Over Security

Over Security

31463 bookmarks
Custom sorting
Belgian hospital AZ Monica shuts down servers after cyberattack
Belgian hospital AZ Monica shuts down servers after cyberattack
Belgian hospital AZ Monica was forced to shut down all servers, cancel scheduled procedures, and transfer critical patients earlier today due to a cyberattack.
·bleepingcomputer.com·
Belgian hospital AZ Monica shuts down servers after cyberattack
Man to plead guilty to hacking US Supreme Court filing system
Man to plead guilty to hacking US Supreme Court filing system
A 24-year-old from Tennessee is expected to admit to accessing the Supreme Court’s electronic filing system without authorization dozens of times throughout 2023.
·techcrunch.com·
Man to plead guilty to hacking US Supreme Court filing system
Target employees confirm leaked source code is authentic
Target employees confirm leaked source code is authentic
Multiple current and former Target employees confirmed that leaked source code samples posted by a threat actor match real internal systems. The company also rolled out an "accelerated" lockdown of its Git server, requiring VPN access, a day after being contacted by BleepingComputer.
·bleepingcomputer.com·
Target employees confirm leaked source code is authentic
Windows 11 KB5074109 & KB5073455 cumulative updates released
Windows 11 KB5074109 & KB5073455 cumulative updates released
Microsoft has released Windows 11 KB5074109 and KB5073455  cumulative updates for versions 25H2/24H2 and 23H2 to fix security vulnerabilities, bugs, and add new features.
·bleepingcomputer.com·
Windows 11 KB5074109 & KB5073455 cumulative updates released
Microsoft releases Windows 10 KB5073724 extended security update
Microsoft releases Windows 10 KB5073724 extended security update
Microsoft has released the KB5073724 extended security update to fix the Patch Tuesday security updates, including 3 zero-days and a fix for expiring Secure Boot certificates.
·bleepingcomputer.com·
Microsoft releases Windows 10 KB5073724 extended security update
Microsoft January 2026 Patch Tuesday fixes 3 zero-days, 114 flaws
Microsoft January 2026 Patch Tuesday fixes 3 zero-days, 114 flaws
Today is Microsoft's January 2026 Patch Tuesday with security updates for 114 flaws, including one actively exploited and two publicly disclosed zero-day vulnerabilities.
·bleepingcomputer.com·
Microsoft January 2026 Patch Tuesday fixes 3 zero-days, 114 flaws
Google confirms Android bug causing volume key issues
Google confirms Android bug causing volume key issues
Google has confirmed a software bug that is preventing volume buttons from working correctly on Android devices with accessibility features enabled.
·bleepingcomputer.com·
Google confirms Android bug causing volume key issues
Tp-Link Router Deep Research
Tp-Link Router Deep Research
Good morning! In this blog I would like to delve into hardware hacking and start expanding my learning.
·r0keb.github.io·
Tp-Link Router Deep Research
Android recon for Bug Bounty hunters: A complete guide
Android recon for Bug Bounty hunters: A complete guide
An in-depth Bug Bounty guide to performing reconnaissance on Android apps – from extracting APKs to mapping endpoints, secrets and vulnerable components.
·yeswehack.com·
Android recon for Bug Bounty hunters: A complete guide
Security Research in the Age of AI Tools
Security Research in the Age of AI Tools
Learn how AI tools can support security researchers in investigating vulnerabilities and designing security checks to detect them.
·invicti.com·
Security Research in the Age of AI Tools
NIS2, AI Act, CRA: perché il 2026 segna una svolta per la sicurezza cyber
NIS2, AI Act, CRA: perché il 2026 segna una svolta per la sicurezza cyber
Europa, Regno Unito e Medio Oriente stanno entrando in una nuova fase in cui la teoria normativa diventerà realtà operativa. Il tempo della compliance “di carta” è finito. Le politiche cyber diventano vincoli operativi: audit, enforcement e assicurazioni metteranno alla prova la maturità di sicurezza, governance e resilienza delle organizzazioni
·cybersecurity360.it·
NIS2, AI Act, CRA: perché il 2026 segna una svolta per la sicurezza cyber
Privilegi di accesso e identità alimentate dall’AI: rischi e mitigazioni
Privilegi di accesso e identità alimentate dall’AI: rischi e mitigazioni
Molte aziende fanno affidamento sull'accesso sempre attivo, na gli ambienti operativi attuali sono più dinamici di quelli di ieri. Invece oggi l’AI amplia velocemente la superficie di attacco focalizzata sulle identità. Ecco quali rischi cyber sono legati agli accessi privilegiati e come mitigarli
·cybersecurity360.it·
Privilegi di accesso e identità alimentate dall’AI: rischi e mitigazioni
Convincing LinkedIn comment-reply tactic used in new phishing
Convincing LinkedIn comment-reply tactic used in new phishing
Scammers are flooding LinkedIn posts with fake "reply" comments that appear to come from the platform, warning of bogus policy violations and urging users to click external links. Some even abuse LinkedIn's official lnkd.in shortener, making the phishing attempts harder to spot.
·bleepingcomputer.com·
Convincing LinkedIn comment-reply tactic used in new phishing
Asset management: perché l’IT non deve essere l’asset owner e come farlo bene
Asset management: perché l’IT non deve essere l’asset owner e come farlo bene
L'asset management efficace trasforma l'inventario da semplice adempimento tecnico a strumento strategico che ottimizza investimenti di protezione e massimizza il valore degli asset organizzativi. Per questo motivo è importante farlo bene. Ecco un’utile guida operativa
·cybersecurity360.it·
Asset management: perché l’IT non deve essere l’asset owner e come farlo bene
Target employees confirm leaked code after ‘accelerated’ Git lockdown
Target employees confirm leaked code after ‘accelerated’ Git lockdown
Multiple current and former Target employees confirmed that leaked source code samples posted by a threat actor match real internal systems. The company also rolled out an "accelerated" lockdown of its Git server, requiring VPN access, a day after being contacted by BleepingComputer.
·bleepingcomputer.com·
Target employees confirm leaked code after ‘accelerated’ Git lockdown
Wraps - AWS Email Pricing with Modern Developer Experience
Wraps - AWS Email Pricing with Modern Developer Experience
82% of domains have no DMARC. Of those that do, most set p=none—which tells receivers not to enforce. An interactive deep-dive into email authentication.
·wraps.dev·
Wraps - AWS Email Pricing with Modern Developer Experience
Report annuale Polizia Postale 2025: la normalità dell’attacco, il dovere della resilienza
Report annuale Polizia Postale 2025: la normalità dell’attacco, il dovere della resilienza
Il Report annuale 2025 della Polizia Postale fotografa l’evoluzione del cybercrime in Italia: frodi da 269 milioni, 9.250 eventi di computer crime e nuove sfide su minori e violenza digitale. Ecco dati chiave e best practice per imprese e Paese
·cybersecurity360.it·
Report annuale Polizia Postale 2025: la normalità dell’attacco, il dovere della resilienza
Quando un incidente cyber smette di essere un problema tecnico e diventa di interesse pubblico
Quando un incidente cyber smette di essere un problema tecnico e diventa di interesse pubblico
Il nuovo paradigma introdotto dalla NIS 2 spiega perché l’incidente significativo non è più un fatto “interno”. Ecco quale ruolo assume il CSIRT Italia e perché la sicurezza informatica diventa oggi una responsabilità che travalica l’organizzazione colpita
·cybersecurity360.it·
Quando un incidente cyber smette di essere un problema tecnico e diventa di interesse pubblico