Toute l'actualité de la Cybersécurité


Odido confirms massive breach; 6.2 Million customers impacted

2026-02-12 20:02:48
Hackers accessed data from 6.2 million Odido accounts, exposing names, contacts, bank details, and ID numbers. Subsidiary Ben also warned customers. Hackers broke into Dutch telecom firm Odido and accessed...

Lire la suite »

Romania's oil pipeline operator Conpet confirms data stolen in attack

2026-02-12 19:16:38
Romania's national oil pipeline operator, Conpet S.A., confirmed that the Qilin ransomware gang stole company data in an attack last week. [...]

Lire la suite »

Odido data breach exposes personal info of 6.2 million customers

2026-02-12 18:18:14
Dutch telecommunications provider Odido is warning that it suffered a cyberattack that reportedly exposed the personal data of 6.2 million customers. [...]

Lire la suite »

USN-7990-4: Linux kernel (Oracle) vulnerabilities

2026-02-12 18:09:52
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Cryptographic API; ...

Lire la suite »

Next Gen Spotlights: Creating Quiet in Moments of Noise – Q&A with Richard Allmendinger, CEO and Co-Founder of Veribee

2026-02-12 18:01:35
Veribee is on a mission to reduce noise for software teams, by striving to minimise alert-heavy tools that create noise, as opposed to confidence in what's actually secure. As one survey found, over...

Lire la suite »

ApolloMD data breach impacts 626,540 people

2026-02-12 17:58:25
A May 2025 cyberattack on ApolloMD exposed the personal data of over 626,000 patients linked to affiliated physicians and practices. ApolloMD is a US-based healthcare services company that partners with...

Lire la suite »

USN-7988-5: Linux kernel (Azure) vulnerabilities

2026-02-12 17:50:59
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Media drivers; ...

Lire la suite »

Odido Telecom Suffers Cyberattack – 6.2 Million Customer Accounts Affected

2026-02-12 17:23:33
Odido Telecom, a leading Dutch telecommunications provider, confirmed on February 12, 2026, that hackers accessed personal data from 6.2 million customer accounts in a major cyberattack. The breach, detected...

Lire la suite »

WordPress plugin with 900k installs vulnerable to critical RCE flaw

2026-02-12 17:09:41
A critical vulnerability in the WPvivid Backup & Migration plugin for WordPress, installed on more than 900,000 websites, can be exploited to achieve remote code execution by uploading arbitrary files...

Lire la suite »

Spoticar mise sur Agentforce dans WhatsApp pour engager ses clients

2026-02-12 17:08:38
Avec plus de 2 milliards d’utilisateurs dans le monde, WhatsApp constitue un vivier de consommateurs potentiels. Les entreprises l’ont bien (...)

Lire la suite »

287 Chrome Extensions Exfiltrate Browsing History From 37.4 Million Users

2026-02-12 17:08:37
A massive data exfiltration operation involving 287 Chrome extensions that secretly steal browsing history from approximately 37.4 million users worldwide. According to research with alias qcontinuum1,...

Lire la suite »

ORB Networks Mask Cyberattacks Using Compromised IoT Devices and SOHO Routers

2026-02-12 17:05:18
Operational Relay Box networks have emerged as one of the most sophisticated tools used by threat actors to hide their cyberattacks from security teams worldwide. These obfuscated mesh networks consist...

Lire la suite »

AIOZ Storage Launches Peer-to-Peer S3-Compatible Cloud on DePIN

2026-02-12 17:00:08
AIOZ Storage is the storage pillar of the AIOZ Network stack, sitting alongside AIOZ Stream, AIOZ AI, and AIOZ Pin on top of the same people‑powered DePIN. It is a contributor-driven S3-compatible object...

Lire la suite »

Your complete guide to Microsoft experiences at RSAC™ 2026 Conference

2026-02-12 17:00:00
Microsoft Security returns to RSAC Conference to show how Frontier Firms—organizations that are human-led and agent-operated—can stay ahead. The post Your complete guide to Microsoft experiences at...

Lire la suite »

Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

2026-02-12 16:55:00
Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI) repository linked to a fake recruitment-themed campaign orchestrated by the North...

Lire la suite »

DragonForce Ransomware Group Expands Its Influence with Cartel-like Operations and Targeting 363 Companies Since 2023

2026-02-12 16:54:16
DragonForce has established itself as a formidable entity in the cybercrime landscape, having been active since December 2023. Operating under a sophisticated Ransomware-as-a-Service (RaaS) model, the...

Lire la suite »

DShield Sensor Captures Self-Propagating SSH Worm Exploit Using Credential Stuffing and Multi-Stage Malware

2026-02-12 16:39:19
A sophisticated self-spreading worm has emerged that can completely compromise Linux systems through SSH brute-force attacks in just four seconds. This new threat combines traditional credential stuffing...

Lire la suite »

Feiniu NAS Devices Infected in Large-Scale Netdragon Botnet Attack Exploiting Unpatched Vulnerabilities

2026-02-12 16:17:51
A serious security incident has recently emerged involving Feiniu (fnOS) Network Attached Storage devices. These systems are being actively targeted and infected by the Netdragon botnet, a malware strain...

Lire la suite »

GitGuardian lève 50 M$ : cap sur les secrets de l'IA agentique

2026-02-12 16:03:44
Après s'être positionné sur la gestion centralisée des identités machine avec une offre spécifique, GitGuardian lorgne l'IA agentique. The post GitGuardian lève 50 M$ : cap sur les secrets de l’IA...

Lire la suite »

The HackerNoon Newsletter: Keeping Up with the Upwork Civil War on Reddit (2/12/2026)

2026-02-12 16:03:29
How are you, hacker? 🪐 What's happening in tech today, February 12, 2026? The HackerNoon Newsletter brings the HackerNoon ...

Lire la suite »

Rogue VM Linked to Muddled Libra in VMware vSphere Attack, Revealing Key TTPs

2026-02-12 15:46:28
In a September 2025 incident response case, investigators found a rogue virtual machine inside a VMware vSphere environment and tied it with high confidence to Muddled Libra, also tracked as Scattered...

Lire la suite »

USN-8037-1: DNSdist vulnerabilities

2026-02-12 15:41:01
It was discovered that HTTP/2, which is used/vendored by DNSdist, did not properly account for resources when handling client-triggered stream resets. An attacker could possibly use this issue to cause...

Lire la suite »

Keeper Commander Introduces SuperShell™

2026-02-12 15:29:22
From today, Keeper Security‘s SuperShell, a full-screen Terminal User Interface (TUI) for browsing and managing the Keeper Vault within Keeper Commander, is available to all customers and can be...

Lire la suite »

How Buck Reached 10% Yield Without Compromising Stability in DeFi's Rate Wars

2026-02-12 15:18:48
Buck Labs announced on February 12 that it would increase yields from 7% to 10% and transition from manual reward claims to automatic distribution. The changes apply to the existing token infrastructure,...

Lire la suite »

Le shadow IA se répand dans les entreprises françaises

2026-02-12 15:12:23
Si la GenAI se développe dans les entreprises françaises, son utilisation soulève des questions. Une étude réalisée (...)

Lire la suite »

WordPress Backup Plugin Vulnerability Exposes 800,000 Sites to Remote Code Execution Attacks

2026-02-12 15:09:57
A critical flaw in the WPvivid Backup & Migration WordPress plugin can let an unauthenticated attacker upload files and run code on the server, a path that often ends in full site takeover. The issue...

Lire la suite »

LummaStealer activity spikes post-law enforcement disruption

2026-02-12 14:57:44
Bitdefender reports a surge in LummaStealer activity, showing the MaaS infostealer rebounded after 2025 law enforcement disruption. Bitdefender observed renewed LummaStealer activity, proving the MaaS...

Lire la suite »

USN-8036-1: HAProxy vulnerability

2026-02-12 14:55:12
Asim Viladi Oglu Manizada discovered that HAProxy incorrectly handled certain INITIAL packets. A remote attacker could possibly use this issue to cause HAProxy to crash, resulting in a denial of service....

Lire la suite »

Outlook add-in goes rogue and steals 4,000 credentials and payment data

2026-02-12 14:35:13
The once popular Outlook add-in AgreeTo was turned into a powerful phishing kit after the developer abandoned the project.

Lire la suite »

Microsoft veut voler de ses propres ailes dans l'IA

2026-02-12 14:31:00
Microsoft accélère le développement de ses propres modèles d'IA pour réduire sa dépendance à OpenAI. Une stratégie d'indépendance technologique qui s'accompagne d'investissements colossaux. The...

Lire la suite »

Sur Windows 11, Microsoft teste le consentement pour installer des applications

2026-02-12 14:27:54
Colonne vertébrale des entreprises du monde entier, Windows équipe plus d'un milliard d'appareils et prend en charge des millions d'applications. (...)

Lire la suite »

AMOS infostealer targets macOS through a popular AI app

2026-02-12 14:25:38
AMOS infostealer is targeting macOS users by abusing popular AI apps and extension marketplaces to harvest credentials. Flare examines how AMOS operates, spreads through AI-driven lures, and feeds the...

Lire la suite »

De WhatsApp à MAX : Moscou met fin au chiffrement des communications

2026-02-12 14:13:05
Moscou impose sa messagerie d'État MAX et met fin à l'ère de la confidentialité numérique. Une rupture technologique qui aura des implications pour la sécurité des communications. The post De WhatsApp...

Lire la suite »

Betashares Global Cybersecurity ETF (ASX: HACK): A Diversified Bet On The Sector

2026-02-12 14:01:15
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 12, 2026 –Read the full story in The Motley Fool Australia Tristan Harrison, one of the longest-serving...

Lire la suite »

Carding-as-a-Service: The Underground Market of Stolen Cards

2026-02-12 14:00:00
Rapid7 software engineer Eliran Alon also contributed to this post.IntroductionDespite sustained efforts by the global banking and payments industry, credit card fraud continues to affect consumers and...

Lire la suite »

Chrome Security Update – Patch for Vulnerabilities that Enables Code Execution Attacks

2026-02-12 13:52:28
Google has released Chrome 145 to the stable channel for Windows, Mac, and Linux, addressing 11 security vulnerabilities that could enable attackers to execute malicious code on user systems. The update,...

Lire la suite »

WaaP Launches on Sui: How human.tech Is Transforming Access for 3 Million Crypto Users

2026-02-12 13:52:18
WaaP is a new protocol built on top of the Sui network. Sui is one of the top Layer 1 blockchains by activity. In October 2025, Sui hit a record .6 billion in TVL.

Lire la suite »

Why Ault Blockchain's Zero-Speculation Model Could Redefine How Layer 1 Networks Launch

2026-02-12 13:47:15
Ault Capital Group launches Ault Blockchain public testnet, a Cosmos-based Layer 1 with no token sale, targeting institutional finance.

Lire la suite »

Fake AI Chrome extensions with 300K users steal credentials, emails

2026-02-12 13:41:55
A set of 30 malicious Chrome extensions that have been installed by more than 300,000 users are masquerading as AI assistants to steal credentials, email content, and browsing information. [...]

Lire la suite »

USN-8035-1: libpng vulnerabilities

2026-02-12 13:37:00
It was discovered that the libpng simplified API incorrectly processed palette PNG images with partial transparency and gamma correction. If a user or automated system were tricked into opening a specially...

Lire la suite »

L'ANSSI affirme l'open source comme levier de sa politique industrielle

2026-02-12 13:25:58
L'ANSSI a remodelé la présentation de sa posture générale sur l'open source, affirmé comme levier de sa politique industrielle. The post L’ANSSI affirme l’open source comme levier de...

Lire la suite »

Sophisticated ‘duer-js' NPM Package Distributes ‘Bada Stealer' Malware Targeting Windows and Discord Users

2026-02-12 13:24:16
A dangerous malware campaign has emerged on the NPM package registry, putting thousands of developers and Windows users at risk. The malicious package, known as “duer-js,” was published by...

Lire la suite »

UK Tech Funding Falls 11% in 2025, but Remains Second Globally

2026-02-12 13:11:16
The UK tech sector raised .3 billion in 2025, marking an 11% year-on-year decline and a 35% drop in deal volume. While late-stage funding remained resilient, seed and early-stage investment fell sharply,...

Lire la suite »

Child exploitation, grooming, and social media addiction claims put Meta on trial

2026-02-12 12:35:26
Landmark trials now underway allege Meta failed to protect children from sexual exploitation, grooming, and addiction-driven design.

Lire la suite »

Ubuntu 22.04 LTS USN-8034-1 Linux NVIDIA Tegra Critical Security Update

2026-02-12 12:32:53
Several security issues were fixed in the Linux kernel.

Lire la suite »

openSUSE 2026-0456-1 Nvidia Driver Important Security Update

2026-02-12 12:30:48
An update that has two security fixes can now be installed.

Lire la suite »

SUSE Linux important Update nvidia-modprobe CUDA System Access 2026-0456-1

2026-02-12 12:30:47
# Security update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed, nvidia-persistenced.cuda Announcement ID: SUSE-SU-2026:0456-1 Release Date: 2026-02-11T22:21:03Z Rating: important

Lire la suite »

SUSE Nodejs20 Important Security Update 2026-0457-1 CVE-2025-55130

2026-02-12 12:30:44
An update that solves seven vulnerabilities can now be installed.

Lire la suite »

openSUSE Leap 15.5 nodejs20 Important Fix Multiple Issues 2026-0457-1

2026-02-12 12:30:44
An update that solves seven vulnerabilities can now be installed.

Lire la suite »

SUSE glib2 Major Security Patch Addressing Buffer and Integer Overflows

2026-02-12 12:30:35
An update that solves one vulnerability can now be installed.

Lire la suite »

Upbit Concludes Review, Removes Restrictions on Bitunix Exchange in South Korea

2026-02-12 12:29:35

Lire la suite »

Du casino au centre d'appels : le Groupe Barrière déploie l'IA par étapes

2026-02-12 12:14:44
Centres d’appels, support technique dans les casinos, assistants IA pour tous les collaborateurs…le Groupe Barrière déploie l’intelligence artificielle sur trois fronts simultanés....

Lire la suite »

ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

2026-02-12 11:51:00
Threat activity this week shows one consistent signal — attackers are leaning harder on what already works. Instead of flashy new exploits, many operations are built around quiet misuse of trusted tools,...

Lire la suite »

Tech's Silent Epidemic: Why We Are Rebooting 2018's Landmark Mental Health Research

2026-02-12 11:42:12
In 2018, I lost 11 friends in the tech industry to suicide. Founders are twice as likely to have suicidal thoughts and ten times as likely as the average person. Only 7% of startups have formal mental...

Lire la suite »

Apple patches zero-day flaw that could let attackers take control of devices

2026-02-12 11:40:35
Apple issued security updates for all devices which include a patch for an actively exploited zero-day—tracked as CVE-2026-20700.

Lire la suite »

Stephan Teerling, nouveau Chief IT & Technology Officer d'Allianz France

2026-02-12 11:33:50
Allianz France annonce la nomination de Stephan Teerling comme Chief IT & Technology Officer, en charge des systèmes d'information. Il sera membre du Comité Exécutif. The post Stephan Teerling,...

Lire la suite »

The Asteroid Escape You Can't Miss

2026-02-12 11:30:14
In Chapter XIII of Astounding Stories of Super-Science (March 1932), Hawk Carse, Eliot Leithgow, and Friday escape Ku Sui's lethal traps and chase across the dome. Using space-suits and the Scorpion...

Lire la suite »

USN-8034-1: Linux kernel (NVIDIA Tegra) vulnerabilities

2026-02-12 11:24:57
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Nios II architecture; ...

Lire la suite »

USN-8033-3: Linux kernel (FIPS) vulnerabilities

2026-02-12 11:12:38
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Nios II architecture; ...

Lire la suite »

Malicious Campaigns Using AI-generated Malware in 2026

2026-02-12 11:00:47
In this blog post I am collecting the campaigns that show evidence of being AI-generated, or make use of AI tools to increase their impact. As always I will continue to update the list as soon as new...

Lire la suite »

How Python Devs Can Build AI Agents Using MCP, Kafka, and Flink

2026-02-12 11:00:03
Python developers can build production-ready AI agents using Model Context Protocol (MCP), Apache Kafka, and Apache Flink. By extending familiar FastAPI microservices with FastMCP tools and event-driven...

Lire la suite »

USN-8033-2: Linux kernel vulnerabilities

2026-02-12 10:55:16
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Nios II architecture; ...

Lire la suite »

Apple fixed first actively exploited zero-day in 2026

2026-02-12 10:50:10
Apple fixed an exploited zero-day in iOS, macOS, and other devices that allowed attackers to run code via a memory flaw. Apple released updates for iOS, iPadOS, macOS, watchOS, tvOS, and visionOS to address...

Lire la suite »

USN-8033-1: Linux kernel vulnerabilities

2026-02-12 10:40:51
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Nios II architecture; ...

Lire la suite »

New Global Expansion Report Benchmarks the Hidden Costs and Risks of Scaling Across 19 Markets

2026-02-12 10:36:19
Native Teams, the global platform for work payments and legal employment, launched the Global Expansion Report, which provides the first cross-market benchmark of cost, timelines, digitalisation levels,...

Lire la suite »

The CTEM Divide: Why 84% of Security Programs Are Falling Behind

2026-02-12 10:30:00
A new 2026 market intelligence study of 128 enterprise security decision-makers (available here) reveals a stark divide forming between organizations – one that has nothing to do with budget size or...

Lire la suite »

Arrestation aux Pays-Bas pour diffusion du bot JokerOTP

2026-02-12 10:24:04
Arrestation aux Pays-Bas pour diffusion du bot JokerOTP contournant la double authentification....

Lire la suite »

USN-8031-1: Linux kernel (GCP) vulnerabilities

2026-02-12 10:13:02
It was discovered that improper initialization of CPU cache memory could allow a local attacker with hypervisor access to overwrite SEV-SNP guest memory resulting in loss of data integrity. (CVE-2024-36331) Oleksii...

Lire la suite »

Mean-Field LIBOR Models Offer Reliable Bounds for Life Insurance Valuation, Study Finds

2026-02-12 10:00:14
This paper presents a market-consistent framework for valuing life insurance portfolios, showing how mean-field LIBOR models and algebraic bounds can accurately estimate future discretionary benefits...

Lire la suite »

Pour accélérer sa croissance, GitGuardian lève 50 M$

2026-02-12 09:40:52
Après avoir levé 44 M$ en décembre 2021, pour s’implanter sur le marché américain, GitGuardian (...)

Lire la suite »

Windows 11 26H1, cette épine dans le pied des admins

2026-02-12 09:21:51
Ciblant un nombre restreint d'appareils, Windows 11 26H1 aura son propre chemin de mise à niveau. The post Windows 11 26H1, cette épine dans le pied des admins appeared first on Silicon.fr.

Lire la suite »

Senegalese Data Breaches Expose Lack of 'Security Maturity'

2026-02-12 09:00:00
Green Blood Group steals personal records and biometric data of the West African nation's nearly 20 million residents.

Lire la suite »

Le cabinet Idna racheté par NXO

2026-02-12 08:56:53
L'intégrateur de solutions réseaux, IT et télécoms NXO (ex-NextiraOne) annonce l'acquisition de la société Idna, (...)

Lire la suite »

Entretien Franz Decker, DSI de BMW : « L'IA réduit considérablement les interventions manuelles »

2026-02-12 08:54:06
Lorsqu'on observe le marché des capitaux, nous constatons que Tesla est valorisé à un niveau élevé, comme une entreprise (...)

Lire la suite »

Attaque revendiquée contre la CFDT par Cl0P

2026-02-12 08:37:20
Cl0P revendique une attaque contre la CFDT, première organisation syndicale française....

Lire la suite »

Criminals are using AI website builders to clone major brands

2026-02-12 08:03:00
AI-assisted website builders are making it far easier for scammers to impersonate well-known and trusted brands, including Malwarebytes.

Lire la suite »

Bypassing Administrator Protection by Abusing UI Access

2026-02-12 08:00:00
In my last blog post I introduced the new Windows feature, Administrator Protection and how it aimed to create a secure boundary for UAC where one didn't exist. I described one of the ways I was able...

Lire la suite »

83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure

2026-02-12 07:32:00
A significant chunk of the exploitation attempts targeting a newly disclosed security flaw in Ivanti Endpoint Manager Mobile (EPMM) can be traced back to a single IP address on bulletproof hosting infrastructure...

Lire la suite »

Proofpoint Acquires Acuvity to Deliver AI Security and Governance Across the Agentic Workspace

2026-02-12 07:16:45

Lire la suite »

Google says hackers are abusing Gemini AI for all attacks stages

2026-02-12 07:00:00
Google Threat Intelligence Group (GTIG) has published a new report warning about AI model extraction/distillation attacks, in which private-sector firms and researchers use legitimate API access to systematically...

Lire la suite »

Multiple Endpoint Manager bugs patched by Ivanti, including remote auth bypass

2026-02-12 06:13:41
Ivanti patched over a dozen Endpoint Manager flaws, including a high-severity auth bypass that let attackers steal credentials remotely. Ivanti released patches for more than a dozen vulnerabilities in...

Lire la suite »

When ARP Goes Wrong: Threat Hunting ARP Poisoning in Network Traffic

2026-02-12 05:48:38
Before we start, it's important to understand the basics of the ARP protocol.In a local network, devices do not communicate using IP addresses alone. Actual data transmission at the network level relies...

Lire la suite »

How an Internal Tool Accidentally Became Public Internet Property

2026-02-12 05:44:02
Free Link 🎈Continue reading on InfoSec Write-ups »

Lire la suite »

The Feature Was Disabled — The Backend Didn't Get the Memo

2026-02-12 05:41:33
Free Link 🎈Continue reading on InfoSec Write-ups »

Lire la suite »

Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Other Devices

2026-02-12 05:39:00
Apple on Wednesday released iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS updates to address a zero-day flaw that it said has been exploited in sophisticated cyber attacks. The vulnerability,...

Lire la suite »

Proving Grounds Linux Lab Image

2026-02-12 05:38:51
We can achieve that by using various of tools and techniques to obtain foothold on the target, by using enumeration, scanning and other…Continue reading on InfoSec Write-ups »

Lire la suite »

Building a Virtual Ethical Hacking Home Lab — Part 6: System Exploitation

2026-02-12 05:38:39
An interactive guide for building your very own ethical hacking home lab using VMwareContinue reading on InfoSec Write-ups »

Lire la suite »

I Let AI Pentest my lab for 45 Minutes. HexStrike AI and KALI MCP to get a shell after only 20.

2026-02-12 05:37:42
Screenshot from HexStrike AI Github RepoWhat you see in the screenshots below? You're sitting in front of your terminal, and instead of typing commands yourself, you're having a conversation with...

Lire la suite »

From a Free TryHackMe Subscription to a Free OSCP Certification

2026-02-12 05:35:31
Lessons, struggles, and growth from four years of learning cybersecurity the hard wayFor all the new readers, this article is a continuation of my yearly cybersecurity journey. This marks the 4th year...

Lire la suite »

Quantum Scrambler — picoCTF 2025 Writeup

2026-02-12 05:28:30
Quantum Scrambler — picoCTF 2025 WriteupThe Quantum Scrambler is a reverse engineering challenge from picoCTF 2025. It may seem challenging — but once broken down, it is much more simpler....

Lire la suite »

I Asked My AI to Find Vulnerable AI. It Found 2,442

2026-02-12 05:27:34
Hello Hackers!!! Ever wondered what happens when you set an AI assistant loose to hunt for security vulnerabilities in… other AI assistants? Today, I'm sharing something wild: I used my Clawdbot to...

Lire la suite »

AI-Assisted Web and Cloud Penetration Testing with Cursor + MCP HexStrike and Burp Suite MCP.

2026-02-12 05:26:32
A Complete Guide to Modern AI-Powered Security Testing. From One Prompt to Full Attack Surface Coverage (Recon → Exploit → Report).Continue reading on InfoSec Write-ups »

Lire la suite »

Apple fixes zero-day flaw used in 'extremely sophisticated' attacks

2026-02-12 01:06:05
Apple has released security updates to fix a zero-day vulnerability that was exploited in an "extremely sophisticated attack" targeting specific individuals. [...]

Lire la suite »

List of 13 new domains

2026-02-12 00:00:00
.fr apcfrance[.fr] (registrar: Hosting Concepts B.V. d/b/a Openprovider) apcoutlet[.fr] (registrar: Hosting Concepts B.V. d/b/a Openprovider) coli-suivi[.fr] (registrar: OVH) confirmationrdv-leboncoin-barhoumi[.fr]...

Lire la suite »

Vulnérabilité dans Traefik (12 février 2026)

12/02/2026
Une vulnérabilité a été découverte dans Traefik. Elle permet à un attaquant de provoquer un déni de service à distance et un contournement de la politique de sécurité.

Lire la suite »

Multiples vulnérabilités dans SPIP (12 février 2026)

12/02/2026
De multiples vulnérabilités ont été découvertes dans SPIP. Elles permettent à un attaquant de provoquer une injection de code indirecte à distance (XSS).

Lire la suite »

Multiples vulnérabilités dans Google Chrome (12 février 2026)

12/02/2026
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Multiples vulnérabilités dans les produits Qnap (12 février 2026)

12/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de...

Lire la suite »

Multiples vulnérabilités dans les produits Apple (12 février 2026)

12/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation...

Lire la suite »

Multiples vulnérabilités dans Keycloak (12 février 2026)

12/02/2026
De multiples vulnérabilités ont été découvertes dans Keycloak. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité.

Lire la suite »

Multiples vulnérabilités dans les produits Palo Alto Networks (12 février 2026)

12/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Palo Alto Networks. Elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique...

Lire la suite »