Over Security

Over Security

31463 bookmarks
Custom sorting
Malicious extensions in Chrome Web store steal user credentials
Malicious extensions in Chrome Web store steal user credentials
Two Chrome extensions in the Web Store named 'Phantom Shuttle' are posing as plugins for a proxy service to hijack user traffic and steal sensitive data.
·bleepingcomputer.com·
Malicious extensions in Chrome Web store steal user credentials
Anubis Ransomware: Inside the Mindset and Methods of a Modern Ransomware Group
Anubis Ransomware: Inside the Mindset and Methods of a Modern Ransomware Group
It is in this context that the Anubis group operates—a presence notable less for the spectacle of its claims and more for its pragmatic, cynical, and methodical approach to compromise, persistence, and extortion.
·suspectfile.com·
Anubis Ransomware: Inside the Mindset and Methods of a Modern Ransomware Group
Cyberattack knocks offline France's postal, banking services
Cyberattack knocks offline France's postal, banking services
The French national postal service's online services were knocked offline by "a major network incident" on Monday, disrupting digital banking and other services for millions.
·bleepingcomputer.com·
Cyberattack knocks offline France's postal, banking services
Assessing SIEM effectiveness
Assessing SIEM effectiveness
We share the results of assessing the effectiveness of Kaspersky SIEM in real-world infrastructures and explore common challenges and solutions to these.
·securelist.com·
Assessing SIEM effectiveness
Italy fines Apple $116 million over App Store privacy policy issues
Italy fines Apple $116 million over App Store privacy policy issues
Italy's competition authority (AGCM) has fined Apple €98.6 million ($116 million) for using the App Tracking Transparency (ATT) privacy framework to abuse its dominant market position in mobile app advertising.
·bleepingcomputer.com·
Italy fines Apple $116 million over App Store privacy policy issues
Finta promozione Conad: come funziona la nuova campagna di Scam che sfrutta i punti fedeltà
Finta promozione Conad: come funziona la nuova campagna di Scam che sfrutta i punti fedeltà
Una nuova campagna di scam sfrutta il brand Conad e i punti fedeltà in scadenza per indurre gli utenti a sottoscrivere inconsapevolmente abbonamenti a pagamento. In questo articolo analizziamo come funziona la frode, le differenze tra scam e phishing e perché anche Conad è una vittima dell’abuso del
·d3lab.net·
Finta promozione Conad: come funziona la nuova campagna di Scam che sfrutta i punti fedeltà
Baker University says 2024 data breach impacts 53,000 people
Baker University says 2024 data breach impacts 53,000 people
Baker University has disclosed a data breach after attackers gained access to its network one year ago and stole the personal, health, and financial information of over 53,000 individuals.
·bleepingcomputer.com·
Baker University says 2024 data breach impacts 53,000 people
Sextortion e responsabilità delle piattaforme: quando il danno diventa prevedibile
Sextortion e responsabilità delle piattaforme: quando il danno diventa prevedibile
Meta e Match citate in giudizio in due casi diversi: il contenzioso punta a qualificare i danni come esito prevedibile di scelte di prodotto, procedure e priorità aziendali. Ecco perché si contesta la responsabilità delle piattaforme digitali sul tema della progettazione e gestione del servizio, anziché sul terreno tradizionale dei “contenuti”
·cybersecurity360.it·
Sextortion e responsabilità delle piattaforme: quando il danno diventa prevedibile
La necessaria revisione periodica delle misure di sicurezza di base per la conformità alla NIS 2
La necessaria revisione periodica delle misure di sicurezza di base per la conformità alla NIS 2
La natura ciclica della sicurezza NIS 2 non è un insieme di documenti, ma un sistema vivo, destinato a evolvere nel tempo. Ecco come la revisione periodica delle procedure è lo strumento attraverso cui si esercita un vero comando, coerente con la governance del rischio e con la visione sistemica del decreto NIS
·cybersecurity360.it·
La necessaria revisione periodica delle misure di sicurezza di base per la conformità alla NIS 2
From cheats to exploits: Webrat spreading via GitHub
From cheats to exploits: Webrat spreading via GitHub
We dissect the new Webrat campaign where the Trojan spreads via GitHub repositories, masquerading as critical vulnerability exploits to target cybersecurity researchers.
·securelist.com·
From cheats to exploits: Webrat spreading via GitHub
Nissan says thousands of customers exposed in Red Hat breach
Nissan says thousands of customers exposed in Red Hat breach
Nissan Motor Co. Ltd. (Nissan) has confirmed that information of thousands of its customers has been compromised after the data breach at Red Hat in September.
·bleepingcomputer.com·
Nissan says thousands of customers exposed in Red Hat breach
New MacSync malware dropper evades macOS Gatekeeper checks
New MacSync malware dropper evades macOS Gatekeeper checks
The latest variant of the MacSync information stealer targeting macOS systems is delivered through a digitally signed, notarized Swift application.
·bleepingcomputer.com·
New MacSync malware dropper evades macOS Gatekeeper checks
CISA flags ASUS Live Update CVE, but the attack is years old
CISA flags ASUS Live Update CVE, but the attack is years old
An ASUS Live Update vulnerability tracked as CVE-2025-59374 has been making the rounds in infosec feeds, with some headlines implying recent or ongoing exploitation. A closer look, however, shows the CVE documents a historic supply-chain attack in an End-of-Life (EoL) software product, not a new attack.
·bleepingcomputer.com·
CISA flags ASUS Live Update CVE, but the attack is years old
Interpol-led action decrypts 6 ransomware strains, arrests hundreds
Interpol-led action decrypts 6 ransomware strains, arrests hundreds
An Interpol-coordinated initiative called Operation Sentinel led to the arrest of 574 individuals and the recovery of $3 million linked to business email compromise, extortion, and ransomware incidents.
·bleepingcomputer.com·
Interpol-led action decrypts 6 ransomware strains, arrests hundreds
Device Code Phishing: la minaccia che non ruba password, ma compromette gli account utente
Device Code Phishing: la minaccia che non ruba password, ma compromette gli account utente
Il phishing del codice dispositivo provoca la compromissione dell’account, l’esfiltrazione di dati e molto altro ancora. Ecco come proteggersi dal Device Code Phishing, la forma di phishing che non ruba la password, ma si fa regalare un token OAuth dall’utente
·cybersecurity360.it·
Device Code Phishing: la minaccia che non ruba password, ma compromette gli account utente
Cyber security: com’è cambiata e cosa aspettarsi per il futuro, con uno sguardo all’AI
Cyber security: com’è cambiata e cosa aspettarsi per il futuro, con uno sguardo all’AI
In soli dieci anni, dal 2015 al 2025, la cyber security ha subito una profonda trasformazione guidata dall’evoluzione tecnologica e dalla maturazione del crimine informatico e in cui, negli ultimi tempi, sta giocando un ruolo di primo piano l’intelligenza artificiale
·cybersecurity360.it·
Cyber security: com’è cambiata e cosa aspettarsi per il futuro, con uno sguardo all’AI
Malicious npm package steals WhatsApp accounts and messages
Malicious npm package steals WhatsApp accounts and messages
A malicious package in the Node Package Manager (NPM) registry poses as a legitimate WhatsApp Web API library to steal WhatsApp messages, collect contacts, and gain access to the account.
·bleepingcomputer.com·
Malicious npm package steals WhatsApp accounts and messages
Romanian water authority hit by ransomware attack over weekend
Romanian water authority hit by ransomware attack over weekend
Romanian Waters (Administrația Națională Apele Române), the country's water management authority, was hit by a ransomware attack over the weekend.
·bleepingcomputer.com·
Romanian water authority hit by ransomware attack over weekend
Coupang breach affecting 33.7 million users raises data protection questions
Coupang breach affecting 33.7 million users raises data protection questions
Coupang disclosed a data breach affecting 33.7 million customers after unauthorized access to personal data went undetected for nearly five months. Penta Security explains how the incident highlights insider credential abuse risks and why encrypting customer data beyond legal requirements can reduce exposure and limit damage.
·bleepingcomputer.com·
Coupang breach affecting 33.7 million users raises data protection questions