Toute l'actualité de la Cybersécurité


VoidLink Framework Enables On-Demand Tool Generation with Windows Plugin Support

2026-02-11 20:20:06
A newly tracked intrusion framework called VoidLink is drawing attention for its modular design and focus on Linux systems. It behaves like an implant management framework, letting operators deploy a...

Lire la suite »

GTIG Analysis Highlights Escalating Espionage and Supply Chain Risks Facing Defense Sector

2026-02-11 19:59:49
Modern warfare extends far beyond physical battlefields, increasingly infiltrating the digital servers and supply chains that safeguard national defense. Today, the sector faces a relentless barrage of...

Lire la suite »

Crazy ransomware gang abuses employee monitoring tool in attacks

2026-02-11 19:29:14
A member of the Crazy ransomware gang is abusing legitimate employee monitoring software and the SimpleHelp remote support tool to maintain persistence in corporate networks, evade detection, and prepare...

Lire la suite »

Volvo Group hit in massive Conduent data breach

2026-02-11 19:28:49
A Conduent breach exposed data of nearly 17,000 Volvo Group North America employees as the total impact rises to 25 million people. A data breach at business services provider Conduent has impacted at...

Lire la suite »

Police arrest seller of JokerOTP MFA passcode capturing tool

2026-02-11 19:14:32
The Netherlands Police have arrested a a 21-year-old man from Dordrecht, suspected of selling access to the JokerOTP phishing automation tool that can intercept one-time passwords (OTP) for hijacking...

Lire la suite »

RU-APT-ChainReaver-L Hijacks Trusted Websites and GitHub Repos in Massive Cross-Platform Supply Chain Campaign

2026-02-11 19:14:17
A sophisticated cyber threat has emerged, targeting users across multiple operating systems through compromised mirror websites and GitHub repositories. The RU-APT-ChainReaver-L campaign represents one...

Lire la suite »

USN-8013-4: Linux kernel vulnerabilities

2026-02-11 18:34:22
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Cryptographic API; ...

Lire la suite »

USN-8015-4: Linux kernel vulnerabilities

2026-02-11 18:23:19
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Cryptographic API; ...

Lire la suite »

Massive Spike in Attacks Exploiting Ivanti EPMM Systems 0-day Vulnerability

2026-02-11 17:43:11
An unprecedented surge in exploitation attempts targeting CVE-2026-1281, a critical vulnerability in Ivanti Endpoint Manager Mobile (EPMM). On February 9, 2026, Shadowserver scans revealed over 28,300...

Lire la suite »

Proactive strategies for cyber resilience with Wazuh

2026-02-11 17:40:28
Cyber resilience means anticipating threats, detecting them early, and recovering fast when incidents occur. Wazuh shows how its open source SIEM and XDR unify visibility, detection, and automated response...

Lire la suite »

USN-8027-1: Python-Multipart vulnerabilities

2026-02-11 17:05:53
It was discovered that Python-Multipart incorrectly handled certain regular expressions. An attacker could possibly use this issue to cause Python-Multipart to consume excessive resources, leading to...

Lire la suite »

LummaStealer infections surge after CastleLoader malware campaigns

2026-02-11 17:02:29
A surge in LummaStealer infections has been observed, driven by social engineering campaigns leveraging the ClickFix technique to deliver the CastleLoader malware. [...]

Lire la suite »

The strategic SIEM buyer's guide: Choosing an AI-ready platform for the agentic era

2026-02-11 17:00:00
New guide details how a unified, AI ready SIEM platform empowers security leaders to operate at the speed of AI, strengthen resilience, accelerate detection and response, and more. The post The strategic...

Lire la suite »

Un simple prompt annihile les garde-fous de plusieurs LLM ouverts

2026-02-11 16:48:45
À mesure que les entreprises personnalisent les modèles IA pour leurs besoins spécifiques, leur sécurité devient critique. (...)

Lire la suite »

Prometei Botnet Attacking Windows Server to Gain Remote Access and Deploy Malware

2026-02-11 16:42:10
A sophisticated attack is targeting Windows Server systems using Prometei, a Russian-linked botnet that has been active since 2016. This multi-functional malware combines cryptocurrency mining, credential...

Lire la suite »

Critical SandboxJS Vulnerability Allows Remote Host Takeover – PoC Released

2026-02-11 16:39:24
A severe sandbox escape vulnerability has been discovered in the JavaScript library, enabling attackers to execute arbitrary code on host systems. The flaw, tracked as CVE-2026-25881 with a critical CVSS...

Lire la suite »

USN-8028-1: Linux kernel vulnerabilities

2026-02-11 16:39:10
It was discovered that improper initialization of CPU cache memory could allow a local attacker with hypervisor access to overwrite SEV-SNP guest memory resulting in loss of data integrity. (CVE-2024-36331) Oleksii...

Lire la suite »

La face sombre de l'amour IA : 9 compagnons IA sur 10 collectent vos données pour vous pister

2026-02-11 16:34:28
Devenant discrètement un cauchemar pour la vie privée, les compagnons IA connaissent un essor fulgurant, générant plus de 14 millions de visites organiques par mois, les États-Unis représentant...

Lire la suite »

How to Monetize Your Blog (and Why You Don't Need Millions of Views to Start)

2026-02-11 16:30:00
You don't need massive traffic to earn from blogging. From ads and affiliate links to HackerNoon writing contests with K+ prize pools, there are many ways to monetize your content. Start small, stay...

Lire la suite »

Threat Actors Weaponize ChatGPT, Grok and Leverages Google Ads to Distribute macOS AMOS Stealer

2026-02-11 16:29:40
Cybercriminals have developed a sophisticated attack campaign that exploits user trust in artificial intelligence platforms to distribute the Atomic macOS Stealer (AMOS), marking a dangerous evolution...

Lire la suite »

Winter has come : sécuriser les Jeux d'hiver 2026

2026-02-11 16:29:23
Avec le début des Jeux d’hiver, le public du monde entier se voit offrir la promesse d'un mélange familier de prouesses athlétiques, d’art et d’émotion. Que ce soit pour les plus...

Lire la suite »

BQTLock & GREENBLOOD Ransomware Attacking Organizations to Encrypt and Exfiltrate Data

2026-02-11 16:27:28
Two sophisticated ransomware families, BQTLock and GREENBLOOD, have surfaced in the cybersecurity landscape, utilizing contrasting strategies to disrupt business operations and extort victims. While typical...

Lire la suite »

Baromètre de la cybersécurité 2025 : un sentiment de maîtrise du risque en décalage avec une exposition qui reste élevée

2026-02-11 16:26:56
Docaposte, leader de la confiance numérique en France, et Cyblex Consulting, cabinet de conseil et d'audit en cybersécurité, dévoilent la troisième édition de leur baromètre annuel de la cybersécurité....

Lire la suite »

Espionnage présumé chez Dassault Aviation

2026-02-11 16:22:36
Intérimaire chez Dassault soupçonné d'avoir filmé des Rafale avec des lunettes-caméra, la DGSI en alerte....

Lire la suite »

Critical UUID Flaw in Fiber v2 on Go 1.24+ Enables Session Hijacking, CSRF Bypass, and Zero-ID DoS Risk

2026-02-11 16:21:39
A severe vulnerability has been discovered in Fiber v2, a popular Go web framework, that could allow attackers to hijack user sessions, bypass security protections, and cause service disruptions. The...

Lire la suite »

Mistral AI investit 1,2 milliard € dans un datacenter IA

2026-02-11 16:15:49
Mistral AI franchit une étape dans son développement européen en implantant son premier datacenter hors de France. Un pari à plus d'un milliard €. The post Mistral AI investit 1,2 milliard €...

Lire la suite »

Kimwolf Botnet Swamps Anonymity Network I2P

2026-02-11 16:08:11
For the past week, the massive "Internet of Things" (IoT) botnet known as Kimwolf has been disrupting the The Invisible Internet Project (I2P), a decentralized, encrypted communications network designed...

Lire la suite »

The HackerNoon Newsletter: Prediction Markets Are Swallowing the Real World (2/11/2026)

2026-02-11 16:03:39
How are you, hacker? 🪐 What's happening in tech today, February 11, 2026? The HackerNoon Newsletter brings the HackerNoon ...

Lire la suite »

Power Secure Swift Development at Scale With Sonatype Nexus Repository

2026-02-11 15:48:00
From its beginnings as a language for Apple platforms, Swift Package Manager has expanded its reach considerably. It now powers a wide range of mobile, desktop, and server-side applications,...

Lire la suite »

Legacy IRC Botnet Campaign Uses Automated SSH Compromise Pipeline to Enroll Linux Hosts at Scale

2026-02-11 15:46:32
SSHStalker is a newly discovered Linux botnet that brings back Internet Relay Chat (IRC) control while using automation to compromise servers over SSH. It mainly succeeds by guessing weak or reused passwords,...

Lire la suite »

Robotics Motion Learning: Training Linked Robot Arms with Kuramoto Models

2026-02-11 15:45:03
Learn how to model linked robot arms using coupled SO(2) actions. Explore deterministic and stochastic policies, normalizing flows on tori, and Kuramoto networks for motion prediction.

Lire la suite »

{ Tribune Expert } – La confiance, enjeu essentiel des forums cybercriminels

2026-02-11 15:38:06
Les forums cybercriminels fonctionnent comme des marchés où une offre rencontre une demande, avec des transactions généralement réalisées en cryptomonnaies ou via des systèmes de crédits interne. The...

Lire la suite »

Wahba's Problem and SO(3) Optimization: Rotation Learning in Geometric ML

2026-02-11 15:30:06
Solve Wahba's problem and master SO(3) matrix optimization. Learn about stochastic policies on manifolds using Bingham, Cauchy, and von Mises-Fisher parametrizations.

Lire la suite »

ESN : la fin de l'âge d'or des valorisations, l'IA générative comme nouvel eldorado

2026-02-11 15:26:13
Après un cycle post-Covid euphorique, le marché français des services informatiques marque le pas. Si les multiples de valorisation s'assagissent, la frénésie autour de l'intelligence artificielle...

Lire la suite »

Beyond Kuramoto Models: Associative Memory and Plastic Synapses in ML Ensembles

2026-02-11 15:15:02
Explore coupled oscillator ensembles beyond Kuramoto models. Learn about associative memories, Ising model generalizations, and Hebbian learning in networks with plastic synapses.

Lire la suite »

NetBox Labs lance un assistant IA pour les administrateurs réseau

2026-02-11 15:13:30
Après 6 mois de test, NetBox Labs officialise le lancement de son copilote IA destiné à accélérer les opérations (...)

Lire la suite »

Google-Wiz : l'UE valide en balayant les craintes

2026-02-11 15:01:10
La Commission européenne valide, sans condition, l'acquisition de Wiz par Google. Et écarte, entre autres, l'argument du « cheval de Troie ». The post Google-Wiz : l’UE valide en balayant les...

Lire la suite »

Reynolds ransomware uses BYOVD to disable security before encryption

2026-02-11 15:00:47
Researchers discovered Reynolds ransomware, which uses BYOVD technique to disable security tools and evade detection before encryption. Researchers found a new ransomware, named Reynolds, that implements...

Lire la suite »

Grassmannian Manifold Learning: Optimization and Deep Learning Architectures

2026-02-11 15:00:23
Explore Grassmannian manifold learning for image classification, video recognition, and MIMO communication. Learn about Riccati ODEs and matrix-based deep neural networks.

Lire la suite »

The Seven Qualification Tests for an AI Scientist

2026-02-11 15:00:20
This article proposes seven qualification tests to evaluate whether an AI system can function as a true scientist—by rediscovering foundational scientific laws through data, computation, and constrained...

Lire la suite »

APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

2026-02-11 14:52:00
Indian defense sector and government-aligned organizations have been targeted by multiple campaigns that are designed to compromise Windows and Linux environments with remote access trojans capable of...

Lire la suite »

Black Duck Signs MSSP Agreement with Accenture

2026-02-11 14:40:17
Black Duck has announced a managed security service provider (MSSP) agreement with Accenture, in a move designed to strengthen the delivery of enterprise-grade application security services worldwide....

Lire la suite »

AI Rising: Do We Know Enough About the Data Populating It?

2026-02-11 14:31:47
Organizations remain reluctant to address the fact that AI can dangerously expose business operations as well as personal data.

Lire la suite »

Everyone Scanned the App — I Read the Error Messages Instead

2026-02-11 14:12:50
Free Link 🎈Continue reading on InfoSec Write-ups »

Lire la suite »

The game is over: when “free” comes at too high a price. What we know about RenEngine

2026-02-11 14:00:38
We disclose new details about campaigns involving RenEngine and HijackLoader malware. Since March 2025, attackers have been distributing the Lumma stealer in a complex chain of infections, and in February...

Lire la suite »

LummaStealer Is Getting a Second Life Alongside CastleLoader

2026-02-11 14:00:09
Bitdefender researchers have discovered a surge in LummaStealer activity, showing how one of the world's most prolific information-stealing malware operations managed to survive despite being almost brought...

Lire la suite »

Researchers Outline a Roadmap for AI That Can Make Scientific Discovery

2026-02-11 14:00:03
This article traces the evolution of automated scientific research and argues that training AI to rediscover historic breakthroughs is a practical first step toward building truly autonomous scientific...

Lire la suite »

Top Cyber Industry Defenses Spike CO2 Emissions

2026-02-11 14:00:00
Organizations can improve their climate footprints by optimizing two specific cybersecurity protections, without incurring added risks.

Lire la suite »

Black-Box Kubernetes Penetration Testing Playbook

2026-02-11 13:48:55
A Manual, End-to-End Walkthrough from First Signal to Cluster TakeoverContinue reading on InfoSec Write-ups »

Lire la suite »

Debian 11 DLA-4476-1 Linux-6.1 Moderate Privilege Escalation and DoS

2026-02-11 13:48:16
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. For Debian 11 bullseye, these problems have been fixed...

Lire la suite »

Debian 11 DLA-4475-1 Linux Critical Privilege Escalation DoS CVE-2022-48744

2026-02-11 13:47:56
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. For Debian 11 bullseye, these problems have been fixed...

Lire la suite »

Account Takeover using Improper Authorization in “Check Availability” Feature

2026-02-11 13:46:55
Hello Guys!!!!Continue reading on InfoSec Write-ups »

Lire la suite »

5 Ways to Bypass Email Verification Without Using Any Tool

2026-02-11 13:46:36
In this blog, I'll share a few unique and real-world ways to bypass email verification without using any tools at all — no Burp Suite, no scanners, nothing fancy.Just a browser, logic, and curiosity.If...

Lire la suite »

Ransomware Remains A Top 10 AI Threat In 2026

2026-02-11 13:28:58
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 11, 2026 –Read the full story in ZDNet ZDNet recently published “10 ways AI can inflict unprecedented...

Lire la suite »

Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

2026-02-11 13:28:00
It's Patch Tuesday, which means a number of software vendors have released patches for various security vulnerabilities impacting their products and services. Microsoft issued fixes for 59 flaws, including...

Lire la suite »

EU Commission Breach – The Importance of Upholding Strong Device Management Infrastructure

2026-02-11 13:23:02
Last week, the European Commission launched an investigation after finding evidence that its mobile device management platform was hacked. The Commission reported that it discovered “traces of a cyberattack”...

Lire la suite »

GitGuardian Raises M Series C to Address Non-Human Identities Crisis and AI Agent Security Gap

2026-02-11 13:05:15
New York, NY, 11th February 2026, CyberNewswire

Lire la suite »

Researchers Propose a Turing Test to Measure Whether AI Can Make Scientific Discoveries

2026-02-11 13:00:04
This paper proposes a “Turing test for an AI scientist,” outlining seven benchmarks to evaluate whether AI can independently rediscover foundational scientific principles without relying on human...

Lire la suite »

USN-7988-4: Linux kernel (GCP FIPS) vulnerabilities

2026-02-11 12:55:32
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Media drivers; ...

Lire la suite »

USN-7990-3: Linux kernel (Xilinx ZynqMP) vulnerabilities

2026-02-11 12:46:55
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Cryptographic API; ...

Lire la suite »

February 2026 Patch Tuesday includes six actively exploited zero-days

2026-02-11 12:32:20
Microsoft's February Patch Tuesday fixes 59 flaws—including six zero-days already under active attack. How bad are they?

Lire la suite »

SUSE Linux 12 SP5 Security Update 2026-0422-1 Avahi Moderate Crash Risk

2026-02-11 12:30:07
An update that solves three vulnerabilities can now be installed.

Lire la suite »

How I Fixed Manufacturing for AI Robotics with WebSerial

2026-02-11 12:00:07
Scaling AI robotics exposed a silent failure: firmware-based identity poisoned training data without crashing systems. By replacing custom firmware and scripts with a browser-based manufacturing stack...

Lire la suite »

Webconférence LMI Banque et Assurance : rendez-vous le 17 février

2026-02-11 11:57:37
Les banques et les assurances vivent une profonde transformation sous l’impulsion de l’intelligence artificielle. Entre automatisation des (...)

Lire la suite »

A Perilous Break to Jupiter

2026-02-11 11:30:02
In Chapter XII of Astounding Stories of Super-Science (March 1932), Hawk Carse and Eliot Leithgow face deadly doors, heat-rays, and Ku Sui's machines. Using ingenuity, they melt a hole in the ceiling,...

Lire la suite »

Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

2026-02-11 11:30:00
Intentionally vulnerable training applications are widely used for security education, internal testing, and product demonstrations. Tools such as OWASP Juice Shop, DVWA, Hackazon, and bWAPP are designed...

Lire la suite »

Un an après, que devient l'initiative EU AI Champions ?

2026-02-11 11:28:08
Au Sommet de l'IA 2025 naissait l'initiative EU AI Champions. Elle a connu depuis quelques temps forts... et des départs de membres. The post Un an après, que devient l’initiative EU AI Champions...

Lire la suite »

EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

2026-02-11 11:21:20
With .5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, four new AI certifications and Certified CISO v4 help close the gap between AI adoption and workforce readiness TAMPA,...

Lire la suite »

Patch Tuesday février 2026 : 59 failles corrigées dont 5 critiques

2026-02-11 11:16:19
Après un patch tuesday de janvier conséquent, février est plus calme sur le front des failles de sécurité affectant (...)

Lire la suite »

USN-8023-1: xmltok library vulnerabilities

2026-02-11 10:29:21
It was discovered that Expat, contained within the xmltok library, incorrectly handled the initialization of parsers for external entities. An attacker could possibly use this issue to cause a denial...

Lire la suite »

Des pirates déconnectent les EDR via un pilote Windows obsolète

2026-02-11 10:28:12
Début février, les équipes d’Huntress ont indiqué avoir contrecarré une intrusion après avoir repéré (...)

Lire la suite »

L'infrastructure à l'ère de l'IA : les choix techniques qui engagent l'avenir

2026-02-11 10:23:22
Le 19 février 2026, la Matinale Silicon réunit en ligne les décideurs IT autour d'un défi majeur : comment bâtir une infrastructure réellement prête pour l'intelligence artificielle ? The post...

Lire la suite »

Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days

2026-02-11 10:22:00
Microsoft on Tuesday released security updates to address a set of 59 flaws across its software, including six vulnerabilities that it said have been exploited in the wild. Of the 59 flaws, five are rated...

Lire la suite »

Malwarebytes earns PCMag Best Tech Brand spot, scores 100% with MRG Effitas

2026-02-11 10:09:52
Malwarebytes is not only one of PCMag's Best Tech Brands for 2026, it also scored 100% on the MRG Effitas consumer security product test.

Lire la suite »

Spam and phishing in 2025

2026-02-11 10:00:59
The report contains statistics on spam and phishing in 2025, outlining the main trends: phishing and scam QR codes, ClickFix attacks, ChatGPT subscription lures and others.

Lire la suite »

SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits

2026-02-11 09:56:00
Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC) communication protocol for command-and-control (C2) purposes. "The...

Lire la suite »

SSHStalker botnet targets Linux servers with legacy exploits and SSH scanning

2026-02-11 09:49:39
A new Linux botnet, SSHStalker, has infected about 7,000 systems using old 2009-era exploits, IRC bots, and mass-scanning malware. Flare researchers uncovered a previously undocumented Linux botnet dubbed...

Lire la suite »

Ubuntu 25.10 Expat Critical DoS Issues USN-8022-1 CVE-2025-59375

2026-02-11 09:38:02
Several security issues were fixed in Expat.

Lire la suite »

SUSE CUPS Critical Security Advisory 2026-20231-1 CVE-2025-58060 DoS Risk

2026-02-11 08:30:23
An update that solves four vulnerabilities, contains two features and has one fix can now be installed.

Lire la suite »

SUSE golang-github-prometheus-prometheus Key Security Update 2026-20232-1

2026-02-11 08:30:17
An update that solves two vulnerabilities and contains one feature can now be installed.

Lire la suite »

Search Exposure Linux Security Threats Impacting Personal Data

2026-02-11 08:16:40
Search-indexed personal data increases security risk in Linux environments. When email addresses, usernames, phone numbers, and role information are easy to discover through search engines, attackers...

Lire la suite »

U.S. CISA adds Microsoft Office and Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog

2026-02-11 07:37:24
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Office and Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure...

Lire la suite »

North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

2026-02-11 06:50:00
The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating...

Lire la suite »

How To Hack Part 3

2026-02-11 02:11:01
Linux Capture The Flag Bandit Levels 7 to 11Continue reading on InfoSec Write-ups »

Lire la suite »

Microsoft releases Windows 11 26H1 for select and upcoming CPUs

2026-02-11 02:06:42
Microsoft has announced Windows 11 26H1, but it's not for existing PCs. Instead, it will ship on devices with Snapdragon X2 processors and possibly other rumored ARM chips.w [...]

Lire la suite »

Asia Fumbles With Throttling Back Telnet Traffic in Region

2026-02-11 02:00:00
Only Taiwan made the top 10 list of governments, effectively blocking the threat-ridden protocol, but overall, the region lagged in curbing Telnet traffic.

Lire la suite »

Patch Tuesday - February 2026

2026-02-11 01:58:33
Microsoft is publishing 55 vulnerabilities this February 2026 Patch Tuesday. Microsoft is aware of exploitation in the wild for six of today's vulnerabilities, and notes public disclosure for three...

Lire la suite »

Roblox visé par une mise en demeure

2026-02-11 01:46:50
Roblox mis en demeure : risques de contenus choquants et prédation, pression pour renforcer protections et revoir la classification PG....

Lire la suite »

Un document du DoJ évoque un « hacker » de Jeffrey Epstein

2026-02-11 01:33:50
Un document du DoJ cite un informateur : Epstein aurait eu un « hacker personnel ». ZATAZ vous a analysé les courriels de Jeffrey Epstein et son attirance pour les hackers....

Lire la suite »

Notepad++ visé via sa chaîne de mise à jour

2026-02-11 01:04:27
Notepad++ a vu son trafic de mises à jour redirigé vers des serveurs malveillants, une attaque de chaîne d'approvisionnement ciblée et attribuée prudemment....

Lire la suite »

Un pirate de Snapchat avoue : 600 femmes ciblées

2026-02-11 00:56:25
Un internaute plaide coupable après le piratage de comptes Snapchat visant 600 femmes, avec vol et revente de photos intimes....

Lire la suite »

L'UE et les Pays-Bas touchés via des failles Ivanti

2026-02-11 00:39:08
Failles zero-day Ivanti EPMM : intrusions confirmées aux Pays-Bas et incident à la Commission européenne, sur fond d'alertes CISA et alliés....

Lire la suite »

La Russie protège un Espagnol accusé de cyberespionnage

2026-02-11 00:26:24
La Russie accorde l'asile à Enrique Arias Gil, Espagnol recherché pour cyberespionnage, au cœur des relais pro-russes sur Telegram....

Lire la suite »

Le Sénégal frappé au cœur de son fichier d'identité

2026-02-11 00:07:38
Le Sénégal confirme une brèche au DAF, cible d'un rançongiciel, avec 139 Go revendiqués et un service d'identité suspendu....

Lire la suite »

List of 18 new domains

2026-02-11 00:00:00
.fr account-renew[.fr] (registrar: AMEN / Agence des Médias Numériques) assur-maladie[.fr] (registrar: Hostinger operations UAB) auray-communaute[.fr] (registrar: Dynadot Inc) casino-spinaura[.fr] (registrar:...

Lire la suite »

Multiples vulnérabilités dans MongoDB (11 février 2026)

11/02/2026
De multiples vulnérabilités ont été découvertes dans MongoDB. Elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et un problème...

Lire la suite »

Multiples vulnérabilités dans Synology Storage Manager (11 février 2026)

11/02/2026
De multiples vulnérabilités ont été découvertes dans Synology Storage Manager. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.

Lire la suite »

Multiples vulnérabilités dans Ivanti Endpoint Manager (11 février 2026)

11/02/2026
De multiples vulnérabilités ont été découvertes dans Ivanti Endpoint Manager. Elles permettent à un attaquant de provoquer une injection SQL (SQLi) et un contournement de la politique de sécurité....

Lire la suite »

Multiples vulnérabilités dans les produits HPE Aruba Networking (11 février 2026)

11/02/2026
De multiples vulnérabilités ont été découvertes dans les produits HPE Aruba Networking. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et un contournement...

Lire la suite »

Multiples vulnérabilités dans GitLab (11 février 2026)

11/02/2026
De multiples vulnérabilités ont été découvertes dans GitLab. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à...

Lire la suite »

Multiples vulnérabilités dans les produits Fortinet (11 février 2026)

11/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation...

Lire la suite »

Multiples vulnérabilités dans les produits Intel (11 février 2026)

11/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte...

Lire la suite »

Multiples vulnérabilités dans Microsoft Office (11 février 2026)

11/02/2026
De multiples vulnérabilités ont été découvertes dans Microsoft Office. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données...

Lire la suite »

Multiples vulnérabilités dans Microsoft Windows (11 février 2026)

11/02/2026
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation...

Lire la suite »

Vulnérabilité dans Microsoft .Net (11 février 2026)

11/02/2026
Une vulnérabilité a été découverte dans Microsoft .Net. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.

Lire la suite »

Multiples vulnérabilités dans Microsoft Azure (11 février 2026)

11/02/2026
De multiples vulnérabilités ont été découvertes dans Microsoft Azure. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité...

Lire la suite »

Multiples vulnérabilités dans les produits Microsoft (11 février 2026)

11/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation...

Lire la suite »