Toute l'actualité de la Cybersécurité
Microsoft intègre Cowork d'Anthropic à Copilot
2026-03-31 17:55:18
Si Microsoft est historiquement proche d’Open AI, cela ne l’empêche pas d’aller aussi voir ailleurs pour étendre ses projets (...)
Cisco source code stolen in Trivy-linked dev environment breach
2026-03-31 17:53:04
Cisco has suffered a cyberattack after threat actors used stolen credentials from the recent Trivy supply chain attack to breach its internal development environment and steal source code belonging to...
Opération Alice, le dark web sous pression
2026-03-31 16:59:00
Opération Alice : 373 000 sites onion fermés, 440 clients identifiés et un vaste réseau cybercriminel exposé.
VRP 2025 Year in Review
2026-03-31 16:55:00
Posted by Dirk Göhmann, Tony Mendez, and the Vulnerability Rewards Program Team2025 marked a special year in the history of vulnerability rewards and bug bounty programs at Google: our 15th anniversary...
Le faux live GTA qui a mené à la prison à vie !
2026-03-31 16:28:52
Faux live GTA, vidéosurveillance, effacement des traces : comment un alibi numérique a conduit un youtubeur à la perpétuité.
En commission d'enquête, Capgemini défend sa « neutralité »
2026-03-31 16:20:37
Capgemini n'a « pas d'intérêt à proposer une solution plutôt qu'une autre », selon son P-DG, qui réfute aussi toute prise de décision technologique pour le compte des clients.
The post En commission...
Le pirate était une influenceuse
2026-03-31 16:14:16
Adva Lavie, alias Mia Ventura, accusée d'avoir utilisé la confiance en ligne pour voler des victimes.
Axios Hijacked: npm Account Takeover Deploys Cross-Platform RAT to Millions
2026-03-31 16:10:12
Axios Hijacked: npm Account Takeover Deploys Cross-Platform RAT to Millions
TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks
2026-03-31 16:03:00
A high-severity security flaw in the TrueConf client video conferencing software has been exploited in the wild as a zero-day as part of a campaign targeting government entities in Southeast Asia dubbed...
Applying security fundamentals to AI: Practical advice for CISOs
2026-03-31 16:00:00
Read actionable advice for CISOs on securing AI, managing risk, and applying core security principles in today's AI‑powered environment.
The post Applying security fundamentals to AI: Practical advice...
Application Maison Blanche, les risques concrets
2026-03-31 15:57:58
Application Maison Blanche : GPS, profilage, scripts tiers, les risques concrets pour vos données et votre vie privée.
Kali Linux 2026.1 muscle l'arsenal offensif
2026-03-31 15:48:04
Kali Linux 2026.1 modernise le pentest avec nouveaux outils, refonte visuelle et avancées NetHunter.
Rethinking Vulnerability Management Strategies for Mid-Market Security
2026-03-31 15:35:55
Intruder's Chris Wallis argues mid-market teams should prioritize CVE remediation speed over vulnerability counts, while expanding defenses beyond CVEs to include attack surface management.
AI and Quantum Are Forcing a Rethink of Digital Trust
2026-03-31 15:29:11
In a conversation with Dark Reading's Terry Sweeney, DigiCert CEO Amit Sinha explains how AI-driven identities and quantum threats are reshaping the foundations of digital trust.
HackerOne touché par la fuite chez Navia
2026-03-31 15:16:05
Fuite chez Navia : 287 salariés de HackerOne exposés, avec un risque élevé de phishing ciblé et d'ingénierie sociale.
Proton lance son service de visioconférence Meet
2026-03-31 15:15:47
Après avoir intégré un éditeur de texte en 2024 et un tableur en décembre dernier, Proton ajoute à (...)
Le marché noir des données et la riposte Zataz
2026-03-31 15:02:51
Darknet, fuites et données volées : pourquoi la veille Zataz aide, sans remplacer la prévention.
Axios supply chain attack chops away at npm trust
2026-03-31 14:53:15
Developers using the axios package from npm may have downloaded a malicous version that drops a Remote Access Trojan
L'Anssi croit en un clone de SecNumCloud au niveau européen
2026-03-31 14:46:38
En début d'année, Bruxelles dévoilait une première version de la révision de la directive européenne sur la cybersécurité, (...)
How to Improve Your Debounce and Get It to Stop Lying to You
2026-03-31 14:00:38
Debouncing is a pattern that coalesces a burst of calls into one invocation after a quiet window. It gives the feeling that requests are "under control," but it does not control the request lifecycle:...
How to Categorize AI Agents and Prioritize Risk
2026-03-31 14:00:10
AI agent risk isn't equal, it scales with access to systems and level of autonomy. Token Security explains how CISOs should categorize agents and prioritize what to secure first. [...]
Nearly half a Million mobile customers of Lloyds Banking Group affected by security incident
2026-03-31 13:58:48
Lloyds Banking Group data incident exposed transactions of ~450,000 mobile banking users due to a faulty update. A faulty software update at Lloyds Banking Group exposed transaction details of nearly...
Kaplan face à une fuite de données massive
2026-03-31 13:54:52
Kaplan revoit à 1,4 million le nombre de victimes d'une fuite impliquant des données sensibles et un accès réseau prolongé.
Hackers compromise Axios npm package to drop cross-platform malware
2026-03-31 13:53:43
Hackers hijacked the npm account of the Axios package, a JavaScript HTTP client with 100M+ weekly downloads, to deliver remote access trojans to Linux, Windows, and macOS systems. [...]
Hackers Poison Axios npm Package with 100 Million Weekly Downloads
2026-03-31 13:49:04
Axios npm Package compromised in a supply chain attack, exposing developers to malware, data theft, and full system takeover risks worldwide.
WhatsApp malware campaign delivers VBS payloads and MSI backdoors
2026-03-31 13:43:05
A malware campaign uses WhatsApp messages to deliver VBS scripts that initiate a multi-stage infection chain. The attack leverages renamed Windows tools and cloud-hosted payloads to install MSI backdoors...
Un courtier d'accès russe condamné dans l'affaire Yanluowang
2026-03-31 13:36:18
Aleksei Volkov, lié à Yanluowang, condamné à 81 mois dans une affaire révélatrice des rouages du ransomware.
Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations
2026-03-31 13:31:33
Iranian APTs are blurring the lines between state-sponsored and cybercriminal activities to target high-impact US organizations.
Crunchyroll confirme une fuite via un sous-traitant
2026-03-31 13:11:20
Crunchyroll confirme une fuite liée au support client, révélatrice du risque cyber majeur porté par les sous-traitants.
Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts
2026-03-31 13:09:00
Cybersecurity researchers have disclosed a security "blind spot" in Google Cloud's Vertex AI platform that could allow artificial intelligence (AI) agents to be weaponized by an attacker to gain unauthorized...
Hackers Weaponize Legitimate Windows Tools to Disable Antivirus Before Ransomware Attacks
2026-03-31 13:02:27
Ransomware attacks have gone far beyond simple malicious code. Today, attackers operate with the precision of a well-planned business, using trusted Windows tools to quietly tear down defenses before...
Is Your Repository Ready for What's Next?
2026-03-31 13:00:04
Most software teams don't start out planning to adopt an enterprise artifact repository.
Initial Access Brokers have Shifted to High-Value Targets and Premium Pricing
2026-03-31 13:00:00
Initial Access Brokers (IABs) are a key component of the cybercrime ecosystem, offering hassle-free building blocks for ransomware, data theft, and extortion. Rapid7's analysis of H2 2025 activity across...
Proton Launches Encrypted Video Conferencing and Unified Workspace to Take On Google and Microsoft
2026-03-31 12:57:16
Swiss privacy company Proton has today announced the simultaneous launch of Proton Workspace and Proton Meet, its most significant expansion yet into the enterprise productivity market and a direct challenge...
Google Unveils Ransomware Detection and File Restoration for Google Drive
2026-03-31 12:47:59
Google has officially moved its ransomware detection and file restoration features for Google Drive into General Availability. Originally launched in beta in September 2025, the updated security controls...
[Spécial Forum InCyber] « Maîtriser nos dépendances numériques »
2026-03-31 12:40:40
La souveraineté est au cœur de l'édition 2026 du Forum International de la Cybersécurité à Lille, auquel Splunk participe. L'occasion pour Les Résilients d'aborder les enjeux de data, de...
Hackers Deploy Telegram-Based ResokerRAT With Screenshot and Persistence Features
2026-03-31 12:39:05
A new remote access trojan known as ResokerRAT has come to light, using Telegram’s bot API as its core communication channel to silently monitor and control infected Windows machines. What makes...
The CISO Gap: Why Every Business Needs Cybersecurity Leadership
2026-03-31 12:19:42
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 31, 2026 – Read the full story in Forbes One message has persisted over the past few years: cybersecurity...
Microsoft fixes Outlook Classic crashes caused by Teams Meeting add-in
2026-03-31 12:04:15
Microsoft has resolved a known issue that rendered the classic Outlook email client unusable for users who enabled the Microsoft Teams Meeting Add-in. [...]
NCSC warns of messaging app targeting
2026-03-31 12:00:00
The NCSC has issued actions for individuals at risk of targeted attacks against messaging apps.
Avec Mythos, Anthropic risque de bouleverser le marché de la cybersécurité
2026-03-31 11:57:20
Anthropic n’avait pas l’intention d’introduire Mythos de cette manière. C’est une fuite de données dans son système (...)
The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority
2026-03-31 11:50:00
The cybersecurity landscape is accelerating at an unprecedented rate. What is emerging is not simply a rise in the number of vulnerabilities or tools, but a dramatic increase in speed. Speed of attack,...
Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains
2026-03-31 11:46:00
Chinese-speaking users are the target of an active campaign that uses typosquatted domains impersonating trusted software brands to deliver a previously undocumented remote access trojan named AtlasCross...
LangChain touché par une troisième faille de sécurité
2026-03-31 11:40:20
Les utilisateurs de LangChain doivent redoubler de vigilance. En décembre dernier, ce framework modulaire pour Python et TypeScript/JavaScript servant (...)
Critical F5 BIG-IP Flaw Upgraded to 9.8 RCE, Exploited in the Wild
2026-03-31 11:36:21
F5 BIG-IP APM flaw CVE-2025-53521 escalates to critical 9.8 RCE, actively exploited. Patch now, check IoCs, and secure vulnerable systems immediately.
Dutch Ministry of Finance takes treasury systems offline amid cyber incident investigation
2026-03-31 11:34:19
The Dutch Ministry of Finance took treasury banking portal offline after a cyberattack; core tax systems were not affected. The Dutch Ministry of Finance took parts of its infrastructure offline, including...
Unmasking the Truth
2026-03-31 11:30:29
Ralph Paton explains his actions, revealing his secret marriage to Ursula and the challenges he faced while in hiding. Dr. Sheppard discreetly assisted him, keeping him out of police reach. Poirot carefully...
Anthropic's Claude Code Source Code Reportedly Leaked Via Their npm Registry
2026-03-31 11:29:13
Anthropic’s proprietary Claude Code CLI tool has had its full TypeScript source code inadvertently exposed through a misconfigured npm package, after a security researcher discovered a leaked .map...
La SNCF, utilisatrice désormais primée de l'écosystème Kubernetes
2026-03-31 11:03:40
La CNCF a décerné au groupe français un community award (« meilleur utilisateur final ») pour son usage des projets de l'écosystème Kubernetes.
The post La SNCF, utilisatrice désormais primée...
The High Cost of Hesitation: Why the Senate Must Provide CLARITY
2026-03-31 11:01:05
The debate over digital asset regulation in the U.S. was framed as a battle between "pro-innovation" pioneers and 'pro-consumer' watchdogs. By failing to establish a comprehensive federal market structure...
WordPress Plugin Vulnerability Exposes Sensitive Data From 800,000+ Sites
2026-03-31 10:59:06
A high-severity security flaw has been disclosed in Smart Slider 3, one of the most widely used WordPress slider builder plugins. With over 800,000 active installations, this vulnerability leaves a massive...
EvilTokens Emerges as New Phishing-as-a-Service Platform for Microsoft Account Takeover
2026-03-31 10:58:41
A new and dangerous phishing toolkit has entered the cybercrime scene. In early 2026, a Phishing-as-a-Service platform called EvilTokens began circulating in underground cybercrime communities, offering...
ChatGPT Vulnerability Let Attackers Silently Exfiltrate User Prompts and Other Sensitive Data
2026-03-31 10:48:43
Users routinely trust AI assistants with highly sensitive information, including medical records, financial documents, and proprietary business code. Check Point Research recently disclosed a critical...
Ubuntu 18.04 LTS Pillow Critical DoS Buffer Overflow Bug USN-8135-1
2026-03-31 10:46:11
Several security issues were fixed in Pillow.
MIWIC26: Gizem Acar Tekin, CEO and Co-founder of Photarix
2026-03-31 10:45:53
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature...
ZepoteQ Earns an 87.4 Proof of Usefulness Score by Building Scalable SaaS Platforms and Business Automation Tools
2026-03-31 10:41:42
ZepoteQ is a software development company focused on building SaaS platforms, CRM systems, and automation tools for startups and growing businesses. Using modern technologies like React, Next.js, and...
CareCloud Data Breach – Hackers Accessed IT Infrastructure and Stole Patient Data
2026-03-31 10:40:56
A prominent healthcare technology provider has formally disclosed a significant cybersecurity incident involving unauthorized access to its IT infrastructure. An unauthorized actor compromised one of...
Video Wizard Earns a 43 Proof of Usefulness Score by Building an AI-Powered Video Content Analysis Platform
2026-03-31 10:29:36
Video Wizard is an open-source tool that automates video editing, subtitle generation, and viral clip identification using AI. Built with technologies like Next.js, Remotion, and OpenCV, it streamlines...
Equinix simplifie la gestion des ressources IA distribuées
2026-03-31 10:26:56
La prolifération des données a toujours été un problème récurrent pour les responsables IT. Cependant, à (...)
Nostr WoT Earns a 57 Proof of Usefulness Score by Building a Portable Web of Trust Layer for the Browser
2026-03-31 10:20:31
Nostr WoT is a browser extension that embeds a Web of Trust layer directly into the user's browsing environment, enabling decentralized reputation and spam filtering across all Nostr clients. By running...
Typhoon Earns a 46 Proof of Usefulness Score by Building Robust Retry Policies for Asynchronous Swift Operations
2026-03-31 10:04:45
Typhoon is a lightweight Swift framework designed to handle transient failures in asynchronous operations using modern async/await patterns. By offering configurable retry strategies and type-safe integrations,...
Double Agents: Exposing Security Blind Spots in GCP Vertex AI
2026-03-31 10:00:56
Unit 42 uncovers a "double agent" flaw in Google Cloud's Vertex AI, demonstrating how overprivileged AI agents can compromise cloud environments.
The post Double Agents: Exposing Security Blind Spots...
USN-8136-1: Dovecot vulnerabilities
2026-03-31 09:48:59
It was discovered that Dovecot incorrectly handled invalid base64 SASL data.
An attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 25.10. (CVE-2025-59028)
It...
U.S. CISA adds a flaw in Citrix NetScaler to its Known Exploited Vulnerabilities catalog
2026-03-31 09:31:41
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Citrix NetScaler to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency...
Hacker charged with stealing million from Uranium crypto exchange
2026-03-31 09:15:45
U.S. prosecutors have charged a Maryland man with stealing more than million after hacking the Uranium Finance crypto exchange twice and laundering the proceeds through a cryptocurrency mixer. [...]...
Apple New macOS Tahoe Feature Warns Users on ClickFix Attacks
2026-03-31 09:03:54
Apple has introduced a new security mechanism in the macOS Tahoe 26.4 release candidate to protect users against social engineering campaigns known as ClickFix attacks. Discovered by users testing the...
Forum INCYBER : les 4 lauréats du Prix de la Start-Up
2026-03-31 09:03:04
Pour la première fois, le prix de la Start-Up du Forum INCYBER consacre un double lauréat. Elles sont donc 4 sociétés pour 5 récompenses.
The post Forum INCYBER : les 4 lauréats du Prix de la Start-Up...
The Man Who Thinks AI Can Beat the Market
2026-03-31 09:00:48
FINQ is betting AI can fully replace human portfolio managers. Its AI-managed ETFs analyze financials, sentiment, and market data across the S&P 500 to rank stocks daily. Unlike humans, AI removes...
CISA Warns of Citrix NetScaler Vulnerability Actively Exploited in Attacks
2026-03-31 08:58:33
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding a critical vulnerability affecting Citrix NetScaler products. Identified as CVE-2026-3055, this security...
Kaspersky identifie le kit d'exploitation Coruna comme une évolution majeure d'Opération Triangulation
2026-03-31 08:56:44
L’équipe du GReAT (Global Research and Analysis Team) de Kaspersky a mené une analyse approfondie du code source des exploits Coruna et a déterminé avec certitude que ce kit constitue une itération...
Cybersécurité : arrêtons de nous raconter des histoires
2026-03-31 08:52:54
Il y a quelque chose d’étrange dans notre secteur : plus on investit, plus on se fait attaquer ! On le sait, on en parle, et on continue à peu près comme avant. Ce n’est pas un manque...
Quiet Cost Earns a 34 Proof of Usefulness Score by Building an Executive Diagnostic Tool for Hidden Revenue Leakage
2026-03-31 08:45:46
Quiet Cost is a diagnostic tool designed to help businesses identify hidden sources of revenue leakage caused by inefficiencies, outdated processes, and misaligned decisions. Through a short, structured...
SUSE 2026 WebKitGTK3 Important Denial Of Service Advisory 1150-1
2026-03-31 08:30:46
An update that solves 25 vulnerabilities can now be installed.
openSUSE Leap 15.4 webkit2gtk3 Important Memory Issues Vuln 2026-1150-1
2026-03-31 08:30:46
An update that solves 25 vulnerabilities can now be installed.
Exposé
2026-03-31 08:30:06
Poirot hosts a strategic reunion of all Fernly Park suspects, presenting Ursula Paton's secret marriage and analyzing critical clues, including the dictaphone and summer-house timeline. He confirms...
From SQL Analytics to Predictive Decision Systems: Operationalizing ML Models in Business Operation
2026-03-31 08:10:11
SQL analytics shows what happened, but modern businesses need to act on what will happen next. The real challenge isn't building ML models, it's operationalizing them. That means feature stores to...
Why Your Kubernetes Platform Team Is Still Answering Tickets in 2026
2026-03-31 08:08:10
Kubernetes doesn't fail at scale because of infrastructure, it fails because of inconsistent human processes. Namespace-as-a-Service (NaaS) fixes this by enforcing policy before automation. Build constraints...
Ubuntu 20.04 LTS Pyasn1 High Risk DoS Vulnerabilities USN-8134-1
2026-03-31 07:58:35
Several security issues were fixed in pyasn1.
Ubuntu 24.04 ImageMagick Critical DoS Risk USN-8127-1 CVE-2026-23952
2026-03-31 07:55:55
Several security issues were fixed in ImageMagick.
Dutch Finance Ministry takes treasury banking portal offline after breach
2026-03-31 07:52:15
The Dutch Ministry of Finance took some of its systems offline, including the digital portal for treasury banking, while investigating a cyberattack detected two weeks ago. [...]
Common Entra ID Security Assessment Findings – Part 2: Privileged Unprotected Groups
2026-03-31 07:41:32
In part 2 of our 4-part series on common Entra ID security findings, we show how seemingly harmless group configurations can be abused to bypass security controls and gain high privileges.
The post shows...
Mageia 9 ZynAddSubFX Bugfix Advisory MGAA-2026-0024 Released Soon
2026-03-31 07:31:58
MGAA-2026-0024 - Updated zynaddsubfx packages fix bug
Qilin Ransomware allegedly breached chemical manufacturer giant Dow Inc
2026-03-31 07:21:16
Qilin ransomware claims a breach of Dow Inc., listing it on its Tor leak site, but no proof of the hack has been released yet. Qilin Ransomware group allegedly breached the chemical manufacturing giant...
CISA orders feds to patch actively exploited Citrix flaw by Thursday
2026-03-31 07:05:25
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered government agencies to patch their Citrix NetScaler appliances against an actively exploited vulnerability by Thursday. [...]
️ SQL Injection for Beginners: The Complete Guide
2026-03-31 06:59:59
Welcome to one of the most important topics in cybersecurity! SQL Injection is a vulnerability that has been around since the late 1990s…Continue reading on InfoSec Write-ups »
Why Most Cybersecurity Beginners Never Become Hackers
2026-03-31 06:55:25
I watched hundreds start the journey. Only a few made it to the other side.Continue reading on InfoSec Write-ups »
Before You Touch Nmap: Networking Fundamentals Every Beginner Must Understand
2026-03-31 06:53:18
Before you run a single Nmap command, you need to understand how networks actually work.Nmap is not magic — it is a tool that speaks the same language every device on the internet understands....
SAR — CVE-2019–12454 in sar2html and a Writable Cron Script That Got Me Root | OffSec PG
2026-03-31 06:52:58
SAR is an easy-rated Linux machine on OffSec Proving Grounds Play. Two services are exposed: SSH on 22 and Apache on 80. The web server hosts sar2html v3.2.1, a system activity reporting tool that passes...
Cuties AI - 144,250 breached accounts
2026-03-31 06:52:52
In March 2026, the NSFW AI companion platform Cuties AI suffered a data breach that was subsequently published to a public hacking forum. The incident exposed 144k unique email addresses along with display...
Understanding OT Cybersecurity: A Practical Guide to Asset Inventory for Industrial Control…
2026-03-31 06:49:55
Industrial control systems run the backbone of our modern world — from power grids and water treatment plants to manufacturing floors and…Continue reading on InfoSec Write-ups »
Thinking Tokens Are the New Denial-of-Wallet Attack Surface
2026-03-31 06:49:19
Last month I burned through 0 in API credits in a single day. Not because I was doing anything fancy. I was running a batch of security classification prompts through Gemini 3 Flash, and I picked it...
The Axios npm Compromise: How the Internet's Most Popular HTTP Client Became a Trojan Horse
2026-03-31 06:45:58
A hijacked maintainer account. A phantom dependency. A self-erasing Remote Access Trojan. If you ran npm install on March 31, 2026, your infrastructure might already be compromised.The axios npm compromise...
Your Secure Messenger is Spying on You (And You Can't Turn It Off)
2026-03-31 06:44:51
No malware. No clicking on sketchy links. All a hacker needs is your phone number to track your sleep schedule, app usage, and physical location.When the ‘Careless Whisper' research was first published...
How I Attacked Active Directory During OSCP Labs (And What Tools Actually Worked)
2026-03-31 06:43:37
Welcome to this new blog where we’ll be diving into Active Directory attacks for OSCP.Continue reading on InfoSec Write-ups »
Anglerphish — A Feature-Rich Gophish Fork
2026-03-31 06:37:20
Anglerphish — A Feature-Rich Gophish ForkFrom Side Project to an Upgraded Gophish PlatformIf you work in cyber security, chances are you've come across Gophish at some point — whether...
Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account
2026-03-31 06:08:00
The popular HTTP client known as Axios has suffered a supply chain attack after two newly published versions of the npm package introduced a malicious dependency that delivers a trojan capable of targeting...
AI Agents Are Democratizing Finance but Also Redefining Risk
2026-03-31 00:41:17
AI agents are transforming finance, enabling automated trading and payments, but introduce new risks around keys, data inputs and secure execution control.
USN-8135-1: Pillow vulnerabilities
2026-03-31 00:19:20
It was discovered that Pillow did not correctly handle reading J2K files,
which could lead to an out-of-bounds read vulnerability. If a user or
automated system were tricked into opening a specially crafted...
Multiples vulnérabilités dans Papercut (31 mars 2026)
31/03/2026
De multiples vulnérabilités ont été découvertes dans Papercut. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et une injection de code indirecte à...
Vulnérabilité dans Symantec Data Loss Prevention (DLP) (31 mars 2026)
31/03/2026
Une vulnérabilité a été découverte dans Symantec Data Loss Prevention (DLP). Elle permet à un attaquant de provoquer une élévation de privilèges.
Vulnérabilité dans Elastic OpenTelemetry Java (31 mars 2026)
31/03/2026
Une vulnérabilité a été découverte dans Elastic OpenTelemetry Java. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.
Multiples vulnérabilités dans Microsoft Edge (31 mars 2026)
31/03/2026
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Multiples vulnérabilités dans les produits Microsoft (31 mars 2026)
31/03/2026
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Multiples vulnérabilités dans les produits FoxIT (31 mars 2026)
31/03/2026
De multiples vulnérabilités ont été découvertes dans les produits FoxIT. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges...