Toute l'actualité de la Cybersécurité
Odido confirms massive breach; 6.2 Million customers impacted
2026-02-12 20:02:48
Hackers accessed data from 6.2 million Odido accounts, exposing names, contacts, bank details, and ID numbers. Subsidiary Ben also warned customers. Hackers broke into Dutch telecom firm Odido and accessed...
Romania's oil pipeline operator Conpet confirms data stolen in attack
2026-02-12 19:16:38
Romania's national oil pipeline operator, Conpet S.A., confirmed that the Qilin ransomware gang stole company data in an attack last week. [...]
Odido data breach exposes personal info of 6.2 million customers
2026-02-12 18:18:14
Dutch telecommunications provider Odido is warning that it suffered a cyberattack that reportedly exposed the personal data of 6.2 million customers. [...]
USN-7990-4: Linux kernel (Oracle) vulnerabilities
2026-02-12 18:09:52
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
...
Next Gen Spotlights: Creating Quiet in Moments of Noise – Q&A with Richard Allmendinger, CEO and Co-Founder of Veribee
2026-02-12 18:01:35
Veribee is on a mission to reduce noise for software teams, by striving to minimise alert-heavy tools that create noise, as opposed to confidence in what's actually secure. As one survey found, over...
ApolloMD data breach impacts 626,540 people
2026-02-12 17:58:25
A May 2025 cyberattack on ApolloMD exposed the personal data of over 626,000 patients linked to affiliated physicians and practices. ApolloMD is a US-based healthcare services company that partners with...
USN-7988-5: Linux kernel (Azure) vulnerabilities
2026-02-12 17:50:59
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Media drivers;
...
Odido Telecom Suffers Cyberattack – 6.2 Million Customer Accounts Affected
2026-02-12 17:23:33
Odido Telecom, a leading Dutch telecommunications provider, confirmed on February 12, 2026, that hackers accessed personal data from 6.2 million customer accounts in a major cyberattack. The breach, detected...
WordPress plugin with 900k installs vulnerable to critical RCE flaw
2026-02-12 17:09:41
A critical vulnerability in the WPvivid Backup & Migration plugin for WordPress, installed on more than 900,000 websites, can be exploited to achieve remote code execution by uploading arbitrary files...
Spoticar mise sur Agentforce dans WhatsApp pour engager ses clients
2026-02-12 17:08:38
Avec plus de 2 milliards d’utilisateurs dans le monde, WhatsApp constitue un vivier de consommateurs potentiels. Les entreprises l’ont bien (...)
287 Chrome Extensions Exfiltrate Browsing History From 37.4 Million Users
2026-02-12 17:08:37
A massive data exfiltration operation involving 287 Chrome extensions that secretly steal browsing history from approximately 37.4 million users worldwide. According to research with alias qcontinuum1,...
ORB Networks Mask Cyberattacks Using Compromised IoT Devices and SOHO Routers
2026-02-12 17:05:18
Operational Relay Box networks have emerged as one of the most sophisticated tools used by threat actors to hide their cyberattacks from security teams worldwide. These obfuscated mesh networks consist...
AIOZ Storage Launches Peer-to-Peer S3-Compatible Cloud on DePIN
2026-02-12 17:00:08
AIOZ Storage is the storage pillar of the AIOZ Network stack, sitting alongside AIOZ Stream, AIOZ AI, and AIOZ Pin on top of the same people‑powered DePIN. It is a contributor-driven S3-compatible object...
Your complete guide to Microsoft experiences at RSAC™ 2026 Conference
2026-02-12 17:00:00
Microsoft Security returns to RSAC Conference to show how Frontier Firms—organizations that are human-led and agent-operated—can stay ahead.
The post Your complete guide to Microsoft experiences at...
Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems
2026-02-12 16:55:00
Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI) repository linked to a fake recruitment-themed campaign orchestrated by the North...
DragonForce Ransomware Group Expands Its Influence with Cartel-like Operations and Targeting 363 Companies Since 2023
2026-02-12 16:54:16
DragonForce has established itself as a formidable entity in the cybercrime landscape, having been active since December 2023. Operating under a sophisticated Ransomware-as-a-Service (RaaS) model, the...
DShield Sensor Captures Self-Propagating SSH Worm Exploit Using Credential Stuffing and Multi-Stage Malware
2026-02-12 16:39:19
A sophisticated self-spreading worm has emerged that can completely compromise Linux systems through SSH brute-force attacks in just four seconds. This new threat combines traditional credential stuffing...
Feiniu NAS Devices Infected in Large-Scale Netdragon Botnet Attack Exploiting Unpatched Vulnerabilities
2026-02-12 16:17:51
A serious security incident has recently emerged involving Feiniu (fnOS) Network Attached Storage devices. These systems are being actively targeted and infected by the Netdragon botnet, a malware strain...
GitGuardian lève 50 M$ : cap sur les secrets de l'IA agentique
2026-02-12 16:03:44
Après s'être positionné sur la gestion centralisée des identités machine avec une offre spécifique, GitGuardian lorgne l'IA agentique.
The post GitGuardian lève 50 M$ : cap sur les secrets de l’IA...
The HackerNoon Newsletter: Keeping Up with the Upwork Civil War on Reddit (2/12/2026)
2026-02-12 16:03:29
How are you, hacker?
🪐 What's happening in tech today, February 12, 2026?
The
HackerNoon Newsletter
brings the HackerNoon
...
Rogue VM Linked to Muddled Libra in VMware vSphere Attack, Revealing Key TTPs
2026-02-12 15:46:28
In a September 2025 incident response case, investigators found a rogue virtual machine inside a VMware vSphere environment and tied it with high confidence to Muddled Libra, also tracked as Scattered...
USN-8037-1: DNSdist vulnerabilities
2026-02-12 15:41:01
It was discovered that HTTP/2, which is used/vendored by DNSdist, did not
properly account for resources when handling client-triggered stream
resets. An attacker could possibly use this issue to cause...
Keeper Commander Introduces SuperShell™
2026-02-12 15:29:22
From today, Keeper Security‘s SuperShell, a full-screen Terminal User Interface (TUI) for browsing and managing the Keeper Vault within Keeper Commander, is available to all customers and can be...
How Buck Reached 10% Yield Without Compromising Stability in DeFi's Rate Wars
2026-02-12 15:18:48
Buck Labs announced on February 12 that it would increase yields from 7% to 10% and transition from manual reward claims to automatic distribution. The changes apply to the existing token infrastructure,...
Le shadow IA se répand dans les entreprises françaises
2026-02-12 15:12:23
Si la GenAI se développe dans les entreprises françaises, son utilisation soulève des questions. Une étude réalisée (...)
WordPress Backup Plugin Vulnerability Exposes 800,000 Sites to Remote Code Execution Attacks
2026-02-12 15:09:57
A critical flaw in the WPvivid Backup & Migration WordPress plugin can let an unauthenticated attacker upload files and run code on the server, a path that often ends in full site takeover. The issue...
LummaStealer activity spikes post-law enforcement disruption
2026-02-12 14:57:44
Bitdefender reports a surge in LummaStealer activity, showing the MaaS infostealer rebounded after 2025 law enforcement disruption. Bitdefender observed renewed LummaStealer activity, proving the MaaS...
USN-8036-1: HAProxy vulnerability
2026-02-12 14:55:12
Asim Viladi Oglu Manizada discovered that HAProxy incorrectly handled
certain INITIAL packets. A remote attacker could possibly use this issue
to cause HAProxy to crash, resulting in a denial of service....
Outlook add-in goes rogue and steals 4,000 credentials and payment data
2026-02-12 14:35:13
The once popular Outlook add-in AgreeTo was turned into a powerful phishing kit after the developer abandoned the project.
Microsoft veut voler de ses propres ailes dans l'IA
2026-02-12 14:31:00
Microsoft accélère le développement de ses propres modèles d'IA pour réduire sa dépendance à OpenAI. Une stratégie d'indépendance technologique qui s'accompagne d'investissements colossaux.
The...
Sur Windows 11, Microsoft teste le consentement pour installer des applications
2026-02-12 14:27:54
Colonne vertébrale des entreprises du monde entier, Windows équipe plus d'un milliard d'appareils et prend en charge des millions d'applications. (...)
AMOS infostealer targets macOS through a popular AI app
2026-02-12 14:25:38
AMOS infostealer is targeting macOS users by abusing popular AI apps and extension marketplaces to harvest credentials. Flare examines how AMOS operates, spreads through AI-driven lures, and feeds the...
De WhatsApp à MAX : Moscou met fin au chiffrement des communications
2026-02-12 14:13:05
Moscou impose sa messagerie d'État MAX et met fin à l'ère de la confidentialité numérique. Une rupture technologique qui aura des implications pour la sécurité des communications.
The post De WhatsApp...
Betashares Global Cybersecurity ETF (ASX: HACK): A Diversified Bet On The Sector
2026-02-12 14:01:15
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 12, 2026 –Read the full story in The Motley Fool Australia Tristan Harrison, one of the longest-serving...
Carding-as-a-Service: The Underground Market of Stolen Cards
2026-02-12 14:00:00
Rapid7 software engineer Eliran Alon also contributed to this post.IntroductionDespite sustained efforts by the global banking and payments industry, credit card fraud continues to affect consumers and...
Chrome Security Update – Patch for Vulnerabilities that Enables Code Execution Attacks
2026-02-12 13:52:28
Google has released Chrome 145 to the stable channel for Windows, Mac, and Linux, addressing 11 security vulnerabilities that could enable attackers to execute malicious code on user systems. The update,...
WaaP Launches on Sui: How human.tech Is Transforming Access for 3 Million Crypto Users
2026-02-12 13:52:18
WaaP is a new protocol built on top of the Sui network. Sui is one of the top Layer 1 blockchains by activity. In October 2025, Sui hit a record .6 billion in TVL.
Why Ault Blockchain's Zero-Speculation Model Could Redefine How Layer 1 Networks Launch
2026-02-12 13:47:15
Ault Capital Group launches Ault Blockchain public testnet, a Cosmos-based Layer 1 with no token sale, targeting institutional finance.
Fake AI Chrome extensions with 300K users steal credentials, emails
2026-02-12 13:41:55
A set of 30 malicious Chrome extensions that have been installed by more than 300,000 users are masquerading as AI assistants to steal credentials, email content, and browsing information. [...]
USN-8035-1: libpng vulnerabilities
2026-02-12 13:37:00
It was discovered that the libpng simplified API incorrectly processed
palette PNG images with partial transparency and gamma correction. If a
user or automated system were tricked into opening a specially...
L'ANSSI affirme l'open source comme levier de sa politique industrielle
2026-02-12 13:25:58
L'ANSSI a remodelé la présentation de sa posture générale sur l'open source, affirmé comme levier de sa politique industrielle.
The post L’ANSSI affirme l’open source comme levier de...
Sophisticated ‘duer-js' NPM Package Distributes ‘Bada Stealer' Malware Targeting Windows and Discord Users
2026-02-12 13:24:16
A dangerous malware campaign has emerged on the NPM package registry, putting thousands of developers and Windows users at risk. The malicious package, known as “duer-js,” was published by...
UK Tech Funding Falls 11% in 2025, but Remains Second Globally
2026-02-12 13:11:16
The UK tech sector raised .3 billion in 2025, marking an 11% year-on-year decline and a 35% drop in deal volume. While late-stage funding remained resilient, seed and early-stage investment fell sharply,...
Child exploitation, grooming, and social media addiction claims put Meta on trial
2026-02-12 12:35:26
Landmark trials now underway allege Meta failed to protect children from sexual exploitation, grooming, and addiction-driven design.
Ubuntu 22.04 LTS USN-8034-1 Linux NVIDIA Tegra Critical Security Update
2026-02-12 12:32:53
Several security issues were fixed in the Linux kernel.
openSUSE 2026-0456-1 Nvidia Driver Important Security Update
2026-02-12 12:30:48
An update that has two security fixes can now be installed.
SUSE Linux important Update nvidia-modprobe CUDA System Access 2026-0456-1
2026-02-12 12:30:47
# Security update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed, nvidia-persistenced.cuda Announcement ID: SUSE-SU-2026:0456-1 Release Date: 2026-02-11T22:21:03Z Rating: important
SUSE Nodejs20 Important Security Update 2026-0457-1 CVE-2025-55130
2026-02-12 12:30:44
An update that solves seven vulnerabilities can now be installed.
openSUSE Leap 15.5 nodejs20 Important Fix Multiple Issues 2026-0457-1
2026-02-12 12:30:44
An update that solves seven vulnerabilities can now be installed.
SUSE glib2 Major Security Patch Addressing Buffer and Integer Overflows
2026-02-12 12:30:35
An update that solves one vulnerability can now be installed.
Upbit Concludes Review, Removes Restrictions on Bitunix Exchange in South Korea
2026-02-12 12:29:35
Du casino au centre d'appels : le Groupe Barrière déploie l'IA par étapes
2026-02-12 12:14:44
Centres d’appels, support technique dans les casinos, assistants IA pour tous les collaborateurs…le Groupe Barrière déploie l’intelligence artificielle sur trois fronts simultanés....
ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories
2026-02-12 11:51:00
Threat activity this week shows one consistent signal — attackers are leaning harder on what already works. Instead of flashy new exploits, many operations are built around quiet misuse of trusted tools,...
Tech's Silent Epidemic: Why We Are Rebooting 2018's Landmark Mental Health Research
2026-02-12 11:42:12
In 2018, I lost 11 friends in the tech industry to suicide. Founders are twice as likely to have suicidal thoughts and ten times as likely as the average person. Only 7% of startups have formal mental...
Apple patches zero-day flaw that could let attackers take control of devices
2026-02-12 11:40:35
Apple issued security updates for all devices which include a patch for an actively exploited zero-day—tracked as CVE-2026-20700.
Stephan Teerling, nouveau Chief IT & Technology Officer d'Allianz France
2026-02-12 11:33:50
Allianz France annonce la nomination de Stephan Teerling comme Chief IT & Technology Officer, en charge des systèmes d'information. Il sera membre du Comité Exécutif.
The post Stephan Teerling,...
The Asteroid Escape You Can't Miss
2026-02-12 11:30:14
In Chapter XIII of Astounding Stories of Super-Science (March 1932), Hawk Carse, Eliot Leithgow, and Friday escape Ku Sui's lethal traps and chase across the dome. Using space-suits and the Scorpion...
USN-8034-1: Linux kernel (NVIDIA Tegra) vulnerabilities
2026-02-12 11:24:57
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Nios II architecture;
...
USN-8033-3: Linux kernel (FIPS) vulnerabilities
2026-02-12 11:12:38
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Nios II architecture;
...
Malicious Campaigns Using AI-generated Malware in 2026
2026-02-12 11:00:47
In this blog post I am collecting the campaigns that show evidence of being AI-generated, or make use of AI tools to increase their impact. As always I will continue to update the list as soon as new...
How Python Devs Can Build AI Agents Using MCP, Kafka, and Flink
2026-02-12 11:00:03
Python developers can build production-ready AI agents using Model Context Protocol (MCP), Apache Kafka, and Apache Flink. By extending familiar FastAPI microservices with FastMCP tools and event-driven...
USN-8033-2: Linux kernel vulnerabilities
2026-02-12 10:55:16
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Nios II architecture;
...
Apple fixed first actively exploited zero-day in 2026
2026-02-12 10:50:10
Apple fixed an exploited zero-day in iOS, macOS, and other devices that allowed attackers to run code via a memory flaw. Apple released updates for iOS, iPadOS, macOS, watchOS, tvOS, and visionOS to address...
USN-8033-1: Linux kernel vulnerabilities
2026-02-12 10:40:51
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Nios II architecture;
...
New Global Expansion Report Benchmarks the Hidden Costs and Risks of Scaling Across 19 Markets
2026-02-12 10:36:19
Native Teams, the global platform for work payments and legal employment, launched the Global Expansion Report, which provides the first cross-market benchmark of cost, timelines, digitalisation levels,...
The CTEM Divide: Why 84% of Security Programs Are Falling Behind
2026-02-12 10:30:00
A new 2026 market intelligence study of 128 enterprise security decision-makers (available here) reveals a stark divide forming between organizations – one that has nothing to do with budget size or...
Arrestation aux Pays-Bas pour diffusion du bot JokerOTP
2026-02-12 10:24:04
Arrestation aux Pays-Bas pour diffusion du bot JokerOTP contournant la double authentification....
USN-8031-1: Linux kernel (GCP) vulnerabilities
2026-02-12 10:13:02
It was discovered that improper initialization of CPU cache memory could
allow a local attacker with hypervisor access to overwrite SEV-SNP guest
memory resulting in loss of data integrity. (CVE-2024-36331)
Oleksii...
Mean-Field LIBOR Models Offer Reliable Bounds for Life Insurance Valuation, Study Finds
2026-02-12 10:00:14
This paper presents a market-consistent framework for valuing life insurance portfolios, showing how mean-field LIBOR models and algebraic bounds can accurately estimate future discretionary benefits...
Pour accélérer sa croissance, GitGuardian lève 50 M$
2026-02-12 09:40:52
Après avoir levé 44 M$ en décembre 2021, pour s’implanter sur le marché américain, GitGuardian (...)
Windows 11 26H1, cette épine dans le pied des admins
2026-02-12 09:21:51
Ciblant un nombre restreint d'appareils, Windows 11 26H1 aura son propre chemin de mise à niveau.
The post Windows 11 26H1, cette épine dans le pied des admins appeared first on Silicon.fr.
Senegalese Data Breaches Expose Lack of 'Security Maturity'
2026-02-12 09:00:00
Green Blood Group steals personal records and biometric data of the West African nation's nearly 20 million residents.
Le cabinet Idna racheté par NXO
2026-02-12 08:56:53
L'intégrateur de solutions réseaux, IT et télécoms NXO (ex-NextiraOne) annonce l'acquisition de la société Idna, (...)
Entretien Franz Decker, DSI de BMW : « L'IA réduit considérablement les interventions manuelles »
2026-02-12 08:54:06
Lorsqu'on observe le marché des capitaux, nous constatons que Tesla est valorisé à un niveau élevé, comme une entreprise (...)
Attaque revendiquée contre la CFDT par Cl0P
2026-02-12 08:37:20
Cl0P revendique une attaque contre la CFDT, première organisation syndicale française....
Criminals are using AI website builders to clone major brands
2026-02-12 08:03:00
AI-assisted website builders are making it far easier for scammers to impersonate well-known and trusted brands, including Malwarebytes.
Bypassing Administrator Protection by Abusing UI Access
2026-02-12 08:00:00
In my last blog post I introduced the new Windows feature, Administrator Protection and how it aimed to create a secure boundary for UAC where one didn't exist. I described one of the ways I was able...
83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure
2026-02-12 07:32:00
A significant chunk of the exploitation attempts targeting a newly disclosed security flaw in Ivanti Endpoint Manager Mobile (EPMM) can be traced back to a single IP address on bulletproof hosting infrastructure...
Proofpoint Acquires Acuvity to Deliver AI Security and Governance Across the Agentic Workspace
2026-02-12 07:16:45
Google says hackers are abusing Gemini AI for all attacks stages
2026-02-12 07:00:00
Google Threat Intelligence Group (GTIG) has published a new report warning about AI model extraction/distillation attacks, in which private-sector firms and researchers use legitimate API access to systematically...
Multiple Endpoint Manager bugs patched by Ivanti, including remote auth bypass
2026-02-12 06:13:41
Ivanti patched over a dozen Endpoint Manager flaws, including a high-severity auth bypass that let attackers steal credentials remotely. Ivanti released patches for more than a dozen vulnerabilities in...
When ARP Goes Wrong: Threat Hunting ARP Poisoning in Network Traffic
2026-02-12 05:48:38
Before we start, it's important to understand the basics of the ARP protocol.In a local network, devices do not communicate using IP addresses alone. Actual data transmission at the network level relies...
How an Internal Tool Accidentally Became Public Internet Property
2026-02-12 05:44:02
Free Link 🎈Continue reading on InfoSec Write-ups »
The Feature Was Disabled — The Backend Didn't Get the Memo
2026-02-12 05:41:33
Free Link 🎈Continue reading on InfoSec Write-ups »
Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Other Devices
2026-02-12 05:39:00
Apple on Wednesday released iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS updates to address a zero-day flaw that it said has been exploited in sophisticated cyber attacks.
The vulnerability,...
Proving Grounds Linux Lab Image
2026-02-12 05:38:51
We can achieve that by using various of tools and techniques to obtain foothold on the target, by using enumeration, scanning and other…Continue reading on InfoSec Write-ups »
Building a Virtual Ethical Hacking Home Lab — Part 6: System Exploitation
2026-02-12 05:38:39
An interactive guide for building your very own ethical hacking home lab using VMwareContinue reading on InfoSec Write-ups »
I Let AI Pentest my lab for 45 Minutes. HexStrike AI and KALI MCP to get a shell after only 20.
2026-02-12 05:37:42
Screenshot from HexStrike AI Github RepoWhat you see in the screenshots below? You're sitting in front of your terminal, and instead of typing commands yourself, you're having a conversation with...
From a Free TryHackMe Subscription to a Free OSCP Certification
2026-02-12 05:35:31
Lessons, struggles, and growth from four years of learning cybersecurity the hard wayFor all the new readers, this article is a continuation of my yearly cybersecurity journey. This marks the 4th year...
Quantum Scrambler — picoCTF 2025 Writeup
2026-02-12 05:28:30
Quantum Scrambler — picoCTF 2025 WriteupThe Quantum Scrambler is a reverse engineering challenge from picoCTF 2025. It may seem challenging — but once broken down, it is much more simpler....
I Asked My AI to Find Vulnerable AI. It Found 2,442
2026-02-12 05:27:34
Hello Hackers!!! Ever wondered what happens when you set an AI assistant loose to hunt for security vulnerabilities in… other AI assistants? Today, I'm sharing something wild: I used my Clawdbot to...
AI-Assisted Web and Cloud Penetration Testing with Cursor + MCP HexStrike and Burp Suite MCP.
2026-02-12 05:26:32
A Complete Guide to Modern AI-Powered Security Testing. From One Prompt to Full Attack Surface Coverage (Recon → Exploit → Report).Continue reading on InfoSec Write-ups »
Apple fixes zero-day flaw used in 'extremely sophisticated' attacks
2026-02-12 01:06:05
Apple has released security updates to fix a zero-day vulnerability that was exploited in an "extremely sophisticated attack" targeting specific individuals. [...]
List of 13 new domains
2026-02-12 00:00:00
.fr apcfrance[.fr] (registrar: Hosting Concepts B.V. d/b/a Openprovider)
apcoutlet[.fr] (registrar: Hosting Concepts B.V. d/b/a Openprovider)
coli-suivi[.fr] (registrar: OVH)
confirmationrdv-leboncoin-barhoumi[.fr]...
Vulnérabilité dans Traefik (12 février 2026)
12/02/2026
Une vulnérabilité a été découverte dans Traefik. Elle permet à un attaquant de provoquer un déni de service à distance et un contournement de la politique de sécurité.
Multiples vulnérabilités dans SPIP (12 février 2026)
12/02/2026
De multiples vulnérabilités ont été découvertes dans SPIP. Elles permettent à un attaquant de provoquer une injection de code indirecte à distance (XSS).
Multiples vulnérabilités dans Google Chrome (12 février 2026)
12/02/2026
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Multiples vulnérabilités dans les produits Qnap (12 février 2026)
12/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de...
Multiples vulnérabilités dans les produits Apple (12 février 2026)
12/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation...
Multiples vulnérabilités dans Keycloak (12 février 2026)
12/02/2026
De multiples vulnérabilités ont été découvertes dans Keycloak. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité.
Multiples vulnérabilités dans les produits Palo Alto Networks (12 février 2026)
12/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Palo Alto Networks. Elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique...