Toute l'actualité de la Cybersécurité
SolarWinds patches four critical Serv-U flaws enabling root access
2026-02-24 20:07:24
SolarWinds addressed four critical Serv-U vulnerabilities that could let attackers gain root access to unpatched servers. SolarWinds released updates fixing four critical Serv-U vulnerabilities that allow...
USN-8052-2: Linux kernel (Xilinx) vulnerabilities
2026-02-24 18:57:40
It was discovered that improper initialization of CPU cache memory could
allow a local attacker with hypervisor access to overwrite SEV-SNP guest
memory resulting in loss of data integrity. (CVE-2024-36331)
Oleksii...
Threat Actors Weaponized AI Tools to Gain Full Domain Access within 30 Minutes
2026-02-24 18:53:55
In 2025, threat actors turned widely used artificial intelligence tools into weapons for launching fast, precise network intrusions. CrowdStrike’s 2026 Global Threat Report found an 89% year-over-year...
RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN
2026-02-24 18:52:00
A vulnerability in GitHub Codespaces could have been exploited by bad actors to seize control of repositories by injecting malicious Copilot instructions in a GitHub issue.
The artificial intelligence...
USN-8028-8: Linux kernel (IBM) vulnerabilities
2026-02-24 18:36:08
It was discovered that improper initialization of CPU cache memory could
allow a local attacker with hypervisor access to overwrite SEV-SNP guest
memory resulting in loss of data integrity. (CVE-2024-36331)
Oleksii...
CarGurus data breach exposes information of 12.4 million accounts
2026-02-24 18:08:20
The ShinyHunters extortion group has published personal information in more than 12 million records allegedly stolen from CarGurus, a U.S.-based digital auto platform. [...]
Microsoft adds Copilot data controls to all storage locations
2026-02-24 17:30:10
Microsoft is expanding data loss prevention (DLP) controls to block the Microsoft 365 Copilot AI assistant from processing confidential Word, Excel, and PowerPoint documents, regardless of their location....
Developer-targeting campaign using malicious Next.js repositories
2026-02-24 17:28:24
A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard build workflows. The activity demonstrates how staged command-and-control can...
65% of Financial Organizations Targeted by Ransomware as Cybercriminals Escalate Attacks
2026-02-24 17:15:09
The financial sector remains a prime target for cybercriminals, safeguarding not only vast sums of money but also sensitive personal data, payment systems, and economic trust. Recent reports highlight...
Le serveur Java GlassFish 8 améliore l'accès aux données
2026-02-24 17:13:40
La Fondation Eclipse a publié la version finale de GlassFish 8, une mise à jour de son serveur d'applications Java d'entreprise. Selon OmniFish, (...)
Anthropic Claims Chinese AI Firms ‘Distilled' Claude to Train Their Models
2026-02-24 17:13:20
Anthropic claims Chinese AI firms distilled Claude to train rival AI models, raising concerns about model extraction, security risks, and AI distillation abuse.
USN-8060-3: Linux kernel (GCP FIPS) vulnerabilities
2026-02-24 17:11:57
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers;
-...
USN-8060-2: Linux kernel (Real-time) vulnerabilities
2026-02-24 17:04:48
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers;
-...
Malicious NuGet Packages Attacking ASP.NET Developers to Steal Login Credentials
2026-02-24 17:01:33
A supply chain attack targeting ASP.NET developers has surfaced, involving four malicious NuGet packages built to steal login credentials and plant persistent backdoors inside web applications. The packages...
The Biological Secession: How Longevity Technology Will Create a New Species Divide
2026-02-24 16:56:45
Longevity is no longer a medical goal; it is a tool for social fragmentation. This article explores the concept of 'Biological Secession'—a future where technology doesn't just separate classes by wealth,...
Optimise LLM usage costs with Semantic Cache
2026-02-24 16:53:21
Semantic cache strategy in RAG system reduces LLM calls for similar questions, and hence cuts down token usage which results in lowering overall API costs without affecting answer quality.
USN-8059-2: Linux kernel (Raspberry Pi Real-time) vulnerabilities
2026-02-24 16:53:18
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- SMB network file...
USN-8061-1: Linux kernel vulnerabilities
2026-02-24 16:43:05
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Network file system...
I Asked 5 LLMs to Write the Same SQL Query. Here's How Wrong They Got It
2026-02-24 16:42:35
ChatGPT is an AI-generated database. It can be used to test and improve the quality of data. The author tested 10 real queries and found that some models were off by 15%.
Reddit Fined £14.47 Million by UK Regulator for Children's Privacy Failures
2026-02-24 16:37:20
The UK’s Information Commissioner’s Office (ICO) has issued a £14.47 million (.52 million) fine against Reddit, Inc. after an investigation concluded the social media platform unlawfully...
USN-8060-1: Linux kernel vulnerabilities
2026-02-24 16:31:20
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers;
-...
Is Crypto Doomed?
2026-02-24 16:30:34
Bitcoin didn't lose because it failed. It lost because it was priced for a future institutional adoption, AI integration that hasn't arrived yet.
Multi-Tenant API Access: Centralize, Scale, and Secure Your Operations
2026-02-24 16:30:00
For teams managing dozens, or even hundreds, of tenants, API access quickly becomes operational overhead. Managed Security Service Providers and large enterprises often find themselves maintaining separate...
New Deserialization Vulnerability in Ruby Workers Could Enable Full System Compromise
2026-02-24 16:25:58
A critical Remote Code Execution (RCE) vulnerability has been identified in a Ruby background job processing system. The flaw stems from unsafe JSON deserialization, which allows untrusted input to be...
Un Ukrainien, pivot d'un schéma nord-coréen, condamné
2026-02-24 16:19:26
Condamné à 5 ans, Oleksandr Didenko a vendu des identités volées à des IT nord-coréens infiltrant des firmes US....
Texas attaque TP-Link sur fond d'accusations prochinoises
2026-02-24 16:08:25
Le Texas poursuit TP-Link, invoquant failles, Camaro Dragon et promesses de sécurité jugées trompeuses....
Unprocessed Residue: The Overlooked Driver of Modern Stress
2026-02-24 16:07:50
In today's world, most people don't just have "one job" They hold multiple roles, often on the same day, sometimes at the same time. Instead of blaming the workplace or the multitasking culture, untangle...
USN-8059-1: Linux kernel vulnerabilities
2026-02-24 16:06:40
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- SMB network file...
Des failles critiques dans le MDM d'Ivanti activement exploitées
2026-02-24 16:05:34
Après les VPN, c’est au tour d’Endpoint Manager Mobile d’Ivani d’être la cible de pirates en exploitant deux failles (...)
The HackerNoon Newsletter: Do AI Agents Dream of Electric Langoustines? (2/24/2026)
2026-02-24 16:02:14
How are you, hacker?
🪐 What's happening in tech today, February 24, 2026?
The
HackerNoon Newsletter
brings the HackerNoon
...
Malicious OpenClaw Skills Used to Trick Users into Manual Password Entry for AMOS Infection
2026-02-24 15:58:54
Atomic macOS Stealer (AMOS), a well-known data-theft malware, has taken a sharp turn in how it reaches victims. Instead of hiding inside cracked software downloads as it once did, threat actors now embed...
Reddit, porn sites fined by UK regulators over children's safety and privacy
2026-02-24 15:48:02
Ofcom and the Information Commissioner's Office respectively fined a US porn company and Reddit for failing to protect children online.
Meta mise des dizaines de milliards sur les GPU d'AMD
2026-02-24 15:44:58
Meta ancre sa stratégie IA dans une nouvelle génération d'infrastructures en misant lourdement sur les GPU et serveurs personnalisés d'AMD.
The post Meta mise des dizaines de milliards sur les...
Sendmarc Releases DMARCbis Fireside Chat Featuring Co-Editor Todd Herr
2026-02-24 14:46:58
Wilmington, North America, 24th February 2026, CyberNewswire
From Prototype to Production: Building Real World AI Systems That Actually Work
2026-02-24 15:30:04
In this interview, Ademola Balogun, Founder of 180GIG Ltd, shares insights from building production ready AI systems across hiring, finance, and nutrition technology. He discusses the realities of deploying...
Paypal admet une exposition de données via un de ses services
2026-02-24 15:29:40
Erreur de code chez PayPal PPWC : données sensibles exposées 6 mois, accès non autorisé, fraudes et mesures clients....
Amazon: Low-Skill Hacker Used AI Tools to Breach FortiGate Devices Globally
2026-02-24 15:23:37
Amazon says a Russian speaking low-skill hacker used AI tools to breach hundreds of FortiGate devices worldwide, showing how AI can scale cyberattacks with basic methods.
Roblox gives predators “powerful tools” to target children, says LA County
2026-02-24 15:22:20
Los Angeles County sued the online gaming platform Roblox for its alleged failure to protect children from danger.
DJI Romo, 7 000 aspirateurs accessibles à distance
2026-02-24 15:10:31
Des robots ménagers DJI Romo, accessibles à distance. Un cyber chercheur voulait diriger le sien avec une manette de PS5....
Forescout Launches VistaroAI™ to Help Security Teams Cut Through AI Hype and Act Faster on Real Threats
2026-02-24 15:04:35
Forescout Technologies has today introduced Forescout VistaroAI™, a new agentic AI capability designed to help security teams prioritize risks, reduce investigation time, and respond faster to cyber...
Identity-First AI Security: Why CISOs Must Add Intent to the Equation
2026-02-24 15:02:12
AI agents now provision infrastructure and approve actions, but many inherit over-scoped privileges without proper governance. Token Security explains why CISOs must treat agents as identities and add...
VMware Aria Operations flaws could enable remote attacks
2026-02-24 15:02:03
Broadcom patched multiple VMware Aria Operations flaws, including high-severity issues that could enable remote code execution. Broadcom has released security updates to address multiple vulnerabilities...
33 Air Sensors, Zero Coding: Simple Plug-in Monitoring
2026-02-24 15:00:22
I built polluSensWeb—a dead-simple browser tool that reads 33+ UART air quality sensors instantly. No Python, no drivers, no installation. Just open the page, plug in your sensor, see live charts. Built...
UK fines Reddit million for using children's data unlawfully
2026-02-24 14:54:24
The UK Information Commissioner's Office (ICO) has fined Reddit £14.47 million (over .5 million) for collecting and using the personal information of children under 13 without adequate safeguards....
MEXC Ranks No. 1 in XAUT Perpetual Volume Globally, Demonstrating Strong Liquidity and User Activity
2026-02-24 14:48:14
MEXC has secured the No. 1 global ranking in XAUT perpetual trading volume, with .43 billion in total volume according to third-party platforms like CoinMarketCap, CoinGecko, and CoinGlass. As spot...
Hackers Leverage Steganographic Images to Bypass Anti-Malware Scans and Deploy Malware Payloads
2026-02-24 14:39:53
A malicious NPM package named buildrunner-dev has been caught hiding .NET malware inside innocent-looking PNG images, using steganography to slip past antivirus tools and deliver a Remote Access Trojan...
How to Maximize DDoS Readiness with Proactive Protection Strategies
2026-02-24 14:29:21
Strengthen DDoS Readiness with proactive protection strategies, risk assessments, traffic monitoring, scalable defenses, and rapid response planning.
UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware
2026-02-24 14:21:00
A Russia-aligned threat actor has been observed targeting a European financial institution as part of a social engineering attack to likely facilitate intelligence gathering or financial theft, signaling...
Les hébergeurs commencent à répercuter les coûts de la RAM et des SSD
2026-02-24 14:14:20
À l'instar d'OVHcloud, Hetzner augmente ses prix dans plusieurs gammes de serveurs pour absorber la hausse des coûts de la RAM et des SSD.
The post Les hébergeurs commencent à répercuter les coûts...
How to Strengthen App Performance Without Slowing Innovation
2026-02-24 14:06:27
Learn how to strengthen app performance without slowing innovation using metrics, observability, scalability planning, and disciplined release strategies.
En ciblant Cobol et la sécurité, Anthropic chahute les fournisseurs IT
2026-02-24 14:02:57
Vent de panique sur les marchés financiers avec les annonces successives d’Anthropic dans certains domaines de l’IT à savoir (...)
Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security
2026-02-24 14:00:40
Unit 42 research reveals most OT attacks begin in IT. Learn how edge-driven defense stops threats early and turns dwell time into advantage.
The post Bring the Fight to the Edge: Turning Time Into an...
{ Tribune Expert } – En 2026, l'accélération du développement logiciel va propulser l'innovation
2026-02-24 14:00:16
2025 a marqué une transition nette vers des workflows plus fragmentés, plus rapides, plus automatisés. En 2026, ce mouvement devrait perdurer voire s'amplifier.
The post { Tribune Expert } –...
New Report: The Digital Footprints of Many Executives Can Leave Their Companies Seriously Exposed
2026-02-24 14:00:00
Senior leaders are visible by design. They speak at events, post on LinkedIn, sit on boards, and sign public filings. That visibility builds brands and drives growth. It also creates risk.In our latest...
Product Management 101: How to Turn Vision Into Measurable Progress
2026-02-24 14:00:00
Companies don't grow for two reasons: they don't know what to do or they can't execute effectively. Strong product management solves this by clarifying direction, charting measurable paths, and...
Les experts en cybersécurité et cloud très recherchés en 2026
2026-02-24 13:47:58
Avec la multiplication et la sophistication des cyberattaques qui touchent toutes les organisations, la cybersécurité s'impose comme la compétence (...)
Fake Huorong Download Site Used to Deploy ValleyRAT Backdoor in Targeted Malware Campaign
2026-02-24 13:35:45
A group of attackers has built a fake version of the Huorong Security antivirus website to trick users into downloading ValleyRAT, a Remote Access Trojan (RAT) built on the Winos4.0 framework. The campaign...
As Cybersecurity Firms Chase AI, VC Market Skyrockets
2026-02-24 13:04:04
Investments in cybersecurity startups took off in 2025 as venture capital firms focused not just on AI-native tech but on talent as well.
Critical SolarWinds Serv-U flaws offer root access to servers
2026-02-24 13:00:45
SolarWinds has patched four critical Serv-U remote code execution vulnerabilities that could grant attackers root access to unpatched servers. [...]
Scaling security operations with Microsoft Defender autonomous defense and expert-led services
2026-02-24 13:00:00
AI-powered cyberattacks outpace aging SOC tools, and this new guide explains why manual defense fails and how autonomous, expert-led security transforms modern protection.
The post Scaling security operations...
Conscio Technologies présente son livre blanc « Sensibilisation Cybersécurité – plan d'action 2026 »
2026-02-24 12:55:23
Conscio Technologies, spécialiste de la sensibilisation à la cybersécurité, présente son livre blanc « Sensibilisation Cybersécurité – plan d'action 2026 », un ouvrage pratique permettant...
Cyberattaques dans le sport : comprendre une tendance et s'adapter
2026-02-24 12:51:53
Commvault revient sur les récentes cyberattaques connues par le milieu sportif. Le golf, l’athlétisme, la voile, la natation, le tennis. Et le ministère des Sports lui-même, attaqué non pas...
Heartbreak in the Scottish Highlands
2026-02-24 12:45:03
A beautiful and captivating heiress, Cecilia Warmond, visits Craigmaver and quickly charms everyone—especially Mina and Malcolm. But beneath her grace lies jealousy and hidden motives. Allan's guarded...
SERP Benchmarks: Success Rates and Latency at Scale
2026-02-24 12:42:43
We benchmarked nine SERP APIs on latency and reliability for AI agents and large-scale scraping. Most perform well, but Bright Data leads in speed, consistency, and production readiness.
Ubuntu 25.10 Linux-Azure Kernel Critical Security Advisory USN-8029-3
2026-02-24 12:29:55
Several security issues were fixed in the Linux kernel.
Romanian Hacker Extradited to US Admits Hacking Oregon State Network
2026-02-24 12:26:52
Catalin Dragomir admits to hacking an Oregon government office and selling network access. Read more on the 0k fraud case and his 2026 sentencing.
Diesel Vortex Russian Cybercrime Group Targets Global Logistics Sector and Steals 1,600+ Credentials
2026-02-24 12:03:32
A Russian-linked cybercrime group named Diesel Vortex has been quietly running a large phishing operation against freight and trucking companies across the United States and Europe. The campaign ran from...
Celebrating Two Years of CSF 2.0!
2026-02-24 12:00:00
Celebrate this milestone with us! Email us at csf [at] nist.gov (csf[at]nist[dot]gov) or tag @NISTcyber on X telling us what your favorite CSF 2.0 resource is (or how your organization has benefitted...
Identity Prioritization isn't a Backlog Problem - It's a Risk Math Problem
2026-02-24 11:58:00
Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or “what failed a control check.” That approach breaks the moment your environment stops being...
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
2026-02-24 11:52:00
The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an unnamed entity in the Middle East, according to a new report by...
Noms, dates de naissance, numéros d'identification : 53 millions de Français concernés, ce que révèle cette fuite géante
2026-02-24 11:51:00
Près d'un milliard d'enregistrements sensibles exposés, des millions de Français potentiellement concernés, et une accélération globale des cyberattaques. La fuite impliquant IDMerit s'inscrit...
Face au coût de la RAM, OVHcloud fait contribuer ses anciens clients
2026-02-24 11:50:20
OVHcloud compte répercuter ses coûts sur d'anciennes générations de serveurs, au nom de l'attractivité des nouvelles.
The post Face au coût de la RAM, OVHcloud fait contribuer ses anciens clients...
ShinyHunters extortion gang claims Odido breach affecting millions
2026-02-24 11:40:20
The ShinyHunters extortion gang has claimed responsibility for breaching Dutch telecommunications provider Odido and stealing millions of user records from its compromised systems. [...]
New ZeroDayRAT Malware Claims Full Monitoring of Android and iOS Devices
2026-02-24 11:27:50
Meet ZeroDayRAT, a newly advertised malware targeting Android and iOS devices with surveillance, location tracking, and crypto theft tools sold via Telegram as a MaaS service.
USN-8029-3: Linux kernel (Azure) vulnerabilities
2026-02-24 11:20:31
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
...
North Korean Lazarus group linked to Medusa ransomware attacks
2026-02-24 11:00:00
North Korean state-backed hackers associated with the Lazarus threat group are targeting U.S. healthcare organizations in extortion attacks using the Medusa ransomware. [...]
Arkanix Stealer: AI-assisted info-stealer shuts down after brief campaign
2026-02-24 10:52:56
Arkanix Stealer surfaced in late 2025 as a short-lived info-stealer, likely built as an AI-assisted experiment and quickly abandoned. Arkanix Stealer emerged in late 2025 as a short-lived information-stealing...
AI Arms Race Shrinks Breakout Time to 29 Minutes as Adversaries Turn GenAI on the Enterprise
2026-02-24 10:29:17
Artificial intelligence is no longer just a defensive tool; it is now a core accelerant for cybercriminals and nation-state actors alike. That is the central message from CrowdStrike's newly released...
Debian 11 OpenSSL Critical Fix - Denial of Service Issues DLA-4490-1
2026-02-24 09:55:17
Aisle Research found multiple vulnerabilites in OpenSSL, a Secure Socket Layer toolkit providing the SSL and TLS cryptographic protocols for secure communication over the Internet. CVE-2025-68160 Petr...
UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors
2026-02-24 09:54:00
The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift from prior attacks aimed at Saudi Arabian...
Fake Zoom meeting “update” silently installs surveillance software
2026-02-24 09:47:26
A fake Zoom meeting page looks real, triggers a bogus “update,” and silently installs surveillance software.
Operation MacroMaze: APT28 exploits webhooks for covert data exfiltration
2026-02-24 09:10:39
Russia-linked APT28 targeted European entities with a webhook-based macro malware campaign called Operation MacroMaze. Russia-linked APT28 (aka UAC-0001, aka Fancy Bear, Pawn Storm, Sofacy Group, Sednit, BlueDelta,...
Sans ROI sur l'IA, les DSI sur la sellette
2026-02-24 08:50:18
Près de trois DSI sur quatre regrettent au moins une décision majeure prise au cours des 18 derniers mois concernant un fournisseur ou une (...)
QR Code Phishing Linux Quishing Risks and Mitigation Strategies
2026-02-24 08:41:36
QR codes were originally designed for industrial logistics. They were optimized for efficiency, not security. In recent years, they have become embedded across enterprise workflows, authentication flows,...
Everest ransomware hits Vikor Scientific ‘s supplier, data of 140,000 patients stolen
2026-02-24 08:37:25
Everest ransomware claims an attack on diagnostic firm Vikor Scientific (Vanta Diagnostics), exposing data of nearly 140,000 people. The Everest ransomware group has claimed responsibility for a cyberattack...
openSUSE 15.6 libpng12 Urgent Security Update Alert SUSE-SU-2026-0710-2
2026-02-24 08:30:10
An update that solves one vulnerability can now be installed.
SUSE libpng12 Important Buffer Overflow Threat 2026-0599-1
2026-02-24 08:30:09
An update that solves one vulnerability can now be installed.
Refund scam impersonates Avast to harvest credit card details
2026-02-24 08:28:32
A convincing fake Avast site displays a €499.99 charge and promises a refund. Instead, it harvests your name, address, and full credit card details.
Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model
2026-02-24 06:04:00
Anthropic on Monday said it identified "industrial-scale campaigns" mounted by three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extract Claude's capabilities...
List of 22 new domains
2026-02-24 00:00:00
.fr connexion-a-mon-espace-client[.fr] (registrar: IONOS SE)
cpam-angouleme[.fr] (registrar: Hosting Concepts B.V. d/b/a Openprovider)
dk-prime[.fr] (registrar: PDR Ltd. d/b/a PublicDomainRegistry.com)
dnu-prime[.fr]...
Multiples vulnérabilités dans Google Chrome (24 février 2026)
24/02/2026
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Multiples vulnérabilités dans les produits VMware (24 février 2026)
24/02/2026
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation...
Vulnérabilité dans Centreon open tickets (24 février 2026)
24/02/2026
Une vulnérabilité a été découverte dans Centreon open tickets. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Multiples vulnérabilités dans Mattermost Server (24 février 2026)
24/02/2026
De multiples vulnérabilités ont été découvertes dans Mattermost Server. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Multiples vulnérabilités dans les produits SonicWall (24 février 2026)
24/02/2026
De multiples vulnérabilités ont été découvertes dans les produits SonicWall. Elles permettent à un attaquant de provoquer un déni de service à distance.
Vulnérabilité dans Microsoft Azure Linux (24 février 2026)
24/02/2026
Une vulnérabilité a été découverte dans Microsoft Azure Linux. Elle permet à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.