What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
RecordedFuture.webp 2025-05-07 00:19:51 Le jury ordonne à NSO Group de payer 168 millions de dollars à WhatsApp pour faciliter les hacks de Pegasus de ses utilisateurs
Jury orders NSO Group to pay $168 million to WhatsApp for facilitating Pegasus hacks of its users
(lien direct)
L'affaire de six ans est l'aboutissement d'une méta-action déposée en 2019, qui a fait valoir que le groupe NSO avait attaqué à plusieurs reprises WhatsApp avec des vecteurs de logiciels espions, continuant de pénétrer dans ses systèmes alors même que le géant des médias sociaux corrigeait les vulnérabilités.
The six-year case is the culmination of a Meta lawsuit filed in 2019, which argued that the NSO Group repeatedly attacked WhatsApp with spyware vectors, continuing to break into its systems even as the social media giant patched vulnerabilities.
Vulnerability ★★
RecordedFuture.webp 2025-04-30 01:04:55 Google: 75 jours zéro considérés en 2024 comme des nations, les fournisseurs de logiciels espions continuent d'exploitation
Google: 75 zero-days seen in 2024 as nations, spyware vendors continue exploitation
(lien direct)
L'équipe de renseignement sur les menaces de Google a publié mardi son rapport annuel zéro-jour, constatant que 75 vulnérabilités étaient exploitées dans la nature en 2024, contre 98 l'année précédente.
Google\'s Threat Intelligence team published its annual zero-day report on Tuesday, finding that 75 vulnerabilities were exploited in the wild in 2024, down from 98 in the prior year.
Vulnerability Threat ★★
RecordedFuture.webp 2025-04-14 20:42:57 La compagnie d'assurance Lemonade indique que les numéros de licence de conducteur exposé à violation \\
Insurance firm Lemonade says breach exposed driver\\'s license numbers
(lien direct)
Une vulnérabilité au sein de la plate-forme de demande en ligne pour les polices d'assurance a probablement entraîné la violation des détails du client.
A vulnerability within the online application platform for insurance policies likely resulted in the breach of customer details.
Vulnerability ★★★
RecordedFuture.webp 2025-04-08 20:37:39 Microsoft: bogue zéro-jour utilisé dans les attaques de ransomware contre les entreprises immobilières américaines
Microsoft: Zero-day bug used in ransomware attacks on US real estate firms
(lien direct)
Microsoft a publié mardi un article de blog sur le bogue parallèlement à sa version plus grande du patch mardi, détaillant comment les pirates ont exploité la vulnérabilité et ont utilisé une souche de malware appelé PipeMagic avant de déployer des ransomwares sur les victimes.
Microsoft published a blog post on Tuesday about the bug alongside its larger Patch Tuesday release, detailing how hackers exploited the vulnerability and used a strain of malware called PipeMagic before deploying ransomware on victims.
Ransomware Malware Vulnerability Threat ★★★
RecordedFuture.webp 2025-04-08 18:03:56 CISA, les experts mettent en garde contre les attaques de transfert de fichiers Crush alors que le gang de ransomware fait des menaces
CISA, experts warn of Crush file transfer attacks as ransomware gang makes threats
(lien direct)
Les fabricants de l'outil de transfert de fichiers populaire Crushftp affirment qu'une vulnérabilité divulguée de manière responsable dans le logiciel a été armé. La CISA et les cyber-chercheurs sonnent des sonnettes d'alarme.
The makers of the popular file transfer tool CrushFTP say a responsibly disclosed vulnerability in the software has been weaponized. CISA and cyber researchers are sounding alarm bells.
Ransomware Tool Vulnerability ★★
RecordedFuture.webp 2025-04-07 15:33:17 Flaw in ESET Security Software utilisé pour répandre les logiciels malveillants à partir du groupe Toddycat
Flaw in ESET security software used to spread malware from ToddyCat group
(lien direct)
Les chercheurs ont déclaré qu'une vulnérabilité dans les logiciels de la société de sécurité ESET avait été utilisée pour répandre les logiciels malveillants. L'entreprise a reconnu le bogue et l'a corrigé.
Researchers said a vulnerability in software from security firm ESET was used to spread malware. The company has acknowledged the bug and patched it.
Malware Vulnerability ★★★
RecordedFuture.webp 2025-04-04 21:22:49 CISA met en garde contre le dernier bug du pare-feu Ivanti exploité par des pirates chinois présumés
CISA warns of latest Ivanti firewall bug being exploited by suspected Chinese hackers
(lien direct)
Les chercheurs ont attribué l'exploitation de la vulnérabilité à un groupe de cyberespionnage basé en Chine suspecté suivi comme UNC5221.
Researchers attributed exploitation of the vulnerability to a suspected China-based cyberespionage group tracked as UNC5221.
Vulnerability ★★
RecordedFuture.webp 2025-04-02 17:58:04 Le dernier bogue Ivanti, associé à des logiciels malveillants, gagne une alerte de CISA
Latest Ivanti bug, paired with malware, earns an alert from CISA
(lien direct)
Une alerte récente de la CISA s'appuie sur des recherches antérieures sur une vulnérabilité dans les produits Ivanti que les pirates liés à la Chine ont utilisés pour insérer des logiciels malveillants dans les réseaux.
A recent alert from CISA builds on previous research about a vulnerability in Ivanti products that China-linked hackers have used to insert malware into networks.
Malware Vulnerability ★★★
RecordedFuture.webp 2025-03-28 13:02:40 Firefox fixe une faille similaire à Chrome Zero-Day utilisée contre les organisations russes
Firefox fixes flaw similar to Chrome zero-day used against Russian organizations
(lien direct)
Les développeurs de Firefox de Mozilla \\ disent que les rapports sur une vulnérabilité Google Chrome zéro les ont amené à trouver un bug similaire pour la version Windows de leur navigateur.
Developers of Mozilla\'s Firefox say that reports on a Google Chrome zero-day vulnerability led them to find a similar bug for the Windows version of their browser.
Vulnerability Threat ★★★
RecordedFuture.webp 2025-03-27 13:51:57 Médias russes, universitaire ciblé dans la campagne d'espionnage à l'aide de Google Chrome Zero-Day Exploit
Russian media, academia targeted in espionage campaign using Google Chrome zero-day exploit
(lien direct)
"Nous avons découvert et signalé des dizaines d'exploitations zéro-jours activement utilisées dans les attaques, mais cet exploit particulier est certainement l'un des plus intéressants que nous avons rencontrés", ont déclaré des chercheurs de Kaspersky dans leur analyse publiée mardi.
“We have discovered and reported dozens of zero-day exploits actively used in attacks, but this particular exploit is certainly one of the most interesting we\'ve encountered,” researchers from Kaspersky said in their analysis published Tuesday.
Vulnerability Threat ★★★
RecordedFuture.webp 2025-03-17 14:09:18 \Ret
\\'Mora_001\\' ransomware gang exploiting Fortinet bug spotlighted by CISA in January
(lien direct)
Deux vulnérabilités ayant un impact sur les produits Fortinet sont exploitées par une nouvelle opération de ransomware avec des liens avec le groupe de ransomware de lockbit.
Two vulnerabilities impacting Fortinet products are being exploited by a new ransomware operation with ties to the LockBit ransomware group.
Ransomware Vulnerability ★★★
RecordedFuture.webp 2025-03-11 19:33:40 Le botnet non identifié précédemment infecte les routeurs de maison TP-Link Archer non corrigées
Previously unidentified botnet infects unpatched TP-Link Archer home routers
(lien direct)
Des chercheurs de Cato Networks ont déclaré que lors d'une récente enquête sur les vulnérabilités du routeur, ils avaient découvert un nouveau botnet - qu'ils ont nommé Ballista - infectant les appareils Archer TP-Link.
Researchers at Cato Networks said that during a recent investigation into router vulnerabilities, they discovered a new botnet - which they named Ballista - infecting TP-Link Archer devices.
Vulnerability ★★★
RecordedFuture.webp 2025-03-07 21:22:37 Bug affectant les scripts PHP exigent \\ 'Action immédiate des défenseurs du monde \\'
Bug affecting PHP scripts demands \\'immediate action from defenders globally\\'
(lien direct)
Une vulnérabilité initialement exploitée principalement dans les cyberattaques contre les organisations japonaises est désormais un problème potentiel dans le monde, ont déclaré vendredi des chercheurs.
A vulnerability initially exploited mostly in cyberattacks against Japanese organizations is now a potential problem worldwide, researchers said Friday.
Vulnerability ★★★
RecordedFuture.webp 2025-03-04 21:22:02 CISA, VMware avertit des nouvelles vulnérabilités exploitées par des pirates
CISA, VMware warn of new vulnerabilities being exploited by hackers
(lien direct)
Trois gammes de produits du géant de la technologie VMware - ESXi, poste de travail et fusion - ont des correctifs de vulnérabilités qui, selon la société et le gouvernement fédéral, sont exploitées par des pirates.
Three product lines from technology giant VMware - ESXI, Workstation and Fusion - have patches for vulnerabilities that the company and the federal government have said are being exploited by hackers.
Vulnerability ★★★
RecordedFuture.webp 2025-02-25 18:04:53 Doge doit interrompre toutes
DOGE must halt all \\'negligent cybersecurity practices,\\' House Democrats tell Trump
(lien direct)
L'administration Trump devrait "cesser toutes les activités DOGE qui créent de graves vulnérabilités de cybersécurité, exposer les réseaux gouvernementaux aux cyberattaques et risquent les divulgations d'informations sensibles et personnelles", a déclaré les démocrates du comité de surveillance de la Chambre dans une lettre à la Maison Blanche.
The Trump administration should "cease all DOGE activities that create serious cybersecurity vulnerabilities, expose government networks to cyberattacks, and risk disclosures of sensitive and personal information,” Democrats from the House Oversight Committee said in a letter to the White House.
Vulnerability ★★★
RecordedFuture.webp 2025-02-25 13:03:20 Le nouveau mécanisme de rapport de la vulnérabilité du UK Home Office \\ laisse les chercheurs ouverts à la poursuite
UK Home Office\\'s new vulnerability reporting mechanism leaves researchers open to prosecution
(lien direct)
Le Home Office est le dernier département du gouvernement britannique à encourager des pirates éthiques à signaler les vulnérabilités dans ses systèmes. Les experts avertissent cependant que les participants pourraient être ouverts aux poursuites pénales.
The Home Office is the latest British government department to encourage ethical hackers to report vulnerabilities in its systems. Experts are warning that participants could be open to criminal prosecution, though.
Vulnerability ★★★
RecordedFuture.webp 2025-02-19 21:09:30 Recent Ghost/Cring ransomware activity prompts alert from FBI, CISA (lien direct) A ransomware group known as Ghost has been exploiting vulnerabilities in software and firmware as recently as January, according to an alert issued Wednesday by the FBI and Cybersecurity and Infrastructure Security Agency (CISA).
A ransomware group known as Ghost has been exploiting vulnerabilities in software and firmware as recently as January, according to an alert issued Wednesday by the FBI and Cybersecurity and Infrastructure Security Agency (CISA).
Ransomware Vulnerability ★★★
RecordedFuture.webp 2025-02-12 22:06:18 Cybercrime evolving into national security threat: Google (lien direct) “The vast cybercriminal ecosystem has acted as an accelerant for state-sponsored hacking, providing malware, vulnerabilities, and in some cases full-spectrum operations to states,” said Ben Read of Google Threat Intelligence Group.
“The vast cybercriminal ecosystem has acted as an accelerant for state-sponsored hacking, providing malware, vulnerabilities, and in some cases full-spectrum operations to states,” said Ben Read of Google Threat Intelligence Group.
Malware Vulnerability Threat ★★★
RecordedFuture.webp 2025-02-07 22:17:56 Hackers exploiting bug in popular Trimble Cityworks tool used by local gov\\'ts (lien direct) Federal civilian agencies have been ordered to patch a vulnerability impacting Trimble Cityworks - a popular tool used by many governments to manage public infrastructure.
Federal civilian agencies have been ordered to patch a vulnerability impacting Trimble Cityworks - a popular tool used by many governments to manage public infrastructure.
Tool Vulnerability ★★★
RecordedFuture.webp 2025-01-31 17:23:37 FDA, CISA warn of backdoor in popular patient monitor used by US hospitals (lien direct) The Contec CMS8000, a patient monitor made by a company based in China, has vulnerabilities in its firmware that directly expose it to unauthorized access.
The Contec CMS8000, a patient monitor made by a company based in China, has vulnerabilities in its firmware that directly expose it to unauthorized access.
Vulnerability ★★
RecordedFuture.webp 2025-01-24 21:36:27 More than 2,000 SonicWall devices vulnerable to critical zero-day (lien direct) The Cybersecurity and Infrastructure Security Agency warned that a bug affecting SonicWall\'s Secure Mobile Access products is being actively exploited.
The Cybersecurity and Infrastructure Security Agency warned that a bug affecting SonicWall\'s Secure Mobile Access products is being actively exploited.
Vulnerability Threat Mobile ★★
RecordedFuture.webp 2025-01-24 13:01:22 UK to examine undersea cable vulnerability as Russian spy ship spotted in British waters (lien direct) After a warning that a Russian spy ship was mapping British undersea infrastructure, a parliamentary inquiry is planned to examine its vulnerabilities.
After a warning that a Russian spy ship was mapping British undersea infrastructure, a parliamentary inquiry is planned to examine its vulnerabilities.
Vulnerability ★★★
RecordedFuture.webp 2025-01-17 01:12:06 CISA warns of exploited Fortinet bugs as Microsoft issues its biggest Patch Tuesday in years (lien direct) The federal government and multiple cybersecurity firms warned of a zero-day vulnerability in FortiGate firewalls that hackers are actively exploiting.
The federal government and multiple cybersecurity firms warned of a zero-day vulnerability in FortiGate firewalls that hackers are actively exploiting.
Vulnerability Threat ★★★
RecordedFuture.webp 2025-01-15 17:52:17 No new funding in EU plan to tackle ransomware attacks against hospitals (lien direct) The European Commission has a new “action plan” to reduce the health sector\'s vulnerability to cyberattacks. For funding, it only offers healthcare entities guidance on opportunities available elsewhere.
The European Commission has a new “action plan” to reduce the health sector\'s vulnerability to cyberattacks. For funding, it only offers healthcare entities guidance on opportunities available elsewhere.
Ransomware Vulnerability Medical ★★
RecordedFuture.webp 2025-01-09 20:34:07 Chinese spies targeting new Ivanti vulnerability, Mandiant says (lien direct) A recently discovered bug in Ivanti\'s Connect Secure VPN appears to be a target for malware previously only deployed by China-based hackers, say researchers for Google\'s Mandiant team.
A recently discovered bug in Ivanti\'s Connect Secure VPN appears to be a target for malware previously only deployed by China-based hackers, say researchers for Google\'s Mandiant team.
Malware Vulnerability ★★★
RecordedFuture.webp 2025-01-08 20:30:24 Ivanti warns hackers are exploiting new vulnerability (lien direct) The company released an advisory and a corresponding blog about two bugs - CVE-2025-0282 and CVE-2025-0283 - and warned that some customers have already seen CVE-2025-0282 exploited in their environments.
The company released an advisory and a corresponding blog about two bugs - CVE-2025-0282 and CVE-2025-0283 - and warned that some customers have already seen CVE-2025-0282 exploited in their environments.
Vulnerability ★★★
RecordedFuture.webp 2025-01-07 19:47:32 DNA sequencer company notifying customers of vulnerabilities in popular device (lien direct) The iSeq 100 genetic sequencer has vulnerabilities that could allow attackers to tamper with its operations or install a firmware implant, researchers from cybersecurity firm Eclypsium say.
The iSeq 100 genetic sequencer has vulnerabilities that could allow attackers to tamper with its operations or install a firmware implant, researchers from cybersecurity firm Eclypsium say.
Vulnerability ★★★
RecordedFuture.webp 2024-12-30 16:35:58 On the sixth day of Christmas, an X account gave to me: a fake 7-Zip ACE (lien direct) An account with the name @NSA_Employee39 claimed to have dropped a zero-day vulnerability for the popular file archive software 7-Zip. Nobody could get it to work.
An account with the name @NSA_Employee39 claimed to have dropped a zero-day vulnerability for the popular file archive software 7-Zip. Nobody could get it to work.
Vulnerability Threat ★★★
RecordedFuture.webp 2024-12-27 13:29:25 Blue Yonder says November ransomware attack not connected to Cleo vulnerability (lien direct) The Panasonic-owned company said it has no reason to believe recent claims from a cybercrime gang are connected to last month\'s ransomware attack, which caused disruptions at Starbucks, BIC and several major supermarket brands.
The Panasonic-owned company said it has no reason to believe recent claims from a cybercrime gang are connected to last month\'s ransomware attack, which caused disruptions at Starbucks, BIC and several major supermarket brands.
Ransomware Vulnerability ★★
RecordedFuture.webp 2024-12-13 21:54:23 CISA warns of ransomware gangs exploiting Cleo, CyberPanel bugs (lien direct) The agency urged federal civilian agencies to patch a vulnerability that impacts a widely used file-sharing product from the software company Cleo.
The agency urged federal civilian agencies to patch a vulnerability that impacts a widely used file-sharing product from the software company Cleo.
Ransomware Vulnerability ★★
RecordedFuture.webp 2024-12-10 21:40:52 Multiple Cleo file transfer products being exploited by hackers (lien direct) The vulnerability - CVE-2024-50623 - was recently patched by software developer Cleo and affects the company\'s LexiCom, VLTransfer and Harmony products. However, researchers at cybersecurity firm Huntress say the patch “does not mitigate the software flaw."
The vulnerability - CVE-2024-50623 - was recently patched by software developer Cleo and affects the company\'s LexiCom, VLTransfer and Harmony products. However, researchers at cybersecurity firm Huntress say the patch “does not mitigate the software flaw."
Vulnerability ★★★
RecordedFuture.webp 2024-11-22 20:17:01 Experts warn of Palo Alto firewall exploitation after 2,000 compromises spotted (lien direct) Security researchers continued to warn users of certain Palo Alto Networks firewalls to patch the products and protect them from internet exposure after two vulnerabilities began attracting attention from malicious hackers.
Security researchers continued to warn users of certain Palo Alto Networks firewalls to patch the products and protect them from internet exposure after two vulnerabilities began attracting attention from malicious hackers.
Vulnerability ★★
RecordedFuture.webp 2024-11-18 23:14:50 Many US water systems exposed to \\'high-risk\\' vulnerabilities, watchdog finds (lien direct) Nearly 100 drinking water systems across the U.S. have "high-risk" cybersecurity deficiencies, an Inspector General assessment found.
Nearly 100 drinking water systems across the U.S. have "high-risk" cybersecurity deficiencies, an Inspector General assessment found.
Vulnerability ★★
RecordedFuture.webp 2024-11-13 22:12:19 NIST says exploited vulnerability backlog cleared but end-of-year goal for full list unlikely (lien direct) The National Institute of Standards and Technology has faced criticism since it became clear that thousands of critical vulnerabilities were not being analyzed or enriched.
The National Institute of Standards and Technology has faced criticism since it became clear that thousands of critical vulnerabilities were not being analyzed or enriched.
Vulnerability ★★
RecordedFuture.webp 2024-11-12 16:07:46 Surge in exploits of zero-day vulnerabilities is \\'new normal\\' warns Five Eyes alliance (lien direct) In a co-authored advisory, the agencies list the top 15 most routinely exploited vulnerabilities of 2023, with CVE-2023-3519 - an issue affecting Citrix\'s networking product NetScalers - being the most widely used.
In a co-authored advisory, the agencies list the top 15 most routinely exploited vulnerabilities of 2023, with CVE-2023-3519 - an issue affecting Citrix\'s networking product NetScalers - being the most widely used.
Vulnerability Threat ★★★
RecordedFuture.webp 2024-11-04 01:36:00 Google utilise un modèle grand langage pour découvrir la vulnérabilité du monde réel
Google uses large language model to discover real-world vulnerability
(lien direct)
Vendredi, dans un article de blog, Google a déclaré qu'il pensait que le bogue est le premier exemple public d'un outil d'IA trouvant un problème de sécurité de mémoire exploitable auparavant inconnu dans des logiciels largement utilisés.
In a blog post on Friday, Google said it believes the bug is the first public example of an AI tool finding a previously unknown exploitable memory-safety issue in widely used real-world software.
Tool Vulnerability ★★★
RecordedFuture.webp 2024-10-18 14:16:47 CISA confirme que la vulnérabilité Veeam est utilisée dans les attaques de ransomwares
CISA confirms Veeam vulnerability is being used in ransomware attacks
(lien direct)
CISA a ajouté CVE-2024-40711 à sa base de données vulnérabilités exploitée connue et a spécifié que le bogue des produits logiciels Veeam est utilisé pour faciliter les attaques de ransomware.
CISA added CVE-2024-40711 to its Known Exploited Vulnerabilities database and specified that the bug in Veeam software products is being used to facilitate ransomware attacks.
Ransomware Vulnerability ★★★
RecordedFuture.webp 2024-10-02 21:07:50 Les experts mettent en garde contre les attaques DDOS en utilisant la vulnérabilité de l'impression Linux
Experts warn of DDoS attacks using linux printing vulnerability
(lien direct)
Un ensemble de bogues qui a provoqué une alarme parmi les experts en cybersécurité peut permettre aux acteurs de menace de lancer de puissantes attaques conçues pour éliminer les systèmes hors ligne.
A set of bugs that has caused alarm among cybersecurity experts may enable threat actors to launch powerful attacks designed to knock systems offline.
Vulnerability Threat ★★
RecordedFuture.webp 2024-10-02 18:07:15 Zimbra Bug provoque une alarme parmi les chercheurs, certificats après des tentatives d'exploitation
Zimbra bug causes alarm among researchers, CERTs after exploitation attempts
(lien direct)
Zimbra a publié un correctif pour une vulnérabilité critique suivie comme CVE-2024-45519, mais les experts avertissent que le bogue a été exploité par des pirates malveillants.
Zimbra has issued a patch for a critical vulnerability tracked as CVE-2024-45519, but experts are warning the bug has been exploited by malicious hackers.
Vulnerability ★★★
RecordedFuture.webp 2024-10-02 00:15:19 CISA: Des milliers de bogues ont été corrigés en deuxième année de programme de divulgation de vulnérabilité
CISA: Thousands of bugs remediated in second year of vulnerability disclosure program
(lien direct)
Des milliers de vulnérabilités ont été identifiées et corrigées par le biais d'une maison de compensation gouvernementale en 2023, selon un nouveau rapport de la principale agence de cybersécurité de la nation.
Thousands of vulnerabilities were identified and remediated through a government clearinghouse in 2023, according to a new report from the nation\'s top cybersecurity agency.
Vulnerability ★★★
RecordedFuture.webp 2024-09-11 17:53:46 Les pirates ont des vues sur quatre vulnérabilités Microsoft, avertit CISA
Hackers have sights set on four Microsoft vulnerabilities, CISA warns
(lien direct)
Pas de details / No more details Vulnerability ★★★
RecordedFuture.webp 2024-08-30 19:36:48 Des pirates nord-coréens présumés ont ciblé l'industrie cryptographique avec Chromium Zero-Day
Suspected North Korean hackers targeted crypto industry with Chromium zero-day
(lien direct)
Pas de details / No more details Vulnerability Threat ★★
RecordedFuture.webp 2024-08-27 17:32:01 Volt Typhoon de Chine \\ aurait cibler les fournisseurs Internet américains en utilisant Versa Zero-Day
China\\'s Volt Typhoon reportedly targets US internet providers using Versa zero-day
(lien direct)
Pas de details / No more details Vulnerability Threat Guam ★★★
RecordedFuture.webp 2024-08-19 12:51:26 Les vulnérabilités dans les applications macOS de Microsoft \\ pourraient aider les pirates à accéder aux microphones et caméras
Vulnerabilities in Microsoft\\'s macOS apps could help hackers access microphones and cameras
(lien direct)
Pas de details / No more details Vulnerability ★★★
RecordedFuture.webp 2024-08-06 17:18:46 Google dit qu'Android Zero-Day a été exploité dans la nature
Google says Android zero-day was exploited in the wild
(lien direct)
Pas de details / No more details Vulnerability Threat Mobile ★★
RecordedFuture.webp 2024-07-30 16:14:15 Vulnérabilités de service critique ciblées par les pirates, prévient la cyber-agence
Critical ServiceNow vulnerabilities being targeted by hackers, cyber agency warns
(lien direct)
Pas de details / No more details Vulnerability ★★★
RecordedFuture.webp 2024-07-22 18:13:14 Télégramme zéro-jour pour Android a permis aux fichiers malveillants de se masquer sous forme de vidéos
Telegram zero-day for Android allowed malicious files to masquerade as videos
(lien direct)
Pas de details / No more details Vulnerability Threat Mobile ★★
RecordedFuture.webp 2024-07-01 21:10:14 Chine \\ 'S \\' Velvet Ant \\ 'Les pirates ont attrapé l'exploitation du nouveau zéro-jour dans les appareils Cisco
China\\'s \\'Velvet Ant\\' hackers caught exploiting new zero-day in Cisco devices
(lien direct)
Pas de details / No more details Vulnerability Threat ★★
RecordedFuture.webp 2024-05-31 21:00:00 Des milliers d'appareils orientés Internet vulnérables à vérifier le point de vue du point zéro
Thousands of internet-facing devices vulnerable to Check Point VPN zero-day
(lien direct)
Pas de details / No more details Vulnerability Threat ★★
RecordedFuture.webp 2024-05-29 22:25:59 NIST prévoit de nettoyer la base de données de Backlog in Vulnerabilities d'ici la fin de l'exercice
NIST expects to clear backlog in vulnerabilities database by end of fiscal year
(lien direct)
Pas de details / No more details Vulnerability ★★
Last update at: 2025-05-11 14:07:49
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter