Toute l'actualité de la Cybersécurité


Coordinated sanctions hit Russian bulletproof hosting providers enabling top ransomware Ops

2025-11-20 19:12:57
US, Australia and UK sanctioned 2 Russian bulletproof hosting providers accused of aiding groups like LockBit, BlackSuit and Play. US, Australia and UK sanctioned two Russian bulletproof hosting providers...

Lire la suite »

Mozilla Says It's Finally Done With Two-Faced Onerep

2025-11-20 19:06:51
In March 2024, Mozilla said it was winding down its collaboration with Onerep -- an identity protection service offered with the Firefox web browser that promises to remove users from hundreds of people-search...

Lire la suite »

Hacker claims to steal 2.3TB data from Italian rail group, Almavia

2025-11-20 18:54:17
Data from Italy's national railway operator, the FS Italiane Group, has been exposed after a threat actor breached the organization's IT services provider, Almaviva. [...]

Lire la suite »

Palo Alto Networks rachète Chronosphere 3,35 Md$

2025-11-20 17:48:07
Après avoir mis 25 Md$ pour engloutir Cyberark en juillet dernier, Palo Alto Networks a encore des réserves. Le fournisseur de solutions (...)

Lire la suite »

Everest Ransomware Says It Breached Brazilian Energy Giant Petrobras

2025-11-20 17:41:34
Everest ransomware claims to have stolen over 180GB of seismic survey data from Petrobras, demanding contact through qTox with a countdown in place.

Lire la suite »

ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet

2025-11-20 17:24:00
Oligo Security has warned of ongoing attacks exploiting a two-year-old security flaw in the Ray open-source artificial intelligence (AI) framework to turn infected clusters with NVIDIA GPUs into a self-replicating...

Lire la suite »

JUPITER atteint l'exascale : que fait-on avec ce supercalculateur ?

2025-11-20 17:09:44
Une centaine de projets ont obtenu du temps de calcul sur JUPITER. En voici quelques-uns auxquels bénéficiera l'échelle exaflopique. The post JUPITER atteint l’exascale : que fait-on avec ce...

Lire la suite »

GlobalProtect VPN portals probed with 2.3 million scan sessions

2025-11-20 17:08:55
A major spike in malicious scanning against Palo Alto Networks GlobalProtect portals has been detected, starting on November 14, 2025. [...]

Lire la suite »

‘Matrix Push' C2 Tool Hijacks Browser Notifications

2025-11-20 17:04:22
Have you ever given two seconds of thought to a browser notification? No? That's what hackers bent on phishing are counting on.

Lire la suite »

Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing

2025-11-20 17:00:00
Posted by Dave Kleidermacher, VP, Platforms Security & Privacy, Google Technology should bring people closer together, not create walls. Being able to communicate and connect with friends and family...

Lire la suite »

You Can Track Code Deployments in New Relic With Laravel Commands: Here's How

2025-11-20 17:00:00
Learn how to configure and integrate this command into your CI/CD pipeline for seamless New Relic deployment tracking.

Lire la suite »

Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows

2025-11-20 16:57:00
Cybersecurity researchers have warned of an actively expanding botnet dubbed Tsundere that's targeting Windows users. Active since mid-2025, the threat is designed to execute arbitrary JavaScript code...

Lire la suite »

What Taylor Swift Fans Can Teach Us About Spotting AI Generated Content

2025-11-20 16:48:30
A survey testing whether people can distinguish Taylor Swift lyrics from AI-generated imitations found that fewer than half chose correctly, and participants' confidence dropped sharply afterward. The...

Lire la suite »

Salesforce investigates customer data theft via Gainsight breach

2025-11-20 16:47:20
Salesforce says it revoked refresh tokens linked to Gainsight-published applications while investigating a new wave of data theft attacks targeting customers. [...]

Lire la suite »

What the Flock is happening with license plate readers?

2025-11-20 16:34:58
What Flock's ALPR cameras really collect, how they're used in neighborhoods, and what you can do to stay in control.

Lire la suite »

Critical Windows Graphics Vulnerability Lets Hackers Seize Control with a Single Image

2025-11-20 16:26:58
A critical remote code execution flaw in Microsoft’s Windows Graphics Component allows attackers to seize control of systems using specially crafted JPEG images. With a CVSS score of 9.8, this vulnerability...

Lire la suite »

Semaine Internationale de Sensibilisation à la Fraude

2025-11-20 16:24:27
Dans le cadre de la Semaine Internationale de Sensibilisation à la Fraude, voici le commentaire de Gal Diskin, VP, Identity Threat & Research chez Delinea.   «  Cette Semaine Internationale de...

Lire la suite »

How to Migrate Existing Azure Functions to the .NET 8 Isolated Worker Runtime

2025-11-20 16:05:43
This article walks through upgrading an existing Azure Functions project to the .NET 8 isolated worker model. It covers updating the project file, configuring host.json, replacing FunctionStartup with...

Lire la suite »

USN-7878-1: cups-filters vulnerabilities

2025-11-20 16:04:31
It was discovered that cups-filters incorrectly handled certain malformed TIFF image files. A remote attacker could use this issue to cause cups-filters to crash, resulting in a denial of service, or...

Lire la suite »

The HackerNoon Newsletter: 10 Marketing Moves Tech Companies Cant Afford to Skip Before 2026 (11/20/2025)

2025-11-20 16:02:23
How are you, hacker? 🪐 What's happening in tech today, November 20, 2025? The HackerNoon Newsletter brings the HackerNoon ...

Lire la suite »

Advanced Patterns with the Symfony Clock: MockClock, NativeClock, and More

2025-11-20 16:00:07
With Symfony 7.3 and PHP 8.4, the symfony/clock component is no longer just a utility. This article explores non-trivial, production-grade patterns for the **Clock component. We will build a generator...

Lire la suite »

Final Project Report 2| Apache SeaTunnel Adds Metalake Support

2025-11-20 16:00:00
Sensitive credentials are no longer hard-coded — connect securely through centralized metadata like Apache Gravitino for dynamic source management.

Lire la suite »

New SonicWall SonicOS flaw allows hackers to crash firewalls

2025-11-20 15:56:00
American cybersecurity company SonicWall urged customers today to patch a high-severity SonicOS SSLVPN security flaw that can allow attackers to crash vulnerable firewalls. [...]

Lire la suite »

Why AI Agents Need Privacy Guardrails Before They Go Mainstream

2025-11-20 15:55:42
As autonomous AI agents move from prototypes to production, they introduce new risks around data leakage, context drift, and unauthorized actions. This article outlines why privacy guardrails—input...

Lire la suite »

USN-7877-1: libcupsfilters vulnerabilities

2025-11-20 15:50:38
It was discovered that libcupsfilters incorrectly handled certain malformed TIFF image files. A remote attacker could use this issue to cause libcupsfilters to crash, resulting in a denial of service,...

Lire la suite »

Cybersécurité : 88% des entreprises connaissent la Threat Intelligence, mais un tiers manque encore de recul

2025-11-20 15:50:09
Avec la montée en puissance des cyberattaques, la Threat Intelligence (TI) s'impose comme une solution de choix pour faire face à ce risque systémique pour les entreprises. Des tendances et motivations...

Lire la suite »

Une nouvelle étude désigne « admin » comme le mot de passe le plus populaire de l'année en France

2025-11-20 15:43:03
NordPass a publié la septième édition de son étude annuelle sur les 200 mots de passe les plus courants. En plus de révéler les mots de passe les plus populaires dans le monde et dans 44 pays particuliers,...

Lire la suite »

Multilingual Isn't Cross-Lingual: Inside My Benchmark of 11 LLMs on Mid- & Low-Resource Languages

2025-11-20 15:41:53
I built an evaluation pipeline for multilingual and cross-lingual LLM performance on 11 mid/low-resource languages (e.g., Basque, Kazakh, Amharic, Hausa, Sundanese). I combined native-language datasets...

Lire la suite »

D-Link warns of new RCE flaws in end-of-life DIR-878 routers

2025-11-20 15:38:56
D-Link is warning of three remotely exploitable command execution vulnerabilities that affect all models and hardware revisions of its DIR-878 router, which has reached end-of-service but is still available...

Lire la suite »

Why 25% of Bitcoin Supply Faces Quantum Threat and What QANplatform Is Doing About It

2025-11-20 15:13:24
QANplatform's QAN XLINK passes Hacken security audit, offering quantum-resistant protection for 25% of Bitcoin supply vulnerable to future attacks.

Lire la suite »

How World Mobile Stratospheric Plans to Beam 5G From the Edge of Space

2025-11-20 15:12:22
World Mobile Stratospheric is testing airborne 5G in 2026, aiming to deploy stratospheric platforms that connect remote regions from the edge of space.

Lire la suite »

Turn your Windows 11 migration into a security opportunity

2025-11-20 15:05:15
Windows 11 migration is inevitable as Windows 10 support ends, and unsupported systems create major security and ransomware risks. Acronis explains how to use this migration to review backups, strengthen...

Lire la suite »

AI Is Coded Postmodernism: A Look at Bohemian Rhapsody, The Matrix, and More

2025-11-20 15:00:07
Generative AI operates through the same core mechanisms that define postmodern art—simulacra, hyperreality, challenged authorship, pastiche, mixed high/low culture, and fragmented nonlinear assembly—making...

Lire la suite »

How Bestfriends Anamika Bhoyrul and Tawishi Jain Are Building the Future of Social Connection

2025-11-20 14:59:59
After meeting through a random Twitter intro, founders Anamika Bhoyrul and Tawishi Jain created Six Social—an AI-powered platform acting as “social memory” for Gen Z. What began as viral social...

Lire la suite »

APIContext Introduces MCP Server Performance Monitoring to Ensure Fast and Reliable AI Workflows

2025-11-20 14:49:50
Today, APIContext, has launched its Model Context Protocol (MCP) Server Performance Monitoring tool, a new capability that ensures AI systems respond fast enough to meet customer expectations. Given...

Lire la suite »

Tsundere Botnet Abusing Popular Node.js and Cryptocurrency Packages to Attack Windows, Linux, and macOS Users

2025-11-20 14:29:05
Tsundere represents a significant shift in botnet tactics, leveraging the power of legitimate Node.js packages and blockchain technology to distribute malware across multiple operating systems. First...

Lire la suite »

Sturnus Banking Malware Steals Communications from Signal and WhatsApp, Gaining Full Control of The Device

2025-11-20 14:18:17
A new banking malware called Sturnus has emerged as a significant threat to mobile users across Europe. Security researchers have discovered that this sophisticated Android trojan can capture encrypted...

Lire la suite »

ESET Research : le groupe PlushDaemon aligné sur la Chine exploite des routeurs pour mener des attaques « man-in-the-middle »

2025-11-20 14:09:19
Les chercheurs d'ESET ont identifié une campagne d'attaque de type « man-in-the-middle » menée par PlushDaemon, un groupe de menace aligné sur les intérêts de la Chine. Cette campagne repose...

Lire la suite »

Samourai Wallet Cryptocurrency Mixing Founders Jailed for Laundering Over 7 Million

2025-11-20 14:06:56
The U.S. Attorney’s Office, Southern District of New York, has announced the sentencing of Keonne Rodriguez and William Lonergan Hill, co-founders of Samourai Wallet, a cryptocurrency mixing application...

Lire la suite »

WhatsApp 'Eternidade' Trojan Self-Propagates Through Brazil

2025-11-20 14:00:00
The infostealer specifically targets Brazilian Portuguese speakers and combines malware designed to phish banking credentials and steal data, a worm, and some uniquely Brazilian quirks.

Lire la suite »

Des chercheurs alertent : 3,5 milliards d'utilisateurs WhatsApp concernés par la « plus grande fuite de données de l'histoire » !

2025-11-20 13:58:00
Une équipe de chercheurs viennois a découvert qu'il est possible de collecter massivement les informations publiques de milliards de comptes WhatsApp, simplement en testant des numéros de téléphone....

Lire la suite »

Holiday scams 2025: These common shopping habits make you the easiest target

2025-11-20 13:50:00
Holiday deals are flooding your phone, and scammers are too. Watch for fake listings, phishing texts, and offers that seem just a little too good to be true.

Lire la suite »

Gmail can read your emails and attachments to train its AI, unless you opt out

2025-11-20 13:48:50
A new Gmail update may allow Google to use your private messages and attachments for AI training. Here's how to turn it off.

Lire la suite »

New Ransomware Variants Targeting Amazon S3 Services Leveraging Misconfigurations and Access Controls

2025-11-20 13:43:38
A new wave of ransomware attacks is targeting cloud storage environments, specifically focusing on Amazon Simple Storage Service (S3) buckets that contain critical business data. Unlike traditional ransomware...

Lire la suite »

New Eternidade Stealer Uses WhatsApp to Steal Banking Data

2025-11-20 13:40:30
Trustwave SpiderLabs warns of Eternidade Stealer, a new banking trojan spreading via personalised WhatsApp messages. Find out how this malicious software bypasses security checks and deploys fake login...

Lire la suite »

TamperedChef Hacking Campaign Leverages Common Apps to Deliver Payloads and Gain Remote Access

2025-11-20 13:35:19
A new global hacking campaign tracked as TamperedChef has emerged, exploiting everyday software names to trick users into installing malicious applications that deliver remote access tools. The campaign...

Lire la suite »

Oracle Linux 8: ELSA-2025-21628 Lasso Critical Type Confusion

2025-11-20 13:34:04
The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

Lire la suite »

Oracle Linux 7: ELSA-2025-16099 Postgresql Important CVE-2025-8714 Update

2025-11-20 13:33:54
The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

Lire la suite »

Everything You Always Wanted To Know About Security Audits But Were Afraid To Ask

2025-11-20 13:33:09
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Nov. 20, 2025 – Read the full story from Astra With the global cost of cybercrime predicted to reach .5...

Lire la suite »

TV streaming piracy service with 26M yearly visits shut down

2025-11-20 13:31:43
Photocall, a TV piracy streaming platform with over 26 million users annually, has ceased operations following a joint investigation by the Alliance for Creativity and Entertainment (ACE) and DAZN. [...]...

Lire la suite »

Retail : Plus de la moitié (58 %) des enseignes victimes d'une attaque de ransomware versent la rançon demandée

2025-11-20 13:23:38
Dans un contexte marqué par le doublement des demandes de rançon et l'augmentation des paiements, près de la moitié des entreprises du secteur attribuent les incidents liés aux ransomwares à des...

Lire la suite »

Lessons from Oracle E-Business Suite Hack That Allegedly Compromises Nearly 30 Organizations Worldwide

2025-11-20 13:20:27
A sophisticated cyberattack targeting Oracle E-Business Suite (EBS) customers has exposed critical vulnerabilities in enterprise resource planning systems, compromising an estimated 100 organizations...

Lire la suite »

Sécurité du cloud : les 7 grandes tendances à suivre pour 2026 !

2025-11-20 13:17:49
À mesure que les entreprises accélèrent leur migration vers le cloud et les architectures hybrides, la sécurité devient un enjeu stratégique. Les modèles historiques, centrés sur la protection...

Lire la suite »

New Malware Via WhatsApp Exfiltrate Contacts to Attack Server and Deploys Malware

2025-11-20 13:05:21
Trustwave SpiderLabs researchers have identified a sophisticated banking trojan called Eternidade Stealer that spreads through WhatsApp hijacking and social engineering tactics. The malware, written in...

Lire la suite »

Palo Alto reprend Chronosphere pour 3,35 milliards $

2025-11-20 12:49:35
Palo Alto Networks va racheter Chronosphere pour 3,35 milliards $ afin de renforcer ses capacités d'observabilité et d'IA appliquées. The post Palo Alto reprend Chronosphere pour 3,35 milliards...

Lire la suite »

GenAI Makes it Easier for Cybercriminals to Successfully Lure Victims into Scams

2025-11-20 12:47:50
Cybercriminals are rapidly embracing generative AI to transform the way they operate scams, making fraud operations faster, more convincing, and dramatically easier to scale. According to recent research,...

Lire la suite »

Comet Browser Flaw Lets Hidden API Run Commands on Users' Devices

2025-11-20 12:30:57
SquareX warns Perplexity's Comet AI browser contains a hidden MCP API that bypasses security, allowing attackers to install malware and seize full device control.

Lire la suite »

openSUSE: ghostscript Moderate Buffer Overflow Vuln 2025:4148-1

2025-11-20 12:30:08
An update that solves two vulnerabilities can now be installed.

Lire la suite »

SUSE: Ghostscript Moderate Buffer Overflow Vuln 2025:4148-1 CVE-2025-59798

2025-11-20 12:30:07
* bsc#1250353 * bsc#1250354 Cross-References: * CVE-2025-59798

Lire la suite »

ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves

2025-11-20 12:29:00
This week has been crazy in the world of hacking and online security. From Thailand to London to the US, we've seen arrests, spies at work, and big power moves online. Hackers are getting caught. Spies...

Lire la suite »

Threat Actors Allegedly Selling Microsoft Office 0-Day RCE Vulnerability on Hacking Forums

2025-11-20 12:17:01
A threat actor known as Zeroplayer has reportedly listed a zero-day remote code execution (RCE) vulnerability, combined with a sandbox escape, targeting Microsoft Office and Windows systems for sale on...

Lire la suite »

Développement d'applications IA : une demande sectorielle pour l'heure insatisfaite

2025-11-20 12:14:36
En matière de développement d'apps IA, Gartner relève un décalage entre les besoins sectoriels et la capacité des offreurs à y répondre. The post Développement d’applications IA : une demande...

Lire la suite »

Inside the dark web job market

2025-11-20 11:37:00
This report examines how employment and recruitment function on the dark web, based on over 2,000 job-related posts collected from shadow forums between January 2023 and June 2025.

Lire la suite »

CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat

2025-11-20 11:30:00
CTM360 has identified a rapidly expanding WhatsApp account-hacking campaign targeting users worldwide via a network of deceptive authentication portals and impersonation pages. The campaign, internally...

Lire la suite »

Mozilla Firefox 145 Rolls Out With Advanced Fingerprint Protection

2025-11-20 11:06:54
Taking another leap towards securing users' digital privacy, Mozilla rolls out Firefox 145 with enhanced… Mozilla Firefox 145 Rolls Out With Advanced Fingerprint Protection on Latest Hacking News...

Lire la suite »

New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices

2025-11-20 11:04:00
Cybersecurity researchers have disclosed details of a new Android banking trojan called Sturnus that enables credential theft and full device takeover to conduct financial fraud. "A key differentiator...

Lire la suite »

Un copier-coller de code fragilise plusieurs frameworks d'inférence

2025-11-20 11:01:11
La sécurité de l’IA prend une place de plus en plus importante au fur et à mesure que la technologie se développe. Des (...)

Lire la suite »

Why the World's Vulnerability Index Cannot Keep Up

2025-11-20 11:00:02
The Common Vulnerabilities and Exposures (CVE) system has been called the backbone of modern cybersecurity. For decades, it's been the shared language connecting scanners, advisories, compliance...

Lire la suite »

Crypto mixer founders sent to prison for laundering over 7 million

2025-11-20 10:49:37
The founders of the Samourai Wallet (Samourai) cryptocurrency mixing service have been sent to prison for helping criminals launder over 7 million. [...]

Lire la suite »

Cyber-enabled kinetic targeting: Iran-linked actor uses cyber operations to support physical attacks

2025-11-20 10:28:13
Iran-linked actors mapped ship AIS data ahead of a missile strike attempt, highlighting the rise of cyber operations enabling real-world attacks. Iran-linked threat actors mapped ship Automatic Identification...

Lire la suite »

Avec Delos Cloud, SAP assure la continuité des services Azure en Europe

2025-11-20 10:23:22
A l’occasion du sommet franco-allemand sur la souveraineté numérique qui s’est déroulé à Berlin le 17 novembre, (...)

Lire la suite »

Blockchain and Node.js abused by Tsundere: an emerging botnet

2025-11-20 10:00:13
Kaspersky GReAT experts discovered a new campaign featuring the Tsundere botnet. Node.js-based bots abuse web3 smart contracts and are spread via MSI installers and PowerShell scripts.

Lire la suite »

Multi-threat Android malware Sturnus steals Signal, WhatsApp messages

2025-11-20 10:00:00
A new Android banking trojan named Sturnus can capture communication from end-to-end encrypted messaging platforms like Signal, WhatsApp, and Telegram, as well as take complete control of the device....

Lire la suite »

Le partenariat SAP-Mistral AI trouve un relais dans l'administration publique

2025-11-20 09:23:51
En partenariat depuis mi-2024, SAP et Mistral AI vont signer un accord-cadre avec Paris et Berlin pour servir les administrations publiques. The post Le partenariat SAP-Mistral AI trouve un relais dans...

Lire la suite »

Les pratiques cloud d'AWS et Microsoft dans le viseur de l'Europe

2025-11-20 08:55:46
A souveraineté, souveraineté et demie ! Le sommet franco-allemand sur la souveraineté numérique européenne, qui réunit (...)

Lire la suite »

SUSE: grub2 Moderate Use-After-Free Flaws SUSE-SU-2025:4143-1

2025-11-20 08:30:09
* bsc#1252931 * bsc#1252932 * bsc#1252933 * bsc#1252934 * bsc#1252935

Lire la suite »

openSUSE: grub2 Moderate Multiple Issues Vuln 2025:4143-1

2025-11-20 08:30:09
An update that solves five vulnerabilities can now be installed.

Lire la suite »

Les cybercriminels créent plus de 30 sites web frauduleux utilisant COP 30 comme appât pour tromper leurs victimes

2025-11-20 08:16:33
Kaspersky alerte sur l’émergence d’escroqueries exploitant l’engouement autour de la conférence pour dérober des données personnelles et des informations confidentielles. Tribune...

Lire la suite »

Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt

2025-11-20 07:35:00
Threat actors with ties to Iran engaged in cyber warfare as part of efforts to facilitate and enhance physical, real-world attacks, a trend that Amazon has called cyber-enabled kinetic targeting. The...

Lire la suite »

Agent 365 : après l'orchestration, Microsoft promet l'encadrement de l'IA agentique

2025-11-20 07:11:15
Sous la bannière Agent 365, Microsoft adapte son socle Entra-Purview-Defender pour constituer un plan de contrôle - mais pas d'orchestration - des agents IA. The post Agent 365 : après l’orchestration,...

Lire la suite »

Beckett Collectibles - 541,132 breached accounts

2025-11-20 05:41:12
In November 2025, Beckett Collectibles experienced a data breach accompanied by website content defacement. The stolen data was later advertised for sale on a prominent hacking forum, with portions subsequently...

Lire la suite »

TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign

2025-11-20 04:06:00
Threat actors are leveraging bogus installers masquerading as popular software to trick users into installing malware as part of a global malvertising campaign dubbed TamperedChef. The end goal of the...

Lire la suite »

Eurofiber - 10,003 breached accounts

2025-11-20 02:44:14
In November 2025, Eurofiber France disclosed a data breach of its ticket management platform. Data containing 10k unique email addresses and a smaller number of names and phone numbers was subsequently...

Lire la suite »

Vultr - 187,872 breached accounts

2025-11-20 01:22:52
In March 2023, the "AI-first global cloud platform" Vultr disclosed a security incident at a third-party vendor. Dating back to the previous year, the incident was attributed to the ActiveCampaign email...

Lire la suite »

OpenAI says its latest GPT-5.1 Codex can code independently for hours

2025-11-20 00:00:00
OpenAI has started rolling out GPT 5.1-Codex-Max on Codex with a better performance on coding tasks. [...]

Lire la suite »

Multiples vulnérabilités dans Wireshark (20 novembre 2025)

20/11/2025
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.

Lire la suite »

Multiples vulnérabilités dans les produits SonicWall (20 novembre 2025)

20/11/2025
De multiples vulnérabilités ont été découvertes dans les produits SonicWall. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte...

Lire la suite »

Vulnérabilité dans GnuTLS (20 novembre 2025)

20/11/2025
Une vulnérabilité a été découverte dans GnuTLS. Elle permet à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Vulnérabilité dans les produits Kaspersky (20 novembre 2025)

20/11/2025
Une vulnérabilité a été découverte dans les produits Kaspersky. Elle permet à un attaquant de provoquer une injection de code indirecte à distance (XSS).

Lire la suite »