Toute l'actualité de la Cybersécurité
Windows PowerShell now warns when running Invoke-WebRequest scripts
2025-12-09 20:45:20
Microsoft says Windows PowerShell now warns when running scripts that use the Invoke-WebRequest cmdlet to download web content, aiming to prevent potentially risky code from executing. [...]
Packer-as-a-Service Shanya Hides Ransomware, Kills EDR
2025-12-09 20:10:32
Shanya is the latest in an emerging field of packing malware, selling obfuscation functionality in order to help ransomware actors reach their target.
Microsoft releases Windows 10 KB5071546 extended security update
2025-12-09 19:54:26
Microsoft has released the KB5071546 extended security update to resolve 57 security vulnerabilities, including three zero-day flaws. [...]
FortiOS, FortiWeb, and FortiProxy Vulnerability Lets Attackers Bypass FortiCloud SSO Authentication
2025-12-09 18:51:00
Fortinet has issued an urgent security advisory regarding a critical vulnerability affecting its FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager product lines. The security flaw, identified as an...
Microsoft December 2025 Patch Tuesday fixes 3 zero-days, 57 flaws
2025-12-09 18:38:00
Microsoft's December 2025 Patch Tuesday fixes 57 flaws, including one actively exploited and two publicly disclosed zero-day vulnerabilities. [...]
Fortinet warns of critical FortiCloud SSO login auth bypass flaws
2025-12-09 18:36:48
Fortinet has released security updates to address two critical vulnerabilities in FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager that could allow attackers to bypass FortiCloud SSO authentication....
Windows 11 KB5072033 & KB5071417 cumulative updates released
2025-12-09 18:31:38
Microsoft has released Windows 11 KB5072033 and KB5071417 cumulative updates for versions 25H2/24H2 and 23H2 to fix security vulnerabilities, bugs, and add new features. [...]
North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware
2025-12-09 18:25:00
Threat actors with ties to North Korea have likely become the latest to exploit the recently disclosed critical security React2Shell flaw in React Server Components (RSC) to deliver a previously undocumented...
Microsoft December 2025 Patch Tuesday – 56 Vulnerabilities Fixed Including 3 Zero-days
2025-12-09 18:09:04
Microsoft released its final Patch Tuesday updates of 2025 on December 9, addressing 56 security vulnerabilities across Windows, Office, Exchange Server, and other components. This patch includes three...
Makop Ransomware Exploits RDP Systems with AV Killer and Other Exploits
2025-12-09 17:43:33
Makop ransomware, a strain of the Phobos malware family first spotted in 2020, continues to evolve into a significant threat to businesses worldwide. Recent analysis reveals that attackers are combining...
Threat Actors Poisoning SEO Results to Attack Organizations With Fake Microsoft Teams Installer
2025-12-09 17:18:07
A sophisticated cyber campaign is exploiting search engine optimization (SEO) to distribute a malicious installer disguised as Microsoft Teams, targeting unsuspecting organizations. This campaign, active...
Ivanti Security Update: Patch for Code Execution Vulnerabilities in Endpoint Manager
2025-12-09 17:17:00
Ivanti has officially released urgent security updates for its Endpoint Manager (EPM) solution to address four distinct security flaws. The latest advisory highlights one critical vulnerability and three...
Ivanti warns of critical Endpoint Manager code execution flaw
2025-12-09 17:10:25
American IT software company Ivanti warned customers today to patch a newly disclosed vulnerability in its Endpoint Manager (EPM) solution that could allow attackers to execute code remotely. [...]
Maintaining enterprise IT hygiene using Wazuh SIEM/XDR
2025-12-09 17:09:33
Poor IT hygiene, such as unused accounts, outdated software, and risky extensions, creates hidden exposure in your infrastructure. Wazuh, the open-source XDR and SIEM, shows how continuous inventory monitoring...
USN-7917-1: fontTools vulnerabilities
2025-12-09 17:08:58
It was discovered that the subsetting module of fontTools was vulnerable to
an XML External Entity (XEE) attack. An unauthenticated remote attacker
could possibly use this issue to include arbitrary files...
Further Hardening Android GPUs
2025-12-09 17:00:00
Posted by Liz Prucka, Hamzeh Zawawy, Rishika Hooda, Android Security and Privacy Team
Last year, Google's Android Red Team partnered with Arm to conduct an in-depth security analysis of the Mali GPU,...
Changing the physics of cyber defense
2025-12-09 17:00:00
Cyber defense is evolving. Find out how graph-powered strategies and AI can help organizations detect threats faster and improve security hygiene.
The post Changing the physics of cyber defense appeared...
Spain arrests teen who stole 64 million personal data records
2025-12-09 16:57:06
The National Police in Spain have arrested a suspected 19-year-old hacker in Barcelona, for allegedly stealing and attempting to sell 64 million records obtained from breaches at nine companies. [...]
Analysts Warn of Cybersecurity Risks in Humanoid Robots
2025-12-09 16:41:27
Think "Blade Runner," but the robots can be hacked more easily than your home computer.
GOLD BLADE Using Custom QWCrypt Locker that Allows Data Exfiltration and Ransomware Deployment
2025-12-09 16:34:23
The GOLD BLADE threat group has shifted from pure espionage to a hybrid model that combines data theft with targeted ransomware attacks using a custom locker called QWCrypt. This shift follows a long-running...
Injection de prompt et injection SQL : même concept ?
2025-12-09 16:08:29
L'ANSSI britannique invite les professionnels de la cyber à proscrire le parallèle conceptuel entre injection de prompt et injection SQL.
The post Injection de prompt et injection SQL : même concept...
Ransomware Targeting Hyper-V and VMware ESXi Surges as Akira Group Exploits System Vulnerabilities
2025-12-09 16:02:36
A new wave of ransomware attacks targeting virtual machine platforms has emerged, with the Akira ransomware group leading a campaign against Hyper-V and VMware ESXi systems. These attacks pose a growing...
The HackerNoon Newsletter: Media Titans: Murdochs vs Ellisons (12/9/2025)
2025-12-09 16:02:02
How are you, hacker?
🪐 What's happening in tech today, December 9, 2025?
The
HackerNoon Newsletter
brings the HackerNoon
...
Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure
2025-12-09 16:01:00
Four distinct threat activity clusters have been observed leveraging a malware loader known as CastleLoader, strengthening the previous assessment that the tool is offered to other threat actors under...
You're a Business, Man: How Blogging Builds Authority, Opportunity, and Income
2025-12-09 16:00:06
Consistent blogging is a powerful career accelerator. Each post builds authority, attracts opportunities, and expands your professional network. The HackerNoon Blogging Fellowship provides structured...
Best AI Automation Platforms for Building Smarter Workflows in 2026
2025-12-09 15:57:54
AI workflow automation is becoming essential for modern businesses. This guide compares the top platforms of 2026—Make, Tray.ai, Workato, Zapier, and n8n—highlighting their strengths, ideal use cases,...
How a Data Engineer-Turned-Music-Producer Is Revolutionizing Spatial Intelligence
2025-12-09 15:52:20
Alexandru Godoroja's journey spans data engineering, music production, and startup building. His company, Vulture Labs, enhances ordinary cameras with human-aware AI—proof that creativity and technology...
See Cyber Threats to Your Company's Industry & Region in 2 Seconds
2025-12-09 15:47:26
Security teams today struggle with a paradox. Threat volumes keep climbing, but most of what hits SIEMs and inboxes is noise: indicators stripped of meaning, alerts detached from context, and threat data...
Deepfakes et cybersécurité : état des lieux des risques actuels
2025-12-09 15:44:06
Le risque d’attaques par deepfake augmente rapidement, alimenté par l’accessibilité et la sophistication croissantes des outils basés sur l’intelligence artificielle (IA). Une étude...
North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks
2025-12-09 15:43:05
A new malware implant called EtherRAT, deployed in a recent React2Shell attack, runs five separate Linux persistence mechanisms and leverages Ethereum smart contracts for communication with the attacker....
CVE-2025-10573: Ivanti EPM Unauthenticated Stored Cross-Site Scripting (Fixed)
2025-12-09 15:31:59
Ivanti Endpoint Manager (“EPM”) versions 2024 SU4 and below are vulnerable to stored cross-site scripting (“XSS”). The vulnerability, tracked as CVE-2025-10573 and assigned a CVSS score of 9.6,...
Evertrust, gestionnaire de certificats et de clés, lève 10M€
2025-12-09 15:27:12
Fondée en 2017 par Kamel Ferchouche (PDG), Jean-Julien Alvado (directeur technique) et Étienne Laviolette (directeur des opérations), (...)
Ransomware IAB abuses EDR for stealthy malware execution
2025-12-09 15:24:00
An initial access broker tracked as Storm-0249 is abusing endpoint detection and response solutions and trusted Microsoft Windows utilities to load malware, establish communication, and persistence...
Google dans le viseur de Bruxelles pour l'utilisation de contenus dans son IA
2025-12-09 15:17:59
La Commission européenne a ouvert une enquête antitrust contre Google, soupçonné d'abuser de sa position dominante dans le déploiement de son intelligence artificielle.
The post Google dans le viseur...
Broadside botnet hits TBK DVRs, raising alarms for maritime logistics
2025-12-09 15:10:59
Mirai-based Broadside botnet targets vulnerable TBK Vision DVRs, posing a potential threat to the maritime logistics sector, Cydome warns. Cydome researchers have identified a new Mirai botnet variant...
Clean Code: Concurrency Patterns, Context Management, and Goroutine Safety [Part 5]
2025-12-09 15:08:49
This final installment in the Clean Code in Go series breaks down how to write safe, idiomatic concurrent Go code using context, goroutines, channels, and proven patterns—while avoiding leaks, race...
Les salaires IT repartent doucement à la hausse en 2026
2025-12-09 15:02:01
Après plusieurs années marquées par des tensions extrêmes sur le marché français du recrutement IT, 2025 aura (...)
Microsoft Teams New feature Allows Users to Flag Malicious Calls
2025-12-09 14:59:42
Microsoft is set to introduce a significant security enhancement to its Teams platform that will empower users to flag potentially malicious or unsolicited calls. This upcoming feature, “Report...
Sonatype Guide: Giving AI the Context It Needs
2025-12-09 14:46:54
AI coding assistants promised to transform software development. And in many ways, they have: coding tasks that once took hours now take minutes, boilerplate nearly writes itself, and entire...
Critical Emby Server Vulnerability Let Attackers Gain Admin Access
2025-12-09 14:14:42
A critical vulnerability has been discovered in Emby Server that allows unauthenticated attackers to gain full administrative access to affected systems. Tracked as CVE-2025-64113 with a severity score...
How Smarter Systems Speed Up Loan Processing for Rural America
2025-12-09 13:59:59
Efficient loan processing is vital for farmers who rely on timely credit to plant, repair equipment, or keep rural businesses running. This piece follows Karthik Chakravartula's journey at Farm Credit...
Saviynt Raises 0M at Approximately B Valuation
2025-12-09 13:56:50
Saviynt has today announced a 0M Series B Growth Equity Financing at a valuation of approximately billion. Funds managed by KKR, a leading global investment firm, led the round with participation...
Face à VMware, Vates s'associe à Nexsan
2025-12-09 13:41:34
Avec les changements de pratiques commerciales de Broadcom sur VMware, beaucoup d’entreprises réfléchissent à des alternatives (...)
Ubuntu 25.10: Radare2 Critical Memory Leak Security Advisory USN-7915-1
2025-12-09 13:37:41
Several security issues were fixed in radare2.
Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading
2025-12-09 13:37:00
The threat actor known as Storm-0249 is likely shifting from its role as an initial access broker to adopt a combination of more advanced tactics like domain spoofing, DLL side-loading, and fileless PowerShell...
Prompt injection is a problem that may never be fixed, warns NCSC
2025-12-09 13:34:02
The NCSC warns that prompt injection is unlikely to be mitigated in the same way SQL injection was. How do they compare?
Global Costs of Software Supply Chain Attacks On The Rise
2025-12-09 13:33:37
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Dec. 9, 2025 – Read the full story from Wiz Due to their cascading effect, supply chain attacks are costlier...
Google défend le modèle de sécurité agentique de Chrome
2025-12-09 13:19:16
Face aux craintes que suscitent les navigateurs IA, Google détaille la manière dont il encadre l'usage agentique de Chrome.
The post Google défend le modèle de sécurité agentique de Chrome appeared...
Building a Petabyte-Scale Web Archive
2025-12-09 13:07:36
Discover how Bright Data optimize its Web Archive to handle petabytes of data in AWS. Learn how a 0,000 billing mistake revealed the trade-off between write speed, read speed, and cloud costs—and...
EU fines X 0m, tied to verification rules that make impostor scams easier
2025-12-09 12:57:28
The core problem persists: anyone can still buy a 'verified' checkmark from X, so don't take their authenticity for granted.
SUSE: kubevirt Important Security Fix Multiple Issues 2025:4330-1
2025-12-09 12:56:53
* bsc#1241772 * bsc#1250683 * bsc#1253181 * bsc#1253185 * bsc#1253186
Poltronesofà, ransomware et données clients oubliées : et voilà !
2025-12-09 12:55:23
Rançongiciel chez Poltronesofà : fuite de données anciennes, risques de fraude et interrogations sur la conservation des informations clients à l'ère du RGPD....
3 Simple Python Tests to Check Your Web App's Authentication Security
2025-12-09 12:52:53
You might think that your application is secure, but every application has bugs. You can check your own application with small Python scripts. This article will give you the Python code and explanation...
Stop Building "AI-Powered" Sh*t. The SaaS Gold Rush is a Trap
2025-12-09 12:19:54
Most projects we see here are *totally useless* and won't exist for more than a few months. Most will be abandoned in 3 weeks when the founder realizes nobody wants to pay for their "revolutionary" todo...
No Extensions Allowed: The Chrome DevTools MCP Dilemma
2025-12-09 12:09:01
Chrome DevTools MCP is a game-changer for AI coding assistants like GitHub Copilot and Cursor—it lets them see what your code actually does in the browser, debug console errors, and validate UI in real-time.
Problem:...
Gemini Enterprise No-Click Flaw Exposes Sensitive Data
2025-12-09 12:08:41
Google has fixed a critical vulnerability that enabled attackers to add malicious instructions to common documents to exfiltrate sensitive corporate information.
How to Build a Fully Automated Affiliate Marketing Tech Stack in 2026
2025-12-09 11:57:29
An affiliate marketing tech stack in 2026 is a connected set of tools where tracking, CRM, payouts, analytics, and comms are wired together via APIs and automation. It's not about “I installed a plugin...
Ubuntu 25.10: python-apt Critical DoS Vulnerability Advisory USN-7916-1
2025-12-09 11:53:17
python-apt could be made to crash if it opened a specially crafted file.
Deepfakes, AI resumes, and the growing threat of fake applicants
2025-12-09 11:49:28
Attackers are blending automation, impersonation, and social engineering to get inside organizations. Here's how to spot the signs.
Microsoft investigates Copilot outage affecting users in Europe
2025-12-09 11:48:39
Microsoft is working to mitigate an ongoing incident that has been blocking users in Europe from accessing the company's AI-powered Copilot digital assistant. [...]
How to Streamline Zero Trust Using the Shared Signals Framework
2025-12-09 11:30:00
Zero Trust helps organizations shrink their attack surface and respond to threats faster, but many still struggle to implement it because their security tools don't share signals reliably. 88% of organizations...
Goodbye, dark Telegram: Blocks are pushing the underground out
2025-12-09 11:25:55
Kaspersky researchers analyze changes in the lifespan of a shadow Telegram channel, blocks, and migration to other platforms.
Google Adds Layered Defenses to Chrome to Block Indirect Prompt Injection Threats
2025-12-09 11:14:00
Google on Monday announced a set of new security features in Chrome, following the company's addition of agentic artificial intelligence (AI) capabilities to the web browser.
To that end, the tech giant...
How Contextualized AI Analytics Can Strengthen Design Education
2025-12-09 11:00:04
This article examines how contextualizing AI-based multiscale design analytics—through indexical linking and visual annotations—enhances instructors' ability to interpret student work, deliver meaningful...
{ Tribune Expert } – L'évolution du risque interne
2025-12-09 10:08:36
À mesure que les adversaires utilisent des sites de confiance pour se dissimuler à la vue de tous, ils se connectent plutôt que de « pirater » leur accès aux organisations.
The post { Tribune Expert...
Polish Police arrest 3 Ukrainians for possessing advanced hacking tools
2025-12-09 10:03:42
Poland arrested three Ukrainian nationals accused of using hacking devices to target IT systems and obtain sensitive defense-related data. Polish police arrested three Ukrainian nationals for allegedly...
Marché de la cybersécurité en 2026 : l'IA déclenche une crise de confiance numérique
2025-12-09 10:03:41
Alors que l'IA se généralise et que les environnements numériques deviennent plus complexes, les experts Zscaler dévoilent les tendances majeures qui redéfiniront la cybersécurité en 2026. Un...
CVE-2025-55182 Exploitation Hits the Smart Home
2025-12-09 09:37:00
Shortly after details of CVE-2025-55182 became public, we began noticing large volumes of exploitation attempts across our endpoint and network sensors. The vulnerability, informally referred to as React2Shell,...
STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware
2025-12-09 09:35:00
Canadian organizations have emerged as the focus of a targeted cyber campaign orchestrated by a threat activity cluster known as STAC6565.
Cybersecurity company Sophos said it investigated almost 40 intrusions...
Vade acquis par Proofpoint : Bercy valide sans répondre aux inquiétudes
2025-12-09 09:31:53
En contrepartie d'engagements portant essentiellement sur l'emploi, la France autorise Proofpoint à mettre - indirectement - la main sur Vade.
The post Vade acquis par Proofpoint : Bercy valide sans...
Le chiffre de l'année : Kaspersky a détecté quotidiennement un demi-million de malwares en 2025
2025-12-09 09:26:28
En 2025, les systèmes de détection de Kaspersky ont identifié en moyenne 500 000 malwares par jour, ce qui représente une augmentation de 7 % par rapport à 2024. Cette progression est notamment due...
Zimperium découvre un nouveau variant plus sophistiqué du spyware ClayRat
2025-12-09 09:21:24
zLabs, la division de recherche de Zimperium annonce la découverte d'une variante nettement plus sophistiquée de ClayRat, une famille de spyware Android, présentée dans le rapport d'octobre 2025...
SUSE: Moderate Buffer Overflow Vulnerability in gnutls CVE-2025-9820
2025-12-09 08:55:20
* bsc#1254132 Cross-References: * CVE-2025-9820
openSUSE: gnutls Moderate Buffer Overflow Fix CVE-2025-9820 2025:4323-1
2025-12-09 08:55:20
An update that solves one vulnerability can now be installed.
SUSE: GIMP Important Buffer Overflow RCE Fix 2025:4324-1
2025-12-09 08:55:17
* bsc#1250497 Cross-References: * CVE-2025-10922
Axis acquiert FF Group pour enrichir ses caméras de surveillance
2025-12-09 08:53:49
Axis Communications, le fabricant de caméras de vidéosurveillance vient d’acquérir FF Group, un éditeur tchèque (...)
Notifications Apple : le CERT-FR alerte sur l'espionnage
2025-12-09 08:47:18
Depuis 2021, Apple prévient certaines cibles d'opérations de surveillance sophistiquées. Le CERT-FR vient de lancer une recherche auprés de français impactés....
Researchers Find Malicious VS Code, Go, npm, and Rust Packages Stealing Developer Data
2025-12-09 08:07:00
Cybersecurity researchers have discovered two new extensions on Microsoft Visual Studio Code (VS Code) Marketplace that are designed to infect developer machines with stealer malware.
The VS Code extensions...
Broken access control on API endpoints
2025-12-09 08:00:00
CVSSv3 Score:
6.2
An Improper access control vulnerability [CWE-284] in FortiSOAR may allow Information disclosure to an authenticated attacker via crafted requests
Revised on 2025-12-09...
Capacity to forge authentication cookies
2025-12-09 08:00:00
CVSSv3 Score:
7.1
A reliance on cookie without validation or integrity checking vulnerability [CWE-565] in FortiWeb may allow an unauthenticated attacker to execute arbitrary operations on...
Capacity to use password hashes instead of password for authentication
2025-12-09 08:00:00
CVSSv3 Score:
4.4
A use of password hash instead of password for authentication vulnerability [CWE-836] in FortiWeb may allow an unauthenticated attacker to use the hash in place of the password...
Current password requirement bypass for self password change
2025-12-09 08:00:00
CVSSv3 Score:
6.5
An Unverified Password Change vulnerability [CWE-620] in FortiSOAR may allow an attacker who gained access to a victim's user account to reset the account credentials without...
Incorrect authorization in multi-vdom environment
2025-12-09 08:00:00
CVSSv3 Score:
6.4
An Incorrect Authorization vulnerability [CWE-863] in FortiPortal may allow an authenticated attacker to reboot a shared FortiGate device via crafted HTTP requests.
...
Insertion of sensitive information into REST API logs
2025-12-09 08:00:00
CVSSv3 Score:
6.3
An insertion of sensitive information into log file vulnerability [CWE-532] in FortiOS, FortiProxy, FortiPAM and FortiSRA may allow a read-only administrator to retrieve API...
Insufficient Session Expiration in SSLVPN
2025-12-09 08:00:00
CVSSv3 Score:
5.3
An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSLVPN may allow an attacker to maintain access to network resources via an active session not terminated...
Missing authorization on log access
2025-12-09 08:00:00
CVSSv3 Score:
2.6
A Direct Request ('Forced Browsing') [CWE-425] vulnerability in FortiAuthenticator logs may allow an authenticated attacker with at least sponsor permissions to read and download...
Multiple Fortinet Products' FortiCloud SSO Login Authentication Bypass
2025-12-09 08:00:00
CVSSv3 Score:
9.1
An Improper Verification of Cryptographic Signature vulnerability[CWE-347] in FortiOS, FortiWeb, FortiProxy and FortiSwitchManager mayallow an unauthenticated attacker to...
Multiple authenticated OS Command Injections via API
2025-12-09 08:00:00
CVSSv3 Score:
6.7
An OS command injection vulnerabtility [CWE-78] in FortiExtender API may allow an authenticated attacker to execute unauthorized code or commands via a specific HTTP request.
...
Multiple authenticated SQL injection via extraParam
2025-12-09 08:00:00
CVSSv3 Score:
6.8
An improper neutralization of special elements used in an SQL command ('SQL injection') [CWE-89] in FortiVoice may allow an authenticated privileged attacker to execute unauthorized...
OS command injection in GUI backup options
2025-12-09 08:00:00
CVSSv3 Score:
6.9
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in FortiSandbox GUI may allow an authenticated privileged...
USN-7916-1: python-apt vulnerability
2025-12-09 06:41:41
Julian Andres Klode discovered that python-apt incorrectly handled
deb822 configuration files. An attacker could use this issue to cause
python-apt to crash, resulting in a denial of service.
USN-7412-3: GnuPG vulnerability
2025-12-09 05:14:53
USN-7412-1 fixed a vulnerability in GnuPG. This update provides the
corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
Original advisory details:
It was discovered that GnuPG incorrectly...
AIs Quiet Move Into the Linux Kernel Raises New Linux Kernel Security Questions
2025-12-09 03:12:59
AI-written patches are starting to land in kernel discussions, and the timing has people watching closely. The code looks ordinary at first glance, yet the review notes keep circling the same point: something...
Security for AI Building, Not Security for AI Buildings
2025-12-09 02:08:37
AWS re:Invent 2025 Shows What "Shift Left" Can Mean for AI Security
Although I wasn't at AWS re:Invent in person this year (only the second one I've missed since 2013), I sat at home closely...
FinCEN data shows .5B in ransomware payments, record spike in 2023
2025-12-09 00:26:49
Ransomware payments reported to FinCEN exceeded .5B by 2024, with 2023 marking a record year at .1B across 1,512 incidents. FinCEN analyzed ransomware trends using Bank Secrecy Act (BSA) reports filed...
Ransomware gangs turn to Shanya EXE packer to hide EDR killers
2025-12-09 00:00:05
Several ransomware groups have been spotted using a packer-as-a-service (PaaS) platform named Shanya to assist in EDR (endpoint detection and response) killing operations. [...]
List of 13 new domains
2025-12-09 00:00:00
.fr cram-bretagne[.fr] (registrar: Infomaniak Network SA)
espace-impots[.fr] (registrar: Dynadot Inc)
fftbilleterie[.fr] (registrar: Hostinger operations UAB)
forticlient-vpn[.fr] (registrar: Dynadot...
Multiples vulnérabilités dans les produits SAP (09 décembre 2025)
09/12/2025
De multiples vulnérabilités ont été découvertes dans les produits SAP. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service...
Multiples vulnérabilités dans VMware Tanzu RabbitMQ (09 décembre 2025)
09/12/2025
De multiples vulnérabilités ont été découvertes dans VMware Tanzu RabbitMQ. Elles permettent à un attaquant de provoquer un déni de service à distance et un problème de sécurité non spécifié...
Vulnérabilité dans Citrix XenServer (09 décembre 2025)
09/12/2025
Une vulnérabilité a été découverte dans Citrix XenServer. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Multiples vulnérabilités dans les produits Microsoft (09 décembre 2025)
09/12/2025
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Multiples vulnérabilités dans les produits Siemens (09 décembre 2025)
09/12/2025
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni...