Toute l'actualité de la Cybersécurité


ConnectWise patches new flaw allowing ScreenConnect hijacking

2026-03-18 18:10:35
ConnectWise is warning ScreenConnect customers of a cryptographic signature verification vulnerability that could lead to unauthorized access and privilege escalation. [...]

Lire la suite »

Cisco Firewall 0-day Vulnerability Exploited in the Wild to Deploy Interlock Ransomware

2026-03-18 17:45:06
An active campaign by the Interlock ransomware group is exploiting a critical zero-day vulnerability (CVE-2026-20131) in Cisco Secure Firewall Management Center (FMC) Software. Cisco disclosed the flaw...

Lire la suite »

OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs

2026-03-18 17:26:00
The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) has sanctioned six individuals and two entities for their involvement in the Democratic People's Republic of Korea (DPRK)...

Lire la suite »

“Claudy Day” Flaws Allow Data Theft via Fake Claude AI Ads, Report

2026-03-18 17:21:48
Researchers detail “Claudy Day” flaws in Claude AI that could enable data theft using fake Google Ads, hidden…

Lire la suite »

Researchers found font-rendering trick to hide malicious commands

2026-03-18 17:16:59
Researchers found a way to trick AI assistants into missing dangerous user instructions on a website.

Lire la suite »

New iOS Exploit With Advanced iPhone Hacking Tools Attacking Users to Steal Personal Data

2026-03-18 17:13:21
A sophisticated full-chain iOS exploit kit dubbed DarkSword, actively deployed by multiple commercial surveillance vendors and state-sponsored threat actors since at least November 2025 to steal sensitive...

Lire la suite »

The High Cost of Slow Triage: How to Make Tier 1 the Fastest Layer in Your SOC

2026-03-18 17:04:20
Why do so many SOCs still struggle to move quickly even with strong detection tools in place? In many cases, the real bottleneck is Tier 1 triage. When alerts take too long to validate, resources...

Lire la suite »

Ransomware gang exploits Cisco flaw in zero-day attacks since January

2026-03-18 16:53:42
The Interlock ransomware gang has been exploiting a maximum severity remote code execution (RCE) vulnerability in Cisco's Secure Firewall Management Center (FMC) software in zero-day attacks since late...

Lire la suite »

Arnaques aux faux colis : pourquoi vos vieux réflexes ne suffisent plus

2026-03-18 16:07:50
Avec l'intelligence artificielle, les escrocs transforment le smishing par SMS en piège visuel ultra-personnalisé : fausses photos de colis, étiquettes à votre nom et logos de transporteurs, le...

Lire la suite »

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

2026-03-18 16:00:00
Amazon Threat Intelligence is warning of an active Interlock ransomware campaign that's exploiting a recently disclosed critical security flaw in Cisco Secure Firewall Management Center (FMC) Software. The...

Lire la suite »

Observability for AI Systems: Strengthening visibility for proactive risk detection

2026-03-18 16:00:00
As AI systems grow more autonomous, observability becomes essential. Learn how visibility into AI behavior helps detect risk and strengthen secure development. The post Observability for AI Systems: Strengthening...

Lire la suite »

USN-8107-1: Linux kernel (AWS FIPS) vulnerabilities

2026-03-18 15:44:44
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - x86 architecture; ...

Lire la suite »

Le Cispe monte au créneau de la pseudo-souveraineté des offres cloud

2026-03-18 15:42:46
Pas moins de 24 dirigeants membres du Cispe (Cloud Infrastructure Services Providers in Europe) - dont Numspot, Clever Cloud, Ikoula, Thésée (...)

Lire la suite »

OpenAI Launches GPT-5.4 Mini and Nano to Provide Answers 2X Faster

2026-03-18 15:36:15
OpenAI has officially launched GPT-5.4 mini and GPT-5.4 nano, releasing its most capable small models designed to handle high-volume, latency-sensitive workloads. The new mini iteration offers a significant...

Lire la suite »

Ocean Network Launches Beta For Affordable P2P GPU Orchestration

2026-03-18 15:35:23
Ocean Network is a decentralized, peer-to-peer (P2P) compute network for pay-per-use jobs. The Ocean Orchestrator integrates natively with VS Code, Cursor, Windsurf, and Antigravity. Users are charged...

Lire la suite »

UIDAI Launches Bug Bounty Programme to Strengthen Aadhaar Security

2026-03-18 15:33:16
The Unique Identification Authority of India (UIDAI) has officially launched its first structured Bug Bounty Programme. This initiative aims to enhance the security posture of the Aadhaar ecosystem, which...

Lire la suite »

Marquis: Ransomware gang stole data of 672K people in cyberattack

2026-03-18 15:32:39
Marquis, a Texas-based financial services provider, revealed this week that a ransomware gang stole the data of over 670,000 individuals in an August 2025 cyberattack that also disrupted operations at...

Lire la suite »

USN-8098-3: Linux kernel vulnerabilities

2026-03-18 15:28:39
Qualys discovered that several vulnerabilities existed in the AppArmor Linux kernel Security Module (LSM). An unprivileged local attacker could use these issues to load, replace, and remove arbitrary...

Lire la suite »

Apple WebKit Vulnerability Enables Malicious Web Content Bypass on iOS and macOS

2026-03-18 15:28:22
Apple has released critical security patches to address a high-severity WebKit vulnerability that allows maliciously crafted web content to bypass the Same Origin Policy. Released on March 17, 2026, these...

Lire la suite »

Agentforce dans Salesforce Suites : le passage à l'échelle se précise

2026-03-18 15:20:47
Salesforce concrétise une première intégration directe d'Agentforce dans ses suites PME, en le réservant toutefois aux forfaits payants. The post Agentforce dans Salesforce Suites : le passage à...

Lire la suite »

Researchers warn of unpatched, critical Telnetd flaw affecting all versions

2026-03-18 15:06:28
CVE-2026-32746 is a critical flaw in GNU InetUtils telnetd that allows remote attackers to execute code with elevated privileges Cybersecurity company Dream disclosed a critical flaw, tracked as CVE-2026-32746...

Lire la suite »

The Courtroom is a State Machine: Architecting Agentic Memory for Litigators

2026-03-18 15:06:26
Can a generative AI agent truly navigate the intricate, ever-shifting facts of a complex judicial trial? While standard language models fail to track how evidence chronologically mutates over time, I...

Lire la suite »

'Claudy Day' Trio of Flaws Exposes Claude Users to Data Theft

2026-03-18 15:05:58
A prompt injection vulnerability paired with other flaws can turn a Google search into a full attack chain that could threaten enterprise networks.

Lire la suite »

Bitcoin Moves First Because It's the Capital Gateway, Not Because It's King

2026-03-18 14:56:47
Bitcoin leads altcoins not due to market prestige, but because it's the primary on-ramp for institutional and retail capital entering crypto. The lag between Bitcoin's move and altcoin follow-through...

Lire la suite »

New Malware Campaigns Turn Network Devices Into DDoS Nodes and Crypto-Mining Bots

2026-03-18 14:55:28
Network security has taken another hard hit. Two previously unknown malware strains have emerged, quietly turning routers, IoT devices, and enterprise network equipment into weapons for large-scale distributed...

Lire la suite »

Orchid Security Recognized by Gartner® As a Representative Vendor of Guardian Agents

2026-03-18 14:44:01
Orchid Security has been recognized as a Representative Vendor in [Gartner's Market Guide for Guardian Agents] The company finds that the growing use of AI agents exponentially expands the amount of...

Lire la suite »

FancyBear Server Exposure Reveals Stolen Credentials, 2FA Secrets and NATO-Linked Targets

2026-03-18 14:43:18
A serious operational security failure by Russian state-linked hacking group FancyBear has given security researchers an unusually clear view into an active espionage campaign targeting government and...

Lire la suite »

Flare et IBM X-Force dévoilent l'infrastructure à l'origine d'une fraude mondiale orchestrée par des informaticiens nord-coréens

2026-03-18 14:39:42
Un nouveau rapport s'appuyant sur des renseignements exclusifs révèle comment le régime nord-coréen mobilise des milliers de professionnels experts de l'IT pour infiltrer des entreprises à travers...

Lire la suite »

Cursor Your Dream, Part 1: How to Move From Product Idea to First Prompt

2026-03-18 14:37:52
This article is for people who are used to relying on development teams. It also is for those who don't have a technical background but want to build a product. The author has built two full-fledged...

Lire la suite »

ScreenConnect Vulnerability Allows Hackers to Extract Unique Machine Keys and Hijack Sessions

2026-03-18 14:37:02
ConnectWise has issued an urgent security advisory for its ScreenConnect remote desktop software, disclosing a critical cryptographic vulnerability that could allow unauthenticated attackers to extract...

Lire la suite »

LeakNet Scales Ransomware Operations With ClickFix Lures and Stealthy Deno Loader

2026-03-18 14:21:49
A ransomware group known as LeakNet has been quietly building a more dangerous attack strategy. Until recently, the group averaged about three victims per month — but new evidence shows it is scaling...

Lire la suite »

Hybrid Observability Unifies Metrics, Logs, Traces, and Data Into a Single Pane of Glass

2026-03-18 14:08:27
Too many tools, too many blind spots. Hybrid observability brings all signals into one view faster fixes, less noise, no lock-in.

Lire la suite »

The Refund Fraud Economy: Exploiting Major Retailers and Payment Platforms

2026-03-18 14:05:15
Refund fraud is now a business, with methods and tutorials sold to exploit return policies for profit. Flare shows how fraudsters turn refunds and chargebacks into a repeatable profit model. [...]

Lire la suite »

New “Darksword” iOS exploit used in infostealer attack on iPhones

2026-03-18 14:02:08
A new exploit kit for iOS devices and delivery framework dubbed "Darksword" has been used to steal a wide range of personal information, including data from cryptocurrency wallet app. [...]

Lire la suite »

Nordstrom's email system abused to send crypto scams to customers

2026-03-18 13:55:49
Customers of upscale department store chain Nordstrom received fraudulent messages from a legitimate company email address that promoted cryptocurrency scams disguised as a St. Patrick's Day promotion....

Lire la suite »

USN-8106-1: Valkey vulnerabilities

2026-03-18 13:31:29
It was discovered that Valkey incorrectly handled errors for lua scripts. An attacker could possibly use this issue to inject arbitrary information into the response stream for other clients. (CVE-2025-67733) It...

Lire la suite »

How to Organize Unit Tests for AI-Generated Code

2026-03-18 13:19:42
An Effective Method for Organizing Unit Tests in the Age of AI-Assisted Development. Software engineering has always relied heavily on unit testing. As agentic development picks up speed, it is becoming...

Lire la suite »

A Practical Guide to SwiftUI Gestures, From Tap to Composed Interactions

2026-03-18 13:06:48
This article is a deep guide to SwiftUI's gesture system, covering core gestures like tap, long press, drag, magnify, and rotation, then moving into advanced topics such as @GestureState, Transaction,...

Lire la suite »

Windsurf IDE Extension Drops Malware via Solana Blockchain

2026-03-18 13:03:55
Bitdefender researchers have discovered a malicious Windsurf IDE (integrated development environment) extension that deploys a multi-stage NodeJS stealer by using the Solana blockchain as the payload...

Lire la suite »

The Attack Cycle is Accelerating: Announcing the Rapid7 2026 Global Threat Landscape Report

2026-03-18 13:00:00
The predictive window has collapsed. In 2025, high-impact vulnerabilities weren't quietly accumulating risk. They were operationalized, and often within days.Today, Rapid7 Labs released the 2026 Global...

Lire la suite »

SideWinder Espionage Campaign Expands Across Southeast Asia

2026-03-18 13:00:00
The suspected India-linked threat group targets governments, telecom, and critical infrastructure using spear-phishing, old vulnerabilities, and rapidly rotating infrastructure to maintain persistent...

Lire la suite »

Meta, TikTok Steal Personal & Financial Info When Users Click Ads

2026-03-18 13:00:00
Tracking pixels let social media companies spy on their users even after they click over to advertiser sites, gleaning credit card info, geolocations, and more.

Lire la suite »

Pigment nomme Vincent Fournier à la tête de la France, de l'Europe du Sud et du Benelux

2026-03-18 12:53:33
Pigment nomme Vincent Fournier dans ce nouveau poste de Country Manager pour structurer son développement commercial sur ces marchés. The post Pigment nomme Vincent Fournier à la tête de la France,...

Lire la suite »

How to Train a Semi-Supervised Classifier With Pseudo-Labeling and CNN Embeddings

2026-03-18 12:50:52
Extract features with a pretrained CNN, cluster unlabeled images, propagate labels with pseudo-labelling, and train a semi-supervised classifier with PyTorch, scikit-learn, and real industrial data.

Lire la suite »

Cybersécurité offensive : Lupin & Holmes lève 5,9 millions $

2026-03-18 12:37:18
Spécialisée dans la sécurité de la Supply Chain Logicielle, Lupin & Holmes lève 5,9 millions $ pour développer sa plateforme Depi et accélérer sa commercialisation. The post Cybersécurité...

Lire la suite »

Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE

2026-03-18 12:30:00
Cybersecurity researchers have disclosed a critical security flaw impacting the GNU InetUtils telnet daemon (telnetd) that could be exploited by an unauthenticated remote attacker to execute arbitrary...

Lire la suite »

New .NET AOT Malware Hides Code as a Black Box to Evade Detection

2026-03-18 12:23:34
Researchers at Howler Cell have discovered a new .NET AOT malware campaign that uses a clever scoring system…

Lire la suite »

Avec NemoClaw, Nvidia assure une exécution sécurisée des agents OpenClaw

2026-03-18 12:15:08
Quelques semaines après l’émergence de l’agent IA open source autonome et le très fort engouement qu’il a suscité, (...)

Lire la suite »

USN-8105-1: FreeRDP vulnerabilities

2026-03-18 12:03:18
It was discovered that FreeRDP incorrectly handled certain RDP packets. A remote attacker could use this issue to cause FreeRDP to crash, resulting in a denial of service, or possibly execute arbitrary...

Lire la suite »

Rocky Linux: RLSA-2026:4728 libpng security update Security Advisories Updates

2026-03-18 12:00:48
Important: libpng security update

Lire la suite »

Adrian Grenier Steps Back Into Acting With ‘Self Custody,' A Crypto Thriller Now Streaming On Prime

2026-03-18 12:00:37
Self Custody follows a struggling father who discovers a long-forgotten Bitcoin payment may now be worth millions. As he attempts to recover the wallet, hackers and criminals begin hunting the digital...

Lire la suite »

Claude Code Security and Magecart: Getting the Threat Model Right

2026-03-18 11:58:00
When a Magecart payload hides inside the EXIF data of a dynamically loaded third-party favicon, no repository scanner will catch it – because the malicious code never actually touches your repo. As...

Lire la suite »

Souveraineté numérique : les outils d'évaluation pleuvent

2026-03-18 11:46:35
Dans la lignée du Cloud Sovereignty Framework de l'UE, des fournisseurs IT ont publié des outils d'(auto)évaluation qui illustrent la manière dont ils s'approprient la notion de souveraineté numérique. The...

Lire la suite »

9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors

2026-03-18 11:42:00
Cybersecurity researchers have warned about the risks posed by low-cost IP KVM (Keyboard, Video, Mouse over Internet Protocol) devices, which can grant attackers extensive control over compromised hosts. The...

Lire la suite »

CVE-2026-3888: Ubuntu Desktop 24.04+ vulnerable to Root exploit

2026-03-18 11:35:29
Ubuntu flaw CVE-2026-3888 lets attackers gain root via a systemd timing exploit, affecting Desktop 24.04+ with high severity. Qualys researchers found a high-severity flaw, tracked as CVE-2026-3888 (CVSS...

Lire la suite »

Ubuntu Flask Important Info Exposure CVE-2026-27205 USN-8104-1

2026-03-18 11:27:47
Flask could be made to expose sensitive information over the network.

Lire la suite »

Avec Forge, Mistral AI personnalise les modèles IA des entreprises

2026-03-18 11:26:31
De plus en plus d’entreprises souhaitent personnaliser les LLM en fonction de leurs besoins et des exigences de conformité pour mieux (...)

Lire la suite »

Cursor IDE expose les développeurs à des cyberattaques sophistiquées

2026-03-18 11:21:51
Les chercheurs de Proofpoint viennent de révéler une vulnérabilité inquiétante dans Cursor IDE, l’éditeur de code dopé à l’IA qui compte des millions d’utilisateurs. Recherche...

Lire la suite »

Apple patches WebKit bug that could let sites access your data

2026-03-18 11:19:59
Apple has released a Background Security Improvement that silently fixes a WebKit vulnerability (CVE-2026-20643).

Lire la suite »

Domitys met le cap sur la data et la cybersécurité

2026-03-18 11:18:25
Arrivé il y a un an à la tête de la DSI, Romain Dachy déroule une feuille de route ambitieuse sur six ans. Au menu : chantiers fondateurs et pragmatisme technologique. The post Domitys met le cap...

Lire la suite »

Kaspersky découvre des infostealers imitant Claude Code, OpenClaw et autres outils de développement d'IA

2026-03-18 11:17:27
En mars 2026, l’équipe Threat Research de Kaspersky a identifié une nouvelle campagne malveillante ciblant les développeurs qui cherchent à installer Claude Code, l’agent d'IA créé...

Lire la suite »

Découverte : moteur pirate de données massives

2026-03-18 11:01:10
Découverte d'un outil qui agrège des milliards de données piratées et les vend à la recherche.

Lire la suite »

The SOC Files: Time to “Sapecar”. Unpacking a new Horabot campaign in Mexico

2026-03-18 11:00:14
Kaspersky SOC uncovered and analyzed a complex Horabot campaign in Mexico. In this article we share insights into how it is unleashed and how to hunt for this threat.

Lire la suite »

Rapport GTIG / Evolution du paysage des ransomwares en 2025

2026-03-18 10:45:50
Le Google Threat Intelligence Group (GTIG) vient de publier un rapport complet sur le paysage des ransomwares en 2025, analysant les tactiques, techniques et procédures observées lors des incidents...

Lire la suite »

Étude Mimecast : 42 % des organisations observent une augmentation des comportements internes malveillants

2026-03-18 10:40:18
Une étude internationale révèle un fossé entre sensibilisation et action face à la montée des cyberattaques liées à l'IA et à l'expansion des outils collaboratifs. Le rapport Mimecast State...

Lire la suite »

Product Walkthrough: How Mesh CSMA Reveals and Breaks Attack Paths to Crown Jewels

2026-03-18 10:30:00
Security teams today are not short on tools or data. They are overwhelmed by both.  Yet within the terabytes of alerts, exposures, and misconfigurations – security teams still struggle to understand...

Lire la suite »

New ClickFix Scam Tricks Users Into Mapping Hacker-Controlled Drives

2026-03-18 10:21:36
A new ClickFix scam tricks Windows users into running hidden commands that map hacker-controlled drives and load malware…

Lire la suite »

Cyberattaque à la BnF : données exposées

2026-03-18 10:14:07
Cyberattaque à la BnF via un prestataire, données personnelles exposées et réponse coordonnée des autorités françaises.

Lire la suite »

Ubuntu 24.04 LTS snapd Important Privilege Escalation Fix USN-8102-2

2026-03-18 09:29:01
USN-8102-1 introduced a regression in snapd

Lire la suite »

MEXC Tops New Listings and Secures #2 with 8.2% Global Spot Market Share

2026-03-18 09:15:04
MEXC ranked among the top global crypto exchanges with 1,281 token listings between 2025 and 2026, the highest among major CEXs. It secured 8.2% of global spot market share and 11.8% in perpetual futures,...

Lire la suite »

Robotic surgery firm Intuitive reports data breach after targeted phishing attack

2026-03-18 09:08:53
Intuitive suffered a phishing attack leading to a data breach exposing customer, employee, and corporate information. Intuitive is an American company that designs, manufactures, and sells robotic systems...

Lire la suite »

The Call of the Wild Comes Alive

2026-03-18 09:00:05
Buck earns riches for his master, joins an epic Yukon expedition, and experiences freedom and survival in the wilderness. He encounters wolves, hunts moose, and follows the mysterious call of the wild,...

Lire la suite »

Inside a network of 20,000+ fake shops

2026-03-18 08:51:46
A sprawling network of fake shops, all built for one purpose: to steal your payment details and personal data.

Lire la suite »

Tracking the Iran War: A Month of Escalation and Regional Impact

2026-03-18 08:46:36
Iran war likely prolonged, increasing cyber threats, energy disruption, and instability, with companies in the Middle East facing higher risk. Follow me on Twitter: @securityaffairs and Facebook and Mastodon...

Lire la suite »

SUSE Linux Enterprise 15 Container-SUSEConnect Important Update 2026-0909-1

2026-03-18 08:30:17
# Security update for container-suseconnect Announcement ID: SUSE-SU-2026:0909-1 Release Date: 2026-03-17T17:34:35Z Rating: important References:

Lire la suite »

SUSE vim Moderate Update 2026-0910-1 Security Flaws Patch

2026-03-18 08:30:16
An update that solves three vulnerabilities can now be installed.

Lire la suite »

Ubuntu 22.04 vim Major Security Flaw Under Scrutiny SEC-ALERT-2028-4216-5

2026-03-18 08:30:16
An update that solves three vulnerabilities can now be installed.

Lire la suite »

Nasir'Hacker, cyberguerre et fabrique de l'influence

2026-03-18 08:22:25
Le pirate Nasir enchaîne les revendications cyber au nom du Hamas. Analyse d'un acteur entre influence, intimidation et cyberguerre.

Lire la suite »

Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit

2026-03-18 08:08:00
A high-severity security flaw affecting default installations of Ubuntu Desktop versions 24.04 and later could be exploited to escalate privileges to the root level. Tracked as CVE-2026-3888 (CVSS score:...

Lire la suite »

Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS

2026-03-18 06:31:00
Apple on Tuesday released its first round of Background Security Improvements to address a security flaw in WebKit that affects iOS, iPadOS, and macOS. The vulnerability, tracked as CVE-2026-20643 (CVSS...

Lire la suite »

Aura - 903,080 breached accounts

2026-03-18 05:29:58
In March 2026, the online safety service Aura disclosed a data breach that exposed 900k unique email addresses. The data was primarily associated with a marketing tool from a previously acquired company,...

Lire la suite »

How I Found a Critical Authentication Bypass in a Lightning Network SDK (CVSS 9.8)

2026-03-18 04:11:18
A bug bounty journey through Rust cryptography, webhook validation, and real-world exploitationDisclaimer: This vulnerability was responsibly disclosed through an official bug bounty program. The program...

Lire la suite »

How I Discovered a Complete CSRF Protection Bypass on a Major Crypto Exchange And What Happened…

2026-03-18 04:11:11
How I Discovered a Complete CSRF Protection Bypass on a Major Crypto Exchange And What Happened NextA bug bounty story about persistence, Django internals, and a hard lesson about program scopeIntroductionEvery...

Lire la suite »

The Dark Web: What Really Exists Beyond Google

2026-03-18 04:09:39
Inside the Hidden Internet Most People Will Never SeeContinue reading on InfoSec Write-ups »

Lire la suite »

Exam Review: Certified Social Engineering Defense Practitioner (CSEDP)

2026-03-18 04:06:38
My Experience with the Certified Social Engineering Defense Practitioner (CSEDP)Continue reading on InfoSec Write-ups »

Lire la suite »

Lame Box From HTB

2026-03-18 04:05:28
Lame box was relatively an easy box, it's considered one of the easiest boxes on HTB and was launched in the beginning of HTB.Hack The Box :: Penetration Testing LabsTools we are gonna use in this...

Lire la suite »

Photographer Box, Proving Grounds

2026-03-18 04:05:20
In every Penetration testing engagement we start by the first step which is Recon or Stands for Reconnaissance, in which the attacker prepares for the attack by scanning the target device for flaws or...

Lire la suite »

USN-8104-1: Flask vulnerability

2026-03-18 03:18:47
Shourya Jaiswal discovered that Flask did not correctly mark certain web responses as user-specific. A remote attacker could possibly use this issue to obtain sensitive information.

Lire la suite »

Apple pushes first Background Security Improvements update to fix WebKit flaw

2026-03-18 01:06:31
Apple has released its first Background Security Improvements update to fix a WebKit flaw tracked as CVE-2026-20643 on iPhones, iPads, and Macs without requiring a full operating system upgrade. [...]

Lire la suite »

List of 12 new domains

2026-03-18 00:00:00
.fr casino-millionz-france[.fr] (registrar: Dynadot Inc) casinoolympe[.fr] (registrar: FUNCALL BV) casinos-simsinos[.fr] (registrar: Dynadot Inc) cpam92[.fr] (registrar: XNS Registrar B.V.) fr-spinfin[.fr]...

Lire la suite »

Multiples vulnérabilités dans Node.js (18 mars 2026)

18/03/2026
De multiples vulnérabilités ont été découvertes dans Node.js. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Multiples vulnérabilités dans Suricata (18 mars 2026)

18/03/2026
De multiples vulnérabilités ont été découvertes dans Suricata. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Multiples vulnérabilités dans MongoDB (18 mars 2026)

18/03/2026
De multiples vulnérabilités ont été découvertes dans MongoDB. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Vulnérabilité dans Citrix XenServer (18 mars 2026)

18/03/2026
Une vulnérabilité a été découverte dans Citrix XenServer. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.

Lire la suite »

Multiples vulnérabilités dans GLPI (18 mars 2026)

18/03/2026
De multiples vulnérabilités ont été découvertes dans GLPI. Elles permettent à un attaquant de provoquer une injection SQL (SQLi) et un contournement de la politique de sécurité.

Lire la suite »

Vulnérabilité dans les produits Apple (18 mars 2026)

18/03/2026
Une vulnérabilité a été découverte dans les produits Apple. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.

Lire la suite »

Multiples vulnérabilités dans les produits Atlassian (18 mars 2026)

18/03/2026
De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni...

Lire la suite »

Multiples vulnérabilités dans les produits VMware (18 mars 2026)

18/03/2026
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »