Over Security

Over Security

31461 bookmarks
Custom sorting
Trust Wallet links $8.5 million crypto theft to Shai-Hulud NPM attack
Trust Wallet links $8.5 million crypto theft to Shai-Hulud NPM attack
Trust Wallet believes the compromise of its web browser to steal roughly $8.5 million from over 2,500 crypto wallets is likely related to an "industry-wide" Sha1-Hulud attack in November.
·bleepingcomputer.com·
Trust Wallet links $8.5 million crypto theft to Shai-Hulud NPM attack
The Kimwolf Botnet is Stalking Your Local Network
The Kimwolf Botnet is Stalking Your Local Network
The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has been exploited for months already, and it's time for a broader awareness of the threat. The…
·krebsonsecurity.com·
The Kimwolf Botnet is Stalking Your Local Network
AI giuridica: perché i LLM non capiscono (ancora) le leggi e cosa serve per renderli affidabili
AI giuridica: perché i LLM non capiscono (ancora) le leggi e cosa serve per renderli affidabili
I LLM falliscono sistematicamente nell'interpretazione giuridica: piccole variazioni nei prompt generano risposte opposte. Manca il senso comune giuridico e la stabilità richiesta dal diritto. Per realizzare il mito della “giustizia computazionale” servono modelli verticali, standard rigorosi e controllo umano costante
·cybersecurity360.it·
AI giuridica: perché i LLM non capiscono (ancora) le leggi e cosa serve per renderli affidabili
Whistleblowing e gestione del rischio: una lettura critica delle linee guida ANAC
Whistleblowing e gestione del rischio: una lettura critica delle linee guida ANAC
Secondo una lettura critica e sistemica, alla luce degli snodi interpretativi, le Linee Guida ANAC 2025 chiedono di interpretare il whistleblowing non come un adempimento settoriale, bensì come un'infrastruttura trasversale di sicurezza organizzativa e di governance del rischio
·cybersecurity360.it·
Whistleblowing e gestione del rischio: una lettura critica delle linee guida ANAC
Si combatte così come ci si è addestrati: le logiche militari sottese al DORA
Si combatte così come ci si è addestrati: le logiche militari sottese al DORA
Leggere il DORA con la lente militare dimostra come la resilienza operativa digitale sia un’estensione naturale dei principi che regolano la leadership: preparazione, addestramento, disciplina. Ecco perché il Regolamento europeo che definisce la resilienza operativa digitale non è un set di adempimenti tecnici, ma una dottrina del comando
·cybersecurity360.it·
Si combatte così come ci si è addestrati: le logiche militari sottese al DORA
New GlassWorm malware wave targets Macs with trojanized crypto wallets
New GlassWorm malware wave targets Macs with trojanized crypto wallets
A fourth wave of the "GlassWorm" campaign is targeting macOS developers with malicious VSCode/OpenVSX extensions that deliver trojanized versions of crypto wallet applications.
·bleepingcomputer.com·
New GlassWorm malware wave targets Macs with trojanized crypto wallets
The biggest cybersecurity and cyberattack stories of 2025
The biggest cybersecurity and cyberattack stories of 2025
2025 was a big year for cybersecurity, with cyberattacks, data breaches, threat groups reaching new notoriety levels, and, of course, zero-day flaws exploited in breaches. Some stories, though, were more impactful or popular with our readers than others. This article explores 15 of the biggest cybersecurity stories of 2025.
·bleepingcomputer.com·
The biggest cybersecurity and cyberattack stories of 2025
OpenAI is offering $20 ChatGPT Plus for free to some users
OpenAI is offering $20 ChatGPT Plus for free to some users
If you're already subscribed to ChatGPT Plus, which costs $20, you can request OpenAI to cancel your subscription, and it may offer one month of free usage.
·bleepingcomputer.com·
OpenAI is offering $20 ChatGPT Plus for free to some users
Vulnerability & Patch Roundup — December 2025
Vulnerability & Patch Roundup — December 2025
Stay informed about our latest WordPress vulnerability reports and patch releases for December 2025. Update now to enhance your security!
·blog.sucuri.net·
Vulnerability & Patch Roundup — December 2025
NYC mayoral inauguration bans Flipper Zero, Raspberry Pi devices
NYC mayoral inauguration bans Flipper Zero, Raspberry Pi devices
New York City's 2026 mayoral inauguration of Zohran Mamdani has published a list of banned items for the event, specifically prohibiting the Flipper Zero and Raspberry Pi devices.
·bleepingcomputer.com·
NYC mayoral inauguration bans Flipper Zero, Raspberry Pi devices
Punto di “sniffing”
Punto di “sniffing”
In questi giorni ho rimesso mano al mio home lab aggiungendo qualche pezzo ed in particolare mi sono dotato di una componente hardware che solitamente, per esigenze di spazio e comodità, utilizzavo…
·roccosicilia.com·
Punto di “sniffing”
Hackers drain $3.9M from Unleash Protocol after multisig hijack
Hackers drain $3.9M from Unleash Protocol after multisig hijack
The decentralized intellectual property platform Unleash Protocol has lost around $3.9 million worth of cryptocurrency after someone executed an unauthorized contract upgrade that allowed asset withdrawals.
·bleepingcomputer.com·
Hackers drain $3.9M from Unleash Protocol after multisig hijack
RondoDox botnet exploits React2Shell flaw to breach Next.js servers
RondoDox botnet exploits React2Shell flaw to breach Next.js servers
The RondoDox botnet has been observed exploiting the critical React2Shell flaw (CVE-2025-55182) to infect vulnerable Next.js servers with malware and cryptominers.
·bleepingcomputer.com·
RondoDox botnet exploits React2Shell flaw to breach Next.js servers
What the f**k is a CAO and do I need one?
What the f**k is a CAO and do I need one?
The CAO (Chief Automation Officer) is the "Chief Enabler." The role assesses automation feasibility, ensuring the right solution (deterministic vs. agentic) for business problems.
·bfore.ai·
What the f**k is a CAO and do I need one?
IBM warns of critical API Connect auth bypass vulnerability
IBM warns of critical API Connect auth bypass vulnerability
IBM urged customers to patch a critical authentication bypass vulnerability in its API Connect enterprise platform that could allow attackers to access apps remotely.
·bleepingcomputer.com·
IBM warns of critical API Connect auth bypass vulnerability
Disney will pay $10 million to settle children's data privacy lawsuit
Disney will pay $10 million to settle children's data privacy lawsuit
Disney has agreed to pay a $10 million civil penalty to settle claims that it violated the Children's Online Privacy Protection Act by mislabeling videos and allowing data collection for targeted advertising.
·bleepingcomputer.com·
Disney will pay $10 million to settle children's data privacy lawsuit
AI come arma cognitiva: dall’ISIS alla tecnodestra, la nuova ingegneria della radicalizzazione
AI come arma cognitiva: dall’ISIS alla tecnodestra, la nuova ingegneria della radicalizzazione
L'IA abbassa le barriere dell'estremismo: ISIS produce deepfake credibili, la tecnodestra “inonda la zona” di contenuti alternativi. Non più propaganda unidirezionale ma radicalizzazione personalizzata. Ecco come l’intelligenza artificiale sta diventando un moltiplicatore di forza cognitiva
·cybersecurity360.it·
AI come arma cognitiva: dall’ISIS alla tecnodestra, la nuova ingegneria della radicalizzazione
Backup immutabili e offline, che cosa sono e perché possono beffare i ransomware
Backup immutabili e offline, che cosa sono e perché possono beffare i ransomware
I backup immutabili e offline dovrebbero essere una priorità per qualsiasi organizzazione. Costano poco, sono semplici da organizzare e gestire e consentono di riprendere le attività in caso di disastro o di attacco hacker. Tutto quello che c’è da sapere
·cybersecurity360.it·
Backup immutabili e offline, che cosa sono e perché possono beffare i ransomware
New ErrTraffic service enables ClickFix attacks via fake browser glitches
New ErrTraffic service enables ClickFix attacks via fake browser glitches
A new cybercrime tool called ErrTraffic allows threat actors to automate ClickFix attacks by generating 'fake glitches' on compromised websites to lure users into downloading payloads or following malicious instructions
·bleepingcomputer.com·
New ErrTraffic service enables ClickFix attacks via fake browser glitches
Zoom Stealer browser extensions harvest corporate meeting intelligence
Zoom Stealer browser extensions harvest corporate meeting intelligence
A newly discovered campaign, which researchers call Zoom Stealer, is affecting 2.2 million Chrome, Firefox, and Microsoft Edge users through 18 extensions that collect online meeting-related data like URLs, IDs, topics, descriptions, and embedded passwords.
·bleepingcomputer.com·
Zoom Stealer browser extensions harvest corporate meeting intelligence
European Space Agency confirms breach of "external servers"
European Space Agency confirms breach of "external servers"
The European Space Agency (ESA) confirmed that attackers recently breached servers outside its corporate network, which contained what it described as "unclassified" information on collaborative engineering activities.
·bleepingcomputer.com·
European Space Agency confirms breach of "external servers"