What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2025-05-07 11:28:01 La vulnérabilité critique de Langflow (CVE-2025-3248) a activement exploité, avertit CISA
Critical Langflow Vulnerability (CVE-2025-3248) Actively Exploited, Warns CISA
(lien direct)
CISA met en garde contre l'exploitation active de la vulnérabilité critique de Langflow (CVE-2025-3248). Le défaut RCE critique permet une prise de contrôle complète du serveur. Correctif…
CISA warns of active exploitation of critical Langflow vulnerability (CVE-2025-3248). Critical RCE flaw allows full server takeover. Patch…
Vulnerability ★★★
Blog.webp 2025-05-06 11:25:56 De nouvelles données de vulnérabilité du cloud montrent que Google Cloud est en risque
New Cloud Vulnerability Data Shows Google Cloud Leads in Risk
(lien direct)
De nouvelles recherches montrent que Google Cloud et les petits fournisseurs ont les taux de vulnérabilité du cloud les plus élevés par rapport à AWS…
New research shows Google Cloud and smaller providers have the highest cloud vulnerability rates as compared to AWS…
Vulnerability Cloud ★★★★
Blog.webp 2025-05-03 21:26:53 Watchtowr met en garde contre l'exploitation active des appareils Sonicwall SMA 100
watchTowr Warns of Active Exploitation of SonicWall SMA 100 Devices
(lien direct)
Watchtowr révèle l'exploitation active des vulnérabilités de Sonicwall SMA 100 (CVE-2024-38475 et CVE-2023-44221) conduisant potentiellement à une prise de contrôle complète du système…
watchTowr reveals active exploitation of SonicWall SMA 100 vulnerabilities (CVE-2024-38475 & CVE-2023-44221) potentially leading to full system takeover…
Vulnerability ★★★
Blog.webp 2025-05-03 18:42:58 Des milliards de dispositifs Apple en danger des vulnérabilités aérodynamiques «aéroportées»
Billions of Apple Devices at Risk from “AirBorne” AirPlay Vulnerabilities
(lien direct)
Oligo Security découvre «Airborne», un ensemble de 23 vulnérabilités dans Airplay Apple affectant des milliards d'appareils. Apprenez comment…
Oligo Security uncovers “AirBorne,” a set of 23 vulnerabilities in Apple AirPlay affecting billions of devices. Learn how…
Vulnerability ★★★
Blog.webp 2025-04-30 12:17:41 Google introduit une IA d'agence pour lutter contre les menaces de cybersécurité
Google Introduces Agentic AI to Combat Cybersecurity Threats
(lien direct)
Google améliore la cybersécurité avec une IA agentique, lançant une sécurité unifiée pour lutter contre les exploits de jours zéro, les menaces d'entreprise et les attaques basées sur les diplômes.…
Google enhances cybersecurity with Agentic AI, launching Unified Security to fight zero-day exploits, enterprise threats, and credential-based attacks.…
Vulnerability Threat ★★
Blog.webp 2025-04-28 17:47:14 BreachForums affiche un message sur l'arrêt, cite MyBB 0day Flaw
BreachForums Displays Message About Shutdown, Cites MyBB 0day Flaw
(lien direct)
BreachForums publie un message signé PGP expliquant la fermeture soudaine d'avril 2025. Les administrateurs citent la vulnérabilité MyBB 0day impactant le…
BreachForums posts a PGP-signed message explaining the sudden April 2025 shutdown. Admins cite MyBB 0day vulnerability impacting the…
Vulnerability Threat ★★★
Blog.webp 2025-04-26 12:46:50 Planet Technology Industrial commutation Les défauts risquent la prise de contrôle complète - Patch maintenant
Planet Technology Industrial Switch Flaws Risk Full Takeover – Patch Now
(lien direct)
Les chercheurs en sécurité immersive ont découvert des vulnérabilités critiques dans la gestion des réseaux de technologie de la planète et les produits de commutation, permettant un contrôle complet de l'appareil.…
Immersive security researchers discovered critical vulnerabilities in Planet Technology network management and switch products, allowing full device control.…
Vulnerability Industrial ★★★
Blog.webp 2025-04-26 11:45:50 SAP Netweaver Flaw scores 10.0 Severe alors que les pirates déploient des coquilles Web
SAP NetWeaver Flaw Scores 10.0 Severity as Hackers Deploy Web Shells
(lien direct)
Une vulnérabilité critique (CVE-2025-31324) dans SAP Netweaver Visual Composer met les systèmes à risque de compromis complet. Apprenez comment…
A critical vulnerability (CVE-2025-31324) in SAP NetWeaver Visual Composer puts systems at risk of full compromise. Learn how…
Vulnerability ★★
Blog.webp 2025-04-22 18:52:31 La vulnérabilité SSL.com a autorisé les certificats SSL frauduleux pour les domaines majeurs
SSL.com Vulnerability Allowed Fraudulent SSL Certificates for Major Domains
(lien direct)
Une vulnérabilité SSL.com a permis aux attaquants d'émettre des certificats SSL valides pour les domaines majeurs en exploitant un bogue…
An SSL.com vulnerability allowed attackers to issue valid SSL certificates for major domains by exploiting a bug in…
Vulnerability ★★★
Blog.webp 2025-04-17 18:14:38 Les chercheurs trouvent CVSS 10.0 Vulnérabilité de gravité RCE dans Erlang / OTP SSH
Researchers Find CVSS 10.0 Severity RCE Vulnerability in Erlang/OTP SSH
(lien direct)
Les chercheurs en sécurité rapportent le CVE-2025-32433, une vulnérabilité CVSS 10.0 RCE dans Erlang / OTP SSH, permettant une exécution de code non authentifiée sur exposé…
Security researchers report CVE-2025-32433, a CVSS 10.0 RCE vulnerability in Erlang/OTP SSH, allowing unauthenticated code execution on exposed…
Vulnerability ★★★
Blog.webp 2025-04-14 20:54:10 Patch incomplet laisse les utilisateurs de Nvidia et Docker à risque
Incomplete Patch Leaves NVIDIA and Docker Users at Risk
(lien direct)
Le patch de sécurité incomplet de NVIIA \\, combiné à une vulnérabilité Docker, crée une menace sérieuse pour les organisations utilisant des environnements conteneurisés. Cet article explique les risques et les stratégies d'atténuation.
NVIIA\'s incomplete security patch, combined with a Docker vulnerability, creates a serious threat for organizations using containerized environments. This article explains the risks and mitigation strategies.
Vulnerability Threat ★★★
Blog.webp 2025-04-11 17:14:09 La vulnérabilité Bentoml permet l'exécution du code distant sur les serveurs d'IA
BentoML Vulnerability Allows Remote Code Execution on AI Servers
(lien direct)
TL; DR: Une vulnérabilité de désérialisation critique (CVSS 9.8 - CVE-2025-27520) dans Bentoml (V1.3.8–1.4.2) permet aux attaquants d'exécuter du code distant sans…
TL;DR: A critical deserialization vulnerability (CVSS 9.8 – CVE-2025-27520) in BentoML (v1.3.8–1.4.2) lets attackers execute remote code without…
Vulnerability ★★
Blog.webp 2025-04-02 14:11:12 Canon Imprimante Drivers Flaw pourrait permettre aux pirates d'exécuter un code malveillant
Canon Printer Drivers Flaw Could Let Hackers Run Malicious Code
(lien direct)
Une vulnérabilité critique (CVE-2025-1268) dans les pilotes d'imprimante Canon permet l'exécution du code distant. Voyez quels conducteurs sont affectés, comment les corriger.
A critical vulnerability (CVE-2025-1268) in Canon printer drivers allows remote code execution. See which drivers are affected, how to patch them.
Vulnerability ★★★
Blog.webp 2025-03-26 16:40:56 Next.js Middleware Flaw permet aux attaquants de contourner l'autorisation
Next.js Middleware Flaw Lets Attackers Bypass Authorization
(lien direct)
Les chercheurs ont découvert une vulnérabilité critique (CVE-2025-29927) dans le middleware suivant. Découvrez l'exploit et les correctifs.
Researchers have uncovered a critical vulnerability (CVE-2025-29927) in Next.js middleware, allowing authorization bypass. Learn about the exploit and fixes.
Vulnerability Threat ★★★
Blog.webp 2025-03-22 13:29:00 Oracle nie la violation au milieu de la revendication d'accès de Hacker \\ à 6 millions d'enregistrements
Oracle Denies Breach Amid Hacker\\'s Claim of Access to 6 Million Records
(lien direct)
Oracle nie les réclamations de violation car le pirate allègue l'accès à 6 millions de dossiers cloud. Cloudsek rapporte un exploit potentiel de zéro-jours affectant 140 000 locataires.
Oracle denies breach claims as hacker alleges access to 6 million cloud records. CloudSEK reports a potential zero-day exploit affecting 140,000 tenants.
Vulnerability Threat Cloud ★★★
Blog.webp 2025-03-21 12:19:08 De nouvelles attaques exploitent des défauts de ServiceNow, âgés d'un an - Israël a frappé le plus durement
New Attacks Exploit Year-Old ServiceNow Flaws – Israel Hit Hardest
(lien direct)
ALERTE DE VULLÉRABILITÉ SERVICENOW: Les pirates exploitent activement des défauts d'un an (CVE-2024-4879, CVE-2024-5217, CVE-2024-5178) pour l'accès à la base de données. Apprenez à…
ServiceNow vulnerability alert: Hackers are actively exploiting year-old flaws (CVE-2024-4879, CVE-2024-5217, CVE-2024-5178) for database access. Learn how to…
Vulnerability Threat ★★★
Blog.webp 2025-03-20 17:33:43 Le graphite spyware israélien ciblé WhatsApp avec exploit de 0 clic
Israeli Spyware Graphite Targeted WhatsApp with 0-Click Exploit
(lien direct)
L'enquête de Citizen Lab \\ révèle des attaques de logiciels espions sophistiqués exploitant les vulnérabilités de WhatsApp, impliquant des solutions de paragon. Découvrez comment leurs recherches ont exposé ces menaces et les implications pour la vie privée numérique.
Citizen Lab\'s investigation reveals sophisticated spyware attacks exploiting WhatsApp vulnerabilities, implicating Paragon Solutions. Learn how their research exposed these threats and the implications for digital privacy.
Vulnerability Threat ★★★★
Blog.webp 2025-03-19 20:00:30 11 hackers de l'État-nation exploitent une faille Windows non corrigée depuis 2017
11 Nation-State Hackers Exploit Unpatched Windows Flaw Since 2017
(lien direct)
Microsoft refuse de corriger la vulnérabilité de raccourci Windows sérieuse abusée dans les campagnes d'espionnage mondiales!
Microsoft refuses to patch serious Windows shortcut vulnerability abused in global espionage campaigns!
Vulnerability Threat ★★★
Blog.webp 2025-03-17 21:26:03 Les pirates exploitent Chatgpt avec CVE-2024-27564, plus de 10 000 attaques en une semaine
Hackers Exploit ChatGPT with CVE-2024-27564, 10,000+ Attacks in a Week
(lien direct)
Dans son dernier rapport de recherche, la société de cybersécurité Veriti a repéré l'exploitation active d'une vulnérabilité dans le chatppt d'Openai…
In its latest research report, cybersecurity firm Veriti has spotted active exploitation of a vulnerability within OpenAI’s ChatGPT…
Vulnerability Threat ChatGPT ★★★
Blog.webp 2025-03-12 17:54:29 Les vulnérabilités de picklescan pourraient permettre aux pirates de contourner les contrôles de sécurité AI
Picklescan Vulnerabilities Could Let Hackers Bypass AI Security Checks
(lien direct)
Les chercheurs de sonat découvrent les vulnérabilités critiques dans Picklescan. Découvrez comment ces défauts ont un impact sur la sécurité du modèle d'IA, les étreintes et…
Sonatype researchers uncover critical vulnerabilities in picklescan. Learn how these flaws impact AI model security, Hugging Face, and…
Vulnerability ★★
Blog.webp 2025-03-12 10:56:12 Mars 2025 Patch mardi: Microsoft corrige 57 vulnérabilités, 7 zéro jours
March 2025 Patch Tuesday: Microsoft Fixes 57 Vulnerabilities, 7 Zero-Days
(lien direct)
Le patch de Microsoft \\ de Microsoft 2025 mardi corrige six vulnérabilités activement exploitées au jour zéro, y compris les défauts critiques de l'escalade du RCE et du privilège. Découvrez comment ces vulnérabilités ont un impact sur les systèmes Windows et pourquoi les correctifs immédiats sont essentiels.
Microsoft\'s March 2025 Patch Tuesday fixes six actively exploited zero-day vulnerabilities, including critical RCE and privilege escalation flaws. Learn how these vulnerabilities impact Windows systems and why immediate patching is essential.
Vulnerability Threat Patching ★★★
Blog.webp 2025-03-05 10:52:13 Les pirates exploitent les erreurs de configuration du cloud pour répandre les logiciels malveillants
Hackers Exploit Cloud Misconfigurations to Spread Malware
(lien direct)
Veriti Research révèle que 40% des réseaux permettent un accès cloud «tout», exposant des vulnérabilités critiques. Découvrez comment les logiciels malveillants comme Xworm…
Veriti Research reveals 40% of networks allow ‘any/any’ cloud access, exposing critical vulnerabilities. Learn how malware like XWorm…
Malware Vulnerability Threat Cloud ★★★
Blog.webp 2025-02-20 12:04:56 FBI and CISA Warn of Ghost Ransomware: A Threat to Firms Worldwide (lien direct) FBI and CISA warn of Ghost ransomware, a China-based cyber threat targeting businesses, schools, and healthcare worldwide by exploiting software vulnerabilities.
FBI and CISA warn of Ghost ransomware, a China-based cyber threat targeting businesses, schools, and healthcare worldwide by exploiting software vulnerabilities.
Ransomware Vulnerability Threat Medical ★★★
Blog.webp 2025-02-19 11:17:57 Xerox Versalink Printers Vulnerabilities Could Let Hackers Steal Credentials (lien direct) Xerox Versalink printers are vulnerable to pass-back attacks. Rapid7 discovers LDAP & SMB flaws (CVE-2024-12510 & CVE-2024-12511). Update…
Xerox Versalink printers are vulnerable to pass-back attacks. Rapid7 discovers LDAP & SMB flaws (CVE-2024-12510 & CVE-2024-12511). Update…
Vulnerability ★★
Blog.webp 2025-02-18 18:05:07 Critical OpenSSH Vulnerabilities Expose Users to MITM and DoS Attacks (lien direct) Two critical OpenSSH vulnerabilities discovered! Qualys TRU finds client and server flaws (CVE-2025-26465 & CVE-2025-26466) enabling MITM and…
Two critical OpenSSH vulnerabilities discovered! Qualys TRU finds client and server flaws (CVE-2025-26465 & CVE-2025-26466) enabling MITM and…
Vulnerability ★★★
Blog.webp 2025-02-18 14:00:23 Intruder Enhances Free Vulnerability Intelligence Platform \\'Intel\\' with AI-Generated CVE Descriptions (lien direct) London, United Kingdom, 18th February 2025, CyberNewsWire
London, United Kingdom, 18th February 2025, CyberNewsWire
Vulnerability ★★★
Blog.webp 2025-02-13 12:53:27 FortiOS Vulnerability Allows Super-Admin Privilege Escalation – Patch Now! (lien direct) Super-admin access vulnerability discovered in FortiOS Security Fabric. Exploitation could lead to widespread network breaches. Update now. Fortinet has…
Super-admin access vulnerability discovered in FortiOS Security Fabric. Exploitation could lead to widespread network breaches. Update now. Fortinet has…
Vulnerability ★★★
Blog.webp 2025-02-12 15:34:41 Patch Tuesday: Microsoft Fixes 63 Bugs with 2 Zero-Days (lien direct) Microsoft’s February Patch Tuesday addresses 63 security vulnerabilities, including two actively exploited zero-days. Update your systems now to…
Microsoft’s February Patch Tuesday addresses 63 security vulnerabilities, including two actively exploited zero-days. Update your systems now to…
Vulnerability ★★★
Blog.webp 2025-02-12 13:45:35 Apple Confirms \\'Extremely Sophisticated\\' Exploit Threatening iOS Security (lien direct) Apple fixes the USB Restricted Mode flaw in iOS 18.3.1 and iPadOS 18.3.1.  Vulnerability exploited in targeted attacks.…
Apple fixes the USB Restricted Mode flaw in iOS 18.3.1 and iPadOS 18.3.1.  Vulnerability exploited in targeted attacks.…
Vulnerability Threat ★★★
Blog.webp 2025-02-07 21:35:43 ASP.NET Vulnerability Lets Hackers Hijack Servers, Inject Malicious Code (lien direct) Microsoft cybersecurity experts have identified a vulnerability flaw affecting ASP.NET applications, putting thousands of web servers at risk.…
Microsoft cybersecurity experts have identified a vulnerability flaw affecting ASP.NET applications, putting thousands of web servers at risk.…
Vulnerability ★★
Blog.webp 2025-02-06 16:16:29 DeepSeek-R1 LLM Fails Over Half of Jailbreak Attacks in Security Analysis (lien direct) DeepSeek-R1 LLM fails 58% of jailbreak attacks in Qualys security analysis. Learn about the vulnerabilities, compliance concerns, and risks for enterprise adoption.
DeepSeek-R1 LLM fails 58% of jailbreak attacks in Qualys security analysis. Learn about the vulnerabilities, compliance concerns, and risks for enterprise adoption.
Vulnerability ★★★
Blog.webp 2025-02-01 13:10:42 Casio and 16 Other Websites Hit by Double-Entry Web Skimming Attack (lien direct) Researchers uncover a double-entry website skimming attack targeting Casio and 16 other sites. Learn how cybercriminals exploited vulnerabilities to steal sensitive payment data and evade detection.
Researchers uncover a double-entry website skimming attack targeting Casio and 16 other sites. Learn how cybercriminals exploited vulnerabilities to steal sensitive payment data and evade detection.
Vulnerability ★★★
Blog.webp 2025-01-27 23:46:41 Subaru STARLINK Flaw Enabled Remote Tracking and Control of Vehicles (lien direct) Subaru STARLINK flaw exposed a critical security vulnerability, enabling unauthorized access to vehicle tracking, remote control, and sensitive…
Subaru STARLINK flaw exposed a critical security vulnerability, enabling unauthorized access to vehicle tracking, remote control, and sensitive…
Vulnerability ★★★
Blog.webp 2025-01-27 16:49:31 Brave Desktop Browser Vulnerability Lets Malicious Sites Appear Trusted (lien direct) A critical vulnerability in Brave Browser allows malicious websites to appear as trusted sources during file uploads/downloads. Learn…
A critical vulnerability in Brave Browser allows malicious websites to appear as trusted sources during file uploads/downloads. Learn…
Vulnerability ★★★
Blog.webp 2025-01-27 11:11:34 SonicWall SMA Appliances Exploited in Zero-Day Attacks (lien direct) Critical security flaw in SonicWall SMA 1000 appliances (CVE-2025-23006) exploited as a zero-day. Rated CVSS 9.8, patch immediately…
Critical security flaw in SonicWall SMA 1000 appliances (CVE-2025-23006) exploited as a zero-day. Rated CVSS 9.8, patch immediately…
Vulnerability Threat ★★
Blog.webp 2025-01-22 20:35:23 Zendesk\\'s Subdomain Registration Exposed to Phishing, Pig Butchering Scams (lien direct) CloudSEK uncovers a Zendesk vulnerability allowing cybercriminals to exploit subdomains for phishing and investment scams. Learn about the…
CloudSEK uncovers a Zendesk vulnerability allowing cybercriminals to exploit subdomains for phishing and investment scams. Learn about the…
Vulnerability Threat ★★
Blog.webp 2025-01-21 16:33:54 PARSIQ\\'s Reactive Network Provides Solution for DeFi Exchange Vulnerabilities (lien direct) Over the past few years, decentralised finance (DeFi) has revolutionised the financial sector. DeFi introduced transparent, permissionless and…
Over the past few years, decentralised finance (DeFi) has revolutionised the financial sector. DeFi introduced transparent, permissionless and…
Vulnerability ★★★
Blog.webp 2025-01-15 10:08:13 Microsoft Discovers macOS Flaw CVE-2024-44243, Bypassing SIP (lien direct) CVE-2024-44243, a critical macOS vulnerability discovered recently by Microsoft, can allow attackers to bypass Apple’s System Integrity Protection…
CVE-2024-44243, a critical macOS vulnerability discovered recently by Microsoft, can allow attackers to bypass Apple’s System Integrity Protection…
Vulnerability ★★★
Blog.webp 2025-01-15 09:29:08 Hackers Use CVE-2024-50603 to Deploy Backdoor on Aviatrix Controllers (lien direct) A critical vulnerability (CVE-2024-50603) in the Aviatrix Controller allows unauthenticated RCE. Active exploitation observed by Wiz Research in…
A critical vulnerability (CVE-2024-50603) in the Aviatrix Controller allows unauthenticated RCE. Active exploitation observed by Wiz Research in…
Vulnerability ★★★
Blog.webp 2025-01-11 13:47:03 Fake PoC Exploit Targets Cybersecurity Researchers with Malware (lien direct) A fake proof-of-concept (PoC) exploit designed to lure cybersecurity researchers into downloading malicious software. This deceptive tactic leverages a recently patched critical vulnerability in Microsoft\'s Windows LDAP service (CVE-2024-49113), which can cause denial-of-service attacks.
A fake proof-of-concept (PoC) exploit designed to lure cybersecurity researchers into downloading malicious software. This deceptive tactic leverages a recently patched critical vulnerability in Microsoft\'s Windows LDAP service (CVE-2024-49113), which can cause denial-of-service attacks.
Malware Vulnerability Threat ★★★
Blog.webp 2025-01-10 21:21:27 Ivanti Urges Patch for Flaws in Connect Secure, Policy Secure and ZTA Gateways (lien direct) Ivanti has issued a critical security advisory addressing two vulnerabilities in its Connect Secure, Policy Secure, and ZTA Gateway products.
Ivanti has issued a critical security advisory addressing two vulnerabilities in its Connect Secure, Policy Secure, and ZTA Gateway products.
Vulnerability ★★★
Blog.webp 2025-01-08 09:05:24 Critical Vulnerabilities in Moxa Routers Allow Root Privilege Escalation (lien direct) Critical security vulnerabilities have been found in Moxa cellular routers and network security appliances. Learn about CVE-2024-9138 &…
Critical security vulnerabilities have been found in Moxa cellular routers and network security appliances. Learn about CVE-2024-9138 &…
Vulnerability ★★★
Blog.webp 2025-01-03 11:08:25 (Déjà vu) NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT (lien direct) Researchers discovered a malicious package on the npm package registry that resembles a library for Ethereum smart contract vulnerabilities but actually drops an open-source remote access trojan called Quasar RAT onto developer systems.
Researchers discovered a malicious package on the npm package registry that resembles a library for Ethereum smart contract vulnerabilities but actually drops an open-source remote access trojan called Quasar RAT onto developer systems.
Tool Vulnerability ★★
Blog.webp 2025-01-02 18:39:30 Fake 7-Zip Exploit Code Traced to AI-Generated Misinterpretation (lien direct) A recent claim that a critical zero-day vulnerability existed in the popular open-source file archiver 7-Zip has been met with skepticism from the software\'s creator and other security researchers.
A recent claim that a critical zero-day vulnerability existed in the popular open-source file archiver 7-Zip has been met with skepticism from the software\'s creator and other security researchers.
Vulnerability Threat ★★★
Blog.webp 2024-12-30 06:13:40 Critical Flaw Exposes Four-Faith Routers to Remote Exploitation (lien direct) SUMMARY: VulnCheck has discovered a critical new vulnerability (CVE-2024-12856) affecting Four-Faith industrial routers (F3x24 and F3x36), with evidence…
SUMMARY: VulnCheck has discovered a critical new vulnerability (CVE-2024-12856) affecting Four-Faith industrial routers (F3x24 and F3x36), with evidence…
Vulnerability Industrial ★★
Blog.webp 2024-12-28 15:52:01 FICORA, CAPSAICIN Botnets Exploit Old D-Link Router Flaws for DDoS Attacks (lien direct) Mirai and Keksec botnet variants are exploiting critical vulnerabilities in D-Link routers. Learn about the impact, affected devices, and how to protect yourself from these attacks.
Mirai and Keksec botnet variants are exploiting critical vulnerabilities in D-Link routers. Learn about the impact, affected devices, and how to protect yourself from these attacks.
Vulnerability Threat ★★
Blog.webp 2024-12-18 12:36:33 Androxgh0st Botnet Targets IoT Devices, Exploiting 27 Vulnerabilities (lien direct) Androxgh0st, a botnet targeting web servers since January 2024, is also deploying IoT-focused Mozi payloads, reveals CloudSEK\'s latest research.
Androxgh0st, a botnet targeting web servers since January 2024, is also deploying IoT-focused Mozi payloads, reveals CloudSEK\'s latest research.
Vulnerability ★★
Blog.webp 2024-12-16 18:13:23 Cl0p Ransomware Exploits Cleo Vulnerability, Threatens Data Leaks (lien direct) SUMMARY The Cl0p ransomware group has recently claimed responsibility for exploiting a critical vulnerability in Cleo’s managed file…
SUMMARY The Cl0p ransomware group has recently claimed responsibility for exploiting a critical vulnerability in Cleo’s managed file…
Ransomware Vulnerability ★★
Blog.webp 2024-12-11 16:00:30 AuthQuake Flaw Allowed MFA Bypass Across Azure, Office 365 Accounts (lien direct) SUMMARY Cybersecurity researchers at Oasis Security have identified a vulnerability in Microsoft’s Multi-Factor Authentication (MFA), known as AuthQuake,…
SUMMARY Cybersecurity researchers at Oasis Security have identified a vulnerability in Microsoft’s Multi-Factor Authentication (MFA), known as AuthQuake,…
Vulnerability ★★★
Blog.webp 2024-12-10 17:25:31 Dell Urges Immediate Update to Fix Critical Power Manager Vulnerability (lien direct) A critical security flaw in Dell Power Manager has been discovered that could allow attackers to compromise your systems and execute arbitrary code.
A critical security flaw in Dell Power Manager has been discovered that could allow attackers to compromise your systems and execute arbitrary code.
Vulnerability ★★★
Last update at: 2025-05-11 16:07:53
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter