Toute l'actualité de la Cybersécurité


Microsoft: Hackers abuse OAuth error flows to spread malware

2026-03-03 20:59:19
Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take users to malicious pages. [...]

Lire la suite »

Vehicle Tire Pressure Sensors Enable Silent Tracking

2026-03-03 20:53:39
Like many other features and systems in modern cars, tire pressure sensors leak sensitive data that can be abused by threat actors.

Lire la suite »

Qualcomm Zero-Day Exploited in Targeted Android Attacks

2026-03-03 20:28:05
The exploitation activity against CVE-2026-21385, a high-severity memory corruption flaw, could be tied to commercial spyware or nation-state threat groups.

Lire la suite »

USN-8062-2: curl vulnerabilities

2026-03-03 18:42:11
USN-8062-1 fixed vulnerabilities in curl. This update provides the corresponding update for CVE-2025-14017, CVE-2025-15079, and CVE-2025-15224 for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS,...

Lire la suite »

Ariomex, Iran-based crypto exchange, suffers data leak

2026-03-03 18:40:08
Resecurity says Iran's Ariomex crypto exchange suffered a data leak exposing user and transaction data from 2022 to 2025. Resecurity (USA) reports that Ariomex’s database, one of Iran’s...

Lire la suite »

Fake Zoom and Google Meet Pages Trick Users Into Installing Monitoring Tool

2026-03-03 18:39:44
Fake Zoom and Google Meet pages trick users into installing a monitoring software on Windows systems through phishing links and fake updates.

Lire la suite »

SloppyLemming Espionage Campaign Uses BurrowShell Backdoor and Rust RAT to Hit Pakistan and Bangladesh Targets

2026-03-03 18:38:48
A suspected India-aligned threat group known as SloppyLemming has been conducting a sustained espionage campaign against government agencies, defense organizations, nuclear oversight bodies, and critical...

Lire la suite »

Malvertising Threat Actor ‘D‑Shortiez' Abuses WebKit Back‑Button Hijack in Forced‑Redirect Browser Campaign

2026-03-03 18:21:53
A threat actor tracked as D-Shortiez has been running a persistent malvertising campaign that turns a WebKit browser behavior into a trap, forcing iOS Safari users into scam pages with no easy way out....

Lire la suite »

LexisNexis Data Breach — Threat Actor Allegedly Claims 2.04 GB Stolen

2026-03-03 17:55:21
A threat actor operating under the alias FulcrumSec has publicly claimed responsibility for a fresh breach of LexisNexis Legal & Professional, the legal information division of RELX Group, alleging...

Lire la suite »

Microsoft Warns of New Phishing Attack Exploiting OAuth in Entra ID to Evade Detection

2026-03-03 17:42:28
A new active phishing attack that exploits OAuth’s legitimate redirection behavior, allowing it to bypass traditional email and browser defenses without stealing any tokens. According to Microsoft...

Lire la suite »

Speakeasies to Shadow AI: Banning AI Browsers Will Fail

2026-03-03 17:40:21
Lessons from history highlight why AI-enabled browsers require controlled enablement.

Lire la suite »

USN-7990-6: Linux kernel (Raspberry Pi) vulnerabilities

2026-03-03 17:23:23
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Cryptographic API; ...

Lire la suite »

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

2026-03-03 17:15:00
Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration...

Lire la suite »

Zerobot Malware Exploiting Tenda Command Injection Vulnerabilities to Deploy Malware

2026-03-03 17:07:18
A Mirai-based botnet campaign known as Zerobot has resurfaced with renewed force, this time targeting critical flaws in Tenda AC1206 routers and the n8n workflow automation platform. The campaign, now...

Lire la suite »

Google Chrome shifts to two-week release cycle for increased stability

2026-03-03 17:00:00
Google Chrome will shift from a four-week to a two-week release cycle to roll out new features, bug fixes, and performance improvements more frequently. [...]

Lire la suite »

Yuki CEO on Data Cost Optimization: Why Your Snowflake and BigQuery Bill Is 40% & Rising Due to AI

2026-03-03 16:58:50
Enterprises routinely overspend 40-60% on Snowflake, BigQuery, and Databricks due to over-provisioned warehouses and manual tuning. Yuki founder Ido Arieli Noga breaks down the root causes behind runaway...

Lire la suite »

Archipelo and Checkmarx Announce Partnership Connecting AppSec Detection with DevSPM

2026-03-03 14:00:18
San Francisco, CA, United States, 3rd March 2026, CyberNewswire

Lire la suite »

The Easiest Way to Add a Digital Signature to a PDF

2026-03-03 16:38:21
Adding a digital signature to a PDF is fast and secure with tools like Adobe Acrobat Reader, Lumin, or mobile apps. This guide explains the difference between digital and electronic signatures, shows...

Lire la suite »

New ‘StegaBin' Campaign Uses Malicious 26 npm Packages to Deploy Multi-Stage Credential Stealer

2026-03-03 16:28:28
A new software supply-chain attack is abusing the npm ecosystem today, where a single mistaken dependency can quietly open a door into a developer's machine. The activity, tracked as “StegaBin,”...

Lire la suite »

Meet Vera Report, The App That Lets You Whistleblow Anonymously From a Smartphone Using Telegram

2026-03-03 16:20:06
AlphaTON Capital and the Midnight Foundation launched Vera Report, a Telegram-based anonymous whistleblowing app built on privacy-preserving blockchain tech. Using zero-knowledge proofs, confidential...

Lire la suite »

When Everything Looks Perfect, Nothing Feels Real

2026-03-03 16:08:39
When perfection is automated, authenticity becomes the only scarce resource. Why AI tools must learn to restore content without replacing its soul.

Lire la suite »

Pentagon ditches Anthropic AI over “security risk” and OpenAI takes over

2026-03-03 16:05:58
At the center of the dispute is how far AI models should be allowed to go inside military systems.

Lire la suite »

How an Autonomous Competitor Will Hollow Out Your Company in a Weekend

2026-03-03 16:05:32
The companies that achieve organizational autonomy first will have a nuclear advantage over their competitors. They will be able to identify your customers, engineer a frictionless one-click migration...

Lire la suite »

How We Cut ,400 Annually by Replacing Managed OTA With Self-Hosted Xavia OTA on Kubernetes

2026-03-03 16:04:16
Faced with scaling OTA updates for a mobile app serving nearly 200,000 users, we rejected a managed service and built a custom Expo-compatible OTA server on Kubernetes. The decision saved ,400 upfront...

Lire la suite »

The HackerNoon Newsletter: Make A Choice, Tiger (3/3/2026)

2026-03-03 16:02:30
How are you, hacker? 🪐 What's happening in tech today, March 3, 2026? The HackerNoon Newsletter brings the HackerNoon ...

Lire la suite »

Why Adaptive Risk Management Needs a Human Touch

2026-03-03 16:00:32
The time to exploit a new vulnerability has dropped from 63 days to 5. Here is why fully automated risk management isn't the solution.

Lire la suite »

Digital Accessibility Moves From Compliance to Competitive Edge, Industry Surveys Show

2026-03-03 15:58:53
Inclusive design helps people complete tasks, lowers the chances they give up, and builds long-term trust. As more fields go digital - especially education, healthcare, and government - accessibility...

Lire la suite »

It's Not Kubernetes. It Never Was.

2026-03-03 15:56:05
Kubernetes didn't make systems complex — organizational scale did. As companies expand across teams, regions, and clouds, infrastructure complexity naturally increases, and Kubernetes simply absorbs...

Lire la suite »

The Top Exposure Assessment Platforms (EAPs) to Watch in 2026

2026-03-03 15:48:13
Exposure management has replaced old‑school “scan‑and‑patch” techniques.   Now, the money is in unified visibility, context, and mobilization; not siloed CVEs that don't reflect the priorities...

Lire la suite »

Why Apple and Google Protect Your Wallet Differently

2026-03-03 15:48:11
Discover the technical differences between Apple Pay and Google Pay security. Learn how Device Account Numbers and cloud tokenization protect your money.

Lire la suite »

How to Use AI Coding Agents Effectively

2026-03-03 15:45:00
Today's top coding models, including GPT-5 Codex and Claude Sonnet 4.5, can rival junior engineers — but only when tightly orchestrated. Success depends less on raw model power and more on disciplined...

Lire la suite »

Oracle EBS 2025 campaign impacts Madison Square Garden, sensitive data leaked

2026-03-03 15:42:56
Madison Square Garden confirmed a data breach tied to the 2025 Oracle E-Business Suite hacking campaign. Madison Square Garden (MSG) has confirmed it was affected by a data breach linked to the 2025 cybercrime...

Lire la suite »

LexisNexis confirms data breach as hackers leak stolen files

2026-03-03 15:40:48
American data analytics company LexisNexis Legal & Professional has confirmed to BleepingComputer that hackers breached its servers and accessed some customer and business information. [...]

Lire la suite »

L'équipe du GReAT de Kaspersky découvre une vulnérabilité d'injection de commande dans ExifTool affectant les utilisateurs macOS

2026-03-03 15:21:11
Une faille dans un outil de métadonnées open source très utilisé permet l’exécution de code arbitraire via des fichiers image piégé. Un correctif est disponible. Tribune – L’équipe...

Lire la suite »

Codage IA : les langages les plus frugaux en tokens

2026-03-03 15:11:16
Une analyse sur de petites tâches (100-200 tokens) donne l'avantage aux langages dynamiques, aux fonctionnels... et aux orientés tableaux. The post Codage IA : les langages les plus frugaux en tokens...

Lire la suite »

Compromised Site Management Panels are a Hot Item in Cybercrime Markets

2026-03-03 15:01:11
Compromised cPanel credentials are being sold in bulk across underground channels as plug-and-play phishing and scam infrastructure. Flare explains how analyzing 200,000 underground posts reveals a commoditized...

Lire la suite »

The Evolution of OSS Index in the Age of AI

2026-03-03 15:00:03
In the past 12 months, enterprise software development has changed faster than at any other point in our lifetime.

Lire la suite »

Proofpoint Launches AI-Enabled Discovery & Archive Suite for Small to Medium Businesses

2026-03-03 14:56:03

Lire la suite »

Hackers Leverage Telegram for Initial Access to Corporate VPN, RDP, and Cloud Environments

2026-03-03 14:40:09
Telegram, once widely recognized as a privacy-focused messaging application, has quietly transformed into one of the most powerful operational platforms used by cybercriminals today. What dark web forums...

Lire la suite »

{ Tribune Expert } – La reconversion est l'infrastructure oubliée de la souveraineté technologique

2026-03-03 14:33:53
Il n'y aura pas de souveraineté technologique durable sans une capacité collective à faire évoluer massivement les trajectoires professionnelles vers les métiers qui structurent ces transitions. The...

Lire la suite »

Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

2026-03-03 14:30:00
Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time are the people with the least experience. Tier 1 analysts...

Lire la suite »

Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries

2026-03-03 14:29:00
The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called...

Lire la suite »

Hackers Abuse .arpa Top-Level Domain to Host Phishing Scams

2026-03-03 14:23:54
Hackers abuse the .arpa Top-Level Domain to host phishing scams, using IPv6 tunnels, reverse DNS tricks, and shadow domains to bypass security checks.

Lire la suite »

Mathias Michiels nommé Country Manager de Cohesity France

2026-03-03 14:18:47
Cohesity France mise sur un profil senior, passé par Oracle, SAS et VMware, pour accélérer son développement en France à un moment qu'il décrit lui-même comme un "point de bascule". The post Mathias...

Lire la suite »

USN-8068-1: Intel Microcode vulnerability

2026-03-03 14:03:20
Sergiu Ghetie discovered that some Intel® processors did not properly handle values in the microcode flow. A local authenticated user could potentially use this issue to escalate their privileges.

Lire la suite »

Observabilité native : la nouvelle frontière du Cloud et du DevOps

2026-03-03 14:00:18
De l'eBPF au Serverless, l'observabilité s'affranchit des agents pour s'intégrer nativement au cœur des infrastructures modernes. Cette approche « as-Code » automatise la visibilité et la performance,...

Lire la suite »

Cybersécurité : le manque de diversité des équipes, une vulnérabilité critique à combler

2026-03-03 13:58:27
Chaque semaine semble apporter son lot de nouvelles concernant un nouveau vecteur d’attaque, une campagne sophistiquée soutenue par un État ou un ransomware paralysant, le tout amplifié par la...

Lire la suite »

Le vol de cartes SIM IoT en France : un risque de cybersécurité sous-estimé (et les pistes pour s'en prémunir)

2026-03-03 13:55:54
Ces derniers mois, plusieurs opérations menées en Europe, dont le démantèlement en Espagne d'une infrastructure de « SIM farm » capable d'émettre jusqu'à 2,5 millions de SMS par jour,...

Lire la suite »

Santé : les données réglementées au cœur de la majorité des fuites dans le cloud et l'IA générative

2026-03-03 13:52:21
Les chercheurs du Threat Labs de Netskope ont analysé les principales cybermenaces qui ont touché les organismes de santé et leurs employés au cours des treize derniers mois et viennent de publier...

Lire la suite »

Le syndrome de l'imposteur gagne les salariés utilisant l'IA

2026-03-03 13:52:11
Alors que l'intelligence artificielle se répand dans les usages au travail, une étude réalisée par l’institut OpinionWay (...)

Lire la suite »

HTCT 2026 : Compromission de la chaîne d'approvisionnement et exposition croissante de l'écosystème numérique français

2026-03-03 13:45:57
Rapport 2026 de Group-IB sur les tendances en matière de criminalité high-tech : les attaques contre la chaîne d’approvisionnement apparaissent comme la principale cybermenace mondiale. Tribune....

Lire la suite »

Epic Fury/Roaring Lion Sparks Escalating Cyber Conflict as Iran Goes Offline, Hacktivists Step Up Retaliation

2026-03-03 13:39:15
On February 28, 2026, the United States and Israel launched a coordinated offensive — code-named Operation Epic Fury by the U.S. and Operation Roaring Lion by Israel — setting off a wide-ranging cyber...

Lire la suite »

Hollywood's Ethical Hacker On The Cybercrime Magazine Podcast

2026-03-03 13:38:14
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 3, 2026 – Listen to the podcast Ralph Echemendia is a world-renowned cybersecurity expert, known internationally...

Lire la suite »

Project Compass Targets 764 Network as 30 Arrested and Victims Rescued

2026-03-03 13:02:32
Europol's Project Compass targets The Com (aka 764 network), an online group exploiting minors. After 30 arrests, officials say the hunt for those involved is far from over.

Lire la suite »

Talion Expands Governance-Aligned Agentic SOC as Board Cyber Scrutiny Intensifies

2026-03-03 13:01:51
Talion, a leading Managed Security Service Provider (MSSP) forged out of BAE Systems, today announced that under the new leadership of CEO, Keven Knight, it has expanded its governance-aligned Agentic...

Lire la suite »

How to Cut MTTR by Improving Threat Visibility in Your SOC

2026-03-03 12:58:23
In boardrooms and security operations centers alike, one metric has risen from a niche KPI to a defining measure of organizational resilience: Mean Time to Respond (MTTR). But why has this particular...

Lire la suite »

AI Agent Overload: How to Solve the Workload Identity Crisis

2026-03-03 12:57:19
Workloads keep getting more complicated and organizations are struggling to keep up. So what's the play?

Lire la suite »

SUSE Micro 6.0 CUPS Vital Updates Prevent Denial of Service Auth Bypass

2026-03-03 12:31:02
An update that solves four vulnerabilities, contains two features and has one fix can now be installed.

Lire la suite »

SUSE Linux Micro 6.0 libsoup Important Denial of Service Fix 2026-20529-1

2026-03-03 12:30:50
An update that solves five vulnerabilities can now be installed.

Lire la suite »

AMD et Nutanix s'allient autour de l'IA d'entreprise

2026-03-03 12:25:31
AMD investit jusqu'à 250 millions $ dans un partenariat avec Nutanix pour co-développer une plateforme d'IA agentique open-source, positionnée comme alternative aux stacks fermés dominés par Nvidia. The...

Lire la suite »

Surviving Ransomware: Best practices to safeguard your business

2026-03-03 12:23:16
By Robbie Ross, cyber security lead, Converged Communication Solutions It's not if but when. This is a phrase that has been echoed across the cyber security industry for several years, but when it comes...

Lire la suite »

Chrome flaw let extensions hijack Gemini's camera, mic, and file access

2026-03-03 12:10:19
Researchers found a now-patched vulnerability in "Live in Chrome" that allowed a Chrome extension to inherit Gemini's permissions.

Lire la suite »

Phishing campaign exploits OAuth redirection to bypass defenses

2026-03-03 11:50:55
Microsoft researchers warn that threat actors abuse OAuth redirects to target government users and deliver malware. Microsoft has warned of phishing campaigns targeting government and public-sector organizations...

Lire la suite »

Amazon: Drone strikes damaged AWS data centers in Middle East

2026-03-03 11:44:44
Amazon has confirmed that three Amazon Web Services (AWS) data centers in the United Arab Emirates (UAE) and one in Bahrain have been damaged by drone strikes, causing an extensive outage that is still...

Lire la suite »

As War Continues, Pro-Iranian Actors Launch Barrage of Cyberattacks

2026-03-03 11:30:31
Iran and its supporters have taken to cyberspace to retaliate for US-Israeli military action, with an aim to cause economic and physical disruption.

Lire la suite »

AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged

2026-03-03 11:30:00
The Rise of MCPs in the Enterprise The Model Context Protocol (MCP) is quickly becoming a practical way to push LLMs from “chat” into real work. By providing structured access to applications, APIs,...

Lire la suite »

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

2026-03-03 11:10:00
Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections. It's advertised...

Lire la suite »

Digital workplace : le cloud, lieu de conservation plus que de collaboration

2026-03-03 11:06:45
Dans les organisations françaises, la collaboration sur les fichiers apparaît nettement plus occasionnelle que leur conservation dans le cloud. The post Digital workplace : le cloud, lieu de conservation...

Lire la suite »

Fooling AI Agents: Web-Based Indirect Prompt Injection Observed in the Wild

2026-03-03 11:00:30
Uncover real-world indirect prompt injection attacks and learn how adversaries weaponize hidden web content to exploit LLMs for high-impact fraud. The post Fooling AI Agents: Web-Based Indirect Prompt...

Lire la suite »

Star Citizen game dev discloses breach affecting user data

2026-03-03 10:50:26
Cloud Imperium Games (CIG), the game developer behind Star Citizen and Squadron 42, says attackers breached systems containing some users' personal information in January. [...]

Lire la suite »

Debian DSA-6155-1 spip Important SQL Injection XSS Attack

2026-03-03 10:30:39
It was discovered that SPIP, a website engine for publishing, would allow a malicious user to access protected information, and perform various SQL injection, Cross-Side Scripting (XSS), and Server-Side...

Lire la suite »

Android devices hit by exploited Qualcomm flaw CVE-2026-21385

2026-03-03 10:03:06
Google confirms that the Qualcomm Android vulnerability CVE-2026-21385 was exploited in real-world attacks. Google has confirmed that CVE-2026-21385 (CVSS score of 7.8), a high-severity vulnerability...

Lire la suite »

UH Cancer Center data breach affects nearly 1.2 million people

2026-03-03 09:48:51
The University of Hawaii confirmed that a ransomware gang stole the data of nearly 1.2 million individuals in August 2025 after breaching its Cancer Center's Epidemiology Division. [...]

Lire la suite »

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

2026-03-03 09:20:00
Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers. The activity,...

Lire la suite »

Chrome security flaw enabled spying via Gemini Live assistant

2026-03-03 08:48:14
A Google Chrome vulnerability lets malicious extensions hijack Gemini Live to spy on users and steal sensitive files. Researchers at Palo Alto Networks found a Chrome vulnerability, tracked as CVE-2026-0628,...

Lire la suite »

Android gets patches for Qualcomm zero-day exploited in attacks

2026-03-03 08:19:53
Google has released security updates to patch 129 Android security vulnerabilities, including an actively exploited zero-day flaw in a Qualcomm display component. [...]

Lire la suite »

Delivery Hero mise sur la supervision pour baisser ses coûts

2026-03-03 08:16:48
Depuis sa création à Berlin en 2011, la jeune pousse Delivery Hero est devenue un acteur majeur de la livraison de repas et d'articles ménagers (...)

Lire la suite »

WinGet Desired State: Initial Access Established

2026-03-03 08:00:00
While not new, a self-referencing LNK file in combination with winget configuration instructions can be a viable initial access payload for environments where the Microsoft Store is not disabled.

Lire la suite »

Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited

2026-03-03 07:08:00
Google on Monday disclosed that a high-severity security flaw impacting an open-source Qualcomm component used in Android devices has been exploited in the wild. The vulnerability in question is CVE-2026-21385...

Lire la suite »

SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains

2026-03-03 06:53:00
The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh. The activity,...

Lire la suite »

Provecho - 712,904 breached accounts

2026-03-03 06:40:50
In early 2026, data purportedly sourced from the recipe and meal planning service Provecho was alleged to have been obtained in a breach. The exposed data included 713k unique email address along with...

Lire la suite »

TryHackMe CTF Walkthrough- Love at First Breach 2026: Hidden Deep into my Heart

2026-03-03 06:15:26
Difficulty: Easy | Category: WebA short but satisfying challenge that teaches one of the most overlooked recon habits in web pentesting, checking robots.txt. The flag is hiding in a place developers use...

Lire la suite »

TryHackMe CTF Walkthrough- Love at First Breach 2026: Valenfind

2026-03-03 06:13:56
Difficulty: Medium | Category: WebA step-by-step walkthrough of the Valenfind challenge , a fake dating app hiding a chain of vulnerabilities that, when followed carefully, leads to complete database...

Lire la suite »

‍♂️ Pulling Off the Heist: A Methodical HTB Takedown

2026-03-03 06:12:24
https://www.freepik.com/free-photo/hacker-breaking-into-computer-system-attacking-database-cybercrime-anonymous-woman-stealing-information-programming-online-malware-software-night-time-looking-camera_49250642.htm#fromView=keyword&page=1&position=2&uuid=f0f62f8e-b280-4e74-8ccc-0b7939560d21&query=Cyber+heistTo...

Lire la suite »

Device is Blacklisted at runtime, now what?

2026-03-03 06:11:24
Have you ever wondered how the Runtime Application self/security Protection isolates the device once it identifies the Root traces?During an Android application assessment, I encountered a runtime protection...

Lire la suite »

Zero-Infra Cloud Exploitation: Hijacking Google's Gemini via Public API Keys

2026-03-03 06:09:24
For over a decade, Google told developers it was safe to put API keys in public code. Then, AI changed the rules.If I asked you right now where you store your API keys, your first answer would probably...

Lire la suite »

I Made an AI Think It Was Root — And It Gave Me /etc/passwd

2026-03-03 06:06:52
The Prompt Injection That Pulled Me Back Into Bug Writing After 3 YearsI hadn't written a public bug bounty report in three years.Then an AI chat application casually handed me the contents of:/etc/passwdNo...

Lire la suite »

Portswigger Walkthrough Lab: Username enumeration via subtly different responses

2026-03-03 06:05:26
Authentication BypassContinue reading on InfoSec Write-ups »

Lire la suite »

THM — CupidBot

2026-03-03 06:05:09
This is an easy room. So, so very easy…Continue reading on InfoSec Write-ups »

Lire la suite »

An AI That Can Hack Things Autonomously Is Real. The Hype Around It Is Not.

2026-03-03 06:04:38
PentAGI is genuinely impressive open-source software. It also requires a human to set it up, configure three databases, provide API keys…Continue reading on InfoSec Write-ups »

Lire la suite »

Sunsetnoontide Offsec's proving ground writeup

2026-03-03 06:02:23
Sunsetnoontide Box, Proving GroundsAs Always and as I frequently explain and document in my write-ups, in every penetration testing engagement we start by information gathering.Pinging the target to...

Lire la suite »

Fedora 42 Erlang High Information Disclosure Vuln FEDORA-2026-d51972eee3

2026-03-03 01:28:26
Erlang ver. 26.2.5.17

Lire la suite »

Fedora 42 python-pillow Critical Out-of-bounds Fix CVE-2026-25990

2026-03-03 01:28:25
Backport fix for CVE-2026-25990.

Lire la suite »

Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran

2026-03-03 01:15:07
Unit 42 details recent Iranian cyberattack activity, sharing direct observations of phishing, hacktivist activity and cybercrime. We include recommendations for defenders. The post Threat Brief: March...

Lire la suite »

Fedora 43 Erlang Important Denial Of Service Fix CVE-2026-21620 Advisory

2026-03-03 01:09:29
Erlang ver. 26.2.5.17

Lire la suite »

CyberStrikeAI tool adopted by hackers for AI-powered attacks

2026-03-03 00:06:39
Researchers warn that a newly identified open-source AI security testing platform called CyberStrikeAI was used by the same threat actor behind a recent campaign that breached hundreds of Fortinet FortiGate...

Lire la suite »

List of 38 new domains

2026-03-03 00:00:00
.fr arkeadirect-b[.fr] (registrar: IONOS SE) biletjul[.fr] (registrar: One.com A/S) billetsdeconcert[.fr] (registrar: TLD Registrar Solutions Ltd) casino-coin[.fr] (registrar: INWX GmbH) casinocoinpoker[.fr]...

Lire la suite »

Multiples vulnérabilités dans Docker Desktop (03 mars 2026)

03/03/2026
De multiples vulnérabilités ont été découvertes dans Docker Desktop. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Multiples vulnérabilités dans Google Android (03 mars 2026)

03/03/2026
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation...

Lire la suite »

Multiples vulnérabilités dans les produits Microsoft (03 mars 2026)

03/03/2026
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »