Fortinet fixes critical zero-day exploited in FortiVoice attacks
Fortinet released security updates to patch a critical remote code execution vulnerability exploited as a zero-day in attacks targeting FortiVoice enterprise phone systems.
Cybersécurité : L’Europe se dote de sa propre base de données sur les vulnérabilités
L'Agence européenne pour la cybersécurité vient de mettre en ligne la première base de données européenne qui centralise les vulnérabilités...-Cybersécurité
Ivanti warns of critical Neurons for ITSM auth bypass flaw
Ivanti has released security updates for its Neurons for ITSM IT service management solution that mitigate a critical authentication bypass vulnerability.
Turkey-Aligned Hackers Targeted Iraq-Based Kurds with Zero-Day Exploit
Marbled Dust has been exploiting a vulnerability in user accounts associated with the Kurdish military operating in Iraq for over a year, according to Microsoft
New Intel CPU flaws leak sensitive data from privileged memory
A new "Branch Privilege Injection" flaw in all modern Intel CPUs allows attackers to leak sensitive data from memory regions allocated to privileged software like the operating system kernel.
EU launches vulnerability database to tackle cybersecurity threats
The European Union launched on Tuesday its new vulnerability database to provide aggregated information regarding cybersecurity issues affecting various products and services.
Microsoft will update Office apps on Windows 10 until 2028
Microsoft has backtracked on its plan to end support for Office apps on Windows 10 later this year and announced that it will continue providing security updates for three more years, until 2028.
State and local election officials plead with Congress for election security funding | CyberScoop
150 active and retired officials from across the country asked Senate and House appropriations leaders to set aside $400 million for the next fiscal year.
Increase Red Team Operations 10X with Adversarial Exposure Validation
Red teams uncover what others miss — but they can't be everywhere, all the time. Adversarial Exposure Validation combines BAS + Automated Pentesting to extend red team impact, uncover real attack paths, and validate defenses continuously. Learn more from Picus Security on how AEV can help protect your network.
Black-out en Espagne : La piste d'une cyberattaque contre les parcs solaires et éoliens
L'Institut national de cybersécurité espagnol serait en train d'enquêter sur la panne électrique géante auprès des entreprises gestionnaires...-Cybersécurité
Non, l'iPhone de Nicolas ne l'écoute pas (et le vôtre non plus) - Numerama
Dans un article du Parisien, on découvre qu'un utilisateur d'iPhone estime être écouté par son appareil qui afficherait ensuite des publicités basées sur ses conversations. Cette théorie populaire est fausse. C'est toujours la même histoire et elle est toujours fausse. Nos confrères du Parisien se font l'écho ce 13
Explore 2025's top security trends: AI governance, compliance automation, third-party risk, and building trust to enhance your organization's security strategy.
Alabama says ‘cybersecurity event’ could disrupt state government services
Alabama Governor Kay Ivey said the state is responding to a "cybersecurity event" that has prompted government IT staff to work "around-the-clock to identify and mitigate impacts."
Sur un an, 80% des entreprises françaises ont connu un incident de sécurité lié à l'IA
Cisco a publié son rapport annuel sur la préparation des organisations aux enjeux de cybersécurité. Malgré une très légère progression du...-Cybersécurité
Redefining IABs: Impacts of compartmentalization on threat tracking and modeling
Threat actors are teaming up, splitting attacks into stages and making defense harder than ever. In Part 1, Cisco Talos examines their tactics and defines their motivations.