Toute l'actualité de la Cybersécurité


Best Tools for Test Data Management to Accelerate QA Teams in 2026

2026-02-10 20:50:44
Test Data Management tools for 2026 ranked for QA and DevOps teams, comparing speed, self service, masking, CI/CD fit, and enterprise readiness.

Lire la suite »

Malicious 7-Zip site distributes installer laced with proxy tool

2026-02-10 19:12:55
A fake 7-Zip website is distributing a trojanized installer of the popular archiving tool that turns the user's computer into a residential proxy node. [...]

Lire la suite »

Microsoft releases Windows 10 KB5075912 extended security update

2026-02-10 19:06:13
Microsoft has released the Windows 10 KB5075912 extended security update to fix February 2026 Patch Tuesday vulnerabilities, including six zero-days, and continue rolling out replacements for expiring...

Lire la suite »

Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws

2026-02-10 18:51:46
Today is Microsoft's February 2026 Patch Tuesday with security updates for 58 flaws, including 6 actively exploited and three publicly disclosed zero-day vulnerabilities. [...]

Lire la suite »

Windows 11 KB5077181 & KB5075941 cumulative updates released

2026-02-10 18:43:53
Microsoft has released Windows 11 KB5077181 and KB5075941 cumulative updates for versions 25H2/24H2 and 23H2 to fix security vulnerabilities, bugs, and add new features. [...]

Lire la suite »

[Fixed]: Outlook not Responding when Sending Email Issue

2026-02-10 18:19:24
Photo by Brett Jordan on UnsplashMany businesses and individuals worldwide uses Microsoft Outlook — a robust email client — for their day-to-day email communication. Thus, it is of vital...

Lire la suite »

Proving Grounds Linux Box Extplorer ( Road to OSCP )

2026-02-10 18:17:20
We can achieve that by using various of tools and techniques to obtain foothold on the target, by using enumeration, scanning and other…Continue reading on InfoSec Write-ups »

Lire la suite »

2. OAuth Misbinding Vulnerability

2026-02-10 18:17:12
The Silent Account Takeover Nobody Notices.Continue reading on InfoSec Write-ups »

Lire la suite »

How a Critical Race Condition in a Management System Led to a Bounty

2026-02-10 18:17:06
Bypassing subscription limits through non-atomic checks: A deep dive into the race condition the automated scanners missed.Continue reading on InfoSec Write-ups »

Lire la suite »

Astronaut Proving Grounds Linux Machine ( Road to OSCP)

2026-02-10 18:14:23
We can achieve that by using various of tools and techniques to obtain foothold on the target, by using enumeration, scanning and other…Continue reading on InfoSec Write-ups »

Lire la suite »

Proving Grounds Practice Codo Linux Lab ( Road to OSCP )

2026-02-10 18:14:14
We can achieve that by using various of tools and techniques to obtain foothold on the target, by using enumeration, scanning and other…Continue reading on InfoSec Write-ups »

Lire la suite »

Ni8mare: Unauthenticated RCE in n8n (CVE-2026–21858)

2026-02-10 18:14:06
In early 2026, security researchers revealed a critical vulnerability in n8n, a popular automation platform, that allows attackers to completely take over unpatched servers — no credentials needed....

Lire la suite »

The “Node 1.9” Miracle: How to Turn Your Bitcoin into a Hard Lesson in Cybersecurity

2026-02-10 18:13:15
So, you're scrolling through the dark corners of the internet … maybe looking for the meaning of life, maybe looking for a way to pay off that credit card… and you stumble upon a Pastebin promising...

Lire la suite »

Inside the OWASP Agentic AI Top 10: Exploitation and Architecture in Autonomous Systems

2026-02-10 18:12:31
1. Introduction: The Evolution from Chatbots to Autonomous AgentsContinue reading on InfoSec Write-ups »

Lire la suite »

Wild Bug Bounty Bugs You've Probably Never Seen

2026-02-10 18:11:50
If you want to stop finding the same bugs as everyone else —   This series is for you.Continue reading on InfoSec Write-ups »

Lire la suite »

Microsoft Patch Tuesday February 2026 – 54 Vulnerabilities Fixed, Including 6 Zero-days

2026-02-10 18:11:27
Microsoft released its February 2026 Patch Tuesday updates on February 10, addressing 54 vulnerabilities, including six zero-days across Windows, Office, Azure, and developer tools. The updates fix issues...

Lire la suite »

Measuring AI Security: Separating Signal from Panic

2026-02-10 18:00:00
The conversation around AI security is full of anxiety. Every week, new headlines warn of jailbreaks, prompt injection, agents gone rogue, and the rise of LLM-enabled cybercrime. It's easy to come away...

Lire la suite »

DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

2026-02-10 17:44:00
The information technology (IT) workers associated with the Democratic People's Republic of Korea (DPRK) are now applying to remote positions using real LinkedIn accounts of individuals they're impersonating,...

Lire la suite »

Sommet de l'IA 2026 : quelques points-clés du rapport scientifique « officiel »

2026-02-10 17:32:31
Comme en 2025, un rapport voulu par la communauté international dresse un état des lieux « vulgarisé » de la compréhension scientifique des IA généralistes et des risques associés. The post Sommet...

Lire la suite »

FortiSandbox XSS Vulnerability Let Attackers Run Arbitrary Commands

2026-02-10 17:10:36
Fortinet has disclosed a high-severity cross-site scripting (XSS) vulnerability in its FortiSandbox platform, tracked as CVE-2025-52436 (FG-IR-25-093), that enables unauthenticated attackers to execute...

Lire la suite »

USN-7942-2: GLib vulnerabilities

2026-02-10 17:07:40
USN-7942-1 fixed vulnerabilities in GLib. This update provides the corresponding updates for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. CVE-2025-3360 only affected Ubuntu...

Lire la suite »

Volvo Group North America customer data exposed in Conduent hack

2026-02-10 17:04:18
Volvo Group North America disclosed that it suffered an indirect data breach stemming from the compromise of IT systems at American business services giant Conduent, of which Volvo is a customer. [...]...

Lire la suite »

Microsoft rolls out new Secure Boot certificates before June expiration

2026-02-10 17:00:00
Microsoft has begun rolling out updated Secure Boot certificates through monthly Windows updates to replace the original 2011 certificates that will expire in late June 2026. [...]

Lire la suite »

The Next Great Engineering Frontier : The Hidden Complexity of Physical AI

2026-02-10 16:58:41
Physical AI isn't just smarter software—it's intelligence forced to survive physics, uncertainty, and real-world consequences. From autonomous cars to surgical robots, engineers must solve sensing...

Lire la suite »

x402 vs UCP: What Challenges Lie Ahead for AI Agent Commerce?

2026-02-10 16:52:43
Universal Commerce Protocol (UCP) is an open standard developed by Shopify and Google. Over 20 major retailers back it, including Target, Walmart, Best Buy, plus payment processors like Visa, Mastercard,...

Lire la suite »

Handwriting vs AI: Real Performance of AI on Handwritten Documents

2026-02-10 16:46:47
Handwritten forms remain a major challenge for AI, even in 2025. Our benchmark of seven leading models shows that GPT-5 Mini leads in accuracy for high-stakes workflows, while Gemini 2.5 Flash Lite offers...

Lire la suite »

Threat Hunting Is Critical to SOC Maturity but Often Misses Real Attacks

2026-02-10 16:40:04
High-performing SOC teams are increasingly turning to sandbox-derived threat intelligence to make threat hunting repeatable and impactful. Tools like ANY.RUN’s TI Lookup enables faster hunts grounded...

Lire la suite »

FortiOS Authentication Bypass Vulnerability Lets Attackers Bypass LDAP Authentication

2026-02-10 16:40:00
Fortinet has disclosed a high-severity authentication bypass vulnerability in FortiOS, tracked as CVE-2026-22153 (FG-IR-25-1052), that could allow unauthenticated attackers to sidestep LDAP authentication...

Lire la suite »

The End of CI/CD Pipelines: The Dawn of Agentic DevOps

2026-02-10 16:37:25
AI agents are replacing traditional CI/CD pipelines by autonomously debugging tests, deploying code, and triaging production incidents—GitHub Copilot and Azure SRE Agent already do this. The shift promises...

Lire la suite »

Microsoft 365 Admin Center Outage Hits users in North America

2026-02-10 16:25:20
Microsoft 365 administrators in North America are grappling with widespread access issues to the Microsoft 365 admin center, as confirmed by the company’s service health dashboard. Issue ID MO1230320...

Lire la suite »

OT Attacks Get Scary With 'Living-off-the-Plant' Techniques

2026-02-10 16:14:29
Ironically, security by obscurity has helped prevent dangerous OT attacks in recent years. It won't be that way forever.

Lire la suite »

Ivanti Endpoint Manager Vulnerability Lets Remote Attacker Leak Arbitrary Data

2026-02-10 16:09:47
Ivanti has released critical security updates for its Endpoint Manager (EPM) platform, addressing two newly discovered vulnerabilities that could enable unauthorized access to sensitive database information...

Lire la suite »

This Affordable Crypto Might Change Your Crypto Portfolio Forever, It Just Hit 300%

2026-02-10 16:08:23
Mutuum Finance (MUTM) is a decentralized lending and borrowing hub built on Ethereum. The project is currently in its presale phase, with the MUTM token priced around .04. Since Phase 1, the token price...

Lire la suite »

The HackerNoon Newsletter: Is Society Just a Really Complicated Brain? (2/10/2026)

2026-02-10 16:03:09
How are you, hacker? 🪐 What's happening in tech today, February 10, 2026? The HackerNoon Newsletter brings the HackerNoon ...

Lire la suite »

Naval Group et Thales accélèrent dans l'IA de défense souveraine

2026-02-10 16:02:18
Naval Group renforce son partenariat avec Thales en entrant au capital de son accélérateur CortAIx, pour développer une intelligence artificielle souveraine dédiée à la défense. The post Naval...

Lire la suite »

80% of Fortune 500 use active AI Agents: Observability, governance, and security shape the new frontier

2026-02-10 16:00:00
Read Microsoft's new Cyber Pulse report for straightforward, practical insights and guidance on new cybersecurity risks. The post 80% of Fortune 500 use active AI Agents: Observability, governance, and...

Lire la suite »

Pour l'IA de défense, Naval Group se rapproche de Cortaix de Thales

2026-02-10 15:57:18
Détenu majoritairement par l’Etat (62 %) avec une participation minoritaire de Thales (35 %), Naval Group a dévoilé un partenariat (...)

Lire la suite »

New Cybercrime Group 0APT Accused of Faking Hundreds of Breach Claims

2026-02-10 15:47:33
Researchers reveal the new 0APT cyber group is fabricating attacks on large organisations. Learn how they use fake data to trick companies into paying.

Lire la suite »

Microsoft 365 outage takes down admin center in North America

2026-02-10 15:45:15
Microsoft is investigating an outage that blocks some administrators with business or enterprise subscriptions from accessing the Microsoft 365 admin center. [...]

Lire la suite »

MEXC Earn Achieves Dual-Scale Growth in 2025: 64% Users, 43% AUM

2026-02-10 15:35:39
MEXC Earn platform achieved a 64% increase in users and a 43% growth in assets under management (AUM) in 2025. MEXC is known for its broad selection of trending tokens, everyday airdrop opportunities,...

Lire la suite »

IA dans le BTP : la révolution en mode test

2026-02-10 15:36:36
Une étude de l'Observatoire des métiers du BTP révèle les freins et opportunités de l'intégration de l'IA dans le secteur. The post IA dans le BTP : la révolution en mode test appeared first on...

Lire la suite »

Discord will limit profiles to teen-appropriate mode until you verify your age

2026-02-10 15:29:52
Discord will make all profiles teen-appropriate by default until you prove you're an adult. What you'd “miss” may not be all that terrible.

Lire la suite »

Hackers Weaponizing 7-Zip Downloads to Turn Your Home Computers into Proxy Nodes

2026-02-10 15:29:43
A deceptive campaign targeting unsuspecting users has emerged, using a counterfeit version of the widely used 7-Zip file archiving software to silently transform home computers into residential proxy...

Lire la suite »

SAP Security Patch Day – Critical SAP CRM and SAP S/4HANA Code Injection Vulnerabilities Fixed

2026-02-10 15:27:58
SAP's February 2026 Security Patch Day delivered fixes that SAP urges customers to prioritize to reduce exposure across core enterprise workloads. The release includes 26 new SAP Security Notes and...

Lire la suite »

ILOVEPOOP Toolkit Exploiting React2Shell Vulnerability to Deploy Malicious Payload

2026-02-10 15:23:08
The cybersecurity sector has been impacted by the sudden appearance of “React2Shell” (CVE-2025-55182), a critical vulnerability affecting Next.js and React Server Components. Following its...

Lire la suite »

ZeroDayRAT spyware grants attackers total access to mobile devices

2026-02-10 15:19:27
ZeroDayRAT is a commercial mobile spyware that grants full remote access to Android and iOS devices for spying and data theft. ZeroDayRAT is a newly discovered commercial mobile spyware toolkit that gives...

Lire la suite »

TeamPCP Industrializes Cloud Misconfigurations Into a Self-Propagating Cybercrime Platform

2026-02-10 15:07:20
TeamPCP, also known as PCPcat, ShellForce, and DeadCatx3, emerged in December 2025 as a sophisticated cloud-native threat actor targeting exposed Docker APIs, Kubernetes clusters, Ray dashboards, Redis...

Lire la suite »

How to Automate AWS Incident Investigation with Tines and AI

2026-02-10 15:01:11
Cloud incidents drag on when analysts have to leave cases to hunt through AWS consoles and CLIs. Tines shows how automated agents pull AWS CLI data directly into cases, reducing MTTR and manual investigation...

Lire la suite »

Manipulating AI memory for profit: The rise of AI Recommendation Poisoning

2026-02-10 14:56:21
That helpful “Summarize with AI” button? It might be secretly manipulating what your AI recommends.  Microsoft security researchers have discovered a growing trend of AI memory poisoning...

Lire la suite »

Microsoft scanne les LLM ouverts à la recherche de backdoor

2026-02-10 14:45:11
De plus en plus d’entreprises se servent de modèles IA ouverts ou open weight, mais ne savent pas s’ils sont complètement sûrs. (...)

Lire la suite »

Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

2026-02-10 14:36:00
Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring your own vulnerable driver (BYOVD) component for defense evasion...

Lire la suite »

D'ici 2027, L'Europe triplera ses dépenses dans le cloud souverain

2026-02-10 14:30:32
Après la multiplication des annonces autour des clouds dits souverains, Gartner donne une version chiffrée de l’appétence des (...)

Lire la suite »

Next Gen Spotlights: Turning Behavioural Intelligence into a Powerful Tool Against Fraud and Crime – Q&A with Paddy Lawton, Co-Founder of FACT360

2026-02-10 14:29:42
Founded on pioneering British research and real-world intelligence applications, FACT360 is using behavioural analytics to help governments and organisations detect fraud, terrorism and serious crime...

Lire la suite »

Safer Internet Day 2026 – Addressing the Age of Artificial Intelligence

2026-02-10 14:27:52
Safer Internet Day takes place during an era of heavy AI usage amongst individuals of all ages. This year's theme ‘Smart tech, safe choices – Exploring the safe and responsible use of AI'...

Lire la suite »

Bank Of America: Cybercrime Will Get Much Worse

2026-02-10 14:13:12
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 10, 2026 –Read the full story in GoBankingRates “The World In 2030,” a Bank of America research...

Lire la suite »

Most Engagement Data Is Compromised and That's a Major Security Problem

2026-02-10 14:00:00
Most engagement data is compromised by bots and spoofing. Datavault AI treats engagement as a security problem, verifying real human actions at the source.

Lire la suite »

From Ransomware to Residency: Inside the Rise of the Digital Parasite

2026-02-10 13:59:00
Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated on noise while missing a more dangerous shift happening quietly all around them? According...

Lire la suite »

How safe are kids using social media? We did the groundwork

2026-02-10 13:50:00
Our research found that mainstream platforms often protect children well—until curiosity or the wrong settings get in the way.

Lire la suite »

Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution

2026-02-10 13:30:00
Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution of arbitrary code on susceptible systems. The vulnerability, tracked as CVE-2026-21643,...

Lire la suite »

Man tricked hundreds of women into handing over Snapchat security codes

2026-02-10 13:28:45
Hacked Snapchat accounts and secret filming with smart glasses, this week served two reminders of how women's privacy is still being violated.

Lire la suite »

Microsoft announces new mobile-style Windows security controls

2026-02-10 13:16:32
Microsoft wants to introduce smartphone-style app permission prompts in Windows 11 to request user consent before apps can access sensitive resources such as files, cameras, and microphones. [...]

Lire la suite »

How One Engineer Turned Saudi Cloud Compliance from a 6-Month Bottleneck into a 2-Week Workflow

2026-02-10 13:09:30
Saudi Arabia's Class C data sovereignty rules once forced ISVs into 4–8 month compliance cycles. One engineer reimagined compliance as code—automating data residency, access controls, and audit...

Lire la suite »

ZeroDayRAT malware grants full access to Android, iOS devices

2026-02-10 13:00:00
A new commercial mobile spyware platform dubbed ZeroDayRAT is being advertised to cybercriminals on Telegram as a tool that provides full remote control over compromised Android and iOS devices. [...]

Lire la suite »

Pourquoi les assistants de codage n'échappent pas au paradoxe de la productivité

2026-02-10 12:50:24
Le gain de productivité des assistants de codage restera moindre tant que les écarts de spécifications seront détectés essentiellement lors de l'implémentation, postule une start-up américaine. The...

Lire la suite »

An Imaging Engineer's Notes, Part 1: The Four Core Modules of a Digital Camera

2026-02-10 12:40:36
Modern cameras aren't black boxes. Image quality emerges from the tight coordination of optics, sensors, ISPs, and intelligent control algorithms—each a critical system with its own constraints and...

Lire la suite »

The Most Powerful Central Banks of the Future Could Store Their Gold in Space

2026-02-10 12:36:50
Elon Musk wants to put 1 million AI servers in space to serve an already crowded AI market place. Meanwhile, central bankers are hodling gold, scared of the dollars future. Only problem is they are putting...

Lire la suite »

SUSE 2026-0412-1 Abseil-CPP Moderate Integer Overflow Risk

2026-02-10 12:30:05
An update that solves one vulnerability can now be installed.

Lire la suite »

What the 2026 State of the Software Supply Chain Report Reveals About Regulation

2026-02-10 12:30:01

Lire la suite »

Pride Month Phishing Targets Employees via Trusted Email Services

2026-02-10 12:19:15
Attackers are using Pride Month themed phishing emails to target employees worldwide, abusing trusted email platforms like SendGrid to harvest credentials.

Lire la suite »

The Reality of Deploying Tech in Legacy Industries

2026-02-10 12:00:49
Legacy industries adopt tech cautiously, not because they resist change, but because mistakes are expensive and risks are higher. With so many digital solutions available, some experience tech fatigue....

Lire la suite »

Senegal shuts National ID office after ransomware attack

2026-02-10 11:48:29
Senegal closed its national ID card office after a ransomware cyberattack disrupted ID, passport, and biometric services. Senegal confirmed a cyberattack on the Directorate of File Automation, the government...

Lire la suite »

Workday : retour aux sources avec Aneel Bhusri pour redresser la barre

2026-02-10 11:48:05
Le co-fondateur, Aneel Bhusri, reprend les rênes de l'éditeur de logiciels alors que l'action a perdu 41% en un an. The post Workday : retour aux sources avec Aneel Bhusri pour redresser la barre appeared...

Lire la suite »

ZAST.AI Raises M Pre-A to Scale "Zero False Positive" AI-Powered Code Security

2026-02-10 11:40:00
January 5, 2026, Seattle, USA — ZAST.AI announced the completion of a million Pre-A funding round. This investment came from the well-known investment firm Hillhouse Capital, bringing ZAST.AI's total...

Lire la suite »

Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server

2026-02-10 10:24:00
SmarterTools confirmed last week that the Warlock (aka Storm-2603) ransomware gang breached its network by exploiting an unpatched SmarterMail instance. The incident took place on January 29, 2026, when...

Lire la suite »

Dutch agencies hit by Ivanti EPMM exploit exposing employee contact data

2026-02-10 10:11:48
Dutch agencies confirmed attacks exploiting Ivanti EPMM flaws that exposed employee contact data at the data protection authority and courts. Dutch authorities said cyberattacks hit the Dutch Data Protection...

Lire la suite »

USN-8021-1: ImageMagick vulnerability

2026-02-10 09:54:52
Benny Isaacs discovered that ImageMagick did not properly manage memory when processing certain image files. An attacker could possibly use this issue to cause a denial of service or execute arbitrary...

Lire la suite »

Avec Feature Flags, Datadog accélère la mise en production des applications

2026-02-10 09:46:06
La mise en production est sans doute l'un des moments les plus importants du cycle de vie du développement d'une application. Mais (...)

Lire la suite »

How ShieldHQ Helps Organizations Reduce Insider Risk Without Disrupting Work

2026-02-10 09:17:49
When organizations think about cybersecurity threats, attention often goes to external attackers. Yet a significant… How ShieldHQ Helps Organizations Reduce Insider Risk Without Disrupting Work...

Lire la suite »

Navigating MiCA: A Practical Compliance Guide for European CASPs

2026-02-10 09:12:37
MiCA creates a single EU crypto rulebook, replacing national regimes with unified licensing, capital, and compliance rules for all CASPs.

Lire la suite »

Security automation for SOC teams: How It Transforms Modern Cybersecurity Operations

2026-02-10 09:08:30
SOC do not struggle because they lack tools but they battle for everything which demands… Security automation for SOC teams: How It Transforms Modern Cybersecurity Operations on Latest Hacking News...

Lire la suite »

Rapport GTIG : les cybermenaces s'intensifient contre les industriels de la défense

2026-02-10 09:01:50
Aujourd'hui, le Google Threat Intelligence Group (GTIG) a publié Beyond the Battlefield: Threats to the Defense Industrial Base, un nouveau rapport qui analyse comment les conflits modernes se jouent...

Lire la suite »

Sport et fuites de données : les risques cachés liés aux trackers d'activité connectés

2026-02-10 08:57:57
Les JO d'hiver pourraient, à nouveau, déclencher un engouement du public pour le sport, mais il est important de rester particulièrement vigilants lors de l'usage de trackers d'activité.  Tribune...

Lire la suite »

China-linked APT UNC3886 targets Singapore telcos

2026-02-10 08:40:15
China-linked group UNC3886 targeted Singapore 's telecom sector in a cyber espionage campaign, Singapore's Cyber Security Agency revealed. Cyber Security Agency of Singapore (CSA) and the Infocomm...

Lire la suite »

SUSE Linux Enterprise Micro Important Kernel Security Update 2026-0411-1

2026-02-10 08:34:57
An update that solves 348 vulnerabilities, contains seven features and has 34 security fixes can now be installed.

Lire la suite »

Fugitive behind M 'pig butchering' scheme gets 20 years in prison

2026-02-10 08:17:54
A dual Chinese and St. Kitts and Nevis national was sentenced to 20 years in prison in absentia for his role in an international cryptocurrency investment scheme (also known as pig butchering or romance...

Lire la suite »

From Folder Deletion to Admin: Lenovo Vantage (CVE‑2025‑13154)

2026-02-10 08:00:00
Last year we wrote about a Windows 11 vulnerability that allowed a regular user to gain administrative privileges. Not long after, Manuel Kiesel from Cyllective AG reached out to us after stumbling across...

Lire la suite »

Arbitrary XML file write in FCConfig

2026-02-10 08:00:00
CVSSv3 Score: 6.4 An Improper Link Resolution Before File Access vulnerability [CWE-59] in FortiClient Windows may allow a local low-privilege attacker to perform an arbitrary file write with...

Lire la suite »

Firewall policy bypass in FSSO Terminal Services Agent

2026-02-10 08:00:00
CVSSv3 Score: 3.8 An Improper Verification of Source of a Communication Channel vulnerability [CWE-940] in FortiOS FSSO Terminal Services Agent may allow an authenticated user with knowledge...

Lire la suite »

Format String Vulnerability in CAPWAP fast-failover mode

2026-02-10 08:00:00
CVSSv3 Score: 6.7 A Use of Externally-Controlled Format String vulnerability [CWE-134] in FortiGate may allow an authenticated admin to execute unauthorized code or commands via specifically...

Lire la suite »

LDAP authentication bypass in Agentless VPN and FSSO

2026-02-10 08:00:00
CVSSv3 Score: 7.5 An Authentication Bypass by Primary Weakness vulnerability [CWE-305] in FortiOS fnbamd may allow an unauthenticated attacker to bypass LDAP authentication of Agentless VPN...

Lire la suite »

Missing authorization on CSV user import

2026-02-10 08:00:00
CVSSv3 Score: 6.8 A missing authorization vulnerability [CWE-862] in FortiAuthenticator may allow a read-only user to make modification to local users via a file upload to an unprotected endpoint. ...

Lire la suite »

Request smuggling attack in FortiOS GUI

2026-02-10 08:00:00
CVSSv3 Score: 5.2 An HTTP request smuggling vulnerability [CWE-444] in FortiOS may allow an unauthenticated attacker to smuggle an unlogged http request through the firewall policies via a...

Lire la suite »

SSL-VPN Symlink Persistence Patch Bypass

2026-02-10 08:00:00
CVSSv3 Score: 5.3 An Exposure of Sensitive Information to an Unauthorized Actor vulnerability [CWE-200] in FortiOS SSL-VPN may allow a remote unauthenticated attacker to bypass the patch developed...

Lire la suite »

XSS via back button

2026-02-10 08:00:00
CVSSv3 Score: 7.9 An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiSandbox may allow an unauthenticated attacker to execute...

Lire la suite »

Toy Battles - 1,017 breached accounts

2026-02-10 02:44:47
In February 2026, the online gaming community Toy Battles suffered a data breach. The incident exposed 1k unique email addresses alongside usernames, IP addresses and chat logs. Following the breach,...

Lire la suite »

Fedora 43 tbtools CVE-2026-25537 Denial of Service Advisory

2026-02-10 01:34:52
Update the time crate to version 0.3.47. Update the time-macros crate to version 0.2.27. Update the time-core crate to version 0.1.8. Update the num-conv crate to version 0.2.0. Update the git2 crate...

Lire la suite »

Fedora 43 tuigreet Critical Stack Exhaustion Issue CVE-2026-25537

2026-02-10 01:34:52
Update the time crate to version 0.3.47. Update the time-macros crate to version 0.2.27. Update the time-core crate to version 0.1.8. Update the num-conv crate to version 0.2.0. Update the git2 crate...

Lire la suite »

Fedora 43 Sad 2026-F400579A21 CVE-2026-25537 Important Auth Bypass

2026-02-10 01:34:52
Update the time crate to version 0.3.47. Update the time-macros crate to version 0.2.27. Update the time-core crate to version 0.1.8. Update the num-conv crate to version 0.2.0. Update the git2 crate...

Lire la suite »

Fedora 43 uv Important Denial of Service Update 2026-25538

2026-02-10 01:34:52
Update the time crate to version 0.3.47. Update the time-macros crate to version 0.2.27. Update the time-core crate to version 0.1.8. Update the num-conv crate to version 0.2.0. Update the git2 crate...

Lire la suite »

Association Nationale des Premiers Secours - 5,600 breached accounts

2026-02-10 01:27:25
In January 2026, a data breach impacting the French non-profit Association Nationale des Premiers Secours (ANPS) was posted to a hacking forum. The breach exposed 5.6k unique email addresses along with...

Lire la suite »

Multiples vulnérabilités dans GnuTLS (10 février 2026)

10/02/2026
De multiples vulnérabilités ont été découvertes dans GnuTLS. Elles permettent à un attaquant de provoquer un déni de service à distance.

Lire la suite »

Multiples vulnérabilités dans les produits Schneider Electric (10 février 2026)

10/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Schneider Electric. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service...

Lire la suite »

Multiples vulnérabilités dans les produits Siemens (10 février 2026)

10/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance...

Lire la suite »

Multiples vulnérabilités dans les produits Axis (10 février 2026)

10/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Axis. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation...

Lire la suite »

Multiples vulnérabilités dans les produits SAP (10 février 2026)

10/02/2026
De multiples vulnérabilités ont été découvertes dans les produits SAP. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service...

Lire la suite »