Toute l'actualité de la Cybersécurité


SolarWinds patches four critical Serv-U flaws enabling root access

2026-02-24 20:07:24
SolarWinds addressed four critical Serv-U vulnerabilities that could let attackers gain root access to unpatched servers. SolarWinds released updates fixing four critical Serv-U vulnerabilities that allow...

Lire la suite »

USN-8052-2: Linux kernel (Xilinx) vulnerabilities

2026-02-24 18:57:40
It was discovered that improper initialization of CPU cache memory could allow a local attacker with hypervisor access to overwrite SEV-SNP guest memory resulting in loss of data integrity. (CVE-2024-36331) Oleksii...

Lire la suite »

Threat Actors Weaponized AI Tools to Gain Full Domain Access within 30 Minutes

2026-02-24 18:53:55
In 2025, threat actors turned widely used artificial intelligence tools into weapons for launching fast, precise network intrusions. CrowdStrike’s 2026 Global Threat Report found an 89% year-over-year...

Lire la suite »

RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN

2026-02-24 18:52:00
A vulnerability in GitHub Codespaces could have been exploited by bad actors to seize control of repositories by injecting malicious Copilot instructions in a GitHub issue. The artificial intelligence...

Lire la suite »

USN-8028-8: Linux kernel (IBM) vulnerabilities

2026-02-24 18:36:08
It was discovered that improper initialization of CPU cache memory could allow a local attacker with hypervisor access to overwrite SEV-SNP guest memory resulting in loss of data integrity. (CVE-2024-36331) Oleksii...

Lire la suite »

CarGurus data breach exposes information of 12.4 million accounts

2026-02-24 18:08:20
The ShinyHunters extortion group has published personal information in more than 12 million records allegedly stolen from CarGurus, a U.S.-based digital auto platform. [...]

Lire la suite »

Microsoft adds Copilot data controls to all storage locations

2026-02-24 17:30:10
Microsoft is expanding data loss prevention (DLP) controls to block the Microsoft 365 Copilot AI assistant from processing confidential Word, Excel, and PowerPoint documents, regardless of their location....

Lire la suite »

Developer-targeting campaign using malicious Next.js repositories

2026-02-24 17:28:24
A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard build workflows. The activity demonstrates how staged command-and-control can...

Lire la suite »

65% of Financial Organizations Targeted by Ransomware as Cybercriminals Escalate Attacks

2026-02-24 17:15:09
The financial sector remains a prime target for cybercriminals, safeguarding not only vast sums of money but also sensitive personal data, payment systems, and economic trust. Recent reports highlight...

Lire la suite »

Le serveur Java GlassFish 8 améliore l'accès aux données

2026-02-24 17:13:40
La Fondation Eclipse a publié la version finale de GlassFish 8, une mise à jour de son serveur d'applications Java d'entreprise. Selon OmniFish, (...)

Lire la suite »

Anthropic Claims Chinese AI Firms ‘Distilled' Claude to Train Their Models

2026-02-24 17:13:20
Anthropic claims Chinese AI firms distilled Claude to train rival AI models, raising concerns about model extraction, security risks, and AI distillation abuse.

Lire la suite »

USN-8060-3: Linux kernel (GCP FIPS) vulnerabilities

2026-02-24 17:11:57
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; -...

Lire la suite »

USN-8060-2: Linux kernel (Real-time) vulnerabilities

2026-02-24 17:04:48
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; -...

Lire la suite »

Malicious NuGet Packages Attacking ASP.NET Developers to Steal Login Credentials

2026-02-24 17:01:33
A supply chain attack targeting ASP.NET developers has surfaced, involving four malicious NuGet packages built to steal login credentials and plant persistent backdoors inside web applications. The packages...

Lire la suite »

The Biological Secession: How Longevity Technology Will Create a New Species Divide

2026-02-24 16:56:45
Longevity is no longer a medical goal; it is a tool for social fragmentation. This article explores the concept of 'Biological Secession'—a future where technology doesn't just separate classes by wealth,...

Lire la suite »

Optimise LLM usage costs with Semantic Cache

2026-02-24 16:53:21
Semantic cache strategy in RAG system reduces LLM calls for similar questions, and hence cuts down token usage which results in lowering overall API costs without affecting answer quality.

Lire la suite »

USN-8059-2: Linux kernel (Raspberry Pi Real-time) vulnerabilities

2026-02-24 16:53:18
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - SMB network file...

Lire la suite »

USN-8061-1: Linux kernel vulnerabilities

2026-02-24 16:43:05
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Network file system...

Lire la suite »

I Asked 5 LLMs to Write the Same SQL Query. Here's How Wrong They Got It

2026-02-24 16:42:35
ChatGPT is an AI-generated database. It can be used to test and improve the quality of data. The author tested 10 real queries and found that some models were off by 15%.

Lire la suite »

Reddit Fined £14.47 Million by UK Regulator for Children's Privacy Failures

2026-02-24 16:37:20
The UK’s Information Commissioner’s Office (ICO) has issued a £14.47 million (.52 million) fine against Reddit, Inc. after an investigation concluded the social media platform unlawfully...

Lire la suite »

USN-8060-1: Linux kernel vulnerabilities

2026-02-24 16:31:20
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; -...

Lire la suite »

Is Crypto Doomed?

2026-02-24 16:30:34
Bitcoin didn't lose because it failed. It lost because it was priced for a future institutional adoption, AI integration that hasn't arrived yet.

Lire la suite »

Multi-Tenant API Access: Centralize, Scale, and Secure Your Operations

2026-02-24 16:30:00
For teams managing dozens, or even hundreds, of tenants, API access quickly becomes operational overhead. Managed Security Service Providers and large enterprises often find themselves maintaining separate...

Lire la suite »

New Deserialization Vulnerability in Ruby Workers Could Enable Full System Compromise

2026-02-24 16:25:58
A critical Remote Code Execution (RCE) vulnerability has been identified in a Ruby background job processing system. The flaw stems from unsafe JSON deserialization, which allows untrusted input to be...

Lire la suite »

Un Ukrainien, pivot d'un schéma nord-coréen, condamné

2026-02-24 16:19:26
Condamné à 5 ans, Oleksandr Didenko a vendu des identités volées à des IT nord-coréens infiltrant des firmes US....

Lire la suite »

Texas attaque TP-Link sur fond d'accusations prochinoises

2026-02-24 16:08:25
Le Texas poursuit TP-Link, invoquant failles, Camaro Dragon et promesses de sécurité jugées trompeuses....

Lire la suite »

Unprocessed Residue: The Overlooked Driver of Modern Stress

2026-02-24 16:07:50
In today's world, most people don't just have "one job" They hold multiple roles, often on the same day, sometimes at the same time. Instead of blaming the workplace or the multitasking culture, untangle...

Lire la suite »

USN-8059-1: Linux kernel vulnerabilities

2026-02-24 16:06:40
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - SMB network file...

Lire la suite »

Des failles critiques dans le MDM d'Ivanti activement exploitées

2026-02-24 16:05:34
Après les VPN, c’est au tour d’Endpoint Manager Mobile d’Ivani d’être la cible de pirates en exploitant deux failles (...)

Lire la suite »

The HackerNoon Newsletter: Do AI Agents Dream of Electric Langoustines? (2/24/2026)

2026-02-24 16:02:14
How are you, hacker? 🪐 What's happening in tech today, February 24, 2026? The HackerNoon Newsletter brings the HackerNoon ...

Lire la suite »

Malicious OpenClaw Skills Used to Trick Users into Manual Password Entry for AMOS Infection

2026-02-24 15:58:54
Atomic macOS Stealer (AMOS), a well-known data-theft malware, has taken a sharp turn in how it reaches victims. Instead of hiding inside cracked software downloads as it once did, threat actors now embed...

Lire la suite »

Reddit, porn sites fined by UK regulators over children's safety and privacy

2026-02-24 15:48:02
Ofcom and the Information Commissioner's Office respectively fined a US porn company and Reddit for failing to protect children online.

Lire la suite »

Meta mise des dizaines de milliards sur les GPU d'AMD

2026-02-24 15:44:58
Meta ancre sa stratégie IA dans une nouvelle génération d'infrastructures en misant lourdement sur les GPU et serveurs personnalisés d'AMD. The post Meta mise des dizaines de milliards sur les...

Lire la suite »

Sendmarc Releases DMARCbis Fireside Chat Featuring Co-Editor Todd Herr

2026-02-24 14:46:58
Wilmington, North America, 24th February 2026, CyberNewswire

Lire la suite »

From Prototype to Production: Building Real World AI Systems That Actually Work

2026-02-24 15:30:04
In this interview, Ademola Balogun, Founder of 180GIG Ltd, shares insights from building production ready AI systems across hiring, finance, and nutrition technology. He discusses the realities of deploying...

Lire la suite »

Paypal admet une exposition de données via un de ses services

2026-02-24 15:29:40
Erreur de code chez PayPal PPWC : données sensibles exposées 6 mois, accès non autorisé, fraudes et mesures clients....

Lire la suite »

Amazon: Low-Skill Hacker Used AI Tools to Breach FortiGate Devices Globally

2026-02-24 15:23:37
Amazon says a Russian speaking low-skill hacker used AI tools to breach hundreds of FortiGate devices worldwide, showing how AI can scale cyberattacks with basic methods.

Lire la suite »

Roblox gives predators “powerful tools” to target children, says LA County

2026-02-24 15:22:20
Los Angeles County sued the online gaming platform Roblox for its alleged failure to protect children from danger.

Lire la suite »

DJI Romo, 7 000 aspirateurs accessibles à distance

2026-02-24 15:10:31
Des robots ménagers DJI Romo, accessibles à distance. Un cyber chercheur voulait diriger le sien avec une manette de PS5....

Lire la suite »

Forescout Launches VistaroAI™ to Help Security Teams Cut Through AI Hype and Act Faster on Real Threats

2026-02-24 15:04:35
Forescout Technologies has today introduced Forescout VistaroAI™, a new agentic AI capability designed to help security teams prioritize risks, reduce investigation time, and respond faster to cyber...

Lire la suite »

Identity-First AI Security: Why CISOs Must Add Intent to the Equation

2026-02-24 15:02:12
AI agents now provision infrastructure and approve actions, but many inherit over-scoped privileges without proper governance. Token Security explains why CISOs must treat agents as identities and add...

Lire la suite »

VMware Aria Operations flaws could enable remote attacks

2026-02-24 15:02:03
Broadcom patched multiple VMware Aria Operations flaws, including high-severity issues that could enable remote code execution. Broadcom has released security updates to address multiple vulnerabilities...

Lire la suite »

33 Air Sensors, Zero Coding: Simple Plug-in Monitoring

2026-02-24 15:00:22
I built polluSensWeb—a dead-simple browser tool that reads 33+ UART air quality sensors instantly. No Python, no drivers, no installation. Just open the page, plug in your sensor, see live charts. Built...

Lire la suite »

UK fines Reddit million for using children's data unlawfully

2026-02-24 14:54:24
The UK Information Commissioner's Office (ICO) has fined Reddit £14.47 million (over .5 million) for collecting and using the personal information of children under 13 without adequate safeguards....

Lire la suite »

MEXC Ranks No. 1 in XAUT Perpetual Volume Globally, Demonstrating Strong Liquidity and User Activity

2026-02-24 14:48:14
MEXC has secured the No. 1 global ranking in XAUT perpetual trading volume, with .43 billion in total volume according to third-party platforms like CoinMarketCap, CoinGecko, and CoinGlass. As spot...

Lire la suite »

Hackers Leverage Steganographic Images to Bypass Anti-Malware Scans and Deploy Malware Payloads

2026-02-24 14:39:53
A malicious NPM package named buildrunner-dev has been caught hiding .NET malware inside innocent-looking PNG images, using steganography to slip past antivirus tools and deliver a Remote Access Trojan...

Lire la suite »

How to Maximize DDoS Readiness with Proactive Protection Strategies

2026-02-24 14:29:21
Strengthen DDoS Readiness with proactive protection strategies, risk assessments, traffic monitoring, scalable defenses, and rapid response planning.

Lire la suite »

UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

2026-02-24 14:21:00
A Russia-aligned threat actor has been observed targeting a European financial institution as part of a social engineering attack to likely facilitate intelligence gathering or financial theft, signaling...

Lire la suite »

Les hébergeurs commencent à répercuter les coûts de la RAM et des SSD

2026-02-24 14:14:20
À l'instar d'OVHcloud, Hetzner augmente ses prix dans plusieurs gammes de serveurs pour absorber la hausse des coûts de la RAM et des SSD. The post Les hébergeurs commencent à répercuter les coûts...

Lire la suite »

How to Strengthen App Performance Without Slowing Innovation

2026-02-24 14:06:27
Learn how to strengthen app performance without slowing innovation using metrics, observability, scalability planning, and disciplined release strategies.

Lire la suite »

En ciblant Cobol et la sécurité, Anthropic chahute les fournisseurs IT

2026-02-24 14:02:57
Vent de panique sur les marchés financiers avec les annonces successives d’Anthropic dans certains domaines de l’IT à savoir (...)

Lire la suite »

Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security

2026-02-24 14:00:40
Unit 42 research reveals most OT attacks begin in IT. Learn how edge-driven defense stops threats early and turns dwell time into advantage. The post Bring the Fight to the Edge: Turning Time Into an...

Lire la suite »

{ Tribune Expert } – En 2026, l'accélération du développement  logiciel va propulser l'innovation

2026-02-24 14:00:16
2025 a marqué une transition nette vers des workflows plus fragmentés, plus rapides, plus automatisés. En 2026, ce mouvement devrait perdurer voire s'amplifier. The post { Tribune Expert } –...

Lire la suite »

New Report: The Digital Footprints of Many Executives Can Leave Their Companies Seriously Exposed

2026-02-24 14:00:00
Senior leaders are visible by design. They speak at events, post on LinkedIn, sit on boards, and sign public filings. That visibility builds brands and drives growth. It also creates risk.In our latest...

Lire la suite »

Product Management 101: How to Turn Vision Into Measurable Progress

2026-02-24 14:00:00
Companies don't grow for two reasons: they don't know what to do or they can't execute effectively. Strong product management solves this by clarifying direction, charting measurable paths, and...

Lire la suite »

Les experts en cybersécurité et cloud très recherchés en 2026

2026-02-24 13:47:58
Avec la multiplication et la sophistication des cyberattaques qui touchent toutes les organisations, la cybersécurité s'impose comme la compétence (...)

Lire la suite »

Fake Huorong Download Site Used to Deploy ValleyRAT Backdoor in Targeted Malware Campaign

2026-02-24 13:35:45
A group of attackers has built a fake version of the Huorong Security antivirus website to trick users into downloading ValleyRAT, a Remote Access Trojan (RAT) built on the Winos4.0 framework. The campaign...

Lire la suite »

As Cybersecurity Firms Chase AI, VC Market Skyrockets

2026-02-24 13:04:04
Investments in cybersecurity startups took off in 2025 as venture capital firms focused not just on AI-native tech but on talent as well.

Lire la suite »

Critical SolarWinds Serv-U flaws offer root access to servers

2026-02-24 13:00:45
SolarWinds has patched four critical Serv-U remote code execution vulnerabilities that could grant attackers root access to unpatched servers. [...]

Lire la suite »

Scaling security operations with Microsoft Defender autonomous defense and expert-led services

2026-02-24 13:00:00
AI-powered cyberattacks outpace aging SOC tools, and this new guide explains why manual defense fails and how autonomous, expert-led security transforms modern protection. The post Scaling security operations...

Lire la suite »

Conscio Technologies présente son livre blanc « Sensibilisation Cybersécurité – plan d'action 2026 »

2026-02-24 12:55:23
Conscio Technologies, spécialiste de la sensibilisation à la cybersécurité, présente son livre blanc « Sensibilisation Cybersécurité – plan d'action 2026 », un ouvrage pratique permettant...

Lire la suite »

Cyberattaques dans le sport : comprendre une tendance et s'adapter

2026-02-24 12:51:53
Commvault revient sur les récentes cyberattaques connues par le milieu sportif. Le golf, l’athlétisme, la voile, la natation, le tennis. Et le ministère des Sports lui-même, attaqué non pas...

Lire la suite »

Heartbreak in the Scottish Highlands

2026-02-24 12:45:03
A beautiful and captivating heiress, Cecilia Warmond, visits Craigmaver and quickly charms everyone—especially Mina and Malcolm. But beneath her grace lies jealousy and hidden motives. Allan's guarded...

Lire la suite »

SERP Benchmarks: Success Rates and Latency at Scale

2026-02-24 12:42:43
​​We benchmarked nine SERP APIs on latency and reliability for AI agents and large-scale scraping. Most perform well, but Bright Data leads in speed, consistency, and production readiness.

Lire la suite »

Ubuntu 25.10 Linux-Azure Kernel Critical Security Advisory USN-8029-3

2026-02-24 12:29:55
Several security issues were fixed in the Linux kernel.

Lire la suite »

Romanian Hacker Extradited to US Admits Hacking Oregon State Network

2026-02-24 12:26:52
Catalin Dragomir admits to hacking an Oregon government office and selling network access. Read more on the 0k fraud case and his 2026 sentencing.

Lire la suite »

Diesel Vortex Russian Cybercrime Group Targets Global Logistics Sector and Steals 1,600+ Credentials

2026-02-24 12:03:32
A Russian-linked cybercrime group named Diesel Vortex has been quietly running a large phishing operation against freight and trucking companies across the United States and Europe. The campaign ran from...

Lire la suite »

Celebrating Two Years of CSF 2.0!

2026-02-24 12:00:00
Celebrate this milestone with us! Email us at csf [at] nist.gov (csf[at]nist[dot]gov) or tag @NISTcyber on X telling us what your favorite CSF 2.0 resource is (or how your organization has benefitted...

Lire la suite »

Identity Prioritization isn't a Backlog Problem - It's a Risk Math Problem

2026-02-24 11:58:00
Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or “what failed a control check.” That approach breaks the moment your environment stops being...

Lire la suite »

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

2026-02-24 11:52:00
The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an unnamed entity in the Middle East, according to a new report by...

Lire la suite »

Noms, dates de naissance, numéros d'identification : 53 millions de Français concernés, ce que révèle cette fuite géante

2026-02-24 11:51:00
Près d'un milliard d'enregistrements sensibles exposés, des millions de Français potentiellement concernés, et une accélération globale des cyberattaques. La fuite impliquant IDMerit s'inscrit...

Lire la suite »

Face au coût de la RAM, OVHcloud fait contribuer ses anciens clients

2026-02-24 11:50:20
OVHcloud compte répercuter ses coûts sur d'anciennes générations de serveurs, au nom de l'attractivité des nouvelles. The post Face au coût de la RAM, OVHcloud fait contribuer ses anciens clients...

Lire la suite »

ShinyHunters extortion gang claims Odido breach affecting millions

2026-02-24 11:40:20
The ShinyHunters extortion gang has claimed responsibility for breaching Dutch telecommunications provider Odido and stealing millions of user records from its compromised systems. [...]

Lire la suite »

New ZeroDayRAT Malware Claims Full Monitoring of Android and iOS Devices

2026-02-24 11:27:50
Meet ZeroDayRAT, a newly advertised malware targeting Android and iOS devices with surveillance, location tracking, and crypto theft tools sold via Telegram as a MaaS service.

Lire la suite »

USN-8029-3: Linux kernel (Azure) vulnerabilities

2026-02-24 11:20:31
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; ...

Lire la suite »

North Korean Lazarus group linked to Medusa ransomware attacks

2026-02-24 11:00:00
North Korean state-backed hackers associated with the Lazarus threat group are targeting U.S. healthcare organizations in extortion attacks using the Medusa ransomware. [...]

Lire la suite »

Arkanix Stealer: AI-assisted info-stealer shuts down after brief campaign

2026-02-24 10:52:56
Arkanix Stealer surfaced in late 2025 as a short-lived info-stealer, likely built as an AI-assisted experiment and quickly abandoned. Arkanix Stealer emerged in late 2025 as a short-lived information-stealing...

Lire la suite »

AI Arms Race Shrinks Breakout Time to 29 Minutes as Adversaries Turn GenAI on the Enterprise

2026-02-24 10:29:17
Artificial intelligence is no longer just a defensive tool; it is now a core accelerant for cybercriminals and nation-state actors alike. That is the central message from CrowdStrike's newly released...

Lire la suite »

Debian 11 OpenSSL Critical Fix - Denial of Service Issues DLA-4490-1

2026-02-24 09:55:17
Aisle Research found multiple vulnerabilites in OpenSSL, a Secure Socket Layer toolkit providing the SSL and TLS cryptographic protocols for secure communication over the Internet. CVE-2025-68160 Petr...

Lire la suite »

UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors

2026-02-24 09:54:00
The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift from prior attacks aimed at Saudi Arabian...

Lire la suite »

Fake Zoom meeting “update” silently installs surveillance software

2026-02-24 09:47:26
A fake Zoom meeting page looks real, triggers a bogus “update,” and silently installs surveillance software.

Lire la suite »

Operation MacroMaze: APT28 exploits webhooks for covert data exfiltration

2026-02-24 09:10:39
Russia-linked APT28 targeted European entities with a webhook-based macro malware campaign called Operation MacroMaze. Russia-linked APT28 (aka UAC-0001, aka Fancy Bear, Pawn Storm, Sofacy Group, Sednit, BlueDelta,...

Lire la suite »

Sans ROI sur l'IA, les DSI sur la sellette

2026-02-24 08:50:18
Près de trois DSI sur quatre regrettent au moins une décision majeure prise au cours des 18 derniers mois concernant un fournisseur ou une (...)

Lire la suite »

QR Code Phishing Linux Quishing Risks and Mitigation Strategies

2026-02-24 08:41:36
QR codes were originally designed for industrial logistics. They were optimized for efficiency, not security. In recent years, they have become embedded across enterprise workflows, authentication flows,...

Lire la suite »

Everest ransomware hits Vikor Scientific ‘s supplier, data of 140,000 patients stolen

2026-02-24 08:37:25
Everest ransomware claims an attack on diagnostic firm Vikor Scientific (Vanta Diagnostics), exposing data of nearly 140,000 people. The Everest ransomware group has claimed responsibility for a cyberattack...

Lire la suite »

openSUSE 15.6 libpng12 Urgent Security Update Alert SUSE-SU-2026-0710-2

2026-02-24 08:30:10
An update that solves one vulnerability can now be installed.

Lire la suite »

SUSE libpng12 Important Buffer Overflow Threat 2026-0599-1

2026-02-24 08:30:09
An update that solves one vulnerability can now be installed.

Lire la suite »

Refund scam impersonates Avast to harvest credit card details

2026-02-24 08:28:32
A convincing fake Avast site displays a €499.99 charge and promises a refund. Instead, it harvests your name, address, and full credit card details.

Lire la suite »

Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

2026-02-24 06:04:00
Anthropic on Monday said it identified "industrial-scale campaigns" mounted by three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extract Claude's capabilities...

Lire la suite »

List of 22 new domains

2026-02-24 00:00:00
.fr connexion-a-mon-espace-client[.fr] (registrar: IONOS SE) cpam-angouleme[.fr] (registrar: Hosting Concepts B.V. d/b/a Openprovider) dk-prime[.fr] (registrar: PDR Ltd. d/b/a PublicDomainRegistry.com) dnu-prime[.fr]...

Lire la suite »

Multiples vulnérabilités dans Google Chrome (24 février 2026)

24/02/2026
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Multiples vulnérabilités dans les produits VMware (24 février 2026)

24/02/2026
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation...

Lire la suite »

Vulnérabilité dans Centreon open tickets (24 février 2026)

24/02/2026
Une vulnérabilité a été découverte dans Centreon open tickets. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.

Lire la suite »

Multiples vulnérabilités dans Mattermost Server (24 février 2026)

24/02/2026
De multiples vulnérabilités ont été découvertes dans Mattermost Server. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Multiples vulnérabilités dans les produits SonicWall (24 février 2026)

24/02/2026
De multiples vulnérabilités ont été découvertes dans les produits SonicWall. Elles permettent à un attaquant de provoquer un déni de service à distance.

Lire la suite »

Vulnérabilité dans Microsoft Azure Linux (24 février 2026)

24/02/2026
Une vulnérabilité a été découverte dans Microsoft Azure Linux. Elle permet à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »