OSINT, Influence Operations, and the Dark Web: Our Top 5 Podcast Episodes From 2019

. December 23, 2019 • The Recorded Future Team. As a cybersecurity professional, it’s easy to become siloed into your own specialist area. After all, it’s a huge field, and nobody could ever hope to become an expert in everything. Nonetheless, it’s val…

Microsoft a exposé 250 millions de fiches client et pourquoi le piratage du mobile de Jeff Bezos devrait tous nous interpeller #veille (26 jan 2020)

Japanese multinational Mitsubishi Electric has admitted that it had suffered a data breach some six months ago, and that “personal information and corporate confidential information may have been leaked.” The company, though, claims that “sensitive inf…

[email protected] – GnuPG: information disclosure via Chosen-Prefix SHA-1 Collisions, analyzed on 26/11/2019

The [email protected] team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Synthesis of the vulnerability An attacker can bypass access restrictions to data via Chosen-Pr…

[email protected] – Ruby: information disclosure via WEBrick HTTP Response Splitting, analyzed on 26/11/2019

Synthesis of the vulnerability An attacker can bypass access restrictions to data via WEBrick HTTP Response Splitting of Ruby, in order to obtain sensitive information. Impacted products:

Severity of this bulletin: 2/4. Creation date: 26/11/2019. Réfé…