Toute l'actualité de la Cybersécurité
Microsoft: Hackers abuse OAuth error flows to spread malware
2026-03-03 20:59:19
Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take users to malicious pages. [...]
Vehicle Tire Pressure Sensors Enable Silent Tracking
2026-03-03 20:53:39
Like many other features and systems in modern cars, tire pressure sensors leak sensitive data that can be abused by threat actors.
Qualcomm Zero-Day Exploited in Targeted Android Attacks
2026-03-03 20:28:05
The exploitation activity against CVE-2026-21385, a high-severity memory corruption flaw, could be tied to commercial spyware or nation-state threat groups.
USN-8062-2: curl vulnerabilities
2026-03-03 18:42:11
USN-8062-1 fixed vulnerabilities in curl. This update provides the
corresponding update for CVE-2025-14017, CVE-2025-15079, and CVE-2025-15224
for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS,...
Ariomex, Iran-based crypto exchange, suffers data leak
2026-03-03 18:40:08
Resecurity says Iran's Ariomex crypto exchange suffered a data leak exposing user and transaction data from 2022 to 2025. Resecurity (USA) reports that Ariomex’s database, one of Iran’s...
Fake Zoom and Google Meet Pages Trick Users Into Installing Monitoring Tool
2026-03-03 18:39:44
Fake Zoom and Google Meet pages trick users into installing a monitoring software on Windows systems through phishing links and fake updates.
SloppyLemming Espionage Campaign Uses BurrowShell Backdoor and Rust RAT to Hit Pakistan and Bangladesh Targets
2026-03-03 18:38:48
A suspected India-aligned threat group known as SloppyLemming has been conducting a sustained espionage campaign against government agencies, defense organizations, nuclear oversight bodies, and critical...
Malvertising Threat Actor ‘D‑Shortiez' Abuses WebKit Back‑Button Hijack in Forced‑Redirect Browser Campaign
2026-03-03 18:21:53
A threat actor tracked as D-Shortiez has been running a persistent malvertising campaign that turns a WebKit browser behavior into a trap, forcing iOS Safari users into scam pages with no easy way out....
LexisNexis Data Breach — Threat Actor Allegedly Claims 2.04 GB Stolen
2026-03-03 17:55:21
A threat actor operating under the alias FulcrumSec has publicly claimed responsibility for a fresh breach of LexisNexis Legal & Professional, the legal information division of RELX Group, alleging...
Microsoft Warns of New Phishing Attack Exploiting OAuth in Entra ID to Evade Detection
2026-03-03 17:42:28
A new active phishing attack that exploits OAuth’s legitimate redirection behavior, allowing it to bypass traditional email and browser defenses without stealing any tokens. According to Microsoft...
Speakeasies to Shadow AI: Banning AI Browsers Will Fail
2026-03-03 17:40:21
Lessons from history highlight why AI-enabled browsers require controlled enablement.
USN-7990-6: Linux kernel (Raspberry Pi) vulnerabilities
2026-03-03 17:23:23
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
...
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
2026-03-03 17:15:00
Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration...
Zerobot Malware Exploiting Tenda Command Injection Vulnerabilities to Deploy Malware
2026-03-03 17:07:18
A Mirai-based botnet campaign known as Zerobot has resurfaced with renewed force, this time targeting critical flaws in Tenda AC1206 routers and the n8n workflow automation platform. The campaign, now...
Google Chrome shifts to two-week release cycle for increased stability
2026-03-03 17:00:00
Google Chrome will shift from a four-week to a two-week release cycle to roll out new features, bug fixes, and performance improvements more frequently. [...]
Yuki CEO on Data Cost Optimization: Why Your Snowflake and BigQuery Bill Is 40% & Rising Due to AI
2026-03-03 16:58:50
Enterprises routinely overspend 40-60% on Snowflake, BigQuery, and Databricks due to over-provisioned warehouses and manual tuning. Yuki founder Ido Arieli Noga breaks down the root causes behind runaway...
Archipelo and Checkmarx Announce Partnership Connecting AppSec Detection with DevSPM
2026-03-03 14:00:18
San Francisco, CA, United States, 3rd March 2026, CyberNewswire
The Easiest Way to Add a Digital Signature to a PDF
2026-03-03 16:38:21
Adding a digital signature to a PDF is fast and secure with tools like Adobe Acrobat Reader, Lumin, or mobile apps. This guide explains the difference between digital and electronic signatures, shows...
New ‘StegaBin' Campaign Uses Malicious 26 npm Packages to Deploy Multi-Stage Credential Stealer
2026-03-03 16:28:28
A new software supply-chain attack is abusing the npm ecosystem today, where a single mistaken dependency can quietly open a door into a developer's machine. The activity, tracked as “StegaBin,”...
Meet Vera Report, The App That Lets You Whistleblow Anonymously From a Smartphone Using Telegram
2026-03-03 16:20:06
AlphaTON Capital and the Midnight Foundation launched Vera Report, a Telegram-based anonymous whistleblowing app built on privacy-preserving blockchain tech. Using zero-knowledge proofs, confidential...
When Everything Looks Perfect, Nothing Feels Real
2026-03-03 16:08:39
When perfection is automated, authenticity becomes the only scarce resource. Why AI tools must learn to restore content without replacing its soul.
Pentagon ditches Anthropic AI over “security risk” and OpenAI takes over
2026-03-03 16:05:58
At the center of the dispute is how far AI models should be allowed to go inside military systems.
How an Autonomous Competitor Will Hollow Out Your Company in a Weekend
2026-03-03 16:05:32
The companies that achieve organizational autonomy first will have a nuclear advantage over their competitors. They will be able to identify your customers, engineer a frictionless one-click migration...
How We Cut ,400 Annually by Replacing Managed OTA With Self-Hosted Xavia OTA on Kubernetes
2026-03-03 16:04:16
Faced with scaling OTA updates for a mobile app serving nearly 200,000 users, we rejected a managed service and built a custom Expo-compatible OTA server on Kubernetes. The decision saved ,400 upfront...
The HackerNoon Newsletter: Make A Choice, Tiger (3/3/2026)
2026-03-03 16:02:30
How are you, hacker?
🪐 What's happening in tech today, March 3, 2026?
The
HackerNoon Newsletter
brings the HackerNoon
...
Why Adaptive Risk Management Needs a Human Touch
2026-03-03 16:00:32
The time to exploit a new vulnerability has dropped from 63 days to 5. Here is why fully automated risk management isn't the solution.
Digital Accessibility Moves From Compliance to Competitive Edge, Industry Surveys Show
2026-03-03 15:58:53
Inclusive design helps people complete tasks, lowers the chances they give up, and builds long-term trust. As more fields go digital - especially education, healthcare, and government - accessibility...
It's Not Kubernetes. It Never Was.
2026-03-03 15:56:05
Kubernetes didn't make systems complex — organizational scale did. As companies expand across teams, regions, and clouds, infrastructure complexity naturally increases, and Kubernetes simply absorbs...
The Top Exposure Assessment Platforms (EAPs) to Watch in 2026
2026-03-03 15:48:13
Exposure management has replaced old‑school “scan‑and‑patch” techniques. Now, the money is in unified visibility, context, and mobilization; not siloed CVEs that don't reflect the priorities...
Why Apple and Google Protect Your Wallet Differently
2026-03-03 15:48:11
Discover the technical differences between Apple Pay and Google Pay security. Learn how Device Account Numbers and cloud tokenization protect your money.
How to Use AI Coding Agents Effectively
2026-03-03 15:45:00
Today's top coding models, including GPT-5 Codex and Claude Sonnet 4.5, can rival junior engineers — but only when tightly orchestrated. Success depends less on raw model power and more on disciplined...
Oracle EBS 2025 campaign impacts Madison Square Garden, sensitive data leaked
2026-03-03 15:42:56
Madison Square Garden confirmed a data breach tied to the 2025 Oracle E-Business Suite hacking campaign. Madison Square Garden (MSG) has confirmed it was affected by a data breach linked to the 2025 cybercrime...
LexisNexis confirms data breach as hackers leak stolen files
2026-03-03 15:40:48
American data analytics company LexisNexis Legal & Professional has confirmed to BleepingComputer that hackers breached its servers and accessed some customer and business information. [...]
L'équipe du GReAT de Kaspersky découvre une vulnérabilité d'injection de commande dans ExifTool affectant les utilisateurs macOS
2026-03-03 15:21:11
Une faille dans un outil de métadonnées open source très utilisé permet l’exécution de code arbitraire via des fichiers image piégé. Un correctif est disponible. Tribune – L’équipe...
Codage IA : les langages les plus frugaux en tokens
2026-03-03 15:11:16
Une analyse sur de petites tâches (100-200 tokens) donne l'avantage aux langages dynamiques, aux fonctionnels... et aux orientés tableaux.
The post Codage IA : les langages les plus frugaux en tokens...
Compromised Site Management Panels are a Hot Item in Cybercrime Markets
2026-03-03 15:01:11
Compromised cPanel credentials are being sold in bulk across underground channels as plug-and-play phishing and scam infrastructure. Flare explains how analyzing 200,000 underground posts reveals a commoditized...
The Evolution of OSS Index in the Age of AI
2026-03-03 15:00:03
In the past 12 months, enterprise software development has changed faster than at any other point in our lifetime.
Proofpoint Launches AI-Enabled Discovery & Archive Suite for Small to Medium Businesses
2026-03-03 14:56:03
Hackers Leverage Telegram for Initial Access to Corporate VPN, RDP, and Cloud Environments
2026-03-03 14:40:09
Telegram, once widely recognized as a privacy-focused messaging application, has quietly transformed into one of the most powerful operational platforms used by cybercriminals today. What dark web forums...
{ Tribune Expert } – La reconversion est l'infrastructure oubliée de la souveraineté technologique
2026-03-03 14:33:53
Il n'y aura pas de souveraineté technologique durable sans une capacité collective à faire évoluer massivement les trajectoires professionnelles vers les métiers qui structurent ces transitions.
The...
Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow
2026-03-03 14:30:00
Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time are the people with the least experience. Tier 1 analysts...
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
2026-03-03 14:29:00
The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called...
Hackers Abuse .arpa Top-Level Domain to Host Phishing Scams
2026-03-03 14:23:54
Hackers abuse the .arpa Top-Level Domain to host phishing scams, using IPv6 tunnels, reverse DNS tricks, and shadow domains to bypass security checks.
Mathias Michiels nommé Country Manager de Cohesity France
2026-03-03 14:18:47
Cohesity France mise sur un profil senior, passé par Oracle, SAS et VMware, pour accélérer son développement en France à un moment qu'il décrit lui-même comme un "point de bascule".
The post Mathias...
USN-8068-1: Intel Microcode vulnerability
2026-03-03 14:03:20
Sergiu Ghetie discovered that some Intel® processors did not properly
handle values in the microcode flow. A local authenticated user could
potentially use this issue to escalate their privileges.
Observabilité native : la nouvelle frontière du Cloud et du DevOps
2026-03-03 14:00:18
De l'eBPF au Serverless, l'observabilité s'affranchit des agents pour s'intégrer nativement au cœur des infrastructures modernes. Cette approche « as-Code » automatise la visibilité et la performance,...
Cybersécurité : le manque de diversité des équipes, une vulnérabilité critique à combler
2026-03-03 13:58:27
Chaque semaine semble apporter son lot de nouvelles concernant un nouveau vecteur d’attaque, une campagne sophistiquée soutenue par un État ou un ransomware paralysant, le tout amplifié par la...
Le vol de cartes SIM IoT en France : un risque de cybersécurité sous-estimé (et les pistes pour s'en prémunir)
2026-03-03 13:55:54
Ces derniers mois, plusieurs opérations menées en Europe, dont le démantèlement en Espagne d'une infrastructure de « SIM farm » capable d'émettre jusqu'à 2,5 millions de SMS par jour,...
Santé : les données réglementées au cœur de la majorité des fuites dans le cloud et l'IA générative
2026-03-03 13:52:21
Les chercheurs du Threat Labs de Netskope ont analysé les principales cybermenaces qui ont touché les organismes de santé et leurs employés au cours des treize derniers mois et viennent de publier...
Le syndrome de l'imposteur gagne les salariés utilisant l'IA
2026-03-03 13:52:11
Alors que l'intelligence artificielle se répand dans les usages au travail, une étude réalisée par l’institut OpinionWay (...)
HTCT 2026 : Compromission de la chaîne d'approvisionnement et exposition croissante de l'écosystème numérique français
2026-03-03 13:45:57
Rapport 2026 de Group-IB sur les tendances en matière de criminalité high-tech : les attaques contre la chaîne d’approvisionnement apparaissent comme la principale cybermenace mondiale. Tribune....
Epic Fury/Roaring Lion Sparks Escalating Cyber Conflict as Iran Goes Offline, Hacktivists Step Up Retaliation
2026-03-03 13:39:15
On February 28, 2026, the United States and Israel launched a coordinated offensive — code-named Operation Epic Fury by the U.S. and Operation Roaring Lion by Israel — setting off a wide-ranging cyber...
Hollywood's Ethical Hacker On The Cybercrime Magazine Podcast
2026-03-03 13:38:14
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 3, 2026 – Listen to the podcast Ralph Echemendia is a world-renowned cybersecurity expert, known internationally...
Project Compass Targets 764 Network as 30 Arrested and Victims Rescued
2026-03-03 13:02:32
Europol's Project Compass targets The Com (aka 764 network), an online group exploiting minors. After 30 arrests, officials say the hunt for those involved is far from over.
Talion Expands Governance-Aligned Agentic SOC as Board Cyber Scrutiny Intensifies
2026-03-03 13:01:51
Talion, a leading Managed Security Service Provider (MSSP) forged out of BAE Systems, today announced that under the new leadership of CEO, Keven Knight, it has expanded its governance-aligned Agentic...
How to Cut MTTR by Improving Threat Visibility in Your SOC
2026-03-03 12:58:23
In boardrooms and security operations centers alike, one metric has risen from a niche KPI to a defining measure of organizational resilience: Mean Time to Respond (MTTR). But why has this particular...
AI Agent Overload: How to Solve the Workload Identity Crisis
2026-03-03 12:57:19
Workloads keep getting more complicated and organizations are struggling to keep up. So what's the play?
SUSE Micro 6.0 CUPS Vital Updates Prevent Denial of Service Auth Bypass
2026-03-03 12:31:02
An update that solves four vulnerabilities, contains two features and has one fix can now be installed.
SUSE Linux Micro 6.0 libsoup Important Denial of Service Fix 2026-20529-1
2026-03-03 12:30:50
An update that solves five vulnerabilities can now be installed.
AMD et Nutanix s'allient autour de l'IA d'entreprise
2026-03-03 12:25:31
AMD investit jusqu'à 250 millions $ dans un partenariat avec Nutanix pour co-développer une plateforme d'IA agentique open-source, positionnée comme alternative aux stacks fermés dominés par Nvidia.
The...
Surviving Ransomware: Best practices to safeguard your business
2026-03-03 12:23:16
By Robbie Ross, cyber security lead, Converged Communication Solutions It's not if but when. This is a phrase that has been echoed across the cyber security industry for several years, but when it comes...
Chrome flaw let extensions hijack Gemini's camera, mic, and file access
2026-03-03 12:10:19
Researchers found a now-patched vulnerability in "Live in Chrome" that allowed a Chrome extension to inherit Gemini's permissions.
Phishing campaign exploits OAuth redirection to bypass defenses
2026-03-03 11:50:55
Microsoft researchers warn that threat actors abuse OAuth redirects to target government users and deliver malware. Microsoft has warned of phishing campaigns targeting government and public-sector organizations...
Amazon: Drone strikes damaged AWS data centers in Middle East
2026-03-03 11:44:44
Amazon has confirmed that three Amazon Web Services (AWS) data centers in the United Arab Emirates (UAE) and one in Bahrain have been damaged by drone strikes, causing an extensive outage that is still...
As War Continues, Pro-Iranian Actors Launch Barrage of Cyberattacks
2026-03-03 11:30:31
Iran and its supporters have taken to cyberspace to retaliate for US-Israeli military action, with an aim to cause economic and physical disruption.
AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged
2026-03-03 11:30:00
The Rise of MCPs in the Enterprise
The Model Context Protocol (MCP) is quickly becoming a practical way to push LLMs from “chat” into real work. By providing structured access to applications, APIs,...
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
2026-03-03 11:10:00
Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections.
It's advertised...
Digital workplace : le cloud, lieu de conservation plus que de collaboration
2026-03-03 11:06:45
Dans les organisations françaises, la collaboration sur les fichiers apparaît nettement plus occasionnelle que leur conservation dans le cloud.
The post Digital workplace : le cloud, lieu de conservation...
Fooling AI Agents: Web-Based Indirect Prompt Injection Observed in the Wild
2026-03-03 11:00:30
Uncover real-world indirect prompt injection attacks and learn how adversaries weaponize hidden web content to exploit LLMs for high-impact fraud.
The post Fooling AI Agents: Web-Based Indirect Prompt...
Star Citizen game dev discloses breach affecting user data
2026-03-03 10:50:26
Cloud Imperium Games (CIG), the game developer behind Star Citizen and Squadron 42, says attackers breached systems containing some users' personal information in January. [...]
Debian DSA-6155-1 spip Important SQL Injection XSS Attack
2026-03-03 10:30:39
It was discovered that SPIP, a website engine for publishing, would allow a malicious user to access protected information, and perform various SQL injection, Cross-Side Scripting (XSS), and Server-Side...
Android devices hit by exploited Qualcomm flaw CVE-2026-21385
2026-03-03 10:03:06
Google confirms that the Qualcomm Android vulnerability CVE-2026-21385 was exploited in real-world attacks. Google has confirmed that CVE-2026-21385 (CVSS score of 7.8), a high-severity vulnerability...
UH Cancer Center data breach affects nearly 1.2 million people
2026-03-03 09:48:51
The University of Hawaii confirmed that a ransomware gang stole the data of nearly 1.2 million individuals in August 2025 after breaching its Cancer Center's Epidemiology Division. [...]
Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets
2026-03-03 09:20:00
Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers.
The activity,...
Chrome security flaw enabled spying via Gemini Live assistant
2026-03-03 08:48:14
A Google Chrome vulnerability lets malicious extensions hijack Gemini Live to spy on users and steal sensitive files. Researchers at Palo Alto Networks found a Chrome vulnerability, tracked as CVE-2026-0628,...
Android gets patches for Qualcomm zero-day exploited in attacks
2026-03-03 08:19:53
Google has released security updates to patch 129 Android security vulnerabilities, including an actively exploited zero-day flaw in a Qualcomm display component. [...]
Delivery Hero mise sur la supervision pour baisser ses coûts
2026-03-03 08:16:48
Depuis sa création à Berlin en 2011, la jeune pousse Delivery Hero est devenue un acteur majeur de la livraison de repas et d'articles ménagers (...)
WinGet Desired State: Initial Access Established
2026-03-03 08:00:00
While not new, a self-referencing LNK file in combination with winget configuration instructions can be a viable initial access payload for environments where the Microsoft Store is not disabled.
Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited
2026-03-03 07:08:00
Google on Monday disclosed that a high-severity security flaw impacting an open-source Qualcomm component used in Android devices has been exploited in the wild.
The vulnerability in question is CVE-2026-21385...
SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains
2026-03-03 06:53:00
The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh.
The activity,...
Provecho - 712,904 breached accounts
2026-03-03 06:40:50
In early 2026, data purportedly sourced from the recipe and meal planning service Provecho was alleged to have been obtained in a breach. The exposed data included 713k unique email address along with...
TryHackMe CTF Walkthrough- Love at First Breach 2026: Hidden Deep into my Heart
2026-03-03 06:15:26
Difficulty: Easy | Category: WebA short but satisfying challenge that teaches one of the most overlooked recon habits in web pentesting, checking robots.txt. The flag is hiding in a place developers use...
TryHackMe CTF Walkthrough- Love at First Breach 2026: Valenfind
2026-03-03 06:13:56
Difficulty: Medium | Category: WebA step-by-step walkthrough of the Valenfind challenge , a fake dating app hiding a chain of vulnerabilities that, when followed carefully, leads to complete database...
♂️ Pulling Off the Heist: A Methodical HTB Takedown
2026-03-03 06:12:24
https://www.freepik.com/free-photo/hacker-breaking-into-computer-system-attacking-database-cybercrime-anonymous-woman-stealing-information-programming-online-malware-software-night-time-looking-camera_49250642.htm#fromView=keyword&page=1&position=2&uuid=f0f62f8e-b280-4e74-8ccc-0b7939560d21&query=Cyber+heistTo...
Device is Blacklisted at runtime, now what?
2026-03-03 06:11:24
Have you ever wondered how the Runtime Application self/security Protection isolates the device once it identifies the Root traces?During an Android application assessment, I encountered a runtime protection...
Zero-Infra Cloud Exploitation: Hijacking Google's Gemini via Public API Keys
2026-03-03 06:09:24
For over a decade, Google told developers it was safe to put API keys in public code. Then, AI changed the rules.If I asked you right now where you store your API keys, your first answer would probably...
I Made an AI Think It Was Root — And It Gave Me /etc/passwd
2026-03-03 06:06:52
The Prompt Injection That Pulled Me Back Into Bug Writing After 3 YearsI hadn't written a public bug bounty report in three years.Then an AI chat application casually handed me the contents of:/etc/passwdNo...
Portswigger Walkthrough Lab: Username enumeration via subtly different responses
2026-03-03 06:05:26
Authentication BypassContinue reading on InfoSec Write-ups »
THM — CupidBot
2026-03-03 06:05:09
This is an easy room. So, so very easy…Continue reading on InfoSec Write-ups »
An AI That Can Hack Things Autonomously Is Real. The Hype Around It Is Not.
2026-03-03 06:04:38
PentAGI is genuinely impressive open-source software. It also requires a human to set it up, configure three databases, provide API keys…Continue reading on InfoSec Write-ups »
Sunsetnoontide Offsec's proving ground writeup
2026-03-03 06:02:23
Sunsetnoontide Box, Proving GroundsAs Always and as I frequently explain and document in my write-ups, in every penetration testing engagement we start by information gathering.Pinging the target to...
Fedora 42 Erlang High Information Disclosure Vuln FEDORA-2026-d51972eee3
2026-03-03 01:28:26
Erlang ver. 26.2.5.17
Fedora 42 python-pillow Critical Out-of-bounds Fix CVE-2026-25990
2026-03-03 01:28:25
Backport fix for CVE-2026-25990.
Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran
2026-03-03 01:15:07
Unit 42 details recent Iranian cyberattack activity, sharing direct observations of phishing, hacktivist activity and cybercrime. We include recommendations for defenders.
The post Threat Brief: March...
Fedora 43 Erlang Important Denial Of Service Fix CVE-2026-21620 Advisory
2026-03-03 01:09:29
Erlang ver. 26.2.5.17
CyberStrikeAI tool adopted by hackers for AI-powered attacks
2026-03-03 00:06:39
Researchers warn that a newly identified open-source AI security testing platform called CyberStrikeAI was used by the same threat actor behind a recent campaign that breached hundreds of Fortinet FortiGate...
List of 38 new domains
2026-03-03 00:00:00
.fr arkeadirect-b[.fr] (registrar: IONOS SE)
biletjul[.fr] (registrar: One.com A/S)
billetsdeconcert[.fr] (registrar: TLD Registrar Solutions Ltd)
casino-coin[.fr] (registrar: INWX GmbH)
casinocoinpoker[.fr]...
Multiples vulnérabilités dans Docker Desktop (03 mars 2026)
03/03/2026
De multiples vulnérabilités ont été découvertes dans Docker Desktop. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Multiples vulnérabilités dans Google Android (03 mars 2026)
03/03/2026
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation...
Multiples vulnérabilités dans les produits Microsoft (03 mars 2026)
03/03/2026
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.