Toute l'actualité de la Cybersécurité
VoidLink Framework Enables On-Demand Tool Generation with Windows Plugin Support
2026-02-11 20:20:06
A newly tracked intrusion framework called VoidLink is drawing attention for its modular design and focus on Linux systems. It behaves like an implant management framework, letting operators deploy a...
GTIG Analysis Highlights Escalating Espionage and Supply Chain Risks Facing Defense Sector
2026-02-11 19:59:49
Modern warfare extends far beyond physical battlefields, increasingly infiltrating the digital servers and supply chains that safeguard national defense. Today, the sector faces a relentless barrage of...
Crazy ransomware gang abuses employee monitoring tool in attacks
2026-02-11 19:29:14
A member of the Crazy ransomware gang is abusing legitimate employee monitoring software and the SimpleHelp remote support tool to maintain persistence in corporate networks, evade detection, and prepare...
Volvo Group hit in massive Conduent data breach
2026-02-11 19:28:49
A Conduent breach exposed data of nearly 17,000 Volvo Group North America employees as the total impact rises to 25 million people. A data breach at business services provider Conduent has impacted at...
Police arrest seller of JokerOTP MFA passcode capturing tool
2026-02-11 19:14:32
The Netherlands Police have arrested a a 21-year-old man from Dordrecht, suspected of selling access to the JokerOTP phishing automation tool that can intercept one-time passwords (OTP) for hijacking...
RU-APT-ChainReaver-L Hijacks Trusted Websites and GitHub Repos in Massive Cross-Platform Supply Chain Campaign
2026-02-11 19:14:17
A sophisticated cyber threat has emerged, targeting users across multiple operating systems through compromised mirror websites and GitHub repositories. The RU-APT-ChainReaver-L campaign represents one...
USN-8013-4: Linux kernel vulnerabilities
2026-02-11 18:34:22
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
...
USN-8015-4: Linux kernel vulnerabilities
2026-02-11 18:23:19
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
...
Massive Spike in Attacks Exploiting Ivanti EPMM Systems 0-day Vulnerability
2026-02-11 17:43:11
An unprecedented surge in exploitation attempts targeting CVE-2026-1281, a critical vulnerability in Ivanti Endpoint Manager Mobile (EPMM). On February 9, 2026, Shadowserver scans revealed over 28,300...
Proactive strategies for cyber resilience with Wazuh
2026-02-11 17:40:28
Cyber resilience means anticipating threats, detecting them early, and recovering fast when incidents occur. Wazuh shows how its open source SIEM and XDR unify visibility, detection, and automated response...
USN-8027-1: Python-Multipart vulnerabilities
2026-02-11 17:05:53
It was discovered that Python-Multipart incorrectly handled certain
regular expressions. An attacker could possibly use this issue to cause
Python-Multipart to consume excessive resources, leading to...
LummaStealer infections surge after CastleLoader malware campaigns
2026-02-11 17:02:29
A surge in LummaStealer infections has been observed, driven by social engineering campaigns leveraging the ClickFix technique to deliver the CastleLoader malware. [...]
The strategic SIEM buyer's guide: Choosing an AI-ready platform for the agentic era
2026-02-11 17:00:00
New guide details how a unified, AI ready SIEM platform empowers security leaders to operate at the speed of AI, strengthen resilience, accelerate detection and response, and more.
The post The strategic...
Un simple prompt annihile les garde-fous de plusieurs LLM ouverts
2026-02-11 16:48:45
À mesure que les entreprises personnalisent les modèles IA pour leurs besoins spécifiques, leur sécurité devient critique. (...)
Prometei Botnet Attacking Windows Server to Gain Remote Access and Deploy Malware
2026-02-11 16:42:10
A sophisticated attack is targeting Windows Server systems using Prometei, a Russian-linked botnet that has been active since 2016. This multi-functional malware combines cryptocurrency mining, credential...
Critical SandboxJS Vulnerability Allows Remote Host Takeover – PoC Released
2026-02-11 16:39:24
A severe sandbox escape vulnerability has been discovered in the JavaScript library, enabling attackers to execute arbitrary code on host systems. The flaw, tracked as CVE-2026-25881 with a critical CVSS...
USN-8028-1: Linux kernel vulnerabilities
2026-02-11 16:39:10
It was discovered that improper initialization of CPU cache memory could
allow a local attacker with hypervisor access to overwrite SEV-SNP guest
memory resulting in loss of data integrity. (CVE-2024-36331)
Oleksii...
La face sombre de l'amour IA : 9 compagnons IA sur 10 collectent vos données pour vous pister
2026-02-11 16:34:28
Devenant discrètement un cauchemar pour la vie privée, les compagnons IA connaissent un essor fulgurant, générant plus de 14 millions de visites organiques par mois, les États-Unis représentant...
How to Monetize Your Blog (and Why You Don't Need Millions of Views to Start)
2026-02-11 16:30:00
You don't need massive traffic to earn from blogging. From ads and affiliate links to HackerNoon writing contests with K+ prize pools, there are many ways to monetize your content. Start small, stay...
Threat Actors Weaponize ChatGPT, Grok and Leverages Google Ads to Distribute macOS AMOS Stealer
2026-02-11 16:29:40
Cybercriminals have developed a sophisticated attack campaign that exploits user trust in artificial intelligence platforms to distribute the Atomic macOS Stealer (AMOS), marking a dangerous evolution...
Winter has come : sécuriser les Jeux d'hiver 2026
2026-02-11 16:29:23
Avec le début des Jeux d’hiver, le public du monde entier se voit offrir la promesse d'un mélange familier de prouesses athlétiques, d’art et d’émotion. Que ce soit pour les plus...
BQTLock & GREENBLOOD Ransomware Attacking Organizations to Encrypt and Exfiltrate Data
2026-02-11 16:27:28
Two sophisticated ransomware families, BQTLock and GREENBLOOD, have surfaced in the cybersecurity landscape, utilizing contrasting strategies to disrupt business operations and extort victims. While typical...
Baromètre de la cybersécurité 2025 : un sentiment de maîtrise du risque en décalage avec une exposition qui reste élevée
2026-02-11 16:26:56
Docaposte, leader de la confiance numérique en France, et Cyblex Consulting, cabinet de conseil et d'audit en cybersécurité, dévoilent la troisième édition de leur baromètre annuel de la cybersécurité....
Espionnage présumé chez Dassault Aviation
2026-02-11 16:22:36
Intérimaire chez Dassault soupçonné d'avoir filmé des Rafale avec des lunettes-caméra, la DGSI en alerte....
Critical UUID Flaw in Fiber v2 on Go 1.24+ Enables Session Hijacking, CSRF Bypass, and Zero-ID DoS Risk
2026-02-11 16:21:39
A severe vulnerability has been discovered in Fiber v2, a popular Go web framework, that could allow attackers to hijack user sessions, bypass security protections, and cause service disruptions. The...
Mistral AI investit 1,2 milliard € dans un datacenter IA
2026-02-11 16:15:49
Mistral AI franchit une étape dans son développement européen en implantant son premier datacenter hors de France. Un pari à plus d'un milliard €.
The post Mistral AI investit 1,2 milliard €...
Kimwolf Botnet Swamps Anonymity Network I2P
2026-02-11 16:08:11
For the past week, the massive "Internet of Things" (IoT) botnet known as Kimwolf has been disrupting the The Invisible Internet Project (I2P), a decentralized, encrypted communications network designed...
The HackerNoon Newsletter: Prediction Markets Are Swallowing the Real World (2/11/2026)
2026-02-11 16:03:39
How are you, hacker?
🪐 What's happening in tech today, February 11, 2026?
The
HackerNoon Newsletter
brings the HackerNoon
...
Power Secure Swift Development at Scale With Sonatype Nexus Repository
2026-02-11 15:48:00
From its beginnings as a language for Apple platforms, Swift Package Manager has expanded its reach considerably. It now powers a wide range of mobile, desktop, and server-side applications,...
Legacy IRC Botnet Campaign Uses Automated SSH Compromise Pipeline to Enroll Linux Hosts at Scale
2026-02-11 15:46:32
SSHStalker is a newly discovered Linux botnet that brings back Internet Relay Chat (IRC) control while using automation to compromise servers over SSH. It mainly succeeds by guessing weak or reused passwords,...
Robotics Motion Learning: Training Linked Robot Arms with Kuramoto Models
2026-02-11 15:45:03
Learn how to model linked robot arms using coupled SO(2) actions. Explore deterministic and stochastic policies, normalizing flows on tori, and Kuramoto networks for motion prediction.
{ Tribune Expert } – La confiance, enjeu essentiel des forums cybercriminels
2026-02-11 15:38:06
Les forums cybercriminels fonctionnent comme des marchés où une offre rencontre une demande, avec des transactions généralement réalisées en cryptomonnaies ou via des systèmes de crédits interne.
The...
Wahba's Problem and SO(3) Optimization: Rotation Learning in Geometric ML
2026-02-11 15:30:06
Solve Wahba's problem and master SO(3) matrix optimization. Learn about stochastic policies on manifolds using Bingham, Cauchy, and von Mises-Fisher parametrizations.
ESN : la fin de l'âge d'or des valorisations, l'IA générative comme nouvel eldorado
2026-02-11 15:26:13
Après un cycle post-Covid euphorique, le marché français des services informatiques marque le pas. Si les multiples de valorisation s'assagissent, la frénésie autour de l'intelligence artificielle...
Beyond Kuramoto Models: Associative Memory and Plastic Synapses in ML Ensembles
2026-02-11 15:15:02
Explore coupled oscillator ensembles beyond Kuramoto models. Learn about associative memories, Ising model generalizations, and Hebbian learning in networks with plastic synapses.
NetBox Labs lance un assistant IA pour les administrateurs réseau
2026-02-11 15:13:30
Après 6 mois de test, NetBox Labs officialise le lancement de son copilote IA destiné à accélérer les opérations (...)
Google-Wiz : l'UE valide en balayant les craintes
2026-02-11 15:01:10
La Commission européenne valide, sans condition, l'acquisition de Wiz par Google. Et écarte, entre autres, l'argument du « cheval de Troie ».
The post Google-Wiz : l’UE valide en balayant les...
Reynolds ransomware uses BYOVD to disable security before encryption
2026-02-11 15:00:47
Researchers discovered Reynolds ransomware, which uses BYOVD technique to disable security tools and evade detection before encryption. Researchers found a new ransomware, named Reynolds, that implements...
Grassmannian Manifold Learning: Optimization and Deep Learning Architectures
2026-02-11 15:00:23
Explore Grassmannian manifold learning for image classification, video recognition, and MIMO communication. Learn about Riccati ODEs and matrix-based deep neural networks.
The Seven Qualification Tests for an AI Scientist
2026-02-11 15:00:20
This article proposes seven qualification tests to evaluate whether an AI system can function as a true scientist—by rediscovering foundational scientific laws through data, computation, and constrained...
APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities
2026-02-11 14:52:00
Indian defense sector and government-aligned organizations have been targeted by multiple campaigns that are designed to compromise Windows and Linux environments with remote access trojans capable of...
Black Duck Signs MSSP Agreement with Accenture
2026-02-11 14:40:17
Black Duck has announced a managed security service provider (MSSP) agreement with Accenture, in a move designed to strengthen the delivery of enterprise-grade application security services worldwide....
AI Rising: Do We Know Enough About the Data Populating It?
2026-02-11 14:31:47
Organizations remain reluctant to address the fact that AI can dangerously expose business operations as well as personal data.
Everyone Scanned the App — I Read the Error Messages Instead
2026-02-11 14:12:50
Free Link 🎈Continue reading on InfoSec Write-ups »
The game is over: when “free” comes at too high a price. What we know about RenEngine
2026-02-11 14:00:38
We disclose new details about campaigns involving RenEngine and HijackLoader malware. Since March 2025, attackers have been distributing the Lumma stealer in a complex chain of infections, and in February...
LummaStealer Is Getting a Second Life Alongside CastleLoader
2026-02-11 14:00:09
Bitdefender researchers have discovered a surge in LummaStealer activity, showing how one of the world's most prolific information-stealing malware operations managed to survive despite being almost brought...
Researchers Outline a Roadmap for AI That Can Make Scientific Discovery
2026-02-11 14:00:03
This article traces the evolution of automated scientific research and argues that training AI to rediscover historic breakthroughs is a practical first step toward building truly autonomous scientific...
Top Cyber Industry Defenses Spike CO2 Emissions
2026-02-11 14:00:00
Organizations can improve their climate footprints by optimizing two specific cybersecurity protections, without incurring added risks.
Black-Box Kubernetes Penetration Testing Playbook
2026-02-11 13:48:55
A Manual, End-to-End Walkthrough from First Signal to Cluster TakeoverContinue reading on InfoSec Write-ups »
Debian 11 DLA-4476-1 Linux-6.1 Moderate Privilege Escalation and DoS
2026-02-11 13:48:16
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. For Debian 11 bullseye, these problems have been fixed...
Debian 11 DLA-4475-1 Linux Critical Privilege Escalation DoS CVE-2022-48744
2026-02-11 13:47:56
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. For Debian 11 bullseye, these problems have been fixed...
Account Takeover using Improper Authorization in “Check Availability” Feature
2026-02-11 13:46:55
Hello Guys!!!!Continue reading on InfoSec Write-ups »
5 Ways to Bypass Email Verification Without Using Any Tool
2026-02-11 13:46:36
In this blog, I'll share a few unique and real-world ways to bypass email verification without using any tools at all — no Burp Suite, no scanners, nothing fancy.Just a browser, logic, and curiosity.If...
Ransomware Remains A Top 10 AI Threat In 2026
2026-02-11 13:28:58
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 11, 2026 –Read the full story in ZDNet ZDNet recently published “10 ways AI can inflict unprecedented...
Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms
2026-02-11 13:28:00
It's Patch Tuesday, which means a number of software vendors have released patches for various security vulnerabilities impacting their products and services.
Microsoft issued fixes for 59 flaws, including...
EU Commission Breach – The Importance of Upholding Strong Device Management Infrastructure
2026-02-11 13:23:02
Last week, the European Commission launched an investigation after finding evidence that its mobile device management platform was hacked. The Commission reported that it discovered “traces of a cyberattack”...
GitGuardian Raises M Series C to Address Non-Human Identities Crisis and AI Agent Security Gap
2026-02-11 13:05:15
New York, NY, 11th February 2026, CyberNewswire
Researchers Propose a Turing Test to Measure Whether AI Can Make Scientific Discoveries
2026-02-11 13:00:04
This paper proposes a “Turing test for an AI scientist,” outlining seven benchmarks to evaluate whether AI can independently rediscover foundational scientific principles without relying on human...
USN-7988-4: Linux kernel (GCP FIPS) vulnerabilities
2026-02-11 12:55:32
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Media drivers;
...
USN-7990-3: Linux kernel (Xilinx ZynqMP) vulnerabilities
2026-02-11 12:46:55
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
...
February 2026 Patch Tuesday includes six actively exploited zero-days
2026-02-11 12:32:20
Microsoft's February Patch Tuesday fixes 59 flaws—including six zero-days already under active attack. How bad are they?
SUSE Linux 12 SP5 Security Update 2026-0422-1 Avahi Moderate Crash Risk
2026-02-11 12:30:07
An update that solves three vulnerabilities can now be installed.
How I Fixed Manufacturing for AI Robotics with WebSerial
2026-02-11 12:00:07
Scaling AI robotics exposed a silent failure: firmware-based identity poisoned training data without crashing systems. By replacing custom firmware and scripts with a browser-based manufacturing stack...
Webconférence LMI Banque et Assurance : rendez-vous le 17 février
2026-02-11 11:57:37
Les banques et les assurances vivent une profonde transformation sous l’impulsion de l’intelligence artificielle. Entre automatisation des (...)
A Perilous Break to Jupiter
2026-02-11 11:30:02
In Chapter XII of Astounding Stories of Super-Science (March 1932), Hawk Carse and Eliot Leithgow face deadly doors, heat-rays, and Ku Sui's machines. Using ingenuity, they melt a hole in the ceiling,...
Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments
2026-02-11 11:30:00
Intentionally vulnerable training applications are widely used for security education, internal testing, and product demonstrations. Tools such as OWASP Juice Shop, DVWA, Hackazon, and bWAPP are designed...
Un an après, que devient l'initiative EU AI Champions ?
2026-02-11 11:28:08
Au Sommet de l'IA 2025 naissait l'initiative EU AI Champions. Elle a connu depuis quelques temps forts... et des départs de membres.
The post Un an après, que devient l’initiative EU AI Champions...
EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security
2026-02-11 11:21:20
With .5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, four new AI certifications and Certified CISO v4 help close the gap between AI adoption and workforce readiness
TAMPA,...
Patch Tuesday février 2026 : 59 failles corrigées dont 5 critiques
2026-02-11 11:16:19
Après un patch tuesday de janvier conséquent, février est plus calme sur le front des failles de sécurité affectant (...)
USN-8023-1: xmltok library vulnerabilities
2026-02-11 10:29:21
It was discovered that Expat, contained within the xmltok library, incorrectly
handled the initialization of parsers for external entities. An attacker could
possibly use this issue to cause a denial...
Des pirates déconnectent les EDR via un pilote Windows obsolète
2026-02-11 10:28:12
Début février, les équipes d’Huntress ont indiqué avoir contrecarré une intrusion après avoir repéré (...)
L'infrastructure à l'ère de l'IA : les choix techniques qui engagent l'avenir
2026-02-11 10:23:22
Le 19 février 2026, la Matinale Silicon réunit en ligne les décideurs IT autour d'un défi majeur : comment bâtir une infrastructure réellement prête pour l'intelligence artificielle ?
The post...
Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days
2026-02-11 10:22:00
Microsoft on Tuesday released security updates to address a set of 59 flaws across its software, including six vulnerabilities that it said have been exploited in the wild.
Of the 59 flaws, five are rated...
Malwarebytes earns PCMag Best Tech Brand spot, scores 100% with MRG Effitas
2026-02-11 10:09:52
Malwarebytes is not only one of PCMag's Best Tech Brands for 2026, it also scored 100% on the MRG Effitas consumer security product test.
Spam and phishing in 2025
2026-02-11 10:00:59
The report contains statistics on spam and phishing in 2025, outlining the main trends: phishing and scam QR codes, ClickFix attacks, ChatGPT subscription lures and others.
SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
2026-02-11 09:56:00
Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC) communication protocol for command-and-control (C2) purposes.
"The...
SSHStalker botnet targets Linux servers with legacy exploits and SSH scanning
2026-02-11 09:49:39
A new Linux botnet, SSHStalker, has infected about 7,000 systems using old 2009-era exploits, IRC bots, and mass-scanning malware. Flare researchers uncovered a previously undocumented Linux botnet dubbed...
Ubuntu 25.10 Expat Critical DoS Issues USN-8022-1 CVE-2025-59375
2026-02-11 09:38:02
Several security issues were fixed in Expat.
SUSE CUPS Critical Security Advisory 2026-20231-1 CVE-2025-58060 DoS Risk
2026-02-11 08:30:23
An update that solves four vulnerabilities, contains two features and has one fix can now be installed.
SUSE golang-github-prometheus-prometheus Key Security Update 2026-20232-1
2026-02-11 08:30:17
An update that solves two vulnerabilities and contains one feature can now be installed.
Search Exposure Linux Security Threats Impacting Personal Data
2026-02-11 08:16:40
Search-indexed personal data increases security risk in Linux environments. When email addresses, usernames, phone numbers, and role information are easy to discover through search engines, attackers...
U.S. CISA adds Microsoft Office and Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog
2026-02-11 07:37:24
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Office and Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure...
North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations
2026-02-11 06:50:00
The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating...
How To Hack Part 3
2026-02-11 02:11:01
Linux Capture The Flag Bandit Levels 7 to 11Continue reading on InfoSec Write-ups »
Microsoft releases Windows 11 26H1 for select and upcoming CPUs
2026-02-11 02:06:42
Microsoft has announced Windows 11 26H1, but it's not for existing PCs. Instead, it will ship on devices with Snapdragon X2 processors and possibly other rumored ARM chips.w [...]
Asia Fumbles With Throttling Back Telnet Traffic in Region
2026-02-11 02:00:00
Only Taiwan made the top 10 list of governments, effectively blocking the threat-ridden protocol, but overall, the region lagged in curbing Telnet traffic.
Patch Tuesday - February 2026
2026-02-11 01:58:33
Microsoft is publishing 55 vulnerabilities this February 2026 Patch Tuesday. Microsoft is aware of exploitation in the wild for six of today's vulnerabilities, and notes public disclosure for three...
Roblox visé par une mise en demeure
2026-02-11 01:46:50
Roblox mis en demeure : risques de contenus choquants et prédation, pression pour renforcer protections et revoir la classification PG....
Un document du DoJ évoque un « hacker » de Jeffrey Epstein
2026-02-11 01:33:50
Un document du DoJ cite un informateur : Epstein aurait eu un « hacker personnel ». ZATAZ vous a analysé les courriels de Jeffrey Epstein et son attirance pour les hackers....
Notepad++ visé via sa chaîne de mise à jour
2026-02-11 01:04:27
Notepad++ a vu son trafic de mises à jour redirigé vers des serveurs malveillants, une attaque de chaîne d'approvisionnement ciblée et attribuée prudemment....
Un pirate de Snapchat avoue : 600 femmes ciblées
2026-02-11 00:56:25
Un internaute plaide coupable après le piratage de comptes Snapchat visant 600 femmes, avec vol et revente de photos intimes....
L'UE et les Pays-Bas touchés via des failles Ivanti
2026-02-11 00:39:08
Failles zero-day Ivanti EPMM : intrusions confirmées aux Pays-Bas et incident à la Commission européenne, sur fond d'alertes CISA et alliés....
La Russie protège un Espagnol accusé de cyberespionnage
2026-02-11 00:26:24
La Russie accorde l'asile à Enrique Arias Gil, Espagnol recherché pour cyberespionnage, au cœur des relais pro-russes sur Telegram....
Le Sénégal frappé au cœur de son fichier d'identité
2026-02-11 00:07:38
Le Sénégal confirme une brèche au DAF, cible d'un rançongiciel, avec 139 Go revendiqués et un service d'identité suspendu....
List of 18 new domains
2026-02-11 00:00:00
.fr account-renew[.fr] (registrar: AMEN / Agence des Médias Numériques)
assur-maladie[.fr] (registrar: Hostinger operations UAB)
auray-communaute[.fr] (registrar: Dynadot Inc)
casino-spinaura[.fr] (registrar:...
Multiples vulnérabilités dans MongoDB (11 février 2026)
11/02/2026
De multiples vulnérabilités ont été découvertes dans MongoDB. Elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et un problème...
Multiples vulnérabilités dans Synology Storage Manager (11 février 2026)
11/02/2026
De multiples vulnérabilités ont été découvertes dans Synology Storage Manager. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Multiples vulnérabilités dans Ivanti Endpoint Manager (11 février 2026)
11/02/2026
De multiples vulnérabilités ont été découvertes dans Ivanti Endpoint Manager. Elles permettent à un attaquant de provoquer une injection SQL (SQLi) et un contournement de la politique de sécurité....
Multiples vulnérabilités dans les produits HPE Aruba Networking (11 février 2026)
11/02/2026
De multiples vulnérabilités ont été découvertes dans les produits HPE Aruba Networking. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et un contournement...
Multiples vulnérabilités dans GitLab (11 février 2026)
11/02/2026
De multiples vulnérabilités ont été découvertes dans GitLab. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à...
Multiples vulnérabilités dans les produits Fortinet (11 février 2026)
11/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation...
Multiples vulnérabilités dans les produits Intel (11 février 2026)
11/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte...
Multiples vulnérabilités dans Microsoft Office (11 février 2026)
11/02/2026
De multiples vulnérabilités ont été découvertes dans Microsoft Office. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données...
Multiples vulnérabilités dans Microsoft Windows (11 février 2026)
11/02/2026
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation...
Vulnérabilité dans Microsoft .Net (11 février 2026)
11/02/2026
Une vulnérabilité a été découverte dans Microsoft .Net. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Multiples vulnérabilités dans Microsoft Azure (11 février 2026)
11/02/2026
De multiples vulnérabilités ont été découvertes dans Microsoft Azure. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité...
Multiples vulnérabilités dans les produits Microsoft (11 février 2026)
11/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation...