Over Security

Over Security

31463 bookmarks
Custom sorting
Aggiornamenti Microsoft dicembre 2025: corretta una zero-day già sfruttata in rete
Aggiornamenti Microsoft dicembre 2025: corretta una zero-day già sfruttata in rete
Con il Patch Tuesday di dicembre 2025 Microsoft è intervenuta per correggere 57 vulnerabilità in Windows e nelle applicazioni. Gli aggiornamenti intervengono anche su una zero-day già sfruttata e su altre due vulnerabilità per le quali risulta disponibile un PoC in rete. Ecco tutti i dettagli
·cybersecurity360.it·
Aggiornamenti Microsoft dicembre 2025: corretta una zero-day già sfruttata in rete
Perché Bitcoin e altre criptovalute sono crollate
Perché Bitcoin e altre criptovalute sono crollate
Era atteso il boom e invece è arrivato il crollo: per molti versi, Bitcoin e i suoi fratelli sono vittima del loro stesso successo e della crescente adozione istituzionale.
·guerredirete.it·
Perché Bitcoin e altre criptovalute sono crollate
La relazione annuale del CISO nel modello NIS 2: un tassello della resilienza aziendale
La relazione annuale del CISO nel modello NIS 2: un tassello della resilienza aziendale
La relazione annuale del CISO, pur non essendo prevista come adempimento formale nel sistema disegnato dalla NIS 2, è uno strumento con cui governare il rischio e orientare risorse e priorità. Ecco perché potrebbe diventare un asse portante della governance
·cybersecurity360.it·
La relazione annuale del CISO nel modello NIS 2: un tassello della resilienza aziendale
Microsoft Patch Tuesday for December 2025 — Snort rules and prominent vulnerabilities
Microsoft Patch Tuesday for December 2025 — Snort rules and prominent vulnerabilities
The Patch Tuesday for December of 2025 includes 57 vulnerabilities, including two that Microsoft marked as “critical.” The remaining vulnerabilities listed are classified as “important.” Microsoft assessed that exploitation of the two “critical” vulnerabilities is “less likely.”
·blog.talosintelligence.com·
Microsoft Patch Tuesday for December 2025 — Snort rules and prominent vulnerabilities
Microsoft Patch Tuesday, December 2025 Edition
Microsoft Patch Tuesday, December 2025 Edition
Microsoft today pushed updates to fix at least 56 security flaws in its Windows operating systems and supported software. This final Patch Tuesday of 2025 tackles one zero-day bug that is already being exploited, as well as two publicly disclosed…
·krebsonsecurity.com·
Microsoft Patch Tuesday, December 2025 Edition
Competizione Ibrida e risposta multi-dominio: la riorganizzazione della Difesa nel Piano Crosetto
Competizione Ibrida e risposta multi-dominio: la riorganizzazione della Difesa nel Piano Crosetto
Il dominio cyber è il terreno principale della competizione ibrida. Lo sviluppo di una nuova concezione di cyber defence passa per la riorganizzazione omnicomprensiva, flessibile e adattabile nell’ambito di tutti i domini nelle dimensioni fisica, virtuale e cognitiva. Ecco perché il paradigma non è più solo difendersi, ma prevenire
·cybersecurity360.it·
Competizione Ibrida e risposta multi-dominio: la riorganizzazione della Difesa nel Piano Crosetto
Windows PowerShell now warns when running Invoke-WebRequest scripts
Windows PowerShell now warns when running Invoke-WebRequest scripts
Microsoft says Windows PowerShell now warns when running scripts that use the Invoke-WebRequest cmdlet to download web content, aiming to prevent potentially risky code from executing.
·bleepingcomputer.com·
Windows PowerShell now warns when running Invoke-WebRequest scripts
Windows 11 KB5072033 & KB5071417 cumulative updates released
Windows 11 KB5072033 & KB5071417 cumulative updates released
Microsoft has released Windows 11 KB5072033 and KB5071417 cumulative updates for versions 25H2/24H2 and 23H2 to fix security vulnerabilities, bugs, and add new features.
·bleepingcomputer.com·
Windows 11 KB5072033 & KB5071417 cumulative updates released
Fortinet warns of critical FortiCloud SSO login auth bypass flaws
Fortinet warns of critical FortiCloud SSO login auth bypass flaws
Fortinet has released security updates to address two critical vulnerabilities in FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager that could allow attackers to bypass FortiCloud SSO authentication.
·bleepingcomputer.com·
Fortinet warns of critical FortiCloud SSO login auth bypass flaws
Maintaining enterprise IT hygiene using Wazuh SIEM/XDR
Maintaining enterprise IT hygiene using Wazuh SIEM/XDR
Poor IT hygiene, such as unused accounts, outdated software, and risky extensions, creates hidden exposure in your infrastructure. Wazuh, the open-source XDR and SIEM, shows how continuous inventory monitoring across endpoints helps teams spot drift and tighten security.
·bleepingcomputer.com·
Maintaining enterprise IT hygiene using Wazuh SIEM/XDR
Ivanti warns of critical Endpoint Manager code execution flaw
Ivanti warns of critical Endpoint Manager code execution flaw
American IT software company Ivanti warned customers today to patch a newly disclosed vulnerability in its Endpoint Manager (EPM) solution that could allow attackers to execute code remotely.
·bleepingcomputer.com·
Ivanti warns of critical Endpoint Manager code execution flaw
Spain arrests teen who stole 64 million personal data records
Spain arrests teen who stole 64 million personal data records
The National Police in Spain have arrested a suspected 19-year-old hacker in Barcelona, for allegedly stealing and attempting to sell 64 million records obtained from breaches at nine companies.
·bleepingcomputer.com·
Spain arrests teen who stole 64 million personal data records
North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks
North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks
A new malware implant called EtherRAT, deployed in a recent React2Shell attack, runs five separate Linux persistence mechanisms and leverages Ethereum smart contracts for communication with the attacker.
·bleepingcomputer.com·
North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks
Ransomware IAB abuses EDR for stealthy malware execution
Ransomware IAB abuses EDR for stealthy malware execution
An initial access broker tracked as Storm-0249 is abusing endpoint detection and response solutions and trusted Microsoft Windows utilities to load malware, establish communication, and persistence in preparation for ransomware attacks.
·bleepingcomputer.com·
Ransomware IAB abuses EDR for stealthy malware execution
Il CISO come risk manager: dieci driver per mappare business e minacce
Il CISO come risk manager: dieci driver per mappare business e minacce
La mappatura degli elementi di business ai driver del rischio è ormai una necessità operativa per ogni organizzazione che gestisce asset strategici. In questo contesto, il CISO deve trasformarsi da responsabile della sicurezza IT a orchestratore della resilienza organizzativa. Ecco come
·cybersecurity360.it·
Il CISO come risk manager: dieci driver per mappare business e minacce
Malware Analysis
Malware Analysis
Managed Detection & Response services (MDR) 24/7 for network, endpoint, cloud, SaaS and OT, against every type of cyber attack
·certego.net·
Malware Analysis
New FvncBot Android banking trojan targets Poland | Intel 471
New FvncBot Android banking trojan targets Poland | Intel 471
Intel 471 discovered a new Android trojan, FvncBot, that masquerades as a security application for mBank, a major Polish bank. Our Malware Intelligence team analyzed its code, which is new and not based on other leaked malware code.
·intel471.com·
New FvncBot Android banking trojan targets Poland | Intel 471
Microsoft investigates Copilot outage affecting users in Europe
Microsoft investigates Copilot outage affecting users in Europe
Microsoft is working to mitigate an ongoing incident that has been blocking users in Europe from accessing the company's AI-powered Copilot digital assistant.
·bleepingcomputer.com·
Microsoft investigates Copilot outage affecting users in Europe