Toute l'actualité de la Cybersécurité
Best Tools for Test Data Management to Accelerate QA Teams in 2026
2026-02-10 20:50:44
Test Data Management tools for 2026 ranked for QA and DevOps teams, comparing speed, self service, masking, CI/CD fit, and enterprise readiness.
Malicious 7-Zip site distributes installer laced with proxy tool
2026-02-10 19:12:55
A fake 7-Zip website is distributing a trojanized installer of the popular archiving tool that turns the user's computer into a residential proxy node. [...]
Microsoft releases Windows 10 KB5075912 extended security update
2026-02-10 19:06:13
Microsoft has released the Windows 10 KB5075912 extended security update to fix February 2026 Patch Tuesday vulnerabilities, including six zero-days, and continue rolling out replacements for expiring...
Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws
2026-02-10 18:51:46
Today is Microsoft's February 2026 Patch Tuesday with security updates for 58 flaws, including 6 actively exploited and three publicly disclosed zero-day vulnerabilities. [...]
Windows 11 KB5077181 & KB5075941 cumulative updates released
2026-02-10 18:43:53
Microsoft has released Windows 11 KB5077181 and KB5075941 cumulative updates for versions 25H2/24H2 and 23H2 to fix security vulnerabilities, bugs, and add new features. [...]
[Fixed]: Outlook not Responding when Sending Email Issue
2026-02-10 18:19:24
Photo by Brett Jordan on UnsplashMany businesses and individuals worldwide uses Microsoft Outlook — a robust email client — for their day-to-day email communication. Thus, it is of vital...
Proving Grounds Linux Box Extplorer ( Road to OSCP )
2026-02-10 18:17:20
We can achieve that by using various of tools and techniques to obtain foothold on the target, by using enumeration, scanning and other…Continue reading on InfoSec Write-ups »
2. OAuth Misbinding Vulnerability
2026-02-10 18:17:12
The Silent Account Takeover Nobody Notices.Continue reading on InfoSec Write-ups »
How a Critical Race Condition in a Management System Led to a Bounty
2026-02-10 18:17:06
Bypassing subscription limits through non-atomic checks: A deep dive into the race condition the automated scanners missed.Continue reading on InfoSec Write-ups »
Astronaut Proving Grounds Linux Machine ( Road to OSCP)
2026-02-10 18:14:23
We can achieve that by using various of tools and techniques to obtain foothold on the target, by using enumeration, scanning and other…Continue reading on InfoSec Write-ups »
Proving Grounds Practice Codo Linux Lab ( Road to OSCP )
2026-02-10 18:14:14
We can achieve that by using various of tools and techniques to obtain foothold on the target, by using enumeration, scanning and other…Continue reading on InfoSec Write-ups »
Ni8mare: Unauthenticated RCE in n8n (CVE-2026–21858)
2026-02-10 18:14:06
In early 2026, security researchers revealed a critical vulnerability in n8n, a popular automation platform, that allows attackers to completely take over unpatched servers — no credentials needed....
The “Node 1.9” Miracle: How to Turn Your Bitcoin into a Hard Lesson in Cybersecurity
2026-02-10 18:13:15
So, you're scrolling through the dark corners of the internet … maybe looking for the meaning of life, maybe looking for a way to pay off that credit card… and you stumble upon a Pastebin promising...
Inside the OWASP Agentic AI Top 10: Exploitation and Architecture in Autonomous Systems
2026-02-10 18:12:31
1. Introduction: The Evolution from Chatbots to Autonomous AgentsContinue reading on InfoSec Write-ups »
Wild Bug Bounty Bugs You've Probably Never Seen
2026-02-10 18:11:50
If you want to stop finding the same bugs as everyone else —
This series is for you.Continue reading on InfoSec Write-ups »
Microsoft Patch Tuesday February 2026 – 54 Vulnerabilities Fixed, Including 6 Zero-days
2026-02-10 18:11:27
Microsoft released its February 2026 Patch Tuesday updates on February 10, addressing 54 vulnerabilities, including six zero-days across Windows, Office, Azure, and developer tools. The updates fix issues...
Measuring AI Security: Separating Signal from Panic
2026-02-10 18:00:00
The conversation around AI security is full of anxiety. Every week, new headlines warn of jailbreaks, prompt injection, agents gone rogue, and the rise of LLM-enabled cybercrime. It's easy to come away...
DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies
2026-02-10 17:44:00
The information technology (IT) workers associated with the Democratic People's Republic of Korea (DPRK) are now applying to remote positions using real LinkedIn accounts of individuals they're impersonating,...
Sommet de l'IA 2026 : quelques points-clés du rapport scientifique « officiel »
2026-02-10 17:32:31
Comme en 2025, un rapport voulu par la communauté international dresse un état des lieux « vulgarisé » de la compréhension scientifique des IA généralistes et des risques associés.
The post Sommet...
FortiSandbox XSS Vulnerability Let Attackers Run Arbitrary Commands
2026-02-10 17:10:36
Fortinet has disclosed a high-severity cross-site scripting (XSS) vulnerability in its FortiSandbox platform, tracked as CVE-2025-52436 (FG-IR-25-093), that enables unauthenticated attackers to execute...
USN-7942-2: GLib vulnerabilities
2026-02-10 17:07:40
USN-7942-1 fixed vulnerabilities in GLib. This update provides the
corresponding updates for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04
LTS, and Ubuntu 20.04 LTS. CVE-2025-3360 only affected Ubuntu...
Volvo Group North America customer data exposed in Conduent hack
2026-02-10 17:04:18
Volvo Group North America disclosed that it suffered an indirect data breach stemming from the compromise of IT systems at American business services giant Conduent, of which Volvo is a customer. [...]...
Microsoft rolls out new Secure Boot certificates before June expiration
2026-02-10 17:00:00
Microsoft has begun rolling out updated Secure Boot certificates through monthly Windows updates to replace the original 2011 certificates that will expire in late June 2026. [...]
The Next Great Engineering Frontier : The Hidden Complexity of Physical AI
2026-02-10 16:58:41
Physical AI isn't just smarter software—it's intelligence forced to survive physics, uncertainty, and real-world consequences. From autonomous cars to surgical robots, engineers must solve sensing...
x402 vs UCP: What Challenges Lie Ahead for AI Agent Commerce?
2026-02-10 16:52:43
Universal Commerce Protocol (UCP) is an open standard developed by Shopify and Google. Over 20 major retailers back it, including Target, Walmart, Best Buy, plus payment processors like Visa, Mastercard,...
Handwriting vs AI: Real Performance of AI on Handwritten Documents
2026-02-10 16:46:47
Handwritten forms remain a major challenge for AI, even in 2025. Our benchmark of seven leading models shows that GPT-5 Mini leads in accuracy for high-stakes workflows, while Gemini 2.5 Flash Lite offers...
Threat Hunting Is Critical to SOC Maturity but Often Misses Real Attacks
2026-02-10 16:40:04
High-performing SOC teams are increasingly turning to sandbox-derived threat intelligence to make threat hunting repeatable and impactful. Tools like ANY.RUN’s TI Lookup enables faster hunts grounded...
FortiOS Authentication Bypass Vulnerability Lets Attackers Bypass LDAP Authentication
2026-02-10 16:40:00
Fortinet has disclosed a high-severity authentication bypass vulnerability in FortiOS, tracked as CVE-2026-22153 (FG-IR-25-1052), that could allow unauthenticated attackers to sidestep LDAP authentication...
The End of CI/CD Pipelines: The Dawn of Agentic DevOps
2026-02-10 16:37:25
AI agents are replacing traditional CI/CD pipelines by autonomously debugging tests, deploying code, and triaging production incidents—GitHub Copilot and Azure SRE Agent already do this. The shift promises...
Microsoft 365 Admin Center Outage Hits users in North America
2026-02-10 16:25:20
Microsoft 365 administrators in North America are grappling with widespread access issues to the Microsoft 365 admin center, as confirmed by the company’s service health dashboard. Issue ID MO1230320...
OT Attacks Get Scary With 'Living-off-the-Plant' Techniques
2026-02-10 16:14:29
Ironically, security by obscurity has helped prevent dangerous OT attacks in recent years. It won't be that way forever.
Ivanti Endpoint Manager Vulnerability Lets Remote Attacker Leak Arbitrary Data
2026-02-10 16:09:47
Ivanti has released critical security updates for its Endpoint Manager (EPM) platform, addressing two newly discovered vulnerabilities that could enable unauthorized access to sensitive database information...
This Affordable Crypto Might Change Your Crypto Portfolio Forever, It Just Hit 300%
2026-02-10 16:08:23
Mutuum Finance (MUTM) is a decentralized lending and borrowing hub built on Ethereum. The project is currently in its presale phase, with the MUTM token priced around .04. Since Phase 1, the token price...
The HackerNoon Newsletter: Is Society Just a Really Complicated Brain? (2/10/2026)
2026-02-10 16:03:09
How are you, hacker?
🪐 What's happening in tech today, February 10, 2026?
The
HackerNoon Newsletter
brings the HackerNoon
...
Naval Group et Thales accélèrent dans l'IA de défense souveraine
2026-02-10 16:02:18
Naval Group renforce son partenariat avec Thales en entrant au capital de son accélérateur CortAIx, pour développer une intelligence artificielle souveraine dédiée à la défense.
The post Naval...
80% of Fortune 500 use active AI Agents: Observability, governance, and security shape the new frontier
2026-02-10 16:00:00
Read Microsoft's new Cyber Pulse report for straightforward, practical insights and guidance on new cybersecurity risks.
The post 80% of Fortune 500 use active AI Agents: Observability, governance, and...
Pour l'IA de défense, Naval Group se rapproche de Cortaix de Thales
2026-02-10 15:57:18
Détenu majoritairement par l’Etat (62 %) avec une participation minoritaire de Thales (35 %), Naval Group a dévoilé un partenariat (...)
New Cybercrime Group 0APT Accused of Faking Hundreds of Breach Claims
2026-02-10 15:47:33
Researchers reveal the new 0APT cyber group is fabricating attacks on large organisations. Learn how they use fake data to trick companies into paying.
Microsoft 365 outage takes down admin center in North America
2026-02-10 15:45:15
Microsoft is investigating an outage that blocks some administrators with business or enterprise subscriptions from accessing the Microsoft 365 admin center. [...]
MEXC Earn Achieves Dual-Scale Growth in 2025: 64% Users, 43% AUM
2026-02-10 15:35:39
MEXC Earn platform achieved a 64% increase in users and a 43% growth in assets under management (AUM) in 2025. MEXC is known for its broad selection of trending tokens, everyday airdrop opportunities,...
IA dans le BTP : la révolution en mode test
2026-02-10 15:36:36
Une étude de l'Observatoire des métiers du BTP révèle les freins et opportunités de l'intégration de l'IA dans le secteur.
The post IA dans le BTP : la révolution en mode test appeared first on...
Discord will limit profiles to teen-appropriate mode until you verify your age
2026-02-10 15:29:52
Discord will make all profiles teen-appropriate by default until you prove you're an adult. What you'd “miss” may not be all that terrible.
Hackers Weaponizing 7-Zip Downloads to Turn Your Home Computers into Proxy Nodes
2026-02-10 15:29:43
A deceptive campaign targeting unsuspecting users has emerged, using a counterfeit version of the widely used 7-Zip file archiving software to silently transform home computers into residential proxy...
SAP Security Patch Day – Critical SAP CRM and SAP S/4HANA Code Injection Vulnerabilities Fixed
2026-02-10 15:27:58
SAP's February 2026 Security Patch Day delivered fixes that SAP urges customers to prioritize to reduce exposure across core enterprise workloads. The release includes 26 new SAP Security Notes and...
ILOVEPOOP Toolkit Exploiting React2Shell Vulnerability to Deploy Malicious Payload
2026-02-10 15:23:08
The cybersecurity sector has been impacted by the sudden appearance of “React2Shell” (CVE-2025-55182), a critical vulnerability affecting Next.js and React Server Components. Following its...
ZeroDayRAT spyware grants attackers total access to mobile devices
2026-02-10 15:19:27
ZeroDayRAT is a commercial mobile spyware that grants full remote access to Android and iOS devices for spying and data theft. ZeroDayRAT is a newly discovered commercial mobile spyware toolkit that gives...
TeamPCP Industrializes Cloud Misconfigurations Into a Self-Propagating Cybercrime Platform
2026-02-10 15:07:20
TeamPCP, also known as PCPcat, ShellForce, and DeadCatx3, emerged in December 2025 as a sophisticated cloud-native threat actor targeting exposed Docker APIs, Kubernetes clusters, Ray dashboards, Redis...
How to Automate AWS Incident Investigation with Tines and AI
2026-02-10 15:01:11
Cloud incidents drag on when analysts have to leave cases to hunt through AWS consoles and CLIs. Tines shows how automated agents pull AWS CLI data directly into cases, reducing MTTR and manual investigation...
Manipulating AI memory for profit: The rise of AI Recommendation Poisoning
2026-02-10 14:56:21
That helpful “Summarize with AI” button? It might be secretly manipulating what your AI recommends. Microsoft security researchers have discovered a growing trend of AI memory poisoning...
Microsoft scanne les LLM ouverts à la recherche de backdoor
2026-02-10 14:45:11
De plus en plus d’entreprises se servent de modèles IA ouverts ou open weight, mais ne savent pas s’ils sont complètement sûrs. (...)
Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools
2026-02-10 14:36:00
Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring your own vulnerable driver (BYOVD) component for defense evasion...
D'ici 2027, L'Europe triplera ses dépenses dans le cloud souverain
2026-02-10 14:30:32
Après la multiplication des annonces autour des clouds dits souverains, Gartner donne une version chiffrée de l’appétence des (...)
Next Gen Spotlights: Turning Behavioural Intelligence into a Powerful Tool Against Fraud and Crime – Q&A with Paddy Lawton, Co-Founder of FACT360
2026-02-10 14:29:42
Founded on pioneering British research and real-world intelligence applications, FACT360 is using behavioural analytics to help governments and organisations detect fraud, terrorism and serious crime...
Safer Internet Day 2026 – Addressing the Age of Artificial Intelligence
2026-02-10 14:27:52
Safer Internet Day takes place during an era of heavy AI usage amongst individuals of all ages. This year's theme ‘Smart tech, safe choices – Exploring the safe and responsible use of AI'...
Bank Of America: Cybercrime Will Get Much Worse
2026-02-10 14:13:12
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 10, 2026 –Read the full story in GoBankingRates “The World In 2030,” a Bank of America research...
Most Engagement Data Is Compromised and That's a Major Security Problem
2026-02-10 14:00:00
Most engagement data is compromised by bots and spoofing. Datavault AI treats engagement as a security problem, verifying real human actions at the source.
From Ransomware to Residency: Inside the Rise of the Digital Parasite
2026-02-10 13:59:00
Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated on noise while missing a more dangerous shift happening quietly all around them?
According...
How safe are kids using social media? We did the groundwork
2026-02-10 13:50:00
Our research found that mainstream platforms often protect children well—until curiosity or the wrong settings get in the way.
Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution
2026-02-10 13:30:00
Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution of arbitrary code on susceptible systems.
The vulnerability, tracked as CVE-2026-21643,...
Man tricked hundreds of women into handing over Snapchat security codes
2026-02-10 13:28:45
Hacked Snapchat accounts and secret filming with smart glasses, this week served two reminders of how women's privacy is still being violated.
Microsoft announces new mobile-style Windows security controls
2026-02-10 13:16:32
Microsoft wants to introduce smartphone-style app permission prompts in Windows 11 to request user consent before apps can access sensitive resources such as files, cameras, and microphones. [...]
How One Engineer Turned Saudi Cloud Compliance from a 6-Month Bottleneck into a 2-Week Workflow
2026-02-10 13:09:30
Saudi Arabia's Class C data sovereignty rules once forced ISVs into 4–8 month compliance cycles. One engineer reimagined compliance as code—automating data residency, access controls, and audit...
ZeroDayRAT malware grants full access to Android, iOS devices
2026-02-10 13:00:00
A new commercial mobile spyware platform dubbed ZeroDayRAT is being advertised to cybercriminals on Telegram as a tool that provides full remote control over compromised Android and iOS devices. [...]
Pourquoi les assistants de codage n'échappent pas au paradoxe de la productivité
2026-02-10 12:50:24
Le gain de productivité des assistants de codage restera moindre tant que les écarts de spécifications seront détectés essentiellement lors de l'implémentation, postule une start-up américaine.
The...
An Imaging Engineer's Notes, Part 1: The Four Core Modules of a Digital Camera
2026-02-10 12:40:36
Modern cameras aren't black boxes. Image quality emerges from the tight coordination of optics, sensors, ISPs, and intelligent control algorithms—each a critical system with its own constraints and...
The Most Powerful Central Banks of the Future Could Store Their Gold in Space
2026-02-10 12:36:50
Elon Musk wants to put 1 million AI servers in space to serve an already crowded AI market place. Meanwhile, central bankers are hodling gold, scared of the dollars future. Only problem is they are putting...
SUSE 2026-0412-1 Abseil-CPP Moderate Integer Overflow Risk
2026-02-10 12:30:05
An update that solves one vulnerability can now be installed.
What the 2026 State of the Software Supply Chain Report Reveals About Regulation
2026-02-10 12:30:01
Pride Month Phishing Targets Employees via Trusted Email Services
2026-02-10 12:19:15
Attackers are using Pride Month themed phishing emails to target employees worldwide, abusing trusted email platforms like SendGrid to harvest credentials.
The Reality of Deploying Tech in Legacy Industries
2026-02-10 12:00:49
Legacy industries adopt tech cautiously, not because they resist change, but because mistakes are expensive and risks are higher. With so many digital solutions available, some experience tech fatigue....
Senegal shuts National ID office after ransomware attack
2026-02-10 11:48:29
Senegal closed its national ID card office after a ransomware cyberattack disrupted ID, passport, and biometric services. Senegal confirmed a cyberattack on the Directorate of File Automation, the government...
Workday : retour aux sources avec Aneel Bhusri pour redresser la barre
2026-02-10 11:48:05
Le co-fondateur, Aneel Bhusri, reprend les rênes de l'éditeur de logiciels alors que l'action a perdu 41% en un an.
The post Workday : retour aux sources avec Aneel Bhusri pour redresser la barre appeared...
ZAST.AI Raises M Pre-A to Scale "Zero False Positive" AI-Powered Code Security
2026-02-10 11:40:00
January 5, 2026, Seattle, USA — ZAST.AI announced the completion of a million Pre-A funding round. This investment came from the well-known investment firm Hillhouse Capital, bringing ZAST.AI's total...
Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server
2026-02-10 10:24:00
SmarterTools confirmed last week that the Warlock (aka Storm-2603) ransomware gang breached its network by exploiting an unpatched SmarterMail instance.
The incident took place on January 29, 2026, when...
Dutch agencies hit by Ivanti EPMM exploit exposing employee contact data
2026-02-10 10:11:48
Dutch agencies confirmed attacks exploiting Ivanti EPMM flaws that exposed employee contact data at the data protection authority and courts. Dutch authorities said cyberattacks hit the Dutch Data Protection...
USN-8021-1: ImageMagick vulnerability
2026-02-10 09:54:52
Benny Isaacs discovered that ImageMagick did not properly manage memory
when processing certain image files. An attacker could possibly use this
issue to cause a denial of service or execute arbitrary...
Avec Feature Flags, Datadog accélère la mise en production des applications
2026-02-10 09:46:06
La mise en production est sans doute l'un des moments les plus importants du cycle de vie du développement d'une application. Mais (...)
How ShieldHQ Helps Organizations Reduce Insider Risk Without Disrupting Work
2026-02-10 09:17:49
When organizations think about cybersecurity threats, attention often goes to external attackers. Yet a significant…
How ShieldHQ Helps Organizations Reduce Insider Risk Without Disrupting Work...
Navigating MiCA: A Practical Compliance Guide for European CASPs
2026-02-10 09:12:37
MiCA creates a single EU crypto rulebook, replacing national regimes with unified licensing, capital, and compliance rules for all CASPs.
Security automation for SOC teams: How It Transforms Modern Cybersecurity Operations
2026-02-10 09:08:30
SOC do not struggle because they lack tools but they battle for everything which demands…
Security automation for SOC teams: How It Transforms Modern Cybersecurity Operations on Latest Hacking News...
Rapport GTIG : les cybermenaces s'intensifient contre les industriels de la défense
2026-02-10 09:01:50
Aujourd'hui, le Google Threat Intelligence Group (GTIG) a publié Beyond the Battlefield: Threats to the Defense Industrial Base, un nouveau rapport qui analyse comment les conflits modernes se jouent...
Sport et fuites de données : les risques cachés liés aux trackers d'activité connectés
2026-02-10 08:57:57
Les JO d'hiver pourraient, à nouveau, déclencher un engouement du public pour le sport, mais il est important de rester particulièrement vigilants lors de l'usage de trackers d'activité. Tribune...
China-linked APT UNC3886 targets Singapore telcos
2026-02-10 08:40:15
China-linked group UNC3886 targeted Singapore 's telecom sector in a cyber espionage campaign, Singapore's Cyber Security Agency revealed. Cyber Security Agency of Singapore (CSA) and the Infocomm...
SUSE Linux Enterprise Micro Important Kernel Security Update 2026-0411-1
2026-02-10 08:34:57
An update that solves 348 vulnerabilities, contains seven features and has 34 security fixes can now be installed.
Fugitive behind M 'pig butchering' scheme gets 20 years in prison
2026-02-10 08:17:54
A dual Chinese and St. Kitts and Nevis national was sentenced to 20 years in prison in absentia for his role in an international cryptocurrency investment scheme (also known as pig butchering or romance...
From Folder Deletion to Admin: Lenovo Vantage (CVE‑2025‑13154)
2026-02-10 08:00:00
Last year we wrote about a Windows 11 vulnerability that allowed a regular user to gain administrative privileges. Not long after, Manuel Kiesel from Cyllective AG reached out to us after stumbling across...
Arbitrary XML file write in FCConfig
2026-02-10 08:00:00
CVSSv3 Score:
6.4
An Improper Link Resolution Before File Access vulnerability [CWE-59] in FortiClient Windows may allow a local low-privilege attacker to perform an arbitrary file write with...
Firewall policy bypass in FSSO Terminal Services Agent
2026-02-10 08:00:00
CVSSv3 Score:
3.8
An Improper Verification of Source of a Communication Channel vulnerability [CWE-940] in FortiOS FSSO Terminal Services Agent may allow an authenticated user with knowledge...
Format String Vulnerability in CAPWAP fast-failover mode
2026-02-10 08:00:00
CVSSv3 Score:
6.7
A Use of Externally-Controlled Format String vulnerability [CWE-134] in FortiGate may allow an authenticated admin to execute unauthorized code or commands via specifically...
LDAP authentication bypass in Agentless VPN and FSSO
2026-02-10 08:00:00
CVSSv3 Score:
7.5
An Authentication Bypass by Primary Weakness vulnerability [CWE-305] in FortiOS fnbamd may allow an unauthenticated attacker to bypass LDAP authentication of Agentless VPN...
Missing authorization on CSV user import
2026-02-10 08:00:00
CVSSv3 Score:
6.8
A missing authorization vulnerability [CWE-862] in FortiAuthenticator may allow a read-only user to make modification to local users via a file upload to an unprotected endpoint.
...
Request smuggling attack in FortiOS GUI
2026-02-10 08:00:00
CVSSv3 Score:
5.2
An HTTP request smuggling vulnerability [CWE-444] in FortiOS may allow an unauthenticated attacker to smuggle an unlogged http request through the firewall policies via a...
SSL-VPN Symlink Persistence Patch Bypass
2026-02-10 08:00:00
CVSSv3 Score:
5.3
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability [CWE-200] in FortiOS SSL-VPN may allow a remote unauthenticated attacker to bypass the patch developed...
XSS via back button
2026-02-10 08:00:00
CVSSv3 Score:
7.9
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiSandbox may allow an unauthenticated attacker to execute...
Toy Battles - 1,017 breached accounts
2026-02-10 02:44:47
In February 2026, the online gaming community Toy Battles suffered a data breach. The incident exposed 1k unique email addresses alongside usernames, IP addresses and chat logs. Following the breach,...
Fedora 43 tbtools CVE-2026-25537 Denial of Service Advisory
2026-02-10 01:34:52
Update the time crate to version 0.3.47. Update the time-macros crate to version 0.2.27. Update the time-core crate to version 0.1.8. Update the num-conv crate to version 0.2.0. Update the git2 crate...
Fedora 43 tuigreet Critical Stack Exhaustion Issue CVE-2026-25537
2026-02-10 01:34:52
Update the time crate to version 0.3.47. Update the time-macros crate to version 0.2.27. Update the time-core crate to version 0.1.8. Update the num-conv crate to version 0.2.0. Update the git2 crate...
Fedora 43 Sad 2026-F400579A21 CVE-2026-25537 Important Auth Bypass
2026-02-10 01:34:52
Update the time crate to version 0.3.47. Update the time-macros crate to version 0.2.27. Update the time-core crate to version 0.1.8. Update the num-conv crate to version 0.2.0. Update the git2 crate...
Fedora 43 uv Important Denial of Service Update 2026-25538
2026-02-10 01:34:52
Update the time crate to version 0.3.47. Update the time-macros crate to version 0.2.27. Update the time-core crate to version 0.1.8. Update the num-conv crate to version 0.2.0. Update the git2 crate...
Association Nationale des Premiers Secours - 5,600 breached accounts
2026-02-10 01:27:25
In January 2026, a data breach impacting the French non-profit Association Nationale des Premiers Secours (ANPS) was posted to a hacking forum. The breach exposed 5.6k unique email addresses along with...
Multiples vulnérabilités dans GnuTLS (10 février 2026)
10/02/2026
De multiples vulnérabilités ont été découvertes dans GnuTLS. Elles permettent à un attaquant de provoquer un déni de service à distance.
Multiples vulnérabilités dans les produits Schneider Electric (10 février 2026)
10/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Schneider Electric. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service...
Multiples vulnérabilités dans les produits Siemens (10 février 2026)
10/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance...
Multiples vulnérabilités dans les produits Axis (10 février 2026)
10/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Axis. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation...
Multiples vulnérabilités dans les produits SAP (10 février 2026)
10/02/2026
De multiples vulnérabilités ont été découvertes dans les produits SAP. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service...