L'actu de la sécu


Les dernières news:

  • Critical Vulnerability in Anthropic's MCP Exposes Developer Machines to Remote Exploits
    Publié le July 1, 2025

    Source: HackerNews

    Cybersecurity researchers have discovered a critical security vulnerability in artificial intelligence (AI) company Anthropic's Model Context Protocol (MCP) Inspector project that could result in remote code execution (RCE) and allow an attacker to gain complete access to the hosts. The vulnerability, tracked as CVE-2025-49596, carries a CVSS score of 9.4 out of a maximum of 10.0. "This is one

    Lien
  • TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns
    Publié le July 1, 2025

    Source: HackerNews

    Cybersecurity researchers have flagged the tactical similarities between the threat actors behind the RomCom RAT and a cluster that has been observed delivering a loader dubbed TransferLoader. Enterprise security firm Proofpoint is tracking the activity associated with TransferLoader to a group dubbed UNK_GreenSec and the RomCom RAT actors under the moniker TA829. The latter is also known by the

    Lien
  • New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status
    Publié le July 1, 2025

    Source: HackerNews

    A new study of integrated development environments (IDEs) like Microsoft Visual Studio Code, Visual Studio, IntelliJ IDEA, and Cursor has revealed weaknesses in how they handle the extension verification process, ultimately enabling attackers to execute malicious code on developer machines. "We discovered that flawed verification checks in Visual Studio Code allow publishers to add functionality

    Lien
  • A New Maturity Model for Browser Security: Closing the Last-Mile Risk
    Publié le July 1, 2025

    Source: HackerNews

    Despite years of investment in Zero Trust, SSE, and endpoint protection, many enterprises are still leaving one critical layer exposed: the browser. It’s where 85% of modern work now happens. It’s also where copy/paste actions, unsanctioned GenAI usage, rogue extensions, and personal devices create a risk surface that most security stacks weren’t designed to handle. For security leaders who know

    Lien
  • [webapps] Social Warfare WordPress Plugin 3.5.2 - Remote Code Execution (RCE)
    Publié le June 26, 2025

    Source: ExploitDB

    Social Warfare WordPress Plugin 3.5.2 - Remote Code Execution (RCE)

    Lien
  • [remote] McAfee Agent 5.7.6 - Insecure Storage of Sensitive Information
    Publié le June 26, 2025

    Source: ExploitDB

    McAfee Agent 5.7.6 - Insecure Storage of Sensitive Information

    Lien
  • [webapps] Sitecore 10.4 - Remote Code Execution (RCE)
    Publié le June 26, 2025

    Source: ExploitDB

    Sitecore 10.4 - Remote Code Execution (RCE)

    Lien
  • [remote] Microsoft Excel 2024 Use after free - Remote Code Execution (RCE)
    Publié le June 26, 2025

    Source: ExploitDB

    Microsoft Excel 2024 Use after free - Remote Code Execution (RCE)

    Lien
  • [remote] freeSSHd 1.0.9 - Denial of Service (DoS)
    Publié le June 26, 2025

    Source: ExploitDB

    freeSSHd 1.0.9 - Denial of Service (DoS)

    Lien