Toute l'actualité de la Cybersécurité


Germany's national rail operator Deutsche Bahn hit by a DDoS attack

2026-02-19 18:45:56
Germany's national rail operator, Deutsche Bahn, suffered a major DDoS attack that disrupted booking and information systems for several hours. Germany's rail operator Deutsche Bahn was hit by a large-scale...

Lire la suite »

Why LLMs Make Terrible Databases and Why That Matters for Trusted AI

2026-02-19 18:00:53
Large language models (LLMs) are now embedded across the SDLC. They summarize documentation, generate code, explain vulnerabilities, and assist with architectural decisions.

Lire la suite »

PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence

2026-02-19 17:52:00
Cybersecurity researchers have discovered what they say is the first Android malware that abuses Gemini, Google's generative artificial intelligence (AI) chatbot, as part of its execution flow and achieves...

Lire la suite »

INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown

2026-02-19 17:50:00
An international cybercrime operation against online scams has led to 651 arrests and recovered more than .3 million as part of an effort led by law enforcement agencies from 16 African countries. The...

Lire la suite »

Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center

2026-02-19 17:40:00
Microsoft has disclosed a now-patched security flaw in Windows Admin Center that could allow an attacker to escalate their privileges. Windows Admin Center is a locally deployed, browser-based management...

Lire la suite »

CCM v4.1 Transition Timeline

2026-02-19 17:36:44
This blog was published on February 19, 2026 with the latest information regarding the release of CCM v4.1. On January 28, CSA released version 4.1 of the Cloud Controls Matrix (CCM), succeeding CCM...

Lire la suite »

Adidas Investigates Alleged Data Breach – 815,000 Records of Customer Data Stolen

2026-02-19 17:30:08
Adidas has confirmed it is actively investigating a potential data breach involving one of its independent third-party partners after a threat actor operating under the alias “LAPSUS-GROUP”...

Lire la suite »

GitHub prépare un agent IA pour la maintenance des référentiels

2026-02-19 17:20:47
Déboguer des pipelines d’intégration continue, trier et hiérarchiser les erreurs, mettre à jour une documentation obsolète (...)

Lire la suite »

Flaw in Grandstream VoIP phones allows stealthy eavesdropping

2026-02-19 17:16:32
A critical vulnerability in Grandstream GXP1600 series VoIP phones allows a remote, unauthenticated attacker to gain root privileges and silently eavesdrop on communications. [...]

Lire la suite »

Google blocked over 1.75 million Play Store app submissions in 2025

2026-02-19 17:00:00
Google says that through 2025, it blocked more than 255,000 Android apps from obtaining excessive access to sensitive user data and rejected over 1.75 million apps from being published on Google Play...

Lire la suite »

Keeping Google Play & Android app ecosystems safe in 2025

2026-02-19 17:00:00
Posted by Vijaya Kaza, VP and GM, App & Ecosystem Trust The Android ecosystem is a thriving global community built on trust, giving billions of users the confidence to download the latest apps. In...

Lire la suite »

New e-book: Establishing a proactive defense with Microsoft Security Exposure Management

2026-02-19 17:00:00
Read the new maturity-based guide that helps organizations move from fragmented, reactive security practices to a unified exposure management approach that enables proactive defense. The post New e-book: Establishing a...

Lire la suite »

OpenClaw's Top Skill is a Malware that Stole SSH Keys and Opened Reverse Shells in 1,184 Packages

2026-02-19 16:55:05
The most downloaded AI agent skill on OpenClaw’s ClawHub marketplace was functional malware, not a productivity tool. OpenClaw, an open-source AI agent platform, operates a public skill marketplace...

Lire la suite »

Running OpenClaw safely: identity, isolation, and runtime risk

2026-02-19 16:27:00
Self-hosted agents execute code with durable credentials and process untrusted input. This creates dual supply chain risk, where skills and external instructions converge in the same runtime. As OpenClaw-like...

Lire la suite »

Beyond CVE China's Dual Vulnerability Databases Reveal a Different Disclosure Timeline

2026-02-19 16:09:26
The emergence of a distinct vulnerability disclosure ecosystem within China has introduced a complex layer to the global threat landscape. Unlike the centralized CVE system used internationally, China...

Lire la suite »

The HackerNoon Newsletter: A Guide on How to Rewire Self-Doubt (2/19/2026)

2026-02-19 16:03:43
How are you, hacker? 🪐 What's happening in tech today, February 19, 2026? The HackerNoon Newsletter brings the HackerNoon ...

Lire la suite »

AI Under Control: Link11 Launches AI Management Dashboard for Clean Traffic

2026-02-19 14:00:47
Frankfurt am Main, Germany, 19th February 2026, CyberNewswire

Lire la suite »

Après son piratage, Notepad++ bétonne sa sécurité

2026-02-19 15:46:07
Piraté par des cybercriminels début février, l'éditeur de texte open source Notepad++ monte d'un cran sa sécurité. (...)

Lire la suite »

1,2 million de comptes bancaires consultés : ce que vous devez comprendre

2026-02-19 15:33:00
Un accès non autorisé au fichier national des comptes bancaires (Ficoba) a exposé les données de 1,2 million de titulaires fin janvier. Si aucune opération n'a pu être réalisée, les informations...

Lire la suite »

CISA orders feds to patch actively exploited Dell flaw within 3 days

2026-02-19 15:30:37
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered government agencies to patch their systems within three days against a maximum-severity Dell vulnerability that has been under...

Lire la suite »

Connected and Compromised: When IoT Devices Turn Into Threats

2026-02-19 15:18:23
Reused passwords, a lack of network segmentation, and poor sanitization processes make the Internet of Things' attack surfaces more dangerous.

Lire la suite »

U.S. CISA adds Dell RecoverPoint and GitLab flaws to its Known Exploited Vulnerabilities catalog

2026-02-19 15:16:39
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Dell RecoverPoint and GitLab flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security...

Lire la suite »

Selective Thread Emulation and Fuzzing Expose DoS Flaws in Socomec DIRIS M-70 IIoT Device

2026-02-19 15:06:27
Security researchers have uncovered six critical denial-of-service vulnerabilities in the Socomec DIRIS M-70 industrial gateway used for power monitoring and energy management in critical infrastructure....

Lire la suite »

How infostealers turn stolen credentials into real identities

2026-02-19 15:05:15
Infostealer dumps increasingly tie stolen credentials to real identities, linking usernames, cookies, and behavior across personal and enterprise accounts. Specops explains how analyzing 90,000 dumps...

Lire la suite »

Why Layered MAPF Algorithms Win on Speed but Lose on Optimality

2026-02-19 15:00:16
Decomposing Multi-Agent Pathfinding (MAPF) instances into layered subproblems consistently reduces runtime and memory consumption while increasing solver success rates across major algorithms, including...

Lire la suite »

I Spent Two Weeks Testing 8 Databases With the Same Question - Here's What Actually Happened

2026-02-19 15:00:09
An analytics dashboard at a company was taking 4 minutes to load. The company was spending ,000 a month on a database that was basically doing math on spreadsheets. The database we were currently using—the...

Lire la suite »

China-Linked Hackers Use Dell RecoverPoint Flaw to Drop GrimBolt Malware

2026-02-19 14:52:22
Dell warns of a critical security hole in its RecoverPoint software exploited by hackers. Learn how to protect your data from the CVE-2026-22769 vulnerability and the new GrimBolt malware.

Lire la suite »

Raspberry Pi rattrapé par la fièvre de l'IA

2026-02-19 14:49:11
Raspberry Pi s'est retrouvé propulsé en Bourse par un engouement inattendu pour OpenClaw, nouvel outil d'IA dont la popularité explose. The post Raspberry Pi rattrapé par la fièvre de l'IA appeared...

Lire la suite »

AI-generated passwords are a security risk

2026-02-19 14:46:58
AI-generated passwords are "highly predictable" and aren't truly random, making them easier for cybercriminals to crack.

Lire la suite »

PromptSpy – First Known Android AI Malware Uses Google's Gemini for Decision-making

2026-02-19 14:39:42
The first known Android malware family to weaponize a generative AI model, specifically Google’s Gemini, as part of its active execution flow. Discovered in February 2026, the malware represents...

Lire la suite »

Au Parlement européen, la DSI met l'IA en pause

2026-02-19 14:39:41
Craignant pour la sécurité des données, la DSI a bloqué des fonctionnalités IA intégrées à des appareils mobiles professionnels. The post Au Parlement européen, la DSI met l’IA en pause...

Lire la suite »

Forescout research points to record number of ICS vulnerabilities in 2025

2026-02-19 14:38:55
Forescout has released new research warning that industrial control systems (ICS) are facing unprecedented levels of cyber risk, with 2025 marking the highest number of recorded vulnerabilities to date....

Lire la suite »

ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories

2026-02-19 14:35:00
The cyber threat space doesn't pause, and this week makes that clear. New risks, new tactics, and new security gaps are showing up across platforms, tools, and industries — often all at the same time. Some...

Lire la suite »

Threat Actors Using Fake Google Forms Site to Harvest Google Logins

2026-02-19 14:30:35
A new phishing campaign is targeting job seekers through fake Google Forms websites designed to steal login credentials. The campaign uses sophisticated domain impersonation techniques to trick victims...

Lire la suite »

USN-8033-8: Linux kernel (Intel IoTG) vulnerabilities

2026-02-19 14:23:05
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Nios II architecture; ...

Lire la suite »

CISA Warns of Honeywell CCTV Products Vulnerability Leads to Account Takeovers

2026-02-19 14:00:56
A critical advisory warning regarding a severe vulnerability affecting Honeywell CCTV products, published on February 17, 2026, under advisory ICSA-26-048-04. The alert details a high-severity security...

Lire la suite »

Nigerian man gets eight years in prison for hacking tax firms

2026-02-19 13:51:49
A Nigerian national was sentenced to eight years in prison for hacking multiple tax preparation firms in Massachusetts and filing fraudulent tax returns seeking over .1 million in refunds. [...]

Lire la suite »

Hackers Leveraging nslookup.exe to Stage Payloads via DNS Using Clickfix Attack

2026-02-19 13:44:42
A sophisticated evolution of the ClickFix social engineering campaign, in which threat actors are now abusing the legitimate Windows utility nslookup.exe to deploy malicious payloads via DNS queries....

Lire la suite »

Arthur Mensch relance le débat : le replatforming par l'IA va-t-il engloutir le logiciel d'entreprise ?

2026-02-19 13:43:26
Arthur Mensch, le patron de Mistral AI, affirme que plus de la moitié des logiciels d'entreprise pourraient être supplantés par des solutions construites autour de l'IA générative. The post Arthur...

Lire la suite »

Why Small Businesses Can't Afford To Ignore Cyberinsurance

2026-02-19 13:31:35
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 19, 2026 –Read the full story in Charter Capital Three out of five small-to-midsized businesses (SMBs) permanently...

Lire la suite »

Eni forme des techniciens à la cybersécurité à Rennes

2026-02-19 13:19:00
Aux côtés des parcours classiques d’apprentissage du numérique, les formations professionnalisantes courtes se développent (...)

Lire la suite »

USN-8053-1: libvpx vulnerability

2026-02-19 13:16:46
It was discovered that libvpx did not properly handle certain malformed media files. If an application using libvpx opened a specially crafted file, a remote attacker could cause a denial of service,...

Lire la suite »

The Missing Layer in AI Security: Why "Data-in-Use" Is the Next Battleground

2026-02-19 13:04:52
The average global breach cost will rise to .88M in 2024, up 10% from the previous year. In H1 2025 alone, 1,732 breaches exposed over 165 million records. Qatar's Bet: Confidential AI Gets Physical....

Lire la suite »

Après la RAM et les CPU, le spectre d'une pénurie de disques durs

2026-02-19 12:41:45
Les dernières annonces de Seagate et Western Digital confirment les tensions à l'approvisionnement en disques durs. The post Après la RAM et les CPU, le spectre d’une pénurie de disques durs...

Lire la suite »

Texas sues TP-Link over Chinese hacking risks, user deception

2026-02-19 12:36:51
Texas sued networking giant TP-Link Systems, accusing the company of deceptively marketing its routers as secure while allowing Chinese state-backed hackers to exploit firmware vulnerabilities and access...

Lire la suite »

Hackers target Microsoft Entra accounts in device code vishing attacks

2026-02-19 12:30:37
Threat actors are targeting technology, manufacturing, and financial organizations in campaigns that combine device code phishing and voice phishing (vishing) to abuse the OAuth 2.0 Device Authorization...

Lire la suite »

USN-8028-7: Linux kernel (Low Latency NVIDIA) vulnerabilities

2026-02-19 12:29:23
It was discovered that improper initialization of CPU cache memory could allow a local attacker with hypervisor access to overwrite SEV-SNP guest memory resulting in loss of data integrity. (CVE-2024-36331) Oleksii...

Lire la suite »

The Ghost in the Statistical Machine: A Search for the Source of Will

2026-02-19 12:22:53
Large Language Models (LLMs) have been making headlines for expressing their "desires" The phenomenon raises disturbing set of questions that go far beyond technology. To understand where we stand in...

Lire la suite »

Study Finds MAPF Decomposition Efficient Under Low Agent Density

2026-02-19 12:00:20
This study evaluates the computational impact of decomposing Multi-Agent Path Finding (MAPF) instances into subproblems. Across 22,300 benchmark instances, decomposition generally adds minimal overhead—under...

Lire la suite »

Kindness Transforms a Lonely Childhood

2026-02-19 12:00:14
In Chapter VIII, Miss Caldera, a learned but poor governess, tutors young Mina Frazer at home. The story explores their growing bond, contrasts between past happiness and present struggles, and Mina's...

Lire la suite »

Family Feuds and Life's Tough Choices in the Moors

2026-02-19 12:00:07
Chapter VII follows Mina Frazer, a determined child navigating life away from Scotland. Her uncle John Merapie struggles to manage her strong will while balancing family duties and societal expectations....

Lire la suite »

XWorm Malware Delivered via Fake Financial Receipts Targeting Windows Systems to Steal Logins and Sessions

2026-02-19 11:55:44
A sophisticated multi-stage malware campaign is actively targeting Brazilian and Latin American (LATAM) businesses using fake bank receipts to deliver XWorm v5.6, a commodity remote access trojan (RAT)...

Lire la suite »

From Exposure to Exploitation: How AI Collapses Your Response Window

2026-02-19 11:55:00
We've all seen this before: a developer deploys a new cloud workload and grants overly broad permissions just to keep the sprint moving. An engineer generates a "temporary" API key for testing and forgets...

Lire la suite »

CISA alerts to critical auth bypass CVE-2026-1670 in Honeywell CCTVs

2026-02-19 11:54:01
CISA warns Honeywell CCTVs are affected by a critical auth bypass flaw (CVE-2026-1670) allowing unauthorized access or account hijacking. The U.S. Cybersecurity and Infrastructure Security Agency (CISA)...

Lire la suite »

How Crypto Expo Europe Is Bridging Web3 Founders and EU Regulators in the MiCA Era

2026-02-19 11:48:56
In this exclusive HackerNoon interview, Crypto Expo Europe CEO Ruxandra Natalia Tataru breaks down the MiCA regulatory shift, Romania's rise as a fintech hub, and how the 2026 Expo bridges institutional...

Lire la suite »

Intimate products maker Tenga spilled customer data

2026-02-19 11:48:35
A phishing attack on a Tenga employee may have exposed US customer data. Customers should watch for sextortion-themed phishing attempts.

Lire la suite »

5 Free Tools to Monitor Your VPS (Terminal)

2026-02-19 11:32:58
A mysterious VPS slowdown turned out to be a silent cryptojacking attack. After days of troubleshooting, I discovered five powerful (and free) Linux terminal tools—btop, htop, glances, bpytop, and bmon—that...

Lire la suite »

Police arrests 651 suspects in African cybercrime crackdown

2026-02-19 11:24:17
African authorities arrested 651 suspects and recovered over .3 million in a joint operation targeting investment fraud, mobile money scams, and fake loan applications. [...]

Lire la suite »

Le NIST planche sur la sécurité et l'interopérabilité des agents IA

2026-02-19 11:20:43
Un peu en retrait sur la question des agents IA, le NIST passe à l'action en annonçant que son centre de l'innovation et des standards (Caisi) (...)

Lire la suite »

Meta patents AI that could keep you posting from beyond the grave

2026-02-19 11:16:32
Hopefully Meta really will file this in the "just because we can do it doesn't mean we should" drawer.

Lire la suite »

Ubuntu 22.04 LTS Kernel Critical Security Flaws USN-8033-7

2026-02-19 11:15:18
Several security issues were fixed in the Linux kernel.

Lire la suite »

A New Method for Decomposing MAPF Problems Into Solvable Subproblems

2026-02-19 11:15:06
This article introduces a structured methodology for decomposing Multi-Agent Pathfinding (MAPF) instances into smaller, solvable subproblems. The process begins by identifying agent dependencies and forming...

Lire la suite »

Love, Long Distance, and Linux: Building a VPN Blind to Bridge the Gap

2026-02-19 11:09:17
Five thousand miles apart, a legally blind Adaptive Systems Architect refused to let geo-locking win. After battling inaccessible cloud dashboards and spinning up a free Oracle Cloud VPS, he built a WireGuard...

Lire la suite »

Ubuntu 24.04 Low Latency Kernel Low Risk Issues USN-8052-1

2026-02-19 11:03:02
Several security issues were fixed in the Linux kernel.

Lire la suite »

Arkanix Stealer: a C++ & Python infostealer

2026-02-19 11:00:49
Kaspersky researchers analyze a C++ and Python stealer dubbed "Arkanix Stealer", which was active for several months, targeted wide range of data, was distributed as MaaS and offered referral program...

Lire la suite »

Ubuntu 24.04 LTS Linux Kernel Critical Data Exploit Advisory USN-8031-3

2026-02-19 10:39:56
Several security issues were fixed in the Linux kernel.

Lire la suite »

Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking Users

2026-02-19 10:24:00
Cybersecurity researchers have disclosed details of a new Android trojan called Massiv that's designed to facilitate device takeover (DTO) attacks for financial theft. The malware, according to ThreatFabric,...

Lire la suite »

Ubuntu 22.04 LTS Linux HWE Critical Security Flaws USN-8028-6

2026-02-19 10:11:20
Several security issues were fixed in the Linux kernel.

Lire la suite »

USN-8033-7: Linux kernel vulnerabilities

2026-02-19 10:10:15
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Nios II architecture; ...

Lire la suite »

Infostealer Found Stealing OpenClaw AI Identity and Memory Files

2026-02-19 10:06:10
Researchers at Hudson Rock have identified a live infection where an infostealer exfiltrated a victim's OpenClaw configuration. The discovery highlights a shift in malware behaviour toward harvesting...

Lire la suite »

New 'Massiv' Android banking malware poses as an IPTV app

2026-02-19 10:00:00
A newly identified Android banking trojan named Massiv has been under active distribution across south Europe, disguised as an IPTV app. [...]

Lire la suite »

L'IA accélère la vitesse des cyberattaques

2026-02-19 09:58:50
Les cyberattaques se multiplient, laissant toujours moins de temps entre la compromission initiale et les conséquences néfastes. De plus, (...)

Lire la suite »

Irish regulator probes X after Grok allegedly generated sexual images of children

2026-02-19 09:53:32
Ireland's Data Protection Commission opened a probe into X over Grok AI tool allegedly generating sexual images, including of children. Ireland's Data Protection Commission has launched another investigation...

Lire la suite »

USN-8052-1: Linux kernel (Low Latency) vulnerabilities

2026-02-19 09:51:06
It was discovered that improper initialization of CPU cache memory could allow a local attacker with hypervisor access to overwrite SEV-SNP guest memory resulting in loss of data integrity. (CVE-2024-36331) Oleksii...

Lire la suite »

USN-8031-3: Linux kernel vulnerabilities

2026-02-19 09:26:23
It was discovered that improper initialization of CPU cache memory could allow a local attacker with hypervisor access to overwrite SEV-SNP guest memory resulting in loss of data integrity. (CVE-2024-36331) Oleksii...

Lire la suite »

USN-8028-6: Linux kernel (HWE) vulnerabilities

2026-02-19 09:01:52
It was discovered that improper initialization of CPU cache memory could allow a local attacker with hypervisor access to overwrite SEV-SNP guest memory resulting in loss of data integrity. (CVE-2024-36331) Oleksii...

Lire la suite »

Intellexa's Predator spyware infected Angolan journalist's device, Amnesty reports

2026-02-19 08:17:16
Amnesty reports Angolan journalist's iPhone was infected by Intellexa's Predator spyware via a WhatsApp link in May 2024. Amnesty International reports that in May 2024, Intellexa's Predator spyware...

Lire la suite »

CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware

2026-02-19 08:13:00
Cybersecurity researchers have disclosed details of a new campaign dubbed CRESCENTHARVEST, likely targeting supporters of Iran's ongoing protests to conduct information theft and long-term espionage. The...

Lire la suite »

More Than 40% of South Africans Were Scammed in 2025

2026-02-19 07:00:00
Survey underscores the reality that scammers follow "scalable opportunities and low friction," rather than rich targets that tend to be better protected.

Lire la suite »

Unpatchable? How Chinese Hackers Hid in Dell VMs for 2 Years Using "Magic Packets"

2026-02-19 04:48:46
Imagine locking your front door with the most expensive, heavy-duty biometric lock money can buy. You feel safe. But you don't realize that the builder of the house glued a spare key under the doormat — and...

Lire la suite »

Extracting IPA from a Non-Jailbroken iOS Device with Apple Configurator

2026-02-19 04:45:06
Hello everyone. During mobile application assessments, we often need the IPA file for static analysis. However, on iOS 18+ devices, many apps cannot be installed on jailbroken devices, which prevents...

Lire la suite »

Breaking the Trust Boundary: SSRF via a Misconfigured Sentry Tunnel

2026-02-19 04:44:41
Free Article Link: Click for free!Continue reading on InfoSec Write-ups »

Lire la suite »

Dell RecoverPoint for Virtual Machines Zero Day Attack

2026-02-19 04:23:02
What is the Attack? The attack involves the threat cluster UNC6201 (a suspected China-nexus Advanced Persistent Threat (APT)) actively exploiting a...

Lire la suite »

OSSEC for Linux: What It Means for Your Monitoring and Risk Posture

2026-02-19 03:46:12
You probably already have firewall rules in place, regular patching cycles, and logs flowing into a SIEM. That covers a lot. What it does not tell you is whether /usr/bin/ssh was replaced last night,...

Lire la suite »

Fedora 42 fvwm3 Crucial Service Disruption Patch 2026-439af2cc95

2026-02-19 01:33:10
Fix CVE-2025-65637.

Lire la suite »

Fedora 43 Fvwm3 Important Denial-of-Service Security Patch CVE-2025-65637

2026-02-19 01:14:16
Fix CVE-2025-65637.

Lire la suite »

List of 34 new domains

2026-02-19 00:00:00
.fr alumni-u-paris[.fr] (registrar: Edomains LLC) assu-servicesmaladie[.fr] (registrar: Hostinger operations UAB) betify-enfrance[.fr] (registrar: TLD Registrar Solutions Ltd) betonreds1[.fr] (registrar:...

Lire la suite »

Multiples vulnérabilités dans Google Chrome (19 février 2026)

19/02/2026
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Multiples vulnérabilités dans Tenable Security Center (19 février 2026)

19/02/2026
De multiples vulnérabilités ont été découvertes dans Tenable Security Center. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à...

Lire la suite »

Multiples vulnérabilités dans les produits Splunk (19 février 2026)

19/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance...

Lire la suite »

Vulnérabilité dans F5 BIG-IP (19 février 2026)

19/02/2026
Une vulnérabilité a été découverte dans F5 BIG-IP. Elle permet à un attaquant de provoquer un déni de service à distance.

Lire la suite »

Multiples vulnérabilités dans Microsoft Edge (19 février 2026)

19/02/2026
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »