Over Security

Over Security

31463 bookmarks
Custom sorting
New SantaStealer malware steals data from browsers, crypto wallets
New SantaStealer malware steals data from browsers, crypto wallets
A new malware-as-a-service (MaaS) information stealer named SantaStealer is being advertised on Telegram and hacker forums as operating in memory to avoid file-based detection.
·bleepingcomputer.com·
New SantaStealer malware steals data from browsers, crypto wallets
PornHub extorted after hackers steal Premium member activity data
PornHub extorted after hackers steal Premium member activity data
Adult video platform PornHub is being extorted by the ShinyHunters extortion gang after the search and watch history of its Premium members was reportedly stolen in a recent Mixpanel data breach.
·bleepingcomputer.com·
PornHub extorted after hackers steal Premium member activity data
Ongoing SoundCloud issue blocks VPN users with 403 server error
Ongoing SoundCloud issue blocks VPN users with 403 server error
Users accessing the SoundCloud audio streaming platform through a virtual private network (VPN) connection are denied access to the service and see a 403 'forbidden' error.
·bleepingcomputer.com·
Ongoing SoundCloud issue blocks VPN users with 403 server error
700Credit data breach impacts 5.8 million vehicle dealership customers
700Credit data breach impacts 5.8 million vehicle dealership customers
700Credit, a U.S.-based financial services and fintech company, will start notifying more than 5.8 million people that their personal information has been exposed in a data breach incident.
·bleepingcomputer.com·
700Credit data breach impacts 5.8 million vehicle dealership customers
~/docs/CloudFlare/Bypass+mitigation
~/docs/CloudFlare/Bypass+mitigation
L'adozione di una Content Delivery Network (CDN) come Cloudflare è prassi standard per la mitigazione dei vettori di attacco di Layer 7 e per l'occultamento dell'indirizzo IP d'origine (origin IP)
·blog.lobsec.com·
~/docs/CloudFlare/Bypass+mitigation
Sorveglianza social per i turisti negli Usa: la nuova frontiera della raccolta dati sui viaggiatori
Sorveglianza social per i turisti negli Usa: la nuova frontiera della raccolta dati sui viaggiatori
L'obbligo della raccolta sistematica di dati personali sui social media rientra nel quadro delle procedure previste dal Paperwork Reduction Act, ai fini delle attività di pre-screening dei turisti prima del loro arrivo sul territorio USA. Ecco perché preoccupa
·cybersecurity360.it·
Sorveglianza social per i turisti negli Usa: la nuova frontiera della raccolta dati sui viaggiatori
2025’s Top Phishing Trends and What They Mean for Your Security Strategy
2025’s Top Phishing Trends and What They Mean for Your Security Strategy
Phishing attacks in 2025 increasingly moved beyond email, with attackers using social platforms, search ads, and browser-based techniques to bypass MFA and steal sessions. Push Security outlines the key phishing trends and what security teams need to adjust as identity-based attacks continue to evolve in 2026.
·bleepingcomputer.com·
2025’s Top Phishing Trends and What They Mean for Your Security Strategy
Rischi privacy per la conservazione delle e-mail: cosa prevede il Garante
Rischi privacy per la conservazione delle e-mail: cosa prevede il Garante
Il provvedimento del 10 luglio 2025 del Garante Privacy riguarda il ciclo di vita delle caselle di posta elettronica messe a disposizione dal datore di lavoro e finite in un limbo di conservazione ingiustificata. Ecco cosa impariamo dalla sanzione di 8.000 euro a un’Università chiamata in causa su questa tematica
·cybersecurity360.it·
Rischi privacy per la conservazione delle e-mail: cosa prevede il Garante
Unpacking VStarcam firmware for fun and profit
Unpacking VStarcam firmware for fun and profit
VStarcam firmware comes in lots of varieties and occasional proprietary formats that binwalk cannot handle. This article documents the formats and unpacking methods.
·palant.info·
Unpacking VStarcam firmware for fun and profit
Google links more Chinese hacking groups to React2Shell attacks
Google links more Chinese hacking groups to React2Shell attacks
Over the weekend, ​Google's threat intelligence team linked five more Chinese hacking groups to attacks exploiting the maximum-severity "React2Shell" remote code execution vulnerability.
·bleepingcomputer.com·
Google links more Chinese hacking groups to React2Shell attacks
Le azioni dei CdA in ambito NIS2: le linee guida ACN sulle specifiche di base
Le azioni dei CdA in ambito NIS2: le linee guida ACN sulle specifiche di base
La direttiva NIS2 impone un cambio di paradigma sui profili di responsabilità rispetto al passato. Ecco le disposizioni in tema di responsabilità nei confronti degli organi di amministrazione e direttivi
·cybersecurity360.it·
Le azioni dei CdA in ambito NIS2: le linee guida ACN sulle specifiche di base
French Interior Ministry confirms cyberattack on email servers
French Interior Ministry confirms cyberattack on email servers
The French Interior Minister confirmed on Friday that the country's Ministry of the Interior was breached in a cyberattack that compromised e-mail servers.
·bleepingcomputer.com·
French Interior Ministry confirms cyberattack on email servers
Microsoft: December security updates cause Message Queuing failures
Microsoft: December security updates cause Message Queuing failures
Microsoft has confirmed that the December 2025 security updates are breaking Message Queuing (MSMQ) functionality, affecting enterprise applications and Internet Information Services (IIS) websites.
·bleepingcomputer.com·
Microsoft: December security updates cause Message Queuing failures
Frogblight threatens you with a court case: a new Android banker targets Turkish users
Frogblight threatens you with a court case: a new Android banker targets Turkish users
Kaspersky researchers have discovered a new Android banking Trojan targeting Turkish users and posing as an app for accessing court case files via an official government webpage. The malware is being actively developed and may become MaaS in the future.
·securelist.com·
Frogblight threatens you with a court case: a new Android banker targets Turkish users
Should You Trust Your VPN Location?
Should You Trust Your VPN Location?
17 out of 20 popular VPNs exit traffic from different countries than they claim. Dig into what that means and why it matters in our VPN report.
Mullvad
·ipinfo.io·
Should You Trust Your VPN Location?
CyberVolk’s ransomware debut stumbles on cryptography weakness
CyberVolk’s ransomware debut stumbles on cryptography weakness
The pro-Russia hacktivist group CyberVolk launched a ransomware-as-a-service (RaaS) called VolkLocker that suffered from serious implementation flaws, allowing victims to potentially decrypt files for free.
·bleepingcomputer.com·
CyberVolk’s ransomware debut stumbles on cryptography weakness
Beware: PayPal subscriptions abused to send fake purchase emails
Beware: PayPal subscriptions abused to send fake purchase emails
An email scam is abusing abusing PayPal's "Subscriptions" billing feature to send legitimate PayPal emails that contain fake purchase notifications embedded in the Customer service URL field.
·bleepingcomputer.com·
Beware: PayPal subscriptions abused to send fake purchase emails