Over Security

Over Security

31463 bookmarks
Custom sorting
Critical flaw lets hackers track, eavesdrop via Bluetooth audio devices
Critical flaw lets hackers track, eavesdrop via Bluetooth audio devices
A critical vulnerability in Google's Fast Pair protocol can allow attackers to hijack Bluetooth audio accessories like wireless headphones and earbuds, track users, and eavesdrop on their conversations.
·bleepingcomputer.com·
Critical flaw lets hackers track, eavesdrop via Bluetooth audio devices
How to automate just-in-time access to applications with Tines
How to automate just-in-time access to applications with Tines
Managing just-in-time access at scale is a growing IAM challenge as speed and auditability collide daily. Tines shows how automated workflows can grant, track, and revoke temporary app access without manual effort.
·bleepingcomputer.com·
How to automate just-in-time access to applications with Tines
Iran e Starlink: la fine del mito della connettività “a prova di censura”
Iran e Starlink: la fine del mito della connettività “a prova di censura”
Il blackout imposto da Teheran e l’interferenza sulle comunicazioni Starlink mostrano che anche le reti satellitari globali possono essere indebolite. Una lezione che riguarda la libertà di informazione, il ruolo delle infrastrutture private e la nuova geopolitica delle comunicazioni
·cybersecurity360.it·
Iran e Starlink: la fine del mito della connettività “a prova di censura”
FTC bans GM from selling drivers' location data for five years
FTC bans GM from selling drivers' location data for five years
The FTC has finalized an order with General Motors, settling charges that it collected and sold the location and driving data of millions of drivers without consent.
·bleepingcomputer.com·
FTC bans GM from selling drivers' location data for five years
Vendor Risk Management: come rendere misurabile il rischio dei fornitori
Vendor Risk Management: come rendere misurabile il rischio dei fornitori
In un contesto caratterizzato dagli attacchi alla supply chain, in cui ogni fornitore rappresenta un potenziale punto di ingresso per gli attaccanti, serve un approccio strutturato e continuo di Third-Party Risk Management (TPRM) dinamico. Ecco cos'è un vendor risk management moderno e maturo
·cybersecurity360.it·
Vendor Risk Management: come rendere misurabile il rischio dei fornitori
Microsoft disrupts massive RedVDS cybercrime virtual desktop service
Microsoft disrupts massive RedVDS cybercrime virtual desktop service
Microsoft announced on Wednesday that it disrupted RedVDS, a massive cybercrime platform linked to at least $40 million in reported losses in the United States alone since March 2025.
·bleepingcomputer.com·
Microsoft disrupts massive RedVDS cybercrime virtual desktop service
ChatGPT's upcoming cross-platform feature is codenamed "Agora"
ChatGPT's upcoming cross-platform feature is codenamed "Agora"
OpenAI is internally testing a new feature called "Agora," and it could be related to some sort of cross-platform feature that works in real time or some other new product.
·bleepingcomputer.com·
ChatGPT's upcoming cross-platform feature is codenamed "Agora"
South Korean giant Kyowon confirms data theft in ransomware attack
South Korean giant Kyowon confirms data theft in ransomware attack
The Kyowon Group (Kyowon), a South Korean conglomerate, disclosed that a cyberattack has disrupted its operations and customer information may have been exposed in the incident.
·bleepingcomputer.com·
South Korean giant Kyowon confirms data theft in ransomware attack
France fines Free Mobile €42 million over 2024 data breach incident
France fines Free Mobile €42 million over 2024 data breach incident
The French data protection authority (CNIL) has imposed cumulative fines of €42 million on Free Mobile and its parent company, Free, for inadequate protection of customer data against cyber threats.
·bleepingcomputer.com·
France fines Free Mobile €42 million over 2024 data breach incident
Exploit code public for critical FortiSIEM command injection flaw
Exploit code public for critical FortiSIEM command injection flaw
Technical details and a public exploit have been published for a critical vulnerability affecting Fortinet's Security Information and Event Management (SIEM) solution that could be leveraged by a remote, unauthenticated attacker to execute commands or code.
·bleepingcomputer.com·
Exploit code public for critical FortiSIEM command injection flaw
“La tua tessera sanitaria è in scadenza”, ma è phishing: come difendersi
“La tua tessera sanitaria è in scadenza”, ma è phishing: come difendersi
Il CERT-AgID ha identificato una nuova campagna di phishing che sfrutta indebitamente il nome e l’immagine del Ministero della Salute per indurre i cittadini a rinnovare la tessera sanitaria. Ecco come funziona la truffa e i consigli per tenere al sicuro i propri dati personali
·cybersecurity360.it·
“La tua tessera sanitaria è in scadenza”, ma è phishing: come difendersi