Toute l'actualité de la Cybersécurité


Critical infra Honeywell CCTVs vulnerable to auth bypass flaw

2026-02-18 20:58:20
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of a critical vulnerability in multiple Honeywell CCTV products that allows unauthorized access to feeds or account hijacking....

Lire la suite »

AI platforms can be abused for stealthy malware communication

2026-02-18 20:18:24
AI assistants like Grok and Microsoft Copilot with web browsing and URL-fetching capabilities can be abused to intermediate command-and-control (C2) activity. [...]

Lire la suite »

Notepad++ patches flaw used to hijack update system

2026-02-18 19:28:02
Notepad++ patched a vulnerability that attackers used to hijack its update system and deliver malware to targeted users. Notepad++ fixed a vulnerability that allowed a China-linked APT group to hijack...

Lire la suite »

Cryptocurrency Scams Target Asia, Combining Malvertising and Pig Butchering with Losses Up to ¥10 Million

2026-02-18 19:20:11
A sophisticated cryptocurrency scam campaign is currently targeting users across Asia, with a heavy and specific focus on Japan. This operation uniquely combines two distinct fraud models into a single,...

Lire la suite »

A CISO's Playbook for Defending Data Assets Against AI Scraping

2026-02-18 19:13:33
Discover a strategic approach to govern scraping risks, balance security with business growth, and safeguard intellectual capital from automated data harvesting.

Lire la suite »

Critical Ivanti EPMM Zero-Day Vulnerabilities Exploited in The Wild Targeting Corporate Networks

2026-02-18 18:49:42
Two critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM) have emerged as a major threat to enterprise networks, with active exploitation campaigns targeting corporate infrastructure...

Lire la suite »

Firebase Misconfiguration Exposes 300M Messages From Chat & Ask AI Users

2026-02-18 18:33:23
A technical mistake in the popular Chat & Ask AI app has left 300 million private messages from 25 million users exposed online. Discover what happened and how you can protect your personal data...

Lire la suite »

Fake CAPTCHA (ClickFix) Attack Chain Leads to Enterprise‑Wide Malware Infection in Organisations

2026-02-18 18:30:32
A sophisticated cyberattack campaign leveraging “ClickFix” social engineering has emerged, posing a severe threat to enterprise networks globally. These massive campaigns, which trick users...

Lire la suite »

ClickFix Abuses Legitimate Homebrew Workflow to Deploy Cuckoo Stealer on macOS for Credential Harvesting

2026-02-18 18:14:28
A sophisticated social engineering campaign is targeting macOS developers through fake Homebrew installation pages that deploy Cuckoo Stealer, a comprehensive credential-harvesting malware. The attack...

Lire la suite »

5 Essential Internet Security Tips Everyone Should Know

2026-02-18 18:12:38
The internet can be a scary place. Every day, I hear stories about people getting… 5 Essential Internet Security Tips Everyone Should Know on Latest Hacking News | Cyber Security News, Hacking Tools...

Lire la suite »

Bercy alerte sur le piratage du fichier national des comptes bancaires

2026-02-18 18:01:57
Le fichier national des comptes bancaires et assimilés (Ficoba) liste tous les comptes bancaires ouverts en France : comptes courants, comptes d'épargne, (...)

Lire la suite »

Cyberattaque à Bercy : 1,2 million de comptes bancaires ont filtré

2026-02-18 17:48:24
Fin janvier, un acteur malveillant a consulté le fichier national des comptes bancaires (FICOBA) en exploitant l'accès d'un agent habilité. The post Cyberattaque à Bercy : 1,2 million de comptes bancaires...

Lire la suite »

Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist's Phone in Police Custody

2026-02-18 17:30:00
New research from the Citizen Lab has found signs that Kenyan authorities used a commercial forensic extraction tool manufactured by Israeli company Cellebrite to break into a prominent dissident's phone,...

Lire la suite »

Betterment data breach might be worse than we thought

2026-02-18 17:09:02
This breach now appears far more serious. The leaked data includes rich personal and financial details that phishers could use.

Lire la suite »

Microsoft 365 Copilot Flaw Allows AI Assistant to Summarize Sensitive Emails

2026-02-18 17:08:51
A security flaw in Microsoft 365 Copilot is causing the AI assistant to incorrectly summarize email messages protected by confidentiality sensitivity labels, bypassing configured Data Loss Prevention...

Lire la suite »

USN-7992-2: Inetutils vulnerability

2026-02-18 17:02:47
USN-7992-1 fixed vulnerabilities in telnetd in Inetutils. This update provides the corresponding update for Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. Original advisory details: Kyu...

Lire la suite »

Trust Wallet Launches Cash Deposits, Enabling Users to Convert Physical Cash Into Crypto

2026-02-18 17:00:04
Cash Deposits is a new feature that allows users to load physical cash and convert into digital assets directly inside their Trust Wallet. Users can load cash into a digital wallet at over 15,000 retail...

Lire la suite »

Koyeb, un atout PaaS dans les mains de Mistral AI

2026-02-18 17:00:01
Pour alimenter son offre d'infrastructure, Mistral AI s'empare de Koyeb, un PaaS made in France qui a pris le virage de l'IA. The post Koyeb, un atout PaaS dans les mains de Mistral AI appeared first...

Lire la suite »

Microsoft 365 Exchange URL Filtering Update Quarantines Legitimate Emails as Phishing

2026-02-18 16:59:56
A faulty URL filtering rule update in Microsoft Exchange Online triggered a widespread false-positive storm beginning February 9, 2026, causing legitimate email messages to be incorrectly flagged as phishing...

Lire la suite »

Avec Qwen 3.5, Alibaba oriente son LLM multimodal vers les agents IA

2026-02-18 16:37:45
Les très grands modèles de langage reviennent en force pour les besoins de l'IA agentique. Dans ce cadre, Alibaba vient de dévoiler (...)

Lire la suite »

Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution

2026-02-18 16:35:00
Cybersecurity researchers have disclosed a critical security flaw in the Grandstream GXP1600 series of VoIP phones that could allow an attacker to seize control of susceptible devices. The vulnerability,...

Lire la suite »

Malware Campaign Delivers Remote Access Backdoor and Fake MetaMask Wallet to Steal Cryptocurrency Funds

2026-02-18 16:34:45
North Korean threat actors have launched a sophisticated attack campaign targeting IT professionals in cryptocurrency, Web3, and artificial intelligence sectors. The ongoing operation, known as Contagious...

Lire la suite »

Accès illégaux à FICOBA, 1,2 million de comptes visés

2026-02-18 16:31:07
Accès illégaux à FICOBA fin janvier 2026, 1,2 million de comptes copiés par un pirate....

Lire la suite »

Telegram channels expose rapid weaponization of SmarterMail flaws

2026-02-18 16:27:38
Underground Telegram channels shared SmarterMail exploit PoCs and stolen admin credentials within days of disclosure. Flare explains how monitoring these communities reveals rapid weaponization of CVE-2026-24423...

Lire la suite »

Microsoft: Anti-phishing rules mistakenly blocked emails, Teams messages

2026-02-18 16:26:53
Microsoft says an Exchange Online issue that mistakenly quarantined legitimate emails last week was triggered by faulty heuristic detection rules designed to block credential phishing campaigns. [...]...

Lire la suite »

Choisir le service public frappé par une fuite massive

2026-02-18 16:03:02
Fuite CSP : 377 418 candidats exposés, compte gestionnaire détourné et données personnelles volées....

Lire la suite »

The HackerNoon Newsletter: The Huel-ification of Thinking (2/18/2026)

2026-02-18 16:03:00
How are you, hacker? 🪐 What's happening in tech today, February 18, 2026? The HackerNoon Newsletter brings the HackerNoon ...

Lire la suite »

Une vulnérabilité critique activement exploitée dans BeyondTrust RS

2026-02-18 15:49:46
Plusieurs sociétés de sécurité ont lancé des alertes après l’exploitation rapide d’une faille critique (...)

Lire la suite »

How to Take the Next Steps to Become a Full-Fledged Writer

2026-02-18 15:45:03
Don't go in without a plan. For a strategy before you begin writing. Connecting with writers is another great tip to become a full-fledged writer. And finally, try to avoid burnout as much as you can....

Lire la suite »

New SysUpdate Variant Malware Discovered and Tool Developed to Decrypt Encrypted Linux C2 Traffic

2026-02-18 15:19:33
A new variant of the SysUpdate malware has emerged as a sophisticated threat targeting Linux systems with advanced command-and-control (C2) encryption capabilities. The malware was discovered during a...

Lire la suite »

A Smarter Way to Scale Multi-Agent Pathfinding

2026-02-18 15:15:09
This paper formalizes multi-agent pathfinding in N-dimensional grid spaces and introduces LayeredMAPF, a decomposition-based framework that splits large MAPF instances into smaller, solvable subproblems....

Lire la suite »

VS Code extensions with 125M+ installs expose users to cyberattacks

2026-02-18 15:14:33
Four popular VS Code extensions with 125M+ installs have flaws that could let hackers steal files and run code remotely. OX Security researchers warn that security flaws in four widely used VS Code extensions...

Lire la suite »

OpenClaw AI Framework v2026.2.17 Released with Anthropic Model Support and Security Fixes

2026-02-18 15:05:59
OpenClaw has released version 2026.2.17 with significant enhancements, including support for Anthropic’s Claude Sonnet 4.6 model. Expanded context windows, though the update arrives as the AI agent...

Lire la suite »

Notification de fuite de données chez ManoMano

2026-02-18 15:05:29
ManoMano : attaque en janvier 2026 chez un sous-traitant, données clients copiées....

Lire la suite »

ClawHavoc Poisoned OpenClaw's ClawHub with 1,184 Malicious Skills, Enabling Data Theft and Backdoor Access

2026-02-18 14:18:48
A large-scale supply chain poisoning campaign that targeted OpenClaw's official marketplace, ClawHub, distributing 1,184 malicious “Skills” designed to steal data and establish backdoor access on...

Lire la suite »

The Phone is Listening: A Cold War–Style Vulnerability in Modern VoIP

2026-02-18 14:15:00
I don't know about you, but when I think about “critical vulnerabilities,” I usually picture ransomware, data theft, or maybe a server falling over at 2 a.m. while someone frantically searches Slack...

Lire la suite »

Comment étendre la résilience de l'IT aux métiers ?

2026-02-18 14:14:58
Euroclear, acteur européen majeur de la sécurisation et de l'enregistrement des transactions financières pratique une collaboration assez inédite entre les équipes IT et ses différents métiers...

Lire la suite »

Cybercrime Goes Corporate: Huntress Report Reveals Rise of Scalable, Stealth-First Attacks

2026-02-18 14:02:36
Cybercriminals are no longer lone hackers exploiting flashy zero-days; they are running streamlined, profit-driven operations that mirror legitimate businesses. That's the key takeaway from the newly...

Lire la suite »

Data breach at fintech firm Figure affects nearly 1 million accounts

2026-02-18 14:01:08
Hackers have stolen the personal and contact information of nearly 1 million accounts after breaching the systems of Figure Technology Solutions, a self-described blockchain-native financial technology...

Lire la suite »

CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 VoIP Phones (FIXED)

2026-02-18 14:00:00
OverviewRapid7 Labs conducted a zero-day research project against the Grandstream GXP1600 series of Voice over Internet Protocol (VoIP) phones. This research resulted in the discovery of a critical unauthenticated...

Lire la suite »

USN-8050-1: Apache Traffic Server vulnerability

2026-02-18 13:49:15
Masakazu Kitajo discovered that Apache Traffic Server did not properly handle the Valid Host header field. An attacker could possibly use this issue to cause a denial of service (DoS).

Lire la suite »

The Playbook For Organized Cybercrime

2026-02-18 13:48:10
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 18, 2026 –Read the full report in GlobeNewswire Cybercrime has become the world's third-largest economy,...

Lire la suite »

Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs

2026-02-18 13:16:00
Cybersecurity researchers have disclosed multiple security vulnerabilities in four popular Microsoft Visual Studio Code (VS Code) extensions that, if successfully exploited, could allow threat actors...

Lire la suite »

USN-8051-1: libssh vulnerabilities

2026-02-18 13:14:15
It was discovered that libssh clients incorrectly handled the key exchange process. A remote attacker could possibly use this issue to cause libssh clients to crash, resulting in a denial of service....

Lire la suite »

Researchers Compare CBS, LNS, PBS, and PIBT in the Race to Speed Up Multi-Agent Pathfinding

2026-02-18 13:00:06
This section reviews key Multi-Agent Pathfinding (MAPF) algorithms designed to reduce computation time. It contrasts serial methods like CBS, LNS, and PBS with parallel approaches such as PIBT and LaCAM,...

Lire la suite »

Job scam uses fake Google Forms site to harvest Google logins

2026-02-18 12:22:22
Phishers are using fake Google Forms pages hosted on lookalike domains to trick job seekers into handing over their Google credentials.

Lire la suite »

China-linked APT weaponized Dell RecoverPoint zero-day since 2024

2026-02-18 12:15:46
A suspected Chinese state-linked group exploited a critical Dell RecoverPoint flaw (CVE-2026-22769) in zero-day attacks starting mid-2024. Mandiant and Google's Threat Intelligence Group (GTIG) reported...

Lire la suite »

Microsoft says bug causes Copilot to summarize confidential emails

2026-02-18 12:03:05
Microsoft says a Microsoft 365 Copilot bug has been causing the AI assistant to summarize confidential emails since late January, bypassing data loss prevention (DLP) policies that organizations rely...

Lire la suite »

Debian gnutls28 Important Denial of Service Fix DSA-6140-1 CVE-2025-14831

2026-02-18 12:00:11
Tim Scheckenbach reported a flaw in GnuTLS, a library implementing the TLS and SSL protocols. Processing of specially crafted certificates containing a large number of name constraints may result in denial...

Lire la suite »

Family Secrets in a Changing Metropolis

2026-02-18 12:00:02
Widow Mrs. Frazer, used to Highland comfort and dreaming of grand London life, visits her wealthy bachelor brother John Merapie. She anticipates refinement, fashion, and ease for her children, but John's...

Lire la suite »

Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability

2026-02-18 11:58:00
In 2025, navigating the digital seas still felt like a matter of direction. Organizations charted routes, watched the horizon, and adjusted course to reach safe harbors of resilience, trust, and compliance. In...

Lire la suite »

Meet the Contest Winner: Crypto VC Researcher Glaze on Finding Opportunity in a Crowded AI Market

2026-02-18 11:57:02
Glaze, a crypto infrastructure researcher at IOSG Ventures, won second place in the #DecentralizeAI Writing Contest by analyzing the gap between Web2 AI maturity and Web3 AI product design. Drawing from...

Lire la suite »

1-15 February 2026 Cyber Attacks Timeline

2026-02-18 11:52:22
In the first half of February 2026 I collected 96 events (6.4 events/day) with a threat landscape dominated by malware with 33%, (it was 38% in the second half of last month, once again ahead of ransomware...

Lire la suite »

Palo Alto Networks muscle la sécurité de l'IA en rachetant Koi

2026-02-18 11:45:08
Fondé en 2024 par des membres de l'Unit 8200 des services de renseignements israéliens, Koi se concentre sur le développement (...)

Lire la suite »

Ubuntu 24.04 LTS Linux Kernel Important Data Integrity Threat USN-8031-2

2026-02-18 11:23:47
Several security issues were fixed in the Linux kernel.

Lire la suite »

Achats publics numériques : la circulaire d'État évoque la préférence européenne sans la consacrer

2026-02-18 11:21:19
La souveraineté est erigée en critère structurant... avec la préférence européenne comme un des axes sur lesquels elle « s'appuie en particulier ». The post Achats publics numériques : la circulaire...

Lire la suite »

Debian GIMP High Denial of Service Risk DSA-6139-1 CVE-2026-2239

2026-02-18 11:07:18
Several vulnerabilities were discovered in GIMP, the GNU Image Manipulation Program, which could result in denial of service or potentially the execution of arbitrary code if malformed PSD, PSP or ICO...

Lire la suite »

After Death Comes Debt: The Choice That Changes Mina's Future

2026-02-18 11:00:02
Chapter V shows how death and financial disaster uproot Mina's life. After Captain Frazer's failed investment wipes out the family fortune, his widow refuses a modest life in Scotland and chooses...

Lire la suite »

U.S. CISA adds Google Chromium CSS, Microsoft Windows, TeamT5 ThreatSonar Anti-Ransomware, and Zimbra flaws to its Known Exploited Vulnerabilities catalog

2026-02-18 10:55:32
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chromium CSS, Microsoft Windows, TeamT5 ThreatSonar Anti-Ransomware, and Zimbra flaws to its Known Exploited Vulnerabilities catalog....

Lire la suite »

Glendale man gets 5 years in prison for role in darknet drug ring

2026-02-18 10:50:50
​A Glendale man was sentenced to nearly five years in federal prison for his role in a darknet drug trafficking operation that sold cocaine, methamphetamine, MDMA, and ketamine to customers across the...

Lire la suite »

Why AI-Driven Enterprises Still Rely on Manual Labor for Data Migration

2026-02-18 10:48:08
In the age of AI, why does so much of our migration and modernization effort still depend on manual labor? The challenge isn't moving data, but translating complex business logic.

Lire la suite »

Le projet Pionniers de l'IA dévoile ses premiers lauréats

2026-02-18 10:44:29
L’Etat multiplie les initiatives autour de l’IA pour créer un écosystème favorable dans ce domaine. Dernier exemple en (...)

Lire la suite »

Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024

2026-02-18 10:32:00
A maximum severity security vulnerability in Dell RecoverPoint for Virtual Machines has been exploited as a zero-day by a suspected China-nexus threat cluster dubbed UNC6201 since mid-2024, according...

Lire la suite »

Do LLMs Really Lie? Why AI Sounds Convincing While Getting Facts Wrong

2026-02-18 10:30:02
AI hallucinations aren't random glitches — they're a natural consequence of how large language models are trained to predict plausible text, not verified truth. This guide breaks down the mechanics...

Lire la suite »

3 Ways to Start Your Intelligent Workflow Program

2026-02-18 10:30:00
Security, IT, and engineering teams today are under relentless pressure to accelerate outcomes, cut operational drag, and unlock the full potential of AI and automation. But simply investing in tools...

Lire la suite »

Scammers use fake “Gemini” AI chatbot to sell fake “Google Coin”

2026-02-18 10:10:49
An AI chatbot posing as Google's Gemini is being used to pitch fake “Google Coin,” promising 7x returns.

Lire la suite »

USN-8031-2: Linux kernel (GCP FIPS) vulnerabilities

2026-02-18 10:06:54
It was discovered that improper initialization of CPU cache memory could allow a local attacker with hypervisor access to overwrite SEV-SNP guest memory resulting in loss of data integrity. (CVE-2024-36331) Oleksii...

Lire la suite »

CredShields Contributes to OWASP's 2026 Smart Contract Security Priorities

2026-02-18 09:54:47
OWASP Smart Contract Top 10 2026 is a risk prioritization framework developed from real world exploit data observed across blockchain ecosystems in 2025. The 2026 ranking encourages teams to integrate...

Lire la suite »

Zircuit Finance Launches Institutional-Grade Onchain Yield Platform Targeting 8–11% APR

2026-02-18 09:31:48
Zircuit Finance is a secure platform for institutional-grade strategies. The vault is designed to generate yield on USDC and USDT, with a stated target range of 8–11% APR, subject to market conditions...

Lire la suite »

L'INESIA a sa feuille de route… et son défi de coopération internationale

2026-02-18 09:27:37
Un an après sa création, l'INESIA formalise une roadmap. En toile de fond, sa participation à un réseau international d'instituts d'évaluation des IA. The post L’INESIA a sa feuille de route…...

Lire la suite »

TryHackMe Relevant Walkthrough: From Anonymous Share to SYSTEM

2026-02-18 09:14:40
Some machines fight you.Some machines hide.And then there are machines like Relevant that quietly leaks small clue and unravel completely.The box doesn't require any guessing, wordlists, or brute force.It...

Lire la suite »

Exam Review: Certified AI/ML Pentester (C-AI/MLPen)

2026-02-18 09:13:30
My Experience with the Certified AI/ML PentesterContinue reading on InfoSec Write-ups »

Lire la suite »

Unauthenticated Image Access and EXIF Location Leak, Easy P4, you can find under 2 mins

2026-02-18 09:09:19
Hello people. Here’s another blog; this one is another bug you can find real quick.Continue reading on InfoSec Write-ups »

Lire la suite »

La Côte d'Or se dote d'un datacenter IA modulaire

2026-02-18 09:07:20
Après Cannes l'an dernier, c'est au tour du département de la Côte d'Or (Bourgogne Franche-Comté) d'annoncer avoir sélectionné (...)

Lire la suite »

Pour Gartner, la géopatriation des données devient une réalité

2026-02-18 08:49:11
Dans leurs décisions technologiques, les entreprises sont de moins en moins immunes au contexte macroéconomique dans lequel elles évoluent. (...)

Lire la suite »

L'IA et la sécurité dynamisent la modernisation des SI des banques

2026-02-18 08:43:05
Depuis toujours, les banques sont des organisations, par nature, technologiques. L'IA, mais aussi les enjeux cyber, les poussent à accélérer (...)

Lire la suite »

Keenadu backdoor found preinstalled on Android devices, powers Ad fraud campaign

2026-02-18 08:31:02
Kaspersky uncovered Keenadu, an Android backdoor used for ad fraud that can even take full control of devices. Kaspersky has identified a new Android malware called Keenadu. It can be preinstalled in...

Lire la suite »

openSUSE libxml2 Moderate Threat Resource Exceeded Fix 2026-0570-1

2026-02-18 08:30:22
An update that solves five vulnerabilities and has six security fixes can now be installed.

Lire la suite »

openSUSE Leap 15.5/15.6 Moderate libxml2 Security Update 2026-0570-1

2026-02-18 08:30:21
An update that solves five vulnerabilities and has six security fixes can now be installed.

Lire la suite »

SUSE Containers 15-SP7 cdi Update Important Fix 2026-0571-1

2026-02-18 08:30:06
# Security update for cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container,...

Lire la suite »

Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware

2026-02-18 07:40:00
Notepad++ has released a security fix to plug gaps that were exploited by an advanced threat actor from China to hijack the software update mechanism to selectively deliver malware to targets of interest. The...

Lire la suite »

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

2026-02-18 06:52:00
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the...

Lire la suite »

Router Security After DKnife: Rethinking Trust at the Network Edge

2026-02-18 03:24:44
We spend most of our time chasing endpoint infections and identity abuse. That's where the alerts are. That's where the tooling is. Meanwhile, the device that routes every login, session cookie, software...

Lire la suite »

Figure - 967,178 breached accounts

2026-02-18 01:11:11
In February 2026, data obtained from the fintech lending platform Figure was publicly posted online. The exposed data, dating back to January 2026, contained over 900k unique email addresses along with...

Lire la suite »

Singapore & Its 4 Major Telcos Fend Off Chinese Hackers

2026-02-18 01:00:00
After detecting a zero-day attack, the country's effective response was attributed to the tight relationship between its government and private industry.

Lire la suite »

Multiples vulnérabilités dans Tenable Security Center (18 février 2026)

18/02/2026
De multiples vulnérabilités ont été découvertes dans Tenable Security Center. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni...

Lire la suite »

Multiples vulnérabilités dans SPIP (18 février 2026)

18/02/2026
De multiples vulnérabilités ont été découvertes dans SPIP. Certaines d'entre elles permettent à un attaquant de provoquer une falsification de requêtes côté serveur (SSRF), une injection de code...

Lire la suite »

Vulnérabilité dans NetApp StorageGRID (18 février 2026)

18/02/2026
Une vulnérabilité a été découverte dans NetApp StorageGRID. Elle permet à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données et une falsification...

Lire la suite »

Vulnérabilité dans Apache Tomcat (18 février 2026)

18/02/2026
Une vulnérabilité a été découverte dans Apache Tomcat. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.

Lire la suite »

Multiples vulnérabilités dans Atlassian Confluence (18 février 2026)

18/02/2026
De multiples vulnérabilités ont été découvertes dans Atlassian Confluence. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni...

Lire la suite »

Vulnérabilité dans HPE Aruba Networking ClearPass Policy Manager (18 février 2026)

18/02/2026
Une vulnérabilité a été découverte dans HPE Aruba Networking ClearPass Policy Manager. Elle permet à un attaquant de provoquer une élévation de privilèges.

Lire la suite »

Multiples vulnérabilités dans Microsoft Edge (18 février 2026)

18/02/2026
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur. Microsoft indique que...

Lire la suite »

Vulnérabilité dans Microsoft Windows (18 février 2026)

18/02/2026
Une vulnérabilité a été découverte dans Microsoft Windows. Elle permet à un attaquant de provoquer une élévation de privilèges.

Lire la suite »