Toute l'actualité de la Cybersécurité


CrushFTP warns users to patch unauthenticated access flaw immediately

2025-03-25 20:11:04
CrushFTP warned customers of an unauthenticated HTTP(S) port access vulnerability and urged them to patch their servers immediately. [...]

Lire la suite »

OPSEC Nightmare: Leaking US Military Plans to a Reporter

2025-03-25 20:03:22
Experts say the leakage of US military plans to a reporter this month reflects a severe operational security failure on the part of US leadership.

Lire la suite »

South African Poultry Company Reports M Loss After Cyber Intrusion

2025-03-25 20:02:49
The company reports that no sensitive information was breached or stolen in the cyber intrusion and that its operations are running normally again.

Lire la suite »

Satellite Navigation Systems Facing Rising Jamming and Spoofing Attacks

2025-03-25 19:47:17
Satellite navigation systems are under rising threat from jamming and spoofing attacks, risking aviation, maritime, and telecom safety worldwide, warn global agencies.

Lire la suite »

Cloudflare R2 service outage caused by password rotation error

2025-03-25 19:47:07
Cloudflare has announced that its R2 object storage and dependent services experienced an outage lasting 1 hour and 7 minutes, causing 100% write and 35% read failures globally. [...]

Lire la suite »

Broadcom warns of authentication bypass in VMware Windows Tools

2025-03-25 19:17:28
Broadcom released security updates today to fix a high-severity authentication bypass vulnerability in VMware Tools for Windows. [...]

Lire la suite »

Cybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver Malware

2025-03-25 19:12:32
In the second half of 2024, cybercriminals have increasingly leveraged legitimate Microsoft tools and browser extensions to bypass security measures and deliver malware, according to Ontinue’s latest...

Lire la suite »

Malicious AI Tools See 200% Surge as ChatGPT Jailbreaking Talks Increase by 52%

2025-03-25 19:07:38
The cybersecurity landscape in 2024 witnessed a significant escalation in AI-related threats, with malicious actors increasingly targeting and exploiting large language models (LLMs). According to KELA’s...

Lire la suite »

Android malware campaigns use .NET MAUI to evade detection

2025-03-25 18:55:45
Researchers warn of a new Android malware that uses .NET MAUI to mimic legit services and evade detection. McAfee researchers warn of Android malware campaigns using .NET MAUI to evade detection. These...

Lire la suite »

Banking Malware Infects 248,000 Mobile Users Through Social Engineering Techniques

2025-03-25 18:54:03
In 2024, the number of users affected by mobile banking malware skyrocketed to nearly 248,000, a staggering 3.6-fold increase from the previous year’s 69,000 affected users. This dramatic rise in...

Lire la suite »

Quantum Minute On The Cybercrime Radio Podcast

2025-03-25 18:49:28
Get ready for Y2Q aka Q-Day – Brought to you by SecureQuantum Northport, N.Y. – Mar. 25, 2025 The Quantum Minute is a weekly one-minute episode on the Cybercrime Magazine Podcast, brought to you by SecureQuantum, a...

Lire la suite »

Researchers Compare Malware Development in Rust vs C and C++

2025-03-25 18:46:19
Security researcher Nick Cerne from Bishop Fox has published findings comparing malware development in Rust versus traditional C/C++ languages. The research demonstrates how Rust provides inherent anti-analysis...

Lire la suite »

ARACNE: LLM-Powered Pentesting Agent Executes Commands on Real Linux Shell Systems

2025-03-25 18:27:55
Researchers have introduced ARACNE, a fully autonomous Large Language Model (LLM)-based pentesting agent designed to interact with SSH services on real Linux shell systems. ARACNE is engineered to execute...

Lire la suite »

New Windows zero-day leaks NTLM hashes, gets unofficial patch

2025-03-25 18:22:38
Free unofficial patches are available for a new Windows zero-day vulnerability that can let remote attackers steal NTLM credentials by tricking targets into viewing malicious files in Windows Explorer....

Lire la suite »

IDT Corporation Partners with AccuKnox for Zero Trust Runtime IoT/Edge Security

2025-03-25 18:19:32
Menlo Park, United States, March 25th, 2025, CyberNewsWire FinTech and Communications Leader, IDT Corporation partners with AccuKnox to deploy runtime security-powered CNAPP (Cloud Native Application...

Lire la suite »

New Phishing Campaign Targets Mac Users to Steal Login Credentials

2025-03-25 18:11:40
A sophisticated phishing campaign, recently identified by LayerX Labs, has shifted its focus from Windows users to Mac users in response to enhanced security measures implemented by major browsers. Initially,...

Lire la suite »

CAPE from Cuckoo v1 Enables Malware Analysis in a Secure Isolated Sandbox Environment

2025-03-25 17:56:07
CAPE, derived from Cuckoo v1, is a sophisticated malware sandbox designed to execute malicious files in an isolated environment while capturing their dynamic behavior and collecting forensic artifacts....

Lire la suite »

Multistage Info-Stealer SnakeKeylogger Targets Individuals and Businesses to Steal Login Credentials

2025-03-25 17:38:17
SnakeKeylogger, a sophisticated multistage malware, has emerged as a significant threat to both individuals and businesses by targeting sensitive login credentials. This malware campaign is characterized...

Lire la suite »

New Malware Targets Android Users by Abusing Cross-Platform Framework for Evasion

2025-03-25 17:31:33
A recent discovery by the McAfee Mobile Research Team has highlighted a new wave of Android malware campaigns that utilize the .NET MAUI cross-platform framework to evade detection. This framework, introduced...

Lire la suite »

VMware Tools for Windows Vulnerability Let Attackers Bypass Authentication

2025-03-25 17:26:33
VMware addressed a significant authentication bypass vulnerability in its VMware Tools for Windows suite. The vulnerability, CVE-2025-22230, could allow malicious actors with non-administrative privileges...

Lire la suite »

Accused Snowflake Attacker 'Judische' Agrees to US Extradition

2025-03-25 17:05:36
Though there is no confirmation as to when this extradition will occur, Alexander Moucka agreed to be transferred in writing before a judge.

Lire la suite »

Hackers Exploit Windows MMC Zero-Day Vulnerability to Execute Malicious Code

2025-03-25 17:00:07
A sophisticated campaign by Russian threat actors exploiting a critical zero-day vulnerability in the Microsoft Management Console (MMC). The vulnerability, CVE-2025-26633, allows attackers to bypass...

Lire la suite »

EncryptHub linked to MMC zero-day attacks on Windows systems

2025-03-25 16:51:32
A threat actor known as EncryptHub has been linked to Windows zero-day attacks exploiting a Microsoft Management Console vulnerability patched this month. [...]

Lire la suite »

One-Click Account Hijacking on TikTok

2025-03-25 16:50:39
Free Article LInkContinue reading on InfoSec Write-ups »

Lire la suite »

BlueSky InfoSec News List

2025-03-25 16:38:13
Hello all, happy Tuesday. I’ve migrated my cybersecurity news feed list to BlueSky and it can now be found here: https://web-cdn.bsky.app/profile/hacks4pancakes.com/lists/3ll6ownhbuz2o I hope you...

Lire la suite »

Hackers Are Using Microsoft's .NET MAUI to Spread Android Malware

2025-03-25 16:28:43
McAfee Labs reveals new Android malware exploiting .NET MAUI to steal user data. Learn about advanced evasion techniques and how to stay protected.

Lire la suite »

Multiple vulnerabilities in Ingress NGINX Controller for Kubernetes

2025-03-25 16:10:50
On March 24, 2025, Kubernetes disclosed 5 new vulnerabilities affecting the Ingress NGINX Controller for Kubernetes. Successful exploitation could allow attackers access to all secrets stored across all...

Lire la suite »

Active Roles Wins 2025 Cybersecurity Excellence Award for Hybrid Active Directory Protection

2025-03-25 15:27:18
Alisa Viejo, United States, 25th March 2025, CyberNewsWire

Lire la suite »

CYREBRO Recognized in Gartner Emerging Tech Report for Detection and Response Startups

2025-03-25 12:54:50
Ramat Gan, Israel, 25th March 2025, CyberNewsWire

Lire la suite »

ARMO Launches First Cloud App Detection and Response to Unify Code to Cloud Runtime Security

2025-03-25 16:06:48
Tel Aviv, Israel, March 25th, 2025, CyberNewsWire ARMO CADR minimizes the cloud attack surface, detects and responds to unknown and known cyberattacks while ensuring business continuity, combining the...

Lire la suite »

Browser-in-the-Browser attacks target CS2 players' Steam accounts

2025-03-25 15:52:09
A new phishing campaign targets Counter-Strike 2 players utilizing Browser-in-the-Browser (BitB) attacks that display a realistic window that mimics Steam's login page. [...]

Lire la suite »

Cyberattaque contre Harvest : ‘importance de l'évaluation des risques Tiers des groupes financiers

2025-03-25 15:47:35
La cyber-attaque contre Harvest, fournisseur de logiciels dédiés aux métiers du patrimoine et de la finance, prend de l'ampleur. La MAIF et le groupe Banque populaire-Caisse d'Épargne (BPCE) ont...

Lire la suite »

Les pirates évaluent une faille dans Smart Licensing Utility de Cisco

2025-03-25 15:38:29
Pour les entreprises qui n’auraient pas corriger l’outil Smart Licensing Utility de Cisco (CSLU), il est urgent de le faire, souligne l’organisme (...)

Lire la suite »

France Travail adosse son chatbot GenAI aussi sur le cloud

2025-03-25 15:35:58
Avec deux datacenters en propre, à Montpellier et Orléans, France Travail mise avant tout sur une stratégie on-premise. « D'autant (...)

Lire la suite »

Hackers Deliver Malware via Browser Extensions & Legitimate Tools to Bypass Security Controls

2025-03-25 15:30:04
A new wave of cyberattacks leveraging browser extensions and trusted system tools has emerged as a critical threat to enterprise security. Over the past six months, threat actors have refined techniques...

Lire la suite »

Houthi PC small group : Le jour où la Maison-Blanche a dévoilé ses plans de guerre sur Signal

2025-03-25 15:22:20
Le 15 mars, le monde a appris que les États-Unis bombardaient des cibles houthies au Yémen. Mais un journaliste savait déjà tout deux heures avant la première frappe. Ils avaient été invités,...

Lire la suite »

Notable vulnerabilities in Next.js (CVE-2025-29927) and CrushFTP

2025-03-25 15:12:56
Rapid7 is warning customers of two notable vulnerabilities affecting Next.js (CVE-2025-29927) and file transfer software CrushFTP (no CVE).

Lire la suite »

Malicious AI Tools Spike 200% and Discussions on Jailbreaking Legitimate ChatGPT Grow by 52%

2025-03-25 15:07:31
The cybersecurity landscape is witnessing an alarming rise in malicious artificial intelligence (AI) applications, with research reporting a 200% surge in the development and deployment of such tools....

Lire la suite »

Navigating NIS2 Compliance: Elevating Cyber Resilience Through Network Visibility

2025-03-25 15:00:02
As cyber threats continue to surge, businesses face growing pressure to fortify their defences and ensure operational continuity. Regulatory frameworks like the Network and Information Systems Directive...

Lire la suite »

Data Connect announces vSOC Assure to streamline cyber risk assessments and increase cyber resilience

2025-03-25 14:57:52
Data Connect, a leading cyber security services provider underpinned by elite cyber practitioners and technology, today announced the launch of vSOC Assure. The platform has been developed in response...

Lire la suite »

Les rencontres du numérique de l'Ouest de retour en avril à Angers

2025-03-25 14:52:17
Depuis leur lancement en 2019 sous le nom de ProSolutions SI, les rencontres du numérique de l’Ouest, pilotées par l'association ADN (...)

Lire la suite »

248,000 Mobile Users Infected by Banking Malware With Social Engineering Techniques

2025-03-25 14:45:04
Mobile banking malware has seen an alarming surge in 2024, with nearly 248,000 users encountering these dangerous threats—a staggering 3.6 times increase compared to the 69,000 users affected in 2023....

Lire la suite »

How Toxic Are Tankies Compared to Other Far-Left Groups?

2025-03-25 14:39:22
Tankies exhibit higher toxicity than other far-left communities, especially in identity attacks and threats. They frequently use profane language, target political figures, and express hostility toward...

Lire la suite »

How Do Tankies Speak? A Misalignment Analysis

2025-03-25 14:39:21
Tankies' language diverges significantly from other far-left communities. They exhibit stronger alignment with CCP narratives, Stalinism, Russian perspectives on Ukraine, and anti-Zionism. They also favor...

Lire la suite »

Who Are Tankies Talking About?

2025-03-25 14:38:57
Tankies prioritize discussions on state-level political events (e.g., Uyghur genocide, North Korea, Russian invasion of Ukraine) over social issues (e.g., police, climate change, healthcare). Using BERTopic...

Lire la suite »

What Do Tankies Talk About?

2025-03-25 14:38:52
Tankies prioritize discussions on state-level political events (e.g., Uyghur genocide, North Korea, Russian invasion of Ukraine) over social issues (e.g., police, climate change, healthcare). Using BERTopic...

Lire la suite »

Tracking the Rise of Tankies on Reddit

2025-03-25 14:38:49
The study tracks user migration between tankies and other far-left communities on Reddit using MRD and MRS metrics. While the proportional inflow from established subreddits declines over time, tankies...

Lire la suite »

Mapping Left-Wing Extremism on Reddit

2025-03-25 14:38:41
To study left-wing extremism online, we identify tankie subreddits and analyze their connections within Reddit's broader political landscape. Using network analysis and data from the Pushshift API,...

Lire la suite »

Mapping the Digital Landscape of Far-Left Ideologies

2025-03-25 14:38:30
This section explores the digital clustering of far-left communities, focusing on tankies. Using network analysis, we examine how ideological subreddits group together and how users migrate between them....

Lire la suite »

How Social Media Fuels Political Extremism on Both Sides

2025-03-25 14:38:15
The internet has transformed political discourse, enabling extremist communities to flourish. While research has primarily focused on right-wing radicalization, left-wing extremism—particularly the...

Lire la suite »

Tankies, Trolls, and the Trouble With Left-Wing Extremists on Social Media

2025-03-25 14:38:07
This research presents the first large-scale study of the far-left on social media, with a focus on the tankie community. Using 1.3M posts from 53K authors, we analyze their position within the broader...

Lire la suite »

USN-7371-1: FreeRDP vulnerabilities

2025-03-25 14:29:16
Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could possibly use this issue to cause...

Lire la suite »

Adaptive Ascension: LLMs, Efficiency, and Query Complexity

2025-03-25 14:14:24
This paper presents Adaptive-RAG experiments that reveal improved QA accuracy, efficient query handling, and effective complexity classification.

Lire la suite »

RAGged Edge: LLMs on a Retrieval Rollercoaster

2025-03-25 14:04:21
This paper is presented on adaptive retrieval-augmented LLM models evaluated against various baselines using comprehensive metrics and detailed implementation.

Lire la suite »

5 Considerations for a Data Loss Prevention Rollout

2025-03-25 14:00:00
Strong DLP can be a game-changer — but it can also become a slow-moving, overcomplicated mess if not executed properly.

Lire la suite »

Microsoft Announces New Enhanced Protection Against AI & BYOD for Edge Business Users

2025-03-25 13:59:13
Microsoft has unveiled significant new data protection capabilities for its Edge for Business browser, specifically targeting the challenges posed by Bring Your Own Device (BYOD) environments and the...

Lire la suite »

Query Quirks: AI's Witty Way of Sorting Brain Teasers

2025-03-25 13:55:26
This paper is presented on an adaptive retrieval-augmented LLM framework that adjusts query handling based on assessed complexity.

Lire la suite »

Researchers Compared Malware Development in Rust vs C & C++ Languages

2025-03-25 13:53:41
In recent years, malware authors have increasingly turned to emerging programming languages like Rust, Nim, and Go for their nefarious creations. This shift represents a tactical evolution as threat actors...

Lire la suite »

New Android malware uses Microsoft's .NET MAUI to evade detection

2025-03-25 13:52:53
New Android malware campaigns use Microsoft's cross-platform framework .NET MAUI while disguising as legitimate services to evade detection. [...]

Lire la suite »

Troy Hunt's Mailchimp List - 16,627 breached accounts

2025-03-25 13:45:48
In March 2025, a phishing attack successfully gained access to Troy Hunt's Mailchimp account and automatically exported a list of people who had subscribed to the newsletter for his personal blog. The...

Lire la suite »

Unpacking Disinformation in the 2024 US Presidential Election

2025-03-25 13:00:36
The 2016 U.S. presidential election is often cited as a watershed moment for digital disinformation campaigns – revealing the vulnerability of democratic processes to foreign interference and the spread...

Lire la suite »

Most Ransomware Victims Who Pay Up Don't Get Their Data Back

2025-03-25 12:36:05
This week in cybersecurity from the editors at Cybercrime Magazine –Read the full story in SC Media Sausalito, Calif. – Mar. 25, 2025 It's any IT professional's worst nightmare, writes Trevor...

Lire la suite »

SUSE: 2025:1002-1 important: python-gunicorn Security Advisory Updates

2025-03-25 12:30:39
* bsc#1239830 Cross-References: * CVE-2024-6827

Lire la suite »

SUSE: 2025:1003-1 important: libxslt Security Advisory Updates

2025-03-25 12:30:36
* bsc#1238591 * bsc#1239625 * bsc#1239637 Cross-References:

Lire la suite »

openSUSE: 2025:1003-1 important: libxslt Advisory Security Update

2025-03-25 12:30:36

Lire la suite »

SUSE: 2025:1004-1 moderate: python-Jinja2 Security Advisory Updates

2025-03-25 12:30:31
* bsc#1238879 Cross-References: * CVE-2025-27516

Lire la suite »

SUSE: 2025:1005-1 important: google-guest-agent Security Advisory Updates

2025-03-25 12:30:28
* bsc#1239197 Cross-References: * CVE-2025-22868

Lire la suite »

openSUSE: 2025:1005-1 important: google-guest-agent Advisory Security Update

2025-03-25 12:30:28

Lire la suite »

Microsoft's Hornet: Securing the Linux Kernel with eBPF Verification

2025-03-25 12:21:43
In a significant move towards boosting the security of the Linux kernel, Microsoft has introduced Hornet, a new Linux security module (LSM) designed to provide signature verification for eBPF (extended...

Lire la suite »

Meet the Low-Key Access Broker Supercharging Russian State Cybercrime

2025-03-25 12:00:00
Raspberry Robin breaks into organizations and sells access to Russian threat actors, including the military cyber unit behind attempted coups, assassinations, and influence operations throughout Europe....

Lire la suite »

Medusa Ransomware Disables Anti-Malware Tools with Stolen Certificates

2025-03-25 11:56:24
Cybercriminals exploit AbyssWorker driver to disable EDR systems, deploying MEDUSA ransomware with revoked certificates for stealthy attacks.

Lire la suite »

Des puces AMD spécifiques pour les workstations Z de HP

2025-03-25 11:38:24
2025 est une année particulière pour les fournisseurs de PC : elle signe en effet la fin de vie de Windows 10 enterrant avec lui de nombreux (...)

Lire la suite »

Faille Telegram : jusqu'à 4 millions de dollars offerts pour une faille zero-day

2025-03-25 11:04:55
Faille Telegram : jusqu'à 4 millions de dollars pour une chaîne d'exploits complète permettant de compromettre à la fois un compte Telegram et le système d'exploitation de l'appareil cible....

Lire la suite »

Oops! Google accidentally deletes some users’ Maps Timeline data

2025-03-25 10:43:54
Google has admitted it accidentally deleted some Maps Timeline user data after what it calls a "technical issue".

Lire la suite »

Sécurité Cloud-native : quelles solutions techniques pour répondre aux défis opérationnels et réglementaires ?

2025-03-25 10:30:11
Les environnements Cloud-natifs offrent une agilité sans précédent, mais ils sont aussi la cible privilégiée des cyberattaques. Avec des délais de notification d'incidents de 24-72 heures (Directive...

Lire la suite »

Snowflake : un Canadien extradé vers les États-Unis pour une série de cyberattaques

2025-03-25 10:28:30
Un Canadien extradé vers les États-Unis pour une série d'attaques informatiques contre 165 clients de Snowflake. Le ver était dans l'info stealer ! ...

Lire la suite »

Astral Foods, South Africa's largest poultry producer, lost over M due to a cyberattack

2025-03-25 10:14:39
Astral Foods, South Africa's largest poultry producer, lost over M due to a cyberattack disrupting deliveries and impacting operations. Astral Foods is a South African integrated poultry producer...

Lire la suite »

Un piratage génétique embarrassant pour le Kremlin

2025-03-25 10:09:37
Les révélations récentes issues du piratage de l'ordinateur du cousin du président russe Vladimir Poutine, secouent le Kremlin et soulèvent des questions sur la génétique, la confidentialité et...

Lire la suite »

Comment bien sécuriser votre smartphone ?

2025-03-25 09:33:07
Comment bien sécuriser son téléphone portable. Des trucs et astuces qu'il est bon de rappeler....

Lire la suite »

Un ex-entraîneur de football américain accusé de piratage massif de données universitaires

2025-03-25 09:27:46
Un ancien entraîneur inculpé pour avoir piraté les bases de données d'athlètes de plus de 100 établissements universitaires, accédant ainsi aux informations médicales d'environ 150 000 personnes.......

Lire la suite »

23andMe Bankruptcy Filing May Put Sensitive Data at Risk

2025-03-25 09:16:09
Security experts worry the company's Chapter 11 status and aim to sell its assets could allow threat actors to exploit and misuse the genetic information it collected.

Lire la suite »

Joffrey Célestin-Urbain devient président du Campus Cyber

2025-03-25 08:57:02
Après la démission de Michel Van Den Berghe de la présidence du Campus Cyber, le lieu totem de la cybersécurité en France (...)

Lire la suite »

Une faille 0-Click dans WhatsApp exploitée pour installer le logiciel espion Graphite

2025-03-25 08:49:41
Une faille critique dans WhatsApp a récemment été corrigée par les développeurs de l'application. Cette vulnérabilité, de type 0-Click, a permis à des cybercriminels d'installer à distance un...

Lire la suite »

La Russie renforce la pression sur Google : 47 applications VPN menacées de suppression

2025-03-25 08:15:45
Depuis une semaine, Roskomnadzor, l'organisme russe de surveillance des communications, a intensifié sa campagne contre les services VPN en Russie....

Lire la suite »

A cyberattack hits Ukraine's national railway operator Ukrzaliznytsia

2025-03-25 08:10:02
A cyberattack on Ukraine's national railway operator Ukrzaliznytsia disrupted online ticket services, causing long lines at Kyiv's station. The Record Media first reported the news of a cyber attack...

Lire la suite »

Financial cyberthreats in 2024

2025-03-25 08:00:33
The Kaspersky financial threat report for 2024 contains the main trends and statistics on financial phishing and scams, mobile and PC banking malware, as well as recommendations on how to protect yourself...

Lire la suite »

Oracle Cloud visé par une attaque revendiquée : un pirate affirme avoir volé 6 millions d'enregistrements

2025-03-25 07:58:04
Un hacker prétend avoir compromis les serveurs SSO d'Oracle Cloud, volant 6 millions d'enregistrements, incluant mots de passe chiffrés et fichiers JKS. Oracle conteste l'attaque, affirmant qu'aucun...

Lire la suite »

Des convertisseurs en ligne piégés volent des données personnelles

2025-03-25 07:38:27
Des faux convertisseurs de documents en ligne sont utilisés par des cybercriminels pour voler des informations personnelles et installer des logiciels malveillants. Une menace qui cible les utilisateurs...

Lire la suite »

I Reviewed 50 API Vulnerabilities — They All Shared This One Flaw

2025-03-25 06:22:31
Continue reading on InfoSec Write-ups »

Lire la suite »

Quantum Computing's Dark Side: What Every Cybersecurity Pro Must Know Before It's Too Late!

2025-03-25 06:20:12
“It’s 3 A.M., and your encrypted data vault is suddenly wide open.” In a not-so-distant future scenario, a bank’s security team watches in…Continue reading on InfoSec...

Lire la suite »

TCS HackQuest Season 9

2025-03-25 06:19:52
How I got the Offer & My experience with the selection processCredits: TCS Hackquest CompetitionMy experience with TCS HackQuest competitionTCS Hackquest is a CTF event organized by Tata Consultancy...

Lire la suite »

New to Proxmox? Here's Why Most Users Are Just Turning Off Secure Boot

2025-03-25 06:18:09
If you’re setting up Proxmox for the first time and wondering what the heck “Secure Boot” is — and more importantly, whether you need it —…Continue...

Lire la suite »

Unveiled the Threat Actors

2025-03-25 06:17:42
In this blog, we will discuss some of the famous threat actors and learn about their famous hacks, techniques, and other required details on how they performed those big hacks.First, we have to know...

Lire la suite »

Why Your ‘Unhackable' Linux System is Still Vulnerable (And How to Fix It in 20 Minutes)

2025-03-25 06:17:26
The Myth of InvincibilityContinue reading on InfoSec Write-ups »

Lire la suite »

Apache Tomcat/VMware - CVE-2024-38286

2025-03-25 04:08:41
Un défaut de contrôle de la mémoire dans le processus d'authentification TLS d'Apache Tomcat permet à un attaquant, en envoyant des requêtes spécifiquement forgées, de provoquer un...

Lire la suite »

D-Link - CVE-2025-2620

2025-03-25 04:08:25
Un défaut de gestion de la mémoire dans certains répéteurs Wifi D-Link DAP-1620 permet à un attaquant, en envoyant des requêtes spécifiquement forgées, d'exécuter du code...

Lire la suite »

NetApp - CVE-2025-26512

2025-03-25 04:08:03
Un défaut non spécifié dans le plugin SnapCenter de NetApp permet à un attaquant authentifié d'élever ses privilèges afin d'obtenir les droits administrateur.

Lire la suite »

Microsoft - CVE-2025-29795

2025-03-25 04:07:21
Un défaut de contrôle de liens dans Microsoft Edge permet à un attaquant authentifié, d'élever ses privilèges. 

Lire la suite »

Dell - CVE-2025-26336

2025-03-25 04:07:10
Un défaut de gestion de la mémoire dans le firmware du Chassis Management Controller de Dell permet à un attaquant non authentifié, en envoyant des requêtes spécifiquement forgées...

Lire la suite »

USN-7370-1: SmartDNS vulnerabilities

2025-03-25 02:06:39
It was discovered that SmartDNS did not correctly align certain objects in memory, leading to undefined behaviour. An attacker could possibly use this issue to cause a denial of service or execute arbitrary...

Lire la suite »

Staying Safe with In-Game Skins: How to Avoid Scams and Malware

2025-03-25 01:20:18
In-game skins are more than just cosmetic upgrades, they're a core part of gaming culture. Whether you're looking…

Lire la suite »

List of 17 new domains

2025-03-25 00:00:00
.fr cooperative-u-enseigne[.fr] (registrar: Hostinger operations UAB) czrglass[.fr] (registrar: Hostinger operations UAB) destockx[.fr] (registrar: EPAG Domainservices GmbH) dossier-assistance[.fr] (registrar:...

Lire la suite »

Multiples vulnérabilités dans Laravel (25 mars 2025)

25/03/2025
De multiples vulnérabilités ont été découvertes dans Laravel. Elles permettent à un attaquant de provoquer une injection de code indirecte à distance (XSS).

Lire la suite »

Multiples vulnérabilités dans Microsoft Azure Kubernetes Service (25 mars 2025)

25/03/2025
De multiples vulnérabilités ont été découvertes dans Microsoft Azure Kubernetes Service. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte...

Lire la suite »