Toute l'actualité de la Cybersécurité
Critical CVE-2025-59367 flaw lets hackers access ASUS DSL routers remotely
2025-11-14 19:16:01
ASUS fixed a critical auth-bypass flaw (CVE-2025-59367) in DSL routers that let remote, unauthenticated attackers access devices with ease. ASUS patched a critical auth-bypass flaw, tracked as CVE-2025-59367...
Beware of Phishing Emails as Spam Filter Alerts Steal Your Email Logins in a Blink
2025-11-14 18:54:33
Cybercriminals have launched a new phishing campaign that tricks users by impersonating legitimate spam-filter notifications from their own company. These fake emails claim that your organization recently...
COP Rating Affirmed At 'AA' - S&P Global
2025-11-14 18:45:41
In addition, the state's recent cyber attack posed a governance concern, but we believe the state's response and its priority to fund key ...
Anthropic claims of Claude AI-automated cyberattacks met with doubt
2025-11-14 18:31:16
Anthropic reports that a Chinese state-sponsored threat group, tracked as GTG-1002, carried out a cyber-espionage operation that was largely automated through the abuse of the company's Claude Code AI...
North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
2025-11-14 18:25:00
The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services to stage malicious payloads.
"The threat actors have recently...
Jaguar Land Rover cyber attack cost company nearly £200 million - Yahoo News UK
2025-11-14 18:07:35
Chancellor Rachel Reeves has blamed the drop in GDP on the cyber attack that crippled production at Jaguar Land Rover. She said, "this quarter clearly ...
Jaguar Land Rover cyber attack cost company nearly £200 million - AOL.com
2025-11-14 18:01:22
The manufacturer revealed costs of £196 million relating to the cyber attack. Show comments.
CISA Warns of Active Attacks on Cisco ASA and Firepower Flaws
2025-11-14 17:48:54
CISA issues an urgent directive for all organizations to patch Cisco ASA and Firepower devices against CVE-2025-20362 and CVE-2025-20333, exploited in the ArcaneDoor campaign. Verify the correct version...
Malicious npm Package with 206k Downloads Attacking GitHub-Owned Repositories to Exfiltrate Tokens
2025-11-14 17:42:46
On November 7th, security researchers discovered a dangerous malicious npm package called “@acitons/artifact” that had already been downloaded more than 206,000 times. The package was designed...
Keeper Security Unveils Secure Secrets Management in Visual Studio Code
2025-11-14 17:05:32
Keeper Security has announced the launch of its Visual Studio Code (VS Code) extension, extending its enterprise-grade secrets management directly into developers' coding environments. The VS Code extension...
Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks
2025-11-14 17:00:42
Fortinet has silently patched a critical zero-day vulnerability in its FortiWeb web application firewall, which is now being widely exploited. [...]
How to Govern Agentic AI Before It Governs You
2025-11-14 16:56:36
This article introduces the Agentic AI Governance Framework—a practical, implementation-ready approach for managing risk in autonomous AI systems. It outlines six core principles for traceability, monitoring,...
Content Moderation is a Must for Online Businesses
2025-11-14 16:47:15
Content moderation is now essential as online platforms overflow with user-generated content. This article explains what moderation is, how it works, and why businesses rely on it to prevent misinformation,...
AI firm claims it stopped Chinese state-sponsored cyber-attack campaign - The Guardian
2025-11-14 16:42:52
... cyber-attack campaign. Anthropic says hackers used its software to attack financial firms and government agencies around world.
Regulators informed about possibility of JLR customer data leak due to cyber attack: Tata Motors
2025-11-14 16:34:43
Jaguar Land Rover has alerted regulators to a possible customer data leak after a cyber attack. This incident halted global manufacturing and led ...
Be careful responding to unexpected job interviews
2025-11-14 16:30:38
Contacted out of the blue for a virtual interview? Be cautious. Attackers are using fake interviews to slip malware onto your device.
Checkout.com snubs hackers after data breach, to donate ransom instead
2025-11-14 16:25:42
UK financial technology company Checkout announced that the ShinyHunters threat group has breached one of its legacy cloud storage systems and is now extorting the company for a ransom. [...]
Jaguar Land Rover cyber attack costs firm £485m in the quarter - Computer Weekly
2025-11-14 16:21:30
Jaguar Land Rover's quarterly financial statement discloses £485m in revenue lost to the late August cyber attack that halted production for six ...
Kubernetes : les 17 premières plates-formes « certifiées IA »
2025-11-14 16:20:46
Une quinzaine de fournisseurs ont (auto)certifié des solutions sur la base de la "spécification IA" récemment établie par la CNCF.
The post Kubernetes : les 17 premières plates-formes « certifiées...
JLR cyber attack hits Tata Motors PV Q2 business, domestic sales gain momentum - ET Auto
2025-11-14 16:18:41
JLR Cyber Attack Impact On Tata Motors: Tata Motors faces a £791 million cash flow hit due to JLR's cyber attack, while domestic sales show ...
How Cartesi's New Fraud-Proof System Could Change Rollup Security Forever
2025-11-14 16:12:18
Cartesi launches Honeypot v2 with Permissionless Refereed Tournaments, introducing bond mechanisms that protect validators from delay attacks.
Chinese State Hackers Jailbroke Claude AI Code for Automated Breaches
2025-11-14 16:06:45
Anthropic, the developer behind Claude AI, says a Chinese state sponsored group used its model to automate most of a cyber espionage operation against about 30 companies with Claude handling up to 90%...
The HackerNoon Newsletter: The DeFAI Crucible: Navigating Trust and Automation in a Nascent Market (11/14/2025)
2025-11-14 16:02:06
How are you, hacker?
🪐 What's happening in tech today, November 14, 2025?
The
HackerNoon Newsletter
brings the HackerNoon
...
Jaguar Land Rover cyber-attack cost nearly £200m - Fleet World
2025-11-14 15:38:30
The cyber-attack on Jaguar Land Rover Automotive Plc (JLR) cost the company nearly £200m, newly posted financial results reveal.
Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
2025-11-14 15:20:00
Cybersecurity researchers have uncovered critical remote code execution vulnerabilities impacting major artificial intelligence (AI) inference engines, including those from Meta, Nvidia, Microsoft, and...
Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims
2025-11-14 15:05:15
“The threat actor manipulated [Anthropic's large language model] Claude into functioning as an autonomous cyber attack agent performing cyber ...
The staggering cost of cyber attack on Jaguar Land Rover revealed - The Independent
2025-11-14 15:05:12
The cyber attack is estimated to be the UK's most economically damaging hack, costing the country £1.9 billion and impacting approximately 5,000 ...
Telegraph future in limbo again as RedBird abandons £500m deal - YouTube
2025-11-14 15:04:36
... . PBS Terra New 226K views · 8:32 · Go to channel · Ed Conway: The cyber attack that tipped a flatlining economy. Sky News New 88K views · 18:49.
Jaguar Land Rover posts heavy loss after devastating cyber attack - Financial Times
2025-11-14 14:58:50
Jaguar Land Rover has suffered deep losses after a devastating cyber attack shut down vehicle production for more than a month and led to a ...
Millions of sites at risk from Imunify360 critical flaw exploit
2025-11-14 14:58:49
A vulnerability affecting Imunify360 lets attackers run code via malicious file uploads, risking millions of websites. A vulnerability in ImunifyAV/Imunify360 allows attackers to upload malicious files...
US announces new strike force targeting Chinese crypto scammers
2025-11-14 14:54:30
U.S. federal authorities have established a new task force to disrupt Chinese cryptocurrency scam networks that defraud Americans of nearly billion annually. [...]
Madrid Approves New Digital Business Center Merging 700 Years of Academia With AI
2025-11-14 14:47:09
The University of Alcalá and ISDI will create a new Higher Education Center in Madrid. The new Center will focus on education around innovation, digital environments and artificial intelligence. The...
Europe Races to Lead Stablecoin Payments Under New MiCA Rules
2025-11-14 14:44:40
A new report by EasyStaff reveals that 70% of freelancer payouts are made in stablecoins. The volume of corporate deposits also rose nearly sevenfold in just one year, climbing from 5% to 13%. As more...
Chinese Tech Firm Leak Reportedly Exposes State Linked Hacking
2025-11-14 14:41:35
A massive data leak reportedly at Chinese firm Knownsec (Chuangyu) exposed 12,000 files detailing state-backed 'cyber weapons' and spying on over 20 countries. See the details, including 95GB of stolen...
Iranian Hackers Launch ‘SpearSpecter' Spy Operation on Defense & Government Targets
2025-11-14 14:40:00
The Iranian state-sponsored threat actor known as APT42 has been observed targeting individuals and organizations that are of interest to the Islamic Revolutionary Guard Corps (IRGC) as part of a new...
Inside ‘DARPAVERSE': The U.S. Military's Next Big Leap in Predictive Warfare Technology
2025-11-14 14:31:34
DARPA is putting out a “program competition” to create a ‘DARPAVERSE' platform to model and simulate scenarios for optimizing military operations. The idea is to keep improving upon modeling systems...
NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation
2025-11-14 14:23:08
NVIDIA has issued a critical security update addressing two high-severity vulnerabilities in its NeMo Framework that could allow attackers to execute malicious code and escalate privileges on affected...
SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT
2025-11-14 14:17:08
The SmartApeSG campaign, also known as ZPHP or HANEY MANEY, continues to evolve its attack methods to compromise Windows systems with malicious remote access tools. First reported in June 2024, this campaign...
Cisco Catalyst Center Vulnerability Allows Attackers to Escalate Privileges
2025-11-14 14:12:22
A critical security vulnerability has been identified in the Cisco Catalyst Center Virtual Appliance that could enable authenticated, remote attackers to escalate their privileges to Administrator on...
Meet Manc Sport, Reinforce Lab Limited, and Klatch Technologies: HackerNoon Startups of the Week
2025-11-14 14:00:10
This week's HackerNoon Startups of The Week spotlight three trailblazers: Manc Sport, Reinforce Lab Limited, and Klatch Technologies.
The DeFAI Crucible: Navigating Trust and Automation in a Nascent Market
2025-11-14 14:00:04
Optimal trustlessness and cybersecurity evade both sides – DeFi and AI – of the DeFAI industry, resulting in B erased from DeFi due to breaches and hacks since 2020. Putting them together into...
Multiple Cisco Unified CCX Vulnerabilities Enable Arbitrary Command Execution by Attackers
2025-11-14 13:36:02
Cisco has disclosed critical security vulnerabilities affecting Cisco Unified Contact Center Express (Unified CCX) that could enable unauthenticated, remote attackers to execute arbitrary commands, escalate...
Cybersecurity Lessons For Leaders: Designing Resilience at Scale
2025-11-14 13:33:23
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Nov. 14, 2025 – Read the full story in Forbes “As an AI entrepreneur and cybersecurity leader, I've watched...
RONINGLOADER Uses Signed Drivers to Disable Microsoft Defender and Bypass EDR
2025-11-14 13:18:12
Elastic Security Labs has uncovered a sophisticated campaign deploying a newly identified loader, dubbed RONINGLOADER, that weaponizes legitimately signed kernel drivers to systematically disable Microsoft...
Hackers Exploit Rogue MCP Server to Inject Malicious Code into Cursor's Built-In Browser
2025-11-14 13:16:08
Security researchers have uncovered a critical vulnerability in Cursor, the AI-powered code editor, that allows attackers to inject malicious code through rogue Model Context Protocol (MCP) servers. Unlike...
NVIDIA NeMo Flaw Enables Code Injection and Privilege Escalation Attacks
2025-11-14 12:59:14
NVIDIA has released critical security patches addressing two high-severity vulnerabilities in its NeMo Framework that could allow attackers to execute arbitrary code and escalate privileges on affected...
Cybercriminals Use Fake Invoices to Deploy XWorm and Steal Login Credentials
2025-11-14 12:54:26
Cybercriminals are deploying sophisticated phishing campaigns that weaponize seemingly legitimate invoice emails to distribute Backdoor.XWorm is a dangerous remote-access trojan (RAT) capable of stealing...
Critical FortiWeb flaw under attack, allowing complete compromise
2025-11-14 12:41:05
A Fortinet FortiWeb auth-bypass flaw is being actively exploited, allowing attackers to hijack admin accounts and fully compromise devices. Researchers warn of an authentication bypass flaw in Fortinet...
Advanced macOS DigitStealer Uses Multi-Stage Attack Chain to Evade Detection
2025-11-14 12:31:36
Jamf Threat Labs has identified a new family of malicious stealers tracked as DigitStealer, representing a significant evolution in macOS-targeted malware. Unlike traditional infostealers that follow...
Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects
2025-11-14 12:29:53
Cybersecurity researchers have uncovered a sophisticated campaign where threat actors abuse legitimate JSON storage services to deliver malware to software developers. The campaign, known as Contagious...
Agent 365 : vers un nouveau modèle économique chez Microsoft
2025-11-14 12:22:57
Microsoft s'apprêterait à ériger certains agents au rang d'utilisateurs inscrits dans l'organigramme d'entreprise et ayant chacun sa licence.
The post Agent 365 : vers un nouveau modèle économique...
Your passport, now on your iPhone. Helpful or risky?
2025-11-14 12:17:21
Apple's Digital ID makes travel smoother and saves you from digging for documents, but it comes with privacy and security trade-offs. We break down the pros and cons.
Formbook Malware Campaign Uses Malicious ZIP Files and Layered Scripting Techniques
2025-11-14 12:07:35
A new campaign leveraging Formbook malware has emerged, showcasing sophisticated multi-stage infection tactics that underscore the importance of analyzing more than just executable files during malware...
L'UE examine les engagements de SAP pour clore une enquête antitrust
2025-11-14 11:58:37
L'Union européenne lance un test de marché sur les engagements proposés par SAP pour clore son enquête antitrust.
The post L’UE examine les engagements de SAP pour clore une enquête antitrust...
Google backpedals on new Android developer registration rules
2025-11-14 11:54:44
Google is backpedaling on its decision to introduce new identity verification rules for all developers, stating that it will also introduce accounts for limited app distribution and will allow users to...
Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands
2025-11-14 11:38:48
Cisco has released security updates to address two critical vulnerabilities in Unified Contact Center Express (Unified CCX) that could allow unauthenticated attackers to execute arbitrary commands with...
Best 6 Online Retrospective Boards: Which Is Most Fun?
2025-11-14 11:38:05
Psychologist and startup founder Christian Heidemeyer has attended more than 220 sprint retrospectives. He knows that keeping these meetings engaging and productive is challenging - but absolutely worth...
Analysis of Multi-Stage Phishing Kits Leveraging Telegram for Credential Theft and Evasion Techniques
2025-11-14 11:28:17
Researchers at Group-IB have uncovered a sophisticated phishing framework that demonstrates how cybercriminals are industrializing credential theft through automation, evasion techniques, and Telegram-based...
Hackers Flooded npm Registry Over 43,000 Spam Packages Survived for Almost Two Years
2025-11-14 11:22:00
Security researcher Paul McCarty uncovered a significant coordinated spam campaign targeting the npm ecosystem. The IndonesianFoods worm, as it has been named, consists of more than 43,000 spam packages...
Microsoft annualise les mises à jour pour Configuration Manager
2025-11-14 11:04:14
Petit changement pour SCCM (system center configuration manager) de Microsoft. En effet, l'éditeur a annoncé qu'en 2026 le cycle des mises (...)
Kraken Ransomware Targets Windows, Linux, and VMware ESXi in Enterprise Environments
2025-11-14 10:47:22
Cisco Talos has identified an emerging threat from Kraken, a sophisticated cross-platform ransomware group that has emerged from the remnants of the HelloKitty ransomware cartel. In August 2025, the security...
GitHub piège Actions avec un paquet npm malveillant
2025-11-14 10:37:54
Les outils de développement deviennent une cible de plus en plus importante pour les cybercriminels. Dans le catalogue de vecteurs, les paquets (...)
Ransomware's Fragmentation Reaches a Breaking Point While LockBit Returns
2025-11-14 10:37:00
Key Takeaways:
85 active ransomware and extortion groups observed in Q3 2025, reflecting the most decentralized ransomware ecosystem to date.
1,590 victims disclosed across 85 leak sites, showing high,...
What Happens When Telegram's 1 Billion Users Get Access to Ethical AI? AlphaTON Has a Plan
2025-11-14 10:16:04
AlphaTON Capital has partnered with SingularityNET, CUDO Compute, and Vertical Data to deploy hydroelectric-powered GPU infrastructure in Sweden for Telegram's Cocoon AI network. The collaboration addresses...
How Sierra Protocol Plans to Reshape DeFi Yield Generation With Dynamic Rebalancing
2025-11-14 10:15:13
Sierra Protocol launched SIERRA, the first dynamically rebalanced Liquid Yield Token on Avalanche, combining investment-grade RWAs and DeFi protocols into a single, auto-rebalancing portfolio. Built on...
Washington Post Oracle E-Suite 0-Day Hack Impacts 9K+ Employees and Contractors
2025-11-14 10:12:12
The Washington Post has publicly disclosed a significant data breach involving external hacking of its Oracle E-Suite system, impacting over 9,700 employees and contractors worldwide. The breach notification,...
Concurrence dans l'IA : le procès Musk contre Apple et OpenAI aura lieu
2025-11-14 10:08:24
Un juge fédéral valide la plainte de X et xAI, obligeant Apple et OpenAI à répondre aux accusations d'entrave à la concurrence dans l'IA.
The post Concurrence dans l’IA : le procès Musk...
Chinese Hackers Use Anthropic's AI to Launch Automated Cyber Espionage Campaign
2025-11-14 09:53:00
State-sponsored threat actors from China used artificial intelligence (AI) technology developed by Anthropic to orchestrate automated cyber attacks as part of a "highly sophisticated espionage campaign"...
ASUS warns of critical auth bypass flaw in DSL series routers
2025-11-14 09:52:37
ASUS has released new firmware to patch a critical authentication bypass security flaw impacting several DSL series router models. [...]
Comment la virtualisation sur OpenShift a évolué depuis la fusion Broadcom-VMware
2025-11-14 09:42:04
Six versions mineures d'OpenShift sont sorties depuis l'acquisition de VMware par Broadcom. Focus sur l'évolution fonctionnelle de la brique de virtualisation.
The post Comment la virtualisation sur...
Le plan d'Octave Klaba pour remettre OVH sur les rails
2025-11-14 09:39:50
Jeudi 20 novembre prochain, OVH invite ses clients et partenaires à la maison de la Mutualité (Paris) pour la prochaine édition (...)
Germany's BSI issues guidelines to counter evasion attacks targeting LLMs
2025-11-14 09:32:50
Germany's BSI warns of rising evasion attacks on LLMs, issuing guidance to help developers and IT managers secure AI systems. Germany's BSI warns of rising evasion attacks on LLMs, issuing guidance...
Critical Imunify360 AV Vulnerability Exposes 56 Million+ Linux-hosted Websites to RCE Attacks
2025-11-14 09:30:39
A severe remote code execution (RCE) vulnerability has been discovered in Imunify360 AV, a widely used malware scanner protecting approximately 56 million websites. The security flaw, recently patched...
Les données nucléaires au coeur de l'accord EDF avec Bleu et S3NS
2025-11-14 09:14:42
En complément de ses hébergements internes, qui accueillent 80% de ses données selon le groupe, EDF vient de référencer (...)
Malicious Chrome Extension as Ethereum Wallet Enables Full Wallet Takeover
2025-11-14 09:00:55
A deceptive Chrome extension named Safery: Ethereum Wallet has emerged as a serious threat to cryptocurrency users. Published on the Chrome Web Store on November 12, 2024, this extension masquerades as...
Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts
2025-11-14 09:00:00
Cybersecurity researchers are sounding the alert about an authentication bypass vulnerability in Fortinet Fortiweb WAF that could allow an attacker to take over admin accounts and completely compromise...
SUSE Lasso Critical Update for Denial of Service Issues 2025:4094-1
2025-11-14 08:30:12
* bsc#1253092 * bsc#1253093 * bsc#1253094 * bsc#1253095
Washington Post notifies 10,000 individuals affected in Oracle-linked data theft
2025-11-14 08:30:05
The Washington Post alerts nearly 10,000 employees and contractors that personal and financial data was exposed in the Oracle breach. The Washington Post warns nearly 10,000 staff and contractors that...
Path confusion vulnerability in GUI
2025-11-14 08:00:00
CVSSv3 Score:
9.1
A relative path traversal vulnerability [CWE-23] in FortiWeb may allow an unauthenticated attacker to execute administrative commands on the system via crafted HTTP or HTTPS...
Linux Security: Mitigating Model Inversion Attack Risks
2025-11-14 07:59:43
Machine learning now runs deep inside Linux security workflows, from containerized inference services to open-source model pipelines. These systems look harmless at first glance. You hand them data, they...
IBM vise l'avantage quantique en tandem avec le HPC
2025-11-14 06:58:05
La connexion avec les environnements HPC prend de l'importance dans le discours d'IBM sur l'informatique quantique.
The post IBM vise l’avantage quantique en tandem avec le HPC appeared first on...
DoorDash hit by new data breach in October exposing user information
2025-11-14 04:38:44
DoorDash has disclosed a data breach that hit the food delivery platform this October. Beginning yesterday evening, DoorDash, which serves millions of customers across the U.S., Canada, Australia,...
Fortinet FortiWeb flaw with public PoC exploited to create admin users
2025-11-14 02:41:28
A Fortinet FortiWeb path traversal vulnerability is being actively exploited to create new administrative users on exposed devices without requiring authentication [...]
Fedora 43: SeaMonkey 2.53.22 Update FEDORA-2025-5f24a0c1ba
2025-11-14 01:28:56
Update to 2.53.22
Fedora 43: docker-buildkit Critical DoS Memory Exhaustion CVE-2025-58185
2025-11-14 01:28:55
Update to v0.25.2 CVE-2025-58183; Resolves: rhbz#2412529 CVE-2025-58188; Resolves: rhbz#2412380, rhbz#2411476, rhbz#2410945 CVE-2025-58185; Resolves: rhbz#2410578, rhbz#2410299, rhbz#2410013 CVE-2025-61723;...
Fedora 43: runc High Risk Security Fix 2025-ebd4913540 CVE-2025-31133
2025-11-14 01:28:54
Update to release v1.3.3
Fedora 43: gh Update Advisory Critical CVE-2025-58189 and CVE-2025-61725
2025-11-14 01:28:50
Update to 2.83.0
Fedora 41: Lasso 2.9.0 Critical Buffer Overflow Fix CVE-2025-46705
2025-11-14 01:09:20
Update to 2.9.0 Fixes CVE-2025-46705
List of 24 new domains
2025-11-14 00:00:00
.fr 2016maillotnba.fr (registrar: KEY-SYSTEMS GmbH)
accessconcert.fr (registrar: TLD Registrar Solutions Ltd)
activation-office.fr (registrar: Infomaniak Network SA)
authentic-coupon-tabac.fr (registrar:...
Vulnérabilité dans Cisco Catalyst Center (14 novembre 2025)
14/11/2025
Une vulnérabilité a été découverte dans Cisco Catalyst Center. Elle permet à un attaquant de provoquer une élévation de privilèges.
Multiples vulnérabilités dans PostgreSQL (14 novembre 2025)
14/11/2025
De multiples vulnérabilités ont été découvertes dans PostgreSQL. Elles permettent à un attaquant de provoquer un déni de service à distance.
Multiples vulnérabilités dans le noyau Linux d'Ubuntu (14 novembre 2025)
14/11/2025
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité et un problème de sécurité...
Multiples vulnérabilités dans le noyau Linux de SUSE (14 novembre 2025)
14/11/2025
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Multiples vulnérabilités dans le noyau Linux de Debian (14 novembre 2025)
14/11/2025
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une...
Multiples vulnérabilités dans le noyau Linux de Red Hat (14 novembre 2025)
14/11/2025
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la...
Vulnérabilité dans Microsoft Edge (14 novembre 2025)
14/11/2025
Une vulnérabilité a été découverte dans Microsoft Edge. Elle permet à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Multiples vulnérabilités dans les produits IBM (14 novembre 2025)
14/11/2025
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation...
Vulnérabilité dans Fortinet FortiWeb (14 novembre 2025)
14/11/2025
Une vulnérabilité a été découverte dans Fortinet FortiWeb. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité. Fortinet indique que la vulnérabilité CVE-2025-64446...