De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d’entre elles permettent à un attaquant...
Année : 2024
CERTFR-2024-AVI-0075 : Multiples vulnérabilités dans le noyau Linux de RedHat (26 janvier 2024)

1 min read
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Certaines d’entre elles permettent à...
The first edition of Pwn2Own Automotive has ended with competitors earning $1,323,750 for hacking Tesla twice and...
Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to...
Genetic testing provider 23andMe confirmed that hackers stole health reports and raw genotype data of customers affected...
A previously unknown advanced threat actor tracked as ‘Blackwood’ is using sophisticated malware called NSPX30 in cyberespionage...
Numerous iOS apps are using background processes triggered by push notifications to collect user data about devices,...
Russian national Vladimir Dunaev has been sentenced to five years and four months in prison for his...
Security researchers hacked the Tesla infotainment system and demoed a total of 24 zero-days on the second day of...
Malicious activity targeting a critical severity flaw in the ‘Better Search Replace’ WordPress plugin has been detected,...