Vue normale

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.
Aujourd’hui — 9 mai 2026Sécurité
À partir d’avant-hierSécurité

Pourquoi les PME se tournent-elles vers les services gérés (MDR) et la recherche sur les menaces pour consolider leur défense cyber ?

28 avril 2026 à 07:00
Entretien avec Jean-Ian Boutin, directeur de la recherche sur les menaces chez ESET. Découvrez dans quels domaines les solutions alliant technologie de pointe et expertise humaine apportent le plus de valeur ajoutée aux entreprises.

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerability, tracked as CVE-2026-31431 (CVSS score: 7.8), is a case of local privilege escalation (LPE) flaw that could allow an

Trellix Confirms Source Code Breach With Unauthorized Repository Access

Cybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a "portion" of its source code. It said it "recently identified" the compromise of its source code repository and that it began working with "leading forensic experts" to resolve the matter immediately. It also said it has notified law enforcement of the matter. Trellix did not disclose the

❌
❌