Veille informationnel - Sécurité
- 5 min read
- 2 comments
Cert-FR
[MàJ] Multiples vulnérabilités dans Microsoft SharePoint (21 juillet 2025)
July 21, 2025**[Mise à jour du 23 juillet 2025]** Le 20 juillet 2025, Microsoft a publié des correctifs pour une vulnérabilité de type limitation insuffisante d'un chemin d'accès à un répertoire restreint, aussi appelé *path traversal*, affectant SharePoint Enterprise Server 2016, SharePoint Server 2019 et...
Vulnérabilité dans Mattermost Server (31 juillet 2025)
July 31, 2025Une vulnérabilité a été découverte dans Mattermost Server. Elle permet à un attaquant de provoquer un déni de service à distance.
Vulnérabilité dans Centreon Web (25 août 2025)
August 25, 2025Une vulnérabilité a été découverte dans Centreon Web. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Vulnérabilité dans les produits Moxa (25 août 2025)
August 25, 2025Une vulnérabilité a été découverte dans les produits Moxa. Elle permet à un attaquant de provoquer une élévation de privilèges.
Vulnérabilité dans Liferay (25 août 2025)
August 25, 2025Une vulnérabilité a été découverte dans Liferay. Elle permet à un attaquant de provoquer une injection de code indirecte à distance (XSS).
Microsoft Security Blog
Azure mandatory multifactor authentication: Phase 2 starting in October 2025
September 5, 2025<p>Microsoft Azure is announcing the start of Phase 2 multi-factor authentication enforcement at the Azure Resource Manager layer, starting October 1, 2025.</p> <p>The post <a href="https://azure.microsoft.com/en-us/blog/azure-mandatory-multifactor-authentication-phase-2-starting-in-october-2025/">Azure mandatory multifactor authentication: Phase 2 starting in October 2025</a> appeared first on <a href="https://www.microsoft.com/en-us/security/blog">Microsoft Security Blog</a>.</p>
Storm-0501’s evolving techniques lead to cloud-based ransomware
August 27, 2025<p>Financially motivated threat actor Storm-0501 has continuously evolved their campaigns to achieve sharpened focus on cloud-based tactics, techniques, and procedures (TTPs). While the threat actor has been known for targeting hybrid cloud environments, their primary objective has shifted from deploying on-premises endpoint ransomware to using cloud-based ransomware tactics. </p> <p>The post <a href="https://www.microsoft.com/en-us/security/blog/2025/08/27/storm-0501s-evolving-techniques-lead-to-cloud-based-ransomware/">Storm-0501’s evolving techniques lead to cloud-based ransomware</a> appeared first on <a href="https://www.microsoft.com/en-us/security/blog">Microsoft Security Blog</a>.</p>
Microsoft ranked number one in modern endpoint security market share third year in a row
August 27, 2025<p>For a third year a row, Microsoft has been named the number one leader for endpoint security market share, as featured in a new IDC report.</p> <p>The post <a href="https://www.microsoft.com/en-us/security/blog/2025/08/27/microsoft-ranked-number-one-in-modern-endpoint-security-market-share-third-year-in-a-row/">Microsoft ranked number one in modern endpoint security market share third year in a row</a> appeared first on <a href="https://www.microsoft.com/en-us/security/blog">Microsoft Security Blog</a>.</p>
Securing and governing the rise of autonomous agents
August 26, 2025<p>Hear directly from Corporate Vice President and Deputy Chief Information Security Officer (CISO) for Identity, Igor Sakhnov, about how to secure and govern autonomous agents. This blog is part of a new ongoing series where our Deputy CISOs share their thoughts on what is most important in their respective domains. In this series you will get practical advice, forward-looking commentary on where the industry is going, things you should stop doing, and more. </p> <p>The post <a href="https://www.microsoft.com/en-us/security/blog/2025/08/26/securing-and-governing-the-rise-of-autonomous-agents/">Securing and governing the rise of autonomous agents</a> appeared first on <a href="https://www.microsoft.com/en-us/security/blog">Microsoft Security Blog</a>.</p>
Think before you Click(Fix): Analyzing the ClickFix social engineering technique
August 21, 2025<p>The ClickFix social engineering technique has been growing in popularity, with campaigns targeting thousands of enterprise and end-user devices daily. This technique exploits users’ tendency to resolve technical issues by tricking them into running malicious commands. These commands, in turn, deliver payloads that ultimately lead to information theft and exfiltration.</p> <p>The post <a href="https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/">Think before you Click(Fix): Analyzing the ClickFix social engineering technique</a> appeared first on <a href="https://www.microsoft.com/en-us/security/blog">Microsoft Security Blog</a>.</p>
AWS
Impossible de lire le flux RSS.