Toute l'actualité de la Cybersécurité
CrushFTP warns users to patch unauthenticated access flaw immediately
2025-03-25 20:11:04
CrushFTP warned customers of an unauthenticated HTTP(S) port access vulnerability and urged them to patch their servers immediately. [...]
OPSEC Nightmare: Leaking US Military Plans to a Reporter
2025-03-25 20:03:22
Experts say the leakage of US military plans to a reporter this month reflects a severe operational security failure on the part of US leadership.
South African Poultry Company Reports M Loss After Cyber Intrusion
2025-03-25 20:02:49
The company reports that no sensitive information was breached or stolen in the cyber intrusion and that its operations are running normally again.
Satellite Navigation Systems Facing Rising Jamming and Spoofing Attacks
2025-03-25 19:47:17
Satellite navigation systems are under rising threat from jamming and spoofing attacks, risking aviation, maritime, and telecom safety worldwide, warn global agencies.
Cloudflare R2 service outage caused by password rotation error
2025-03-25 19:47:07
Cloudflare has announced that its R2 object storage and dependent services experienced an outage lasting 1 hour and 7 minutes, causing 100% write and 35% read failures globally. [...]
Broadcom warns of authentication bypass in VMware Windows Tools
2025-03-25 19:17:28
Broadcom released security updates today to fix a high-severity authentication bypass vulnerability in VMware Tools for Windows. [...]
Cybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver Malware
2025-03-25 19:12:32
In the second half of 2024, cybercriminals have increasingly leveraged legitimate Microsoft tools and browser extensions to bypass security measures and deliver malware, according to Ontinue’s latest...
Malicious AI Tools See 200% Surge as ChatGPT Jailbreaking Talks Increase by 52%
2025-03-25 19:07:38
The cybersecurity landscape in 2024 witnessed a significant escalation in AI-related threats, with malicious actors increasingly targeting and exploiting large language models (LLMs). According to KELA’s...
Android malware campaigns use .NET MAUI to evade detection
2025-03-25 18:55:45
Researchers warn of a new Android malware that uses .NET MAUI to mimic legit services and evade detection. McAfee researchers warn of Android malware campaigns using .NET MAUI to evade detection. These...
Banking Malware Infects 248,000 Mobile Users Through Social Engineering Techniques
2025-03-25 18:54:03
In 2024, the number of users affected by mobile banking malware skyrocketed to nearly 248,000, a staggering 3.6-fold increase from the previous year’s 69,000 affected users. This dramatic rise in...
Quantum Minute On The Cybercrime Radio Podcast
2025-03-25 18:49:28
Get ready for Y2Q aka Q-Day – Brought to you by SecureQuantum Northport, N.Y. – Mar. 25, 2025 The Quantum Minute is a weekly one-minute episode on the Cybercrime Magazine Podcast, brought to you by SecureQuantum, a...
Researchers Compare Malware Development in Rust vs C and C++
2025-03-25 18:46:19
Security researcher Nick Cerne from Bishop Fox has published findings comparing malware development in Rust versus traditional C/C++ languages. The research demonstrates how Rust provides inherent anti-analysis...
ARACNE: LLM-Powered Pentesting Agent Executes Commands on Real Linux Shell Systems
2025-03-25 18:27:55
Researchers have introduced ARACNE, a fully autonomous Large Language Model (LLM)-based pentesting agent designed to interact with SSH services on real Linux shell systems. ARACNE is engineered to execute...
New Windows zero-day leaks NTLM hashes, gets unofficial patch
2025-03-25 18:22:38
Free unofficial patches are available for a new Windows zero-day vulnerability that can let remote attackers steal NTLM credentials by tricking targets into viewing malicious files in Windows Explorer....
IDT Corporation Partners with AccuKnox for Zero Trust Runtime IoT/Edge Security
2025-03-25 18:19:32
Menlo Park, United States, March 25th, 2025, CyberNewsWire FinTech and Communications Leader, IDT Corporation partners with AccuKnox to deploy runtime security-powered CNAPP (Cloud Native Application...
New Phishing Campaign Targets Mac Users to Steal Login Credentials
2025-03-25 18:11:40
A sophisticated phishing campaign, recently identified by LayerX Labs, has shifted its focus from Windows users to Mac users in response to enhanced security measures implemented by major browsers. Initially,...
CAPE from Cuckoo v1 Enables Malware Analysis in a Secure Isolated Sandbox Environment
2025-03-25 17:56:07
CAPE, derived from Cuckoo v1, is a sophisticated malware sandbox designed to execute malicious files in an isolated environment while capturing their dynamic behavior and collecting forensic artifacts....
Multistage Info-Stealer SnakeKeylogger Targets Individuals and Businesses to Steal Login Credentials
2025-03-25 17:38:17
SnakeKeylogger, a sophisticated multistage malware, has emerged as a significant threat to both individuals and businesses by targeting sensitive login credentials. This malware campaign is characterized...
New Malware Targets Android Users by Abusing Cross-Platform Framework for Evasion
2025-03-25 17:31:33
A recent discovery by the McAfee Mobile Research Team has highlighted a new wave of Android malware campaigns that utilize the .NET MAUI cross-platform framework to evade detection. This framework, introduced...
VMware Tools for Windows Vulnerability Let Attackers Bypass Authentication
2025-03-25 17:26:33
VMware addressed a significant authentication bypass vulnerability in its VMware Tools for Windows suite. The vulnerability, CVE-2025-22230, could allow malicious actors with non-administrative privileges...
Accused Snowflake Attacker 'Judische' Agrees to US Extradition
2025-03-25 17:05:36
Though there is no confirmation as to when this extradition will occur, Alexander Moucka agreed to be transferred in writing before a judge.
Hackers Exploit Windows MMC Zero-Day Vulnerability to Execute Malicious Code
2025-03-25 17:00:07
A sophisticated campaign by Russian threat actors exploiting a critical zero-day vulnerability in the Microsoft Management Console (MMC). The vulnerability, CVE-2025-26633, allows attackers to bypass...
EncryptHub linked to MMC zero-day attacks on Windows systems
2025-03-25 16:51:32
A threat actor known as EncryptHub has been linked to Windows zero-day attacks exploiting a Microsoft Management Console vulnerability patched this month. [...]
One-Click Account Hijacking on TikTok
2025-03-25 16:50:39
Free Article LInkContinue reading on InfoSec Write-ups »
BlueSky InfoSec News List
2025-03-25 16:38:13
Hello all, happy Tuesday. I’ve migrated my cybersecurity news feed list to BlueSky and it can now be found here: https://web-cdn.bsky.app/profile/hacks4pancakes.com/lists/3ll6ownhbuz2o I hope you...
Hackers Are Using Microsoft's .NET MAUI to Spread Android Malware
2025-03-25 16:28:43
McAfee Labs reveals new Android malware exploiting .NET MAUI to steal user data. Learn about advanced evasion techniques and how to stay protected.
Multiple vulnerabilities in Ingress NGINX Controller for Kubernetes
2025-03-25 16:10:50
On March 24, 2025, Kubernetes disclosed 5 new vulnerabilities affecting the Ingress NGINX Controller for Kubernetes. Successful exploitation could allow attackers access to all secrets stored across all...
Active Roles Wins 2025 Cybersecurity Excellence Award for Hybrid Active Directory Protection
2025-03-25 15:27:18
Alisa Viejo, United States, 25th March 2025, CyberNewsWire
CYREBRO Recognized in Gartner Emerging Tech Report for Detection and Response Startups
2025-03-25 12:54:50
Ramat Gan, Israel, 25th March 2025, CyberNewsWire
ARMO Launches First Cloud App Detection and Response to Unify Code to Cloud Runtime Security
2025-03-25 16:06:48
Tel Aviv, Israel, March 25th, 2025, CyberNewsWire ARMO CADR minimizes the cloud attack surface, detects and responds to unknown and known cyberattacks while ensuring business continuity, combining the...
Browser-in-the-Browser attacks target CS2 players' Steam accounts
2025-03-25 15:52:09
A new phishing campaign targets Counter-Strike 2 players utilizing Browser-in-the-Browser (BitB) attacks that display a realistic window that mimics Steam's login page. [...]
Cyberattaque contre Harvest : ‘importance de l'évaluation des risques Tiers des groupes financiers
2025-03-25 15:47:35
La cyber-attaque contre Harvest, fournisseur de logiciels dédiés aux métiers du patrimoine et de la finance, prend de l'ampleur. La MAIF et le groupe Banque populaire-Caisse d'Épargne (BPCE) ont...
Les pirates évaluent une faille dans Smart Licensing Utility de Cisco
2025-03-25 15:38:29
Pour les entreprises qui n’auraient pas corriger l’outil Smart Licensing Utility de Cisco (CSLU), il est urgent de le faire, souligne l’organisme (...)
France Travail adosse son chatbot GenAI aussi sur le cloud
2025-03-25 15:35:58
Avec deux datacenters en propre, à Montpellier et Orléans, France Travail mise avant tout sur une stratégie on-premise. « D'autant (...)
Hackers Deliver Malware via Browser Extensions & Legitimate Tools to Bypass Security Controls
2025-03-25 15:30:04
A new wave of cyberattacks leveraging browser extensions and trusted system tools has emerged as a critical threat to enterprise security. Over the past six months, threat actors have refined techniques...
Houthi PC small group : Le jour où la Maison-Blanche a dévoilé ses plans de guerre sur Signal
2025-03-25 15:22:20
Le 15 mars, le monde a appris que les États-Unis bombardaient des cibles houthies au Yémen. Mais un journaliste savait déjà tout deux heures avant la première frappe. Ils avaient été invités,...
Notable vulnerabilities in Next.js (CVE-2025-29927) and CrushFTP
2025-03-25 15:12:56
Rapid7 is warning customers of two notable vulnerabilities affecting Next.js (CVE-2025-29927) and file transfer software CrushFTP (no CVE).
Malicious AI Tools Spike 200% and Discussions on Jailbreaking Legitimate ChatGPT Grow by 52%
2025-03-25 15:07:31
The cybersecurity landscape is witnessing an alarming rise in malicious artificial intelligence (AI) applications, with research reporting a 200% surge in the development and deployment of such tools....
Navigating NIS2 Compliance: Elevating Cyber Resilience Through Network Visibility
2025-03-25 15:00:02
As cyber threats continue to surge, businesses face growing pressure to fortify their defences and ensure operational continuity. Regulatory frameworks like the Network and Information Systems Directive...
Data Connect announces vSOC Assure to streamline cyber risk assessments and increase cyber resilience
2025-03-25 14:57:52
Data Connect, a leading cyber security services provider underpinned by elite cyber practitioners and technology, today announced the launch of vSOC Assure. The platform has been developed in response...
Les rencontres du numérique de l'Ouest de retour en avril à Angers
2025-03-25 14:52:17
Depuis leur lancement en 2019 sous le nom de ProSolutions SI, les rencontres du numérique de l’Ouest, pilotées par l'association ADN (...)
248,000 Mobile Users Infected by Banking Malware With Social Engineering Techniques
2025-03-25 14:45:04
Mobile banking malware has seen an alarming surge in 2024, with nearly 248,000 users encountering these dangerous threats—a staggering 3.6 times increase compared to the 69,000 users affected in 2023....
How Toxic Are Tankies Compared to Other Far-Left Groups?
2025-03-25 14:39:22
Tankies exhibit higher toxicity than other far-left communities, especially in identity attacks and threats. They frequently use profane language, target political figures, and express hostility toward...
How Do Tankies Speak? A Misalignment Analysis
2025-03-25 14:39:21
Tankies' language diverges significantly from other far-left communities. They exhibit stronger alignment with CCP narratives, Stalinism, Russian perspectives on Ukraine, and anti-Zionism. They also favor...
Who Are Tankies Talking About?
2025-03-25 14:38:57
Tankies prioritize discussions on state-level political events (e.g., Uyghur genocide, North Korea, Russian invasion of Ukraine) over social issues (e.g., police, climate change, healthcare). Using BERTopic...
What Do Tankies Talk About?
2025-03-25 14:38:52
Tankies prioritize discussions on state-level political events (e.g., Uyghur genocide, North Korea, Russian invasion of Ukraine) over social issues (e.g., police, climate change, healthcare). Using BERTopic...
Tracking the Rise of Tankies on Reddit
2025-03-25 14:38:49
The study tracks user migration between tankies and other far-left communities on Reddit using MRD and MRS metrics. While the proportional inflow from established subreddits declines over time, tankies...
Mapping Left-Wing Extremism on Reddit
2025-03-25 14:38:41
To study left-wing extremism online, we identify tankie subreddits and analyze their connections within Reddit's broader political landscape. Using network analysis and data from the Pushshift API,...
Mapping the Digital Landscape of Far-Left Ideologies
2025-03-25 14:38:30
This section explores the digital clustering of far-left communities, focusing on tankies. Using network analysis, we examine how ideological subreddits group together and how users migrate between them....
How Social Media Fuels Political Extremism on Both Sides
2025-03-25 14:38:15
The internet has transformed political discourse, enabling extremist communities to flourish. While research has primarily focused on right-wing radicalization, left-wing extremism—particularly the...
Tankies, Trolls, and the Trouble With Left-Wing Extremists on Social Media
2025-03-25 14:38:07
This research presents the first large-scale study of the far-left on social media, with a focus on the tankie community. Using 1.3M posts from 53K authors, we analyze their position within the broader...
USN-7371-1: FreeRDP vulnerabilities
2025-03-25 14:29:16
Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory
operations. If a user were tricked into connecting to a malicious server, a
remote attacker could possibly use this issue to cause...
Adaptive Ascension: LLMs, Efficiency, and Query Complexity
2025-03-25 14:14:24
This paper presents Adaptive-RAG experiments that reveal improved QA accuracy, efficient query handling, and effective complexity classification.
RAGged Edge: LLMs on a Retrieval Rollercoaster
2025-03-25 14:04:21
This paper is presented on adaptive retrieval-augmented LLM models evaluated against various baselines using comprehensive metrics and detailed implementation.
5 Considerations for a Data Loss Prevention Rollout
2025-03-25 14:00:00
Strong DLP can be a game-changer — but it can also become a slow-moving, overcomplicated mess if not executed properly.
Microsoft Announces New Enhanced Protection Against AI & BYOD for Edge Business Users
2025-03-25 13:59:13
Microsoft has unveiled significant new data protection capabilities for its Edge for Business browser, specifically targeting the challenges posed by Bring Your Own Device (BYOD) environments and the...
Query Quirks: AI's Witty Way of Sorting Brain Teasers
2025-03-25 13:55:26
This paper is presented on an adaptive retrieval-augmented LLM framework that adjusts query handling based on assessed complexity.
Researchers Compared Malware Development in Rust vs C & C++ Languages
2025-03-25 13:53:41
In recent years, malware authors have increasingly turned to emerging programming languages like Rust, Nim, and Go for their nefarious creations. This shift represents a tactical evolution as threat actors...
New Android malware uses Microsoft's .NET MAUI to evade detection
2025-03-25 13:52:53
New Android malware campaigns use Microsoft's cross-platform framework .NET MAUI while disguising as legitimate services to evade detection. [...]
Troy Hunt's Mailchimp List - 16,627 breached accounts
2025-03-25 13:45:48
In March 2025, a phishing attack successfully gained access to Troy Hunt's Mailchimp account and automatically exported a list of people who had subscribed to the newsletter for his personal blog. The...
Unpacking Disinformation in the 2024 US Presidential Election
2025-03-25 13:00:36
The 2016 U.S. presidential election is often cited as a watershed moment for digital disinformation campaigns – revealing the vulnerability of democratic processes to foreign interference and the spread...
Most Ransomware Victims Who Pay Up Don't Get Their Data Back
2025-03-25 12:36:05
This week in cybersecurity from the editors at Cybercrime Magazine –Read the full story in SC Media Sausalito, Calif. – Mar. 25, 2025 It's any IT professional's worst nightmare, writes Trevor...
SUSE: 2025:1002-1 important: python-gunicorn Security Advisory Updates
2025-03-25 12:30:39
* bsc#1239830 Cross-References: * CVE-2024-6827
SUSE: 2025:1003-1 important: libxslt Security Advisory Updates
2025-03-25 12:30:36
* bsc#1238591 * bsc#1239625 * bsc#1239637 Cross-References:
openSUSE: 2025:1003-1 important: libxslt Advisory Security Update
2025-03-25 12:30:36
SUSE: 2025:1004-1 moderate: python-Jinja2 Security Advisory Updates
2025-03-25 12:30:31
* bsc#1238879 Cross-References: * CVE-2025-27516
SUSE: 2025:1005-1 important: google-guest-agent Security Advisory Updates
2025-03-25 12:30:28
* bsc#1239197 Cross-References: * CVE-2025-22868
openSUSE: 2025:1005-1 important: google-guest-agent Advisory Security Update
2025-03-25 12:30:28
Microsoft's Hornet: Securing the Linux Kernel with eBPF Verification
2025-03-25 12:21:43
In a significant move towards boosting the security of the Linux kernel, Microsoft has introduced Hornet, a new Linux security module (LSM) designed to provide signature verification for eBPF (extended...
Meet the Low-Key Access Broker Supercharging Russian State Cybercrime
2025-03-25 12:00:00
Raspberry Robin breaks into organizations and sells access to Russian threat actors, including the military cyber unit behind attempted coups, assassinations, and influence operations throughout Europe....
Medusa Ransomware Disables Anti-Malware Tools with Stolen Certificates
2025-03-25 11:56:24
Cybercriminals exploit AbyssWorker driver to disable EDR systems, deploying MEDUSA ransomware with revoked certificates for stealthy attacks.
Des puces AMD spécifiques pour les workstations Z de HP
2025-03-25 11:38:24
2025 est une année particulière pour les fournisseurs de PC : elle signe en effet la fin de vie de Windows 10 enterrant avec lui de nombreux (...)
Faille Telegram : jusqu'à 4 millions de dollars offerts pour une faille zero-day
2025-03-25 11:04:55
Faille Telegram : jusqu'à 4 millions de dollars pour une chaîne d'exploits complète permettant de compromettre à la fois un compte Telegram et le système d'exploitation de l'appareil cible....
Oops! Google accidentally deletes some users’ Maps Timeline data
2025-03-25 10:43:54
Google has admitted it accidentally deleted some Maps Timeline user data after what it calls a "technical issue".
Sécurité Cloud-native : quelles solutions techniques pour répondre aux défis opérationnels et réglementaires ?
2025-03-25 10:30:11
Les environnements Cloud-natifs offrent une agilité sans précédent, mais ils sont aussi la cible privilégiée des cyberattaques. Avec des délais de notification d'incidents de 24-72 heures (Directive...
Snowflake : un Canadien extradé vers les États-Unis pour une série de cyberattaques
2025-03-25 10:28:30
Un Canadien extradé vers les États-Unis pour une série d'attaques informatiques contre 165 clients de Snowflake. Le ver était dans l'info stealer ! ...
Astral Foods, South Africa's largest poultry producer, lost over M due to a cyberattack
2025-03-25 10:14:39
Astral Foods, South Africa's largest poultry producer, lost over M due to a cyberattack disrupting deliveries and impacting operations. Astral Foods is a South African integrated poultry producer...
Un piratage génétique embarrassant pour le Kremlin
2025-03-25 10:09:37
Les révélations récentes issues du piratage de l'ordinateur du cousin du président russe Vladimir Poutine, secouent le Kremlin et soulèvent des questions sur la génétique, la confidentialité et...
Comment bien sécuriser votre smartphone ?
2025-03-25 09:33:07
Comment bien sécuriser son téléphone portable. Des trucs et astuces qu'il est bon de rappeler....
Un ex-entraîneur de football américain accusé de piratage massif de données universitaires
2025-03-25 09:27:46
Un ancien entraîneur inculpé pour avoir piraté les bases de données d'athlètes de plus de 100 établissements universitaires, accédant ainsi aux informations médicales d'environ 150 000 personnes.......
23andMe Bankruptcy Filing May Put Sensitive Data at Risk
2025-03-25 09:16:09
Security experts worry the company's Chapter 11 status and aim to sell its assets could allow threat actors to exploit and misuse the genetic information it collected.
Joffrey Célestin-Urbain devient président du Campus Cyber
2025-03-25 08:57:02
Après la démission de Michel Van Den Berghe de la présidence du Campus Cyber, le lieu totem de la cybersécurité en France (...)
Une faille 0-Click dans WhatsApp exploitée pour installer le logiciel espion Graphite
2025-03-25 08:49:41
Une faille critique dans WhatsApp a récemment été corrigée par les développeurs de l'application. Cette vulnérabilité, de type 0-Click, a permis à des cybercriminels d'installer à distance un...
La Russie renforce la pression sur Google : 47 applications VPN menacées de suppression
2025-03-25 08:15:45
Depuis une semaine, Roskomnadzor, l'organisme russe de surveillance des communications, a intensifié sa campagne contre les services VPN en Russie....
A cyberattack hits Ukraine's national railway operator Ukrzaliznytsia
2025-03-25 08:10:02
A cyberattack on Ukraine's national railway operator Ukrzaliznytsia disrupted online ticket services, causing long lines at Kyiv's station. The Record Media first reported the news of a cyber attack...
Financial cyberthreats in 2024
2025-03-25 08:00:33
The Kaspersky financial threat report for 2024 contains the main trends and statistics on financial phishing and scams, mobile and PC banking malware, as well as recommendations on how to protect yourself...
Oracle Cloud visé par une attaque revendiquée : un pirate affirme avoir volé 6 millions d'enregistrements
2025-03-25 07:58:04
Un hacker prétend avoir compromis les serveurs SSO d'Oracle Cloud, volant 6 millions d'enregistrements, incluant mots de passe chiffrés et fichiers JKS. Oracle conteste l'attaque, affirmant qu'aucun...
Des convertisseurs en ligne piégés volent des données personnelles
2025-03-25 07:38:27
Des faux convertisseurs de documents en ligne sont utilisés par des cybercriminels pour voler des informations personnelles et installer des logiciels malveillants. Une menace qui cible les utilisateurs...
I Reviewed 50 API Vulnerabilities — They All Shared This One Flaw
2025-03-25 06:22:31
Continue reading on InfoSec Write-ups »
Quantum Computing's Dark Side: What Every Cybersecurity Pro Must Know Before It's Too Late!
2025-03-25 06:20:12
“It’s 3 A.M., and your encrypted data vault is suddenly wide open.” In a not-so-distant future scenario, a bank’s security team watches in…Continue reading on InfoSec...
TCS HackQuest Season 9
2025-03-25 06:19:52
How I got the Offer & My experience with the selection processCredits: TCS Hackquest CompetitionMy experience with TCS HackQuest competitionTCS Hackquest is a CTF event organized by Tata Consultancy...
New to Proxmox? Here's Why Most Users Are Just Turning Off Secure Boot
2025-03-25 06:18:09
If you’re setting up Proxmox for the first time and wondering what the heck “Secure Boot” is — and more importantly, whether you need it —…Continue...
Unveiled the Threat Actors
2025-03-25 06:17:42
In this blog, we will discuss some of the famous threat actors and learn about their famous hacks, techniques, and other required details on how they performed those big hacks.First, we have to know...
Why Your ‘Unhackable' Linux System is Still Vulnerable (And How to Fix It in 20 Minutes)
2025-03-25 06:17:26
The Myth of InvincibilityContinue reading on InfoSec Write-ups »
Apache Tomcat/VMware - CVE-2024-38286
2025-03-25 04:08:41
Un défaut de contrôle de la mémoire dans le processus d'authentification TLS d'Apache Tomcat permet à un attaquant, en envoyant des requêtes spécifiquement forgées, de provoquer un...
D-Link - CVE-2025-2620
2025-03-25 04:08:25
Un défaut de gestion de la mémoire dans certains répéteurs Wifi D-Link DAP-1620 permet à un attaquant, en envoyant des requêtes spécifiquement forgées, d'exécuter du code...
NetApp - CVE-2025-26512
2025-03-25 04:08:03
Un défaut non spécifié dans le plugin SnapCenter de NetApp permet à un attaquant authentifié d'élever ses privilèges afin d'obtenir les droits administrateur.
Microsoft - CVE-2025-29795
2025-03-25 04:07:21
Un défaut de contrôle de liens dans Microsoft Edge permet à un attaquant authentifié, d'élever ses privilèges.
Dell - CVE-2025-26336
2025-03-25 04:07:10
Un défaut de gestion de la mémoire dans le firmware du Chassis Management Controller de Dell permet à un attaquant non authentifié, en envoyant des requêtes spécifiquement forgées...
USN-7370-1: SmartDNS vulnerabilities
2025-03-25 02:06:39
It was discovered that SmartDNS did not correctly align certain objects in
memory, leading to undefined behaviour. An attacker could possibly use this
issue to cause a denial of service or execute arbitrary...
Staying Safe with In-Game Skins: How to Avoid Scams and Malware
2025-03-25 01:20:18
In-game skins are more than just cosmetic upgrades, they're a core part of gaming culture. Whether you're looking…
List of 17 new domains
2025-03-25 00:00:00
.fr cooperative-u-enseigne[.fr] (registrar: Hostinger operations UAB)
czrglass[.fr] (registrar: Hostinger operations UAB)
destockx[.fr] (registrar: EPAG Domainservices GmbH)
dossier-assistance[.fr] (registrar:...
Multiples vulnérabilités dans Laravel (25 mars 2025)
25/03/2025
De multiples vulnérabilités ont été découvertes dans Laravel. Elles permettent à un attaquant de provoquer une injection de code indirecte à distance (XSS).
Multiples vulnérabilités dans Microsoft Azure Kubernetes Service (25 mars 2025)
25/03/2025
De multiples vulnérabilités ont été découvertes dans Microsoft Azure Kubernetes Service. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte...