Over Security

Over Security

31463 bookmarks
Custom sorting
Fortinet warns of 5-year-old FortiOS 2FA bypass still exploited in attacks
Fortinet warns of 5-year-old FortiOS 2FA bypass still exploited in attacks
Fortinet has warned customers that threat actors are still actively exploiting a critical FortiOS vulnerability that allows them to bypass two-factor authentication (2FA) when targeting vulnerable FortiGate firewalls.
·bleepingcomputer.com·
Fortinet warns of 5-year-old FortiOS 2FA bypass still exploited in attacks
MongoBleed, la vulnerabilità in MongoDB è già sfruttata in rete: aggiornamento urgente
MongoBleed, la vulnerabilità in MongoDB è già sfruttata in rete: aggiornamento urgente
Disponibile in rete l’exploit per la vulnerabilità MongoBleed identificata in MongoDB: lo sfruttamento attivo potrebbe consentire l’accesso non controllato a zone di memoria riservate. La falla di sicurezza è già stata risolta dal vendor, per cui è urgente applicare il prima possibile la patch
·cybersecurity360.it·
MongoBleed, la vulnerabilità in MongoDB è già sfruttata in rete: aggiornamento urgente
You’ve been targeted by government spyware. Now what?
You’ve been targeted by government spyware. Now what?
Tech companies are increasingly warning their customers that they have been targeted by governments with advanced government spyware, such as NSO's Pegasus or Paragon's Graphite. What happens after receiving a threat notification?
·techcrunch.com·
You’ve been targeted by government spyware. Now what?
Manipolazione dei prompt: la bassa soglia di accesso apre il vaso di Pandora
Manipolazione dei prompt: la bassa soglia di accesso apre il vaso di Pandora
Il prompt hacking o prompt injection ricorda i famigerati attacchi SQL injection dei primi anni 2000. Abbiamo già visto tattiche simili in passato. Ecco cosa rende questa minaccia particolarmente difficile da affrontare
·cybersecurity360.it·
Manipolazione dei prompt: la bassa soglia di accesso apre il vaso di Pandora
Quando un’entità finanziaria è anche un fornitore ICT: gli impatti su GDPR, DORA, NIS2
Quando un’entità finanziaria è anche un fornitore ICT: gli impatti su GDPR, DORA, NIS2
Un’azienda, titolare di un trattamento, potrebbe nominare un proprio fornitore come responsabile del trattamento oppure operare come responsabile del trattamento per conto di uno o più clienti. O ancora agire come titolare e responsabile. Ecco che cosa accade, dal punto di vista della conformità normativa, qualora un’entità finanziaria ricopra anche il ruolo di fornitore ICT
·cybersecurity360.it·
Quando un’entità finanziaria è anche un fornitore ICT: gli impatti su GDPR, DORA, NIS2
Exploited MongoBleed flaw leaks MongoDB secrets, 87K servers exposed
Exploited MongoBleed flaw leaks MongoDB secrets, 87K servers exposed
A severe vulnerability affecting multiple MongoDB versions, dubbed MongoBleed (CVE-2025-14847), is being actively exploited in the wild, with over 80,000 potentially vulnerable servers exposed on the public web.
·bleepingcomputer.com·
Exploited MongoBleed flaw leaks MongoDB secrets, 87K servers exposed
Hacker claims to leak WIRED database with 2.3 million records
Hacker claims to leak WIRED database with 2.3 million records
A hacker claims to have breached Condé Nast and leaked an alleged WIRED database containing more than 2.3 million subscriber records, while also warning that they plan to release up to 40 million additional records for other Condé Nast properties.
·bleepingcomputer.com·
Hacker claims to leak WIRED database with 2.3 million records
Massive Rainbow Six Siege breach gives players billions of credits
Massive Rainbow Six Siege breach gives players billions of credits
Ubisoft's Rainbow Six Siege (R6) suffered a breach that allowed hackers to abuse internal systems to ban and unban players, manipulate in-game moderation feeds, and grant massive amounts of in-game currency and cosmetic items to accounts worldwide.
·bleepingcomputer.com·
Massive Rainbow Six Siege breach gives players billions of credits
WIRED - 2,364,431 breached accounts
WIRED - 2,364,431 breached accounts
In December 2025, 2.3M records of WIRED magazine users allegedly obtained from parent company Condé Nast were published online. The most recent data dated back to the previous September and exposed email addresses and display names, as well as, for a small number of users, their name, phone number, date of birth, gender, and geographic location or full physical address. The WIRED data allegedly represents a subset of Condé Nast brands the hacker also claims to have obtained.
·haveibeenpwned.com·
WIRED - 2,364,431 breached accounts
Vectored Exception Handling Squared
Vectored Exception Handling Squared
A detailed exploration of VEH² in Rust, showing how vectored exception handling and CPU debug registers can be used to intercept sensitive functions like AmsiScanBuffer without code patching or SetThreadContext, and where detection opportunities still exist.
·fluxsec.red·
Vectored Exception Handling Squared
Fake GrubHub emails promise tenfold return on sent cryptocurrency
Fake GrubHub emails promise tenfold return on sent cryptocurrency
Grubhub users received fraudulent messages, apparently from a company email address, promising a tenfold bitcoin payout in return for a transfer to a specified wallet.
·bleepingcomputer.com·
Fake GrubHub emails promise tenfold return on sent cryptocurrency
Trust Wallet confirms extension hack led to $7 million crypto theft
Trust Wallet confirms extension hack led to $7 million crypto theft
Several users of the Trust Wallet Chrome extension report having their cryptocurrency wallets drained after installing a compromised extension update released on December 24, prompting an urgent response from the company and warnings to affected users. Simultaneously, BleepingComputer observed a phishing domain launched by hackers.
·bleepingcomputer.com·
Trust Wallet confirms extension hack led to $7 million crypto theft
MongoDB warns admins to patch severe vulnerability immediately
MongoDB warns admins to patch severe vulnerability immediately
MongoDB has warned IT admins to immediately patch a high-severity memory-read vulnerability that may be exploited by unauthenticated attackers remotely.
·bleepingcomputer.com·
MongoDB warns admins to patch severe vulnerability immediately
Trust Wallet Chrome extension hack tied to millions in losses
Trust Wallet Chrome extension hack tied to millions in losses
Several users of the Trust Wallet Chrome extension report having their cryptocurrency wallets drained after installing a compromised extension update released on December 24, prompting an urgent response from the company and warnings to affected users. Simultaneously, BleepingComputer observed a phishing domain launched by hackers.
·bleepingcomputer.com·
Trust Wallet Chrome extension hack tied to millions in losses
Invisible Unicode Obfuscation: Beyond GlassWorm
Invisible Unicode Obfuscation: Beyond GlassWorm
A deep dive into the invisible Unicode obfuscation technique popularized by GlassWorm, extended to undocumented variants and unseen attack surfaces such as command lines and security logs.
·reggia.xyz·
Invisible Unicode Obfuscation: Beyond GlassWorm
Utair - 401,400 breached accounts
Utair - 401,400 breached accounts
In August 2020, news broke of a data breach of Russian airline Utair that dated back to the previous year. The breach contained over 400k unique email addresses along with extensive personal information including names, physical addresses, dates of birth, passport numbers and loyalty program details.
·haveibeenpwned.com·
Utair - 401,400 breached accounts
Microsoft Teams to let admins block external users via Defender portal
Microsoft Teams to let admins block external users via Defender portal
Microsoft announced that security administrators will soon be able to block external users from sending messages, calls, or meeting invitations to members of their organization via Teams.
·bleepingcomputer.com·
Microsoft Teams to let admins block external users via Defender portal