Over Security

Over Security

31463 bookmarks
Custom sorting
Quando i sistemi di intelligenza artificiale possono collassare
Quando i sistemi di intelligenza artificiale possono collassare
La possibilità di degradazione esiste e le conseguenze potrebbero impattare su più fronti: affidabilità dei dati, sicurezza e modelli economici. Gli esperti: attenti, in alcuni casi si rischia di non poter più tornare indietro
·cybersecurity360.it·
Quando i sistemi di intelligenza artificiale possono collassare
Cellik Android malware builds malicious versions from Google Play apps
Cellik Android malware builds malicious versions from Google Play apps
A new Android malware-as-a-service (MaaS) named Cellik is being advertised on underground cybercrime forums offering a robust set of capabilities that include the option to embed it in any app available on the Google Play Store.
·bleepingcomputer.com·
Cellik Android malware builds malicious versions from Google Play apps
GhostPoster attacks hide malicious JavaScript in Firefox addon logos
GhostPoster attacks hide malicious JavaScript in Firefox addon logos
A new campaign dubbed 'GhostPoster' is hiding JavaScript code in the image logo of malicious Firefox extensions counting more than 50,000 downloads, to monitor browser activity and plant a backdoor.
·bleepingcomputer.com·
GhostPoster attacks hide malicious JavaScript in Firefox addon logos
Amazon disrupts Russian GRU hackers attacking edge network devices
Amazon disrupts Russian GRU hackers attacking edge network devices
The Amazon Threat Intelligence team has disrupted active operations attributed to hackers working for the Russian foreign military intelligence agency, the GRU, who targeted customers' cloud infrastructure.
·bleepingcomputer.com·
Amazon disrupts Russian GRU hackers attacking edge network devices
Texas sues TV makers for taking screenshots of what people watch
Texas sues TV makers for taking screenshots of what people watch
The Texas Attorney General sued five major television manufacturers, accusing them of illegally collecting their users' data by secretly recording what they watch using Automated Content Recognition (ACR) technology.
·bleepingcomputer.com·
Texas sues TV makers for taking screenshots of what people watch
Hackers exploit newly patched Fortinet auth bypass flaws
Hackers exploit newly patched Fortinet auth bypass flaws
Hackers are exploiting critical-severity vulnerabilities affecting multiple Fortinet products to get unauthorized access to admin accounts and steal system configuration files.
·bleepingcomputer.com·
Hackers exploit newly patched Fortinet auth bypass flaws
Polheepo: il chip tutto italiano che promette di risolvere i problemi di sovranità digitale
Polheepo: il chip tutto italiano che promette di risolvere i problemi di sovranità digitale
Progettazione e avvio della sperimentazione per Polheepo, il chip tutto italiano che può supportare applicazioni di intelligenza artificiale e di crittografia post-quantica e che potrebbe risolvere i problemi di sovranità digitale del nostro Paese. Ecco tutto quello che c’è da sapere
·cybersecurity360.it·
Polheepo: il chip tutto italiano che promette di risolvere i problemi di sovranità digitale
Cyberattack disrupts Venezuelan oil giant PDVSA's operations
Cyberattack disrupts Venezuelan oil giant PDVSA's operations
Petróleos de Venezuela (PDVSA), Venezuela's state-owned oil company, was hit by a cyberattack over the weekend that disrupted its export operations.
·bleepingcomputer.com·
Cyberattack disrupts Venezuelan oil giant PDVSA's operations
Rischio professionale del CISO: quando la sicurezza diventa responsabilità penale
Rischio professionale del CISO: quando la sicurezza diventa responsabilità penale
La trasformazione del CISO da tecnico a figura strategica con responsabilità legali richiede evoluzione parallela delle protezioni professionali per garantire sostenibilità di lungo termine del ruolo. Che c’è da sapere
·cybersecurity360.it·
Rischio professionale del CISO: quando la sicurezza diventa responsabilità penale
The Hidden Risk in Virtualization: Why Hypervisors are a Ransomware Magnet
The Hidden Risk in Virtualization: Why Hypervisors are a Ransomware Magnet
Ransomware groups are targeting hypervisors to maximize impact, allowing a single breach to encrypt dozens of virtual machines at once. Drawing on real-world incident data, Huntress explains how attackers exploit visibility gaps at the hypervisor layer and outlines steps orgs can take to harden virtualization infrastructure.
·bleepingcomputer.com·
The Hidden Risk in Virtualization: Why Hypervisors are a Ransomware Magnet
Most Parked Domains Now Serving Malicious Content
Most Parked Domains Now Serving Malicious Content
Direct navigation -- the act of visiting a website by manually typing a domain name in a web browser -- has never been riskier: A new study finds the vast majority of "parked" domains -- mostly expired or dormant domain…
·krebsonsecurity.com·
Most Parked Domains Now Serving Malicious Content
European authorities dismantle call center fraud ring in Ukraine
European authorities dismantle call center fraud ring in Ukraine
European law enforcement authorities dismantled a fraud network operating call centers in Ukraine that scammed victims across Europe out of more than 10 million euros.
·bleepingcomputer.com·
European authorities dismantle call center fraud ring in Ukraine
Classificare ciò che conta: come mappare attività e servizi per la conformità alla NIS 2
Classificare ciò che conta: come mappare attività e servizi per la conformità alla NIS 2
L’articolo 30 del decreto NIS 2 riguarda un processo strategico di autoconoscenza organizzativa e mostra perché, senza l’attuazione di tale articolo, nessun sistema di sicurezza può dirsi credibile. Più che un adempimento, è una radiografia operativa
·cybersecurity360.it·
Classificare ciò che conta: come mappare attività e servizi per la conformità alla NIS 2
PornHub extorted after hackers steal Premium member activity data
PornHub extorted after hackers steal Premium member activity data
Adult video platform PornHub is being extorted by the ShinyHunters extortion gang after the search and watch history of its Premium members was reportedly stolen in a recent Mixpanel data breach.
·bleepingcomputer.com·
PornHub extorted after hackers steal Premium member activity data
SoundCloud confirms breach after member data stolen, VPN access disrupted
SoundCloud confirms breach after member data stolen, VPN access disrupted
Audio streaming platform SoundCloud has confirmed that outages and VPN connection issues over the past few days were caused by a security breach in which threat actors stole a database containing user information.
·bleepingcomputer.com·
SoundCloud confirms breach after member data stolen, VPN access disrupted
Askul confirms theft of 740k customer records in ransomware attack
Askul confirms theft of 740k customer records in ransomware attack
Japanese e-commerce giant Askul Corporation has confirmed that RansomHouse hackers stole around 740,000 customer records in the ransomware attack it suffered in October.
·bleepingcomputer.com·
Askul confirms theft of 740k customer records in ransomware attack