Blog

Incident de sécurité F5 (16 octobre 2025) (CERT-FR)

Sécurité
Le 15 octobre 2025, F5 a publié un communiqué [1] dans lequel l'éditeur déclare avoir été affecté par un incident de sécurité qu'il attribue à un mode opératoire sophistiqué. L'éditeur a pris connaissance de l'intrusion début août 2025. L'attaquant a réussi à exfiltrer une partie du code source...
Read More

Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in « Zero Disco’ Attacks

Actualités
Cybersecurity researchers have disclosed details of a new campaign that exploited a recently disclosed security flaw impacting Cisco IOS Software and IOS XE Software to deploy Linux rootkits on older, unprotected systems. The activity, codenamed Operation Zero Disco by Trend Micro, involves the weaponization of CVE-2025-20352 (CVSS score: 7.7), a stack overflow vulnerability in the Simple
Read More

Architectures, Risks, and Adoption: How to Assess and Choose the Right AI-SOC Platform

Actualités
Scaling the SOC with AI - Why now?  Security Operations Centers (SOCs) are under unprecedented pressure. According to SACR’s AI-SOC Market Landscape 2025, the average organization now faces around 960 alerts per day, while large enterprises manage more than 3,000 alerts daily from an average of 28 different tools. Nearly 40% of those alerts go uninvestigated, and 61% of security teams admit
Read More

Beware the Hidden Costs of Pen Testing

Actualités
Penetration testing helps organizations ensure IT systems are secure, but it should never be treated in a one-size-fits-all approach. Traditional approaches can be rigid and cost your organization time and money – while producing inferior results.  The benefits of pen testing are clear. By empowering “white hat” hackers to attempt to breach your system using similar tools and techniques to
Read More