-tech e geopolitiche: nuove sfide per i cyber leader
Minacce hi-tech e geopolitiche: nuove sfide per i cyber leader
L'anno appena cominciato presenta un panorama di rischio sempre più complesso in termini di cyber security e di instabilità geopolitica. Analizziamolo insieme
·cybersecurity360.it·
Minacce hi-tech e geopolitiche: nuove sfide per i cyber leader
Microsoft PowerToys adds new CursorWrap mouse 'teleport' tool
Microsoft PowerToys adds new CursorWrap mouse 'teleport' tool
Microsoft has released PowerToys 0.97, with a new mouse utility for multi-monitor setups and significant improvements to the Command Palette quick launcher.
·bleepingcomputer.com·
Microsoft PowerToys adds new CursorWrap mouse 'teleport' tool
SCANT: A (kind-of-decent) Framework for Ethical Deepfake Creation & Distribution
SCANT: A (kind-of-decent) Framework for Ethical Deepfake Creation & Distribution
Contents 1. The Ethical Blueprint: Building Trust in Synthetic Media 1. S - Social Benefit 2. C - Consent 3. A - Accountability 4. N - Non-Deception 5. T - Transparency 2. Putting SCANT into Practice 3. TL;DR Checklist 4. It takes work! 5. AI - Embracing the Human 6. Speaking of ISO 42001 The Ethical Blueprint: Building Trust in Synthetic Media Lots of damage has been done with AI, and to keep from deep-sixing the forward-leaning tone I want in this article, I’ll re
·secjuice.com·
SCANT: A (kind-of-decent) Framework for Ethical Deepfake Creation & Distribution
Make Identity Threat Detection your security strategy for 2026
Make Identity Threat Detection your security strategy for 2026
Identity-based attacks are one of the primary paths attackers use to breach corporate networks. Tenfold shows how Identity Threat Detection helps spot suspicious account activity before real damage occurs.
·bleepingcomputer.com·
Make Identity Threat Detection your security strategy for 2026