X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - Hier 21:35

Hackers exploit TrueConf zero-day to push malicious software updates

Hackers have targeted TrueConf conference servers in attacks that exploit a zero-day vulnerability, allowing them to execute arbitrary files on all connected endpoints. [...]

Articles similaires

Sorry! Image not available at this time

Hackers exploit TrueConf zero-day to push malicious software updates

bleepingcomputer.com - 21:35

Hackers have targeted TrueConf conference servers in attacks that exploit a zero-day vulnerability, allowing them to execute arbitrary files on all...

Sorry! Image not available at this time

Cisco Firewall 0-day Vulnerability Exploited in the Wild to Deploy Interlock Ransomware

itsecuritynews.info - 18/Mar 18:09

An active campaign by the Interlock ransomware group is exploiting a critical zero-day vulnerability (CVE-2026-20131) in Cisco Secure Firewall...

Sorry! Image not available at this time

Cisco Firewall 0-day Vulnerability Exploited in the Wild to Deploy Interlock Ransomware

itsecuritynews.info - 18/Mar 18:09

An active campaign by the Interlock ransomware group is exploiting a critical zero-day vulnerability (CVE-2026-20131) in Cisco Secure Firewall...

Sorry! Image not available at this time

Vim Vulnerability Let Attackers Execute Arbitrary Command Via Weaponized Files

itsecuritynews.info - 30/Mar 13:06

A high-severity security flaw has been discovered in Vim, one of the most widely used text editors among developers. This vulnerability allows...

Sorry! Image not available at this time

It’s a mystery … alleged unpatched Telegram zero-day allows device takeover, but Telegram denies

securityaffairs.co - 30/Mar 14:07

A critical Telegram flaw could allow zero-click remote code execution on devices, but Telegram denies it. Researcher Michael DePlante (@izobashi) of...

Sorry! Image not available at this time

Russian hackers exploit Zimbra flaw in Ukrainian govt attacks

bleepingcomputer.com - 19/Mar 14:55

Hackers part of APT28, a state-backed threat group linked to Russia's military intelligence service (GRU), are exploiting a Zimbra Collaboration...

Sorry! Image not available at this time

Russian hackers exploit Zimbra flaw in Ukrainian govt attacks

bleepingcomputer.com - 19/Mar 14:55

Hackers part of APT28, a state-backed threat group linked to Russia's military intelligence service (GRU), are exploiting a Zimbra Collaboration...

Sorry! Image not available at this time

Hackers now exploit critical F5 BIG-IP flaw in attacks, patch now

bleepingcomputer.com - 30/Mar 10:59

F5 has reclassified a BIG-IP APM denial-of-service (DoS) vulnerability as a critical-severity remote code execution (RCE) flaw, warning that attackers...

Sorry! Image not available at this time

Vim Modeline Bypass Vulnerability Let Attackers Execute Arbitrary OS Commands

itsecuritynews.info - 04:09

A newly discovered high-severity vulnerability in the popular Vim text editor exposes users to arbitrary command execution on the operating system....

Sorry! Image not available at this time

Vim Modeline Bypass Vulnerability Let Attackers Execute Arbitrary OS Commands

itsecuritynews.info - 04:09

A newly discovered high-severity vulnerability in the popular Vim text editor exposes users to arbitrary command execution on the operating system....