Over Security

Over Security

31463 bookmarks
Custom sorting
Libbiosig, Grassroot DiCoM, Smallstep step-ca vulnerabilities
Libbiosig, Grassroot DiCoM, Smallstep step-ca vulnerabilities
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed vulnerabilities in Biosig Project Libbiosig, Grassroot DiCoM, and Smallstep step-ca. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisco’s third-party vulnerability disclosure policy, except for Grassroot, as the DiCoM vulnerabilities are zero-days. For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets
·blog.talosintelligence.com·
Libbiosig, Grassroot DiCoM, Smallstep step-ca vulnerabilities
WhatsApp device linking abused in account hijacking attacks
WhatsApp device linking abused in account hijacking attacks
Threat actors are abusing the legitimate device-linking feature to hijack WhatsApp accounts via pairing codes in a campaign dubbed GhostPairing.
·bleepingcomputer.com·
WhatsApp device linking abused in account hijacking attacks
Cisco warns of unpatched AsyncOS zero-day exploited in attacks
Cisco warns of unpatched AsyncOS zero-day exploited in attacks
​Cisco warned customers today of an unpatched, maximum-severity Cisco AsyncOS zero-day actively exploited in attacks targeting Secure Email Gateway (SEG) and Secure Email and Web Manager (SEWM) appliances.
·bleepingcomputer.com·
Cisco warns of unpatched AsyncOS zero-day exploited in attacks
Sonicwall warns of new SMA1000 zero-day exploited in attacks
Sonicwall warns of new SMA1000 zero-day exploited in attacks
SonicWall warned customers today to patch a vulnerability in the SonicWall SMA1000 Appliance Management Console (AMC) that was chained in zero-day attacks to escalate privileges.
·bleepingcomputer.com·
Sonicwall warns of new SMA1000 zero-day exploited in attacks
UAT-9686 actively targets Cisco Secure Email Gateway and Secure Email and Web Manager
UAT-9686 actively targets Cisco Secure Email Gateway and Secure Email and Web Manager
Cisco Talos is tracking the active targeting of Cisco AsyncOS Software for Cisco Secure Email Gateway, formerly known as Cisco Email Security Appliance (ESA), and Cisco Secure Email and Web Manager, formerly known as Cisco Content Security Management Appliance (SMA).
·blog.talosintelligence.com·
UAT-9686 actively targets Cisco Secure Email Gateway and Secure Email and Web Manager
Critical React2Shell flaw exploited in ransomware attacks
Critical React2Shell flaw exploited in ransomware attacks
A ransomware gang exploited the critical React2Shell vulnerability (CVE-2025-55182) to gain initial access to corporate networks and deployed the file-encrypting malware less than a minute later.
·bleepingcomputer.com·
Critical React2Shell flaw exploited in ransomware attacks
Your MFA Is Costing You Millions. It Doesn't Have To.
Your MFA Is Costing You Millions. It Doesn't Have To.
Passwords and app-based MFA add hidden costs through lost productivity, frequent resets, and risk of phishing and social engineering attacks. Token explains how wireless biometric, passwordless authentication eliminates credential-based attacks and delivers measurable financial returns by reducing login time across the enterprise.
·bleepingcomputer.com·
Your MFA Is Costing You Millions. It Doesn't Have To.
Microsoft asks IT admins to reach out for Windows IIS failures fix
Microsoft asks IT admins to reach out for Windows IIS failures fix
Microsoft has asked businesses to reach out for advice on how to temporarily mitigate a Message Queuing (MSMQ) issue causing enterprise apps and Internet Information Services (IIS) sites to fail.
·bleepingcomputer.com·
Microsoft asks IT admins to reach out for Windows IIS failures fix
Lexi DiScola’s guide to global teamwork and overflowing TBRs
Lexi DiScola’s guide to global teamwork and overflowing TBRs
Lexi DiScola shares how her unconventional path led her to global cyber threat analysis and highlights the power of diverse backgrounds on an international team
·blog.talosintelligence.com·
Lexi DiScola’s guide to global teamwork and overflowing TBRs
Lexi DiScola’s guide to global teamwork and overflowing TBRs
Lexi DiScola’s guide to global teamwork and overflowing TBRs
Lexi DiScola shares how her unconventional path led her to global cyber threat analysis and highlights the power of diverse backgrounds on an international team
·blog.talosintelligence.com·
Lexi DiScola’s guide to global teamwork and overflowing TBRs
Trend cyber 2026: attacchi AI-driven, progresso quantistico e pressione normativa
Trend cyber 2026: attacchi AI-driven, progresso quantistico e pressione normativa
Si prevede che l'anno prossimo accelererà lo sviluppo di agenti AI sempre più autonomi e del calcolo quantistico, mentre le normative entrano nel vivo, anche per aumentare la resilienza. Ecco i consigli degli esperti per non farsi cogliere impreparati dalle nuove tendenze cyber che plasmeranno il 2026
·cybersecurity360.it·
Trend cyber 2026: attacchi AI-driven, progresso quantistico e pressione normativa