Toute l'actualité de la Cybersécurité
ConnectWise patches new flaw allowing ScreenConnect hijacking
2026-03-18 18:10:35
ConnectWise is warning ScreenConnect customers of a cryptographic signature verification vulnerability that could lead to unauthorized access and privilege escalation. [...]
Cisco Firewall 0-day Vulnerability Exploited in the Wild to Deploy Interlock Ransomware
2026-03-18 17:45:06
An active campaign by the Interlock ransomware group is exploiting a critical zero-day vulnerability (CVE-2026-20131) in Cisco Secure Firewall Management Center (FMC) Software. Cisco disclosed the flaw...
OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs
2026-03-18 17:26:00
The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) has sanctioned six individuals and two entities for their involvement in the Democratic People's Republic of Korea (DPRK)...
“Claudy Day” Flaws Allow Data Theft via Fake Claude AI Ads, Report
2026-03-18 17:21:48
Researchers detail “Claudy Day” flaws in Claude AI that could enable data theft using fake Google Ads, hidden…
Researchers found font-rendering trick to hide malicious commands
2026-03-18 17:16:59
Researchers found a way to trick AI assistants into missing dangerous user instructions on a website.
New iOS Exploit With Advanced iPhone Hacking Tools Attacking Users to Steal Personal Data
2026-03-18 17:13:21
A sophisticated full-chain iOS exploit kit dubbed DarkSword, actively deployed by multiple commercial surveillance vendors and state-sponsored threat actors since at least November 2025 to steal sensitive...
The High Cost of Slow Triage: How to Make Tier 1 the Fastest Layer in Your SOC
2026-03-18 17:04:20
Why do so many SOCs still struggle to move quickly even with strong detection tools in place? In many cases, the real bottleneck is Tier 1 triage. When alerts take too long to validate, resources...
Ransomware gang exploits Cisco flaw in zero-day attacks since January
2026-03-18 16:53:42
The Interlock ransomware gang has been exploiting a maximum severity remote code execution (RCE) vulnerability in Cisco's Secure Firewall Management Center (FMC) software in zero-day attacks since late...
Arnaques aux faux colis : pourquoi vos vieux réflexes ne suffisent plus
2026-03-18 16:07:50
Avec l'intelligence artificielle, les escrocs transforment le smishing par SMS en piège visuel ultra-personnalisé : fausses photos de colis, étiquettes à votre nom et logos de transporteurs, le...
Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access
2026-03-18 16:00:00
Amazon Threat Intelligence is warning of an active Interlock ransomware campaign that's exploiting a recently disclosed critical security flaw in Cisco Secure Firewall Management Center (FMC) Software.
The...
Observability for AI Systems: Strengthening visibility for proactive risk detection
2026-03-18 16:00:00
As AI systems grow more autonomous, observability becomes essential. Learn how visibility into AI behavior helps detect risk and strengthen secure development.
The post Observability for AI Systems: Strengthening...
USN-8107-1: Linux kernel (AWS FIPS) vulnerabilities
2026-03-18 15:44:44
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- x86 architecture;
...
Le Cispe monte au créneau de la pseudo-souveraineté des offres cloud
2026-03-18 15:42:46
Pas moins de 24 dirigeants membres du Cispe (Cloud Infrastructure Services Providers in Europe) - dont Numspot, Clever Cloud, Ikoula, Thésée (...)
OpenAI Launches GPT-5.4 Mini and Nano to Provide Answers 2X Faster
2026-03-18 15:36:15
OpenAI has officially launched GPT-5.4 mini and GPT-5.4 nano, releasing its most capable small models designed to handle high-volume, latency-sensitive workloads. The new mini iteration offers a significant...
Ocean Network Launches Beta For Affordable P2P GPU Orchestration
2026-03-18 15:35:23
Ocean Network is a decentralized, peer-to-peer (P2P) compute network for pay-per-use jobs. The Ocean Orchestrator integrates natively with VS Code, Cursor, Windsurf, and Antigravity. Users are charged...
UIDAI Launches Bug Bounty Programme to Strengthen Aadhaar Security
2026-03-18 15:33:16
The Unique Identification Authority of India (UIDAI) has officially launched its first structured Bug Bounty Programme. This initiative aims to enhance the security posture of the Aadhaar ecosystem, which...
Marquis: Ransomware gang stole data of 672K people in cyberattack
2026-03-18 15:32:39
Marquis, a Texas-based financial services provider, revealed this week that a ransomware gang stole the data of over 670,000 individuals in an August 2025 cyberattack that also disrupted operations at...
USN-8098-3: Linux kernel vulnerabilities
2026-03-18 15:28:39
Qualys discovered that several vulnerabilities existed in the AppArmor
Linux kernel Security Module (LSM). An unprivileged local attacker could
use these issues to load, replace, and remove arbitrary...
Apple WebKit Vulnerability Enables Malicious Web Content Bypass on iOS and macOS
2026-03-18 15:28:22
Apple has released critical security patches to address a high-severity WebKit vulnerability that allows maliciously crafted web content to bypass the Same Origin Policy. Released on March 17, 2026, these...
Agentforce dans Salesforce Suites : le passage à l'échelle se précise
2026-03-18 15:20:47
Salesforce concrétise une première intégration directe d'Agentforce dans ses suites PME, en le réservant toutefois aux forfaits payants.
The post Agentforce dans Salesforce Suites : le passage à...
Researchers warn of unpatched, critical Telnetd flaw affecting all versions
2026-03-18 15:06:28
CVE-2026-32746 is a critical flaw in GNU InetUtils telnetd that allows remote attackers to execute code with elevated privileges Cybersecurity company Dream disclosed a critical flaw, tracked as CVE-2026-32746...
The Courtroom is a State Machine: Architecting Agentic Memory for Litigators
2026-03-18 15:06:26
Can a generative AI agent truly navigate the intricate, ever-shifting facts of a complex judicial trial? While standard language models fail to track how evidence chronologically mutates over time, I...
'Claudy Day' Trio of Flaws Exposes Claude Users to Data Theft
2026-03-18 15:05:58
A prompt injection vulnerability paired with other flaws can turn a Google search into a full attack chain that could threaten enterprise networks.
Bitcoin Moves First Because It's the Capital Gateway, Not Because It's King
2026-03-18 14:56:47
Bitcoin leads altcoins not due to market prestige, but because it's the primary on-ramp for institutional and retail capital entering crypto. The lag between Bitcoin's move and altcoin follow-through...
New Malware Campaigns Turn Network Devices Into DDoS Nodes and Crypto-Mining Bots
2026-03-18 14:55:28
Network security has taken another hard hit. Two previously unknown malware strains have emerged, quietly turning routers, IoT devices, and enterprise network equipment into weapons for large-scale distributed...
Orchid Security Recognized by Gartner® As a Representative Vendor of Guardian Agents
2026-03-18 14:44:01
Orchid Security has been recognized as a Representative Vendor in [Gartner's Market Guide for Guardian Agents] The company finds that the growing use of AI agents exponentially expands the amount of...
FancyBear Server Exposure Reveals Stolen Credentials, 2FA Secrets and NATO-Linked Targets
2026-03-18 14:43:18
A serious operational security failure by Russian state-linked hacking group FancyBear has given security researchers an unusually clear view into an active espionage campaign targeting government and...
Flare et IBM X-Force dévoilent l'infrastructure à l'origine d'une fraude mondiale orchestrée par des informaticiens nord-coréens
2026-03-18 14:39:42
Un nouveau rapport s'appuyant sur des renseignements exclusifs révèle comment le régime nord-coréen mobilise des milliers de professionnels experts de l'IT pour infiltrer des entreprises à travers...
Cursor Your Dream, Part 1: How to Move From Product Idea to First Prompt
2026-03-18 14:37:52
This article is for people who are used to relying on development teams. It also is for those who don't have a technical background but want to build a product. The author has built two full-fledged...
ScreenConnect Vulnerability Allows Hackers to Extract Unique Machine Keys and Hijack Sessions
2026-03-18 14:37:02
ConnectWise has issued an urgent security advisory for its ScreenConnect remote desktop software, disclosing a critical cryptographic vulnerability that could allow unauthenticated attackers to extract...
LeakNet Scales Ransomware Operations With ClickFix Lures and Stealthy Deno Loader
2026-03-18 14:21:49
A ransomware group known as LeakNet has been quietly building a more dangerous attack strategy. Until recently, the group averaged about three victims per month — but new evidence shows it is scaling...
Hybrid Observability Unifies Metrics, Logs, Traces, and Data Into a Single Pane of Glass
2026-03-18 14:08:27
Too many tools, too many blind spots. Hybrid observability brings all signals into one view faster fixes, less noise, no lock-in.
The Refund Fraud Economy: Exploiting Major Retailers and Payment Platforms
2026-03-18 14:05:15
Refund fraud is now a business, with methods and tutorials sold to exploit return policies for profit. Flare shows how fraudsters turn refunds and chargebacks into a repeatable profit model. [...]
New “Darksword” iOS exploit used in infostealer attack on iPhones
2026-03-18 14:02:08
A new exploit kit for iOS devices and delivery framework dubbed "Darksword" has been used to steal a wide range of personal information, including data from cryptocurrency wallet app. [...]
Nordstrom's email system abused to send crypto scams to customers
2026-03-18 13:55:49
Customers of upscale department store chain Nordstrom received fraudulent messages from a legitimate company email address that promoted cryptocurrency scams disguised as a St. Patrick's Day promotion....
USN-8106-1: Valkey vulnerabilities
2026-03-18 13:31:29
It was discovered that Valkey incorrectly handled errors for lua scripts.
An attacker could possibly use this issue to inject arbitrary information
into the response stream for other clients. (CVE-2025-67733)
It...
How to Organize Unit Tests for AI-Generated Code
2026-03-18 13:19:42
An Effective Method for Organizing Unit Tests in the Age of AI-Assisted Development. Software engineering has always relied heavily on unit testing. As agentic development picks up speed, it is becoming...
A Practical Guide to SwiftUI Gestures, From Tap to Composed Interactions
2026-03-18 13:06:48
This article is a deep guide to SwiftUI's gesture system, covering core gestures like tap, long press, drag, magnify, and rotation, then moving into advanced topics such as @GestureState, Transaction,...
Windsurf IDE Extension Drops Malware via Solana Blockchain
2026-03-18 13:03:55
Bitdefender researchers have discovered a malicious Windsurf IDE (integrated development environment) extension that deploys a multi-stage NodeJS stealer by using the Solana blockchain as the payload...
The Attack Cycle is Accelerating: Announcing the Rapid7 2026 Global Threat Landscape Report
2026-03-18 13:00:00
The predictive window has collapsed. In 2025, high-impact vulnerabilities weren't quietly accumulating risk. They were operationalized, and often within days.Today, Rapid7 Labs released the 2026 Global...
SideWinder Espionage Campaign Expands Across Southeast Asia
2026-03-18 13:00:00
The suspected India-linked threat group targets governments, telecom, and critical infrastructure using spear-phishing, old vulnerabilities, and rapidly rotating infrastructure to maintain persistent...
Meta, TikTok Steal Personal & Financial Info When Users Click Ads
2026-03-18 13:00:00
Tracking pixels let social media companies spy on their users even after they click over to advertiser sites, gleaning credit card info, geolocations, and more.
Pigment nomme Vincent Fournier à la tête de la France, de l'Europe du Sud et du Benelux
2026-03-18 12:53:33
Pigment nomme Vincent Fournier dans ce nouveau poste de Country Manager pour structurer son développement commercial sur ces marchés.
The post Pigment nomme Vincent Fournier à la tête de la France,...
How to Train a Semi-Supervised Classifier With Pseudo-Labeling and CNN Embeddings
2026-03-18 12:50:52
Extract features with a pretrained CNN, cluster unlabeled images, propagate labels with pseudo-labelling, and train a semi-supervised classifier with PyTorch, scikit-learn, and real industrial data.
Cybersécurité offensive : Lupin & Holmes lève 5,9 millions $
2026-03-18 12:37:18
Spécialisée dans la sécurité de la Supply Chain Logicielle, Lupin & Holmes lève 5,9 millions $ pour développer sa plateforme Depi et accélérer sa commercialisation.
The post Cybersécurité...
Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE
2026-03-18 12:30:00
Cybersecurity researchers have disclosed a critical security flaw impacting the GNU InetUtils telnet daemon (telnetd) that could be exploited by an unauthenticated remote attacker to execute arbitrary...
New .NET AOT Malware Hides Code as a Black Box to Evade Detection
2026-03-18 12:23:34
Researchers at Howler Cell have discovered a new .NET AOT malware campaign that uses a clever scoring system…
Avec NemoClaw, Nvidia assure une exécution sécurisée des agents OpenClaw
2026-03-18 12:15:08
Quelques semaines après l’émergence de l’agent IA open source autonome et le très fort engouement qu’il a suscité, (...)
USN-8105-1: FreeRDP vulnerabilities
2026-03-18 12:03:18
It was discovered that FreeRDP incorrectly handled certain RDP packets. A
remote attacker could use this issue to cause FreeRDP to crash, resulting
in a denial of service, or possibly execute arbitrary...
Rocky Linux: RLSA-2026:4728 libpng security update Security Advisories Updates
2026-03-18 12:00:48
Important: libpng security update
Adrian Grenier Steps Back Into Acting With ‘Self Custody,' A Crypto Thriller Now Streaming On Prime
2026-03-18 12:00:37
Self Custody follows a struggling father who discovers a long-forgotten Bitcoin payment may now be worth millions. As he attempts to recover the wallet, hackers and criminals begin hunting the digital...
Claude Code Security and Magecart: Getting the Threat Model Right
2026-03-18 11:58:00
When a Magecart payload hides inside the EXIF data of a dynamically loaded third-party favicon, no repository scanner will catch it – because the malicious code never actually touches your repo. As...
Souveraineté numérique : les outils d'évaluation pleuvent
2026-03-18 11:46:35
Dans la lignée du Cloud Sovereignty Framework de l'UE, des fournisseurs IT ont publié des outils d'(auto)évaluation qui illustrent la manière dont ils s'approprient la notion de souveraineté numérique.
The...
9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors
2026-03-18 11:42:00
Cybersecurity researchers have warned about the risks posed by low-cost IP KVM (Keyboard, Video, Mouse over Internet Protocol) devices, which can grant attackers extensive control over compromised hosts.
The...
CVE-2026-3888: Ubuntu Desktop 24.04+ vulnerable to Root exploit
2026-03-18 11:35:29
Ubuntu flaw CVE-2026-3888 lets attackers gain root via a systemd timing exploit, affecting Desktop 24.04+ with high severity. Qualys researchers found a high-severity flaw, tracked as CVE-2026-3888 (CVSS...
Ubuntu Flask Important Info Exposure CVE-2026-27205 USN-8104-1
2026-03-18 11:27:47
Flask could be made to expose sensitive information over the network.
Avec Forge, Mistral AI personnalise les modèles IA des entreprises
2026-03-18 11:26:31
De plus en plus d’entreprises souhaitent personnaliser les LLM en fonction de leurs besoins et des exigences de conformité pour mieux (...)
Cursor IDE expose les développeurs à des cyberattaques sophistiquées
2026-03-18 11:21:51
Les chercheurs de Proofpoint viennent de révéler une vulnérabilité inquiétante dans Cursor IDE, l’éditeur de code dopé à l’IA qui compte des millions d’utilisateurs. Recherche...
Apple patches WebKit bug that could let sites access your data
2026-03-18 11:19:59
Apple has released a Background Security Improvement that silently fixes a WebKit vulnerability (CVE-2026-20643).
Domitys met le cap sur la data et la cybersécurité
2026-03-18 11:18:25
Arrivé il y a un an à la tête de la DSI, Romain Dachy déroule une feuille de route ambitieuse sur six ans. Au menu : chantiers fondateurs et pragmatisme technologique.
The post Domitys met le cap...
Kaspersky découvre des infostealers imitant Claude Code, OpenClaw et autres outils de développement d'IA
2026-03-18 11:17:27
En mars 2026, l’équipe Threat Research de Kaspersky a identifié une nouvelle campagne malveillante ciblant les développeurs qui cherchent à installer Claude Code, l’agent d'IA créé...
Découverte : moteur pirate de données massives
2026-03-18 11:01:10
Découverte d'un outil qui agrège des milliards de données piratées et les vend à la recherche.
The SOC Files: Time to “Sapecar”. Unpacking a new Horabot campaign in Mexico
2026-03-18 11:00:14
Kaspersky SOC uncovered and analyzed a complex Horabot campaign in Mexico. In this article we share insights into how it is unleashed and how to hunt for this threat.
Rapport GTIG / Evolution du paysage des ransomwares en 2025
2026-03-18 10:45:50
Le Google Threat Intelligence Group (GTIG) vient de publier un rapport complet sur le paysage des ransomwares en 2025, analysant les tactiques, techniques et procédures observées lors des incidents...
Étude Mimecast : 42 % des organisations observent une augmentation des comportements internes malveillants
2026-03-18 10:40:18
Une étude internationale révèle un fossé entre sensibilisation et action face à la montée des cyberattaques liées à l'IA et à l'expansion des outils collaboratifs. Le rapport Mimecast State...
Product Walkthrough: How Mesh CSMA Reveals and Breaks Attack Paths to Crown Jewels
2026-03-18 10:30:00
Security teams today are not short on tools or data. They are overwhelmed by both.
Yet within the terabytes of alerts, exposures, and misconfigurations – security teams still struggle to understand...
New ClickFix Scam Tricks Users Into Mapping Hacker-Controlled Drives
2026-03-18 10:21:36
A new ClickFix scam tricks Windows users into running hidden commands that map hacker-controlled drives and load malware…
Cyberattaque à la BnF : données exposées
2026-03-18 10:14:07
Cyberattaque à la BnF via un prestataire, données personnelles exposées et réponse coordonnée des autorités françaises.
Ubuntu 24.04 LTS snapd Important Privilege Escalation Fix USN-8102-2
2026-03-18 09:29:01
USN-8102-1 introduced a regression in snapd
MEXC Tops New Listings and Secures #2 with 8.2% Global Spot Market Share
2026-03-18 09:15:04
MEXC ranked among the top global crypto exchanges with 1,281 token listings between 2025 and 2026, the highest among major CEXs. It secured 8.2% of global spot market share and 11.8% in perpetual futures,...
Robotic surgery firm Intuitive reports data breach after targeted phishing attack
2026-03-18 09:08:53
Intuitive suffered a phishing attack leading to a data breach exposing customer, employee, and corporate information. Intuitive is an American company that designs, manufactures, and sells robotic systems...
The Call of the Wild Comes Alive
2026-03-18 09:00:05
Buck earns riches for his master, joins an epic Yukon expedition, and experiences freedom and survival in the wilderness. He encounters wolves, hunts moose, and follows the mysterious call of the wild,...
Inside a network of 20,000+ fake shops
2026-03-18 08:51:46
A sprawling network of fake shops, all built for one purpose: to steal your payment details and personal data.
Tracking the Iran War: A Month of Escalation and Regional Impact
2026-03-18 08:46:36
Iran war likely prolonged, increasing cyber threats, energy disruption, and instability, with companies in the Middle East facing higher risk. Follow me on Twitter: @securityaffairs and Facebook and Mastodon...
SUSE Linux Enterprise 15 Container-SUSEConnect Important Update 2026-0909-1
2026-03-18 08:30:17
# Security update for container-suseconnect Announcement ID: SUSE-SU-2026:0909-1 Release Date: 2026-03-17T17:34:35Z Rating: important References:
SUSE vim Moderate Update 2026-0910-1 Security Flaws Patch
2026-03-18 08:30:16
An update that solves three vulnerabilities can now be installed.
Ubuntu 22.04 vim Major Security Flaw Under Scrutiny SEC-ALERT-2028-4216-5
2026-03-18 08:30:16
An update that solves three vulnerabilities can now be installed.
Nasir'Hacker, cyberguerre et fabrique de l'influence
2026-03-18 08:22:25
Le pirate Nasir enchaîne les revendications cyber au nom du Hamas. Analyse d'un acteur entre influence, intimidation et cyberguerre.
Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit
2026-03-18 08:08:00
A high-severity security flaw affecting default installations of Ubuntu Desktop versions 24.04 and later could be exploited to escalate privileges to the root level.
Tracked as CVE-2026-3888 (CVSS score:...
Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS
2026-03-18 06:31:00
Apple on Tuesday released its first round of Background Security Improvements to address a security flaw in WebKit that affects iOS, iPadOS, and macOS.
The vulnerability, tracked as CVE-2026-20643 (CVSS...
Aura - 903,080 breached accounts
2026-03-18 05:29:58
In March 2026, the online safety service Aura disclosed a data breach that exposed 900k unique email addresses. The data was primarily associated with a marketing tool from a previously acquired company,...
How I Found a Critical Authentication Bypass in a Lightning Network SDK (CVSS 9.8)
2026-03-18 04:11:18
A bug bounty journey through Rust cryptography, webhook validation, and real-world exploitationDisclaimer: This vulnerability was responsibly disclosed through an official bug bounty program. The program...
How I Discovered a Complete CSRF Protection Bypass on a Major Crypto Exchange And What Happened…
2026-03-18 04:11:11
How I Discovered a Complete CSRF Protection Bypass on a Major Crypto Exchange And What Happened NextA bug bounty story about persistence, Django internals, and a hard lesson about program scopeIntroductionEvery...
The Dark Web: What Really Exists Beyond Google
2026-03-18 04:09:39
Inside the Hidden Internet Most People Will Never SeeContinue reading on InfoSec Write-ups »
Exam Review: Certified Social Engineering Defense Practitioner (CSEDP)
2026-03-18 04:06:38
My Experience with the Certified Social Engineering Defense Practitioner (CSEDP)Continue reading on InfoSec Write-ups »
Lame Box From HTB
2026-03-18 04:05:28
Lame box was relatively an easy box, it's considered one of the easiest boxes on HTB and was launched in the beginning of HTB.Hack The Box :: Penetration Testing LabsTools we are gonna use in this...
Photographer Box, Proving Grounds
2026-03-18 04:05:20
In every Penetration testing engagement we start by the first step which is Recon or Stands for Reconnaissance, in which the attacker prepares for the attack by scanning the target device for flaws or...
USN-8104-1: Flask vulnerability
2026-03-18 03:18:47
Shourya Jaiswal discovered that Flask did not correctly mark certain web
responses as user-specific. A remote attacker could possibly use this
issue to obtain sensitive information.
Apple pushes first Background Security Improvements update to fix WebKit flaw
2026-03-18 01:06:31
Apple has released its first Background Security Improvements update to fix a WebKit flaw tracked as CVE-2026-20643 on iPhones, iPads, and Macs without requiring a full operating system upgrade. [...]
List of 12 new domains
2026-03-18 00:00:00
.fr casino-millionz-france[.fr] (registrar: Dynadot Inc)
casinoolympe[.fr] (registrar: FUNCALL BV)
casinos-simsinos[.fr] (registrar: Dynadot Inc)
cpam92[.fr] (registrar: XNS Registrar B.V.)
fr-spinfin[.fr]...
Multiples vulnérabilités dans Node.js (18 mars 2026)
18/03/2026
De multiples vulnérabilités ont été découvertes dans Node.js. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Multiples vulnérabilités dans Suricata (18 mars 2026)
18/03/2026
De multiples vulnérabilités ont été découvertes dans Suricata. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Multiples vulnérabilités dans MongoDB (18 mars 2026)
18/03/2026
De multiples vulnérabilités ont été découvertes dans MongoDB. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Vulnérabilité dans Citrix XenServer (18 mars 2026)
18/03/2026
Une vulnérabilité a été découverte dans Citrix XenServer. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Multiples vulnérabilités dans GLPI (18 mars 2026)
18/03/2026
De multiples vulnérabilités ont été découvertes dans GLPI. Elles permettent à un attaquant de provoquer une injection SQL (SQLi) et un contournement de la politique de sécurité.
Vulnérabilité dans les produits Apple (18 mars 2026)
18/03/2026
Une vulnérabilité a été découverte dans les produits Apple. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Multiples vulnérabilités dans les produits Atlassian (18 mars 2026)
18/03/2026
De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni...
Multiples vulnérabilités dans les produits VMware (18 mars 2026)
18/03/2026
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.