❌

Normal view

Cycom Hacking Conference

17 February 2026 at 10:16

Name : Cycom Hacking Conference
Website: https://www.cycomhackingconference.com/
Date: April 23-24, 2026
Location: Montpellier, France
The CYCOM Hacking Conference is the annual cybersecurity event organized by Devensys Cybersecurity. A key event in Montpellier and Occitanie, CYCOM brings together the entire cybersecurity ecosystem for several days: professionals, technical experts, students, specialized schools, institutions, local authorities, technology partners, and industry associations.

Designed as a technical, educational, and community event, CYCOM highlights offensive, defensive, and operational cybersecurity practices through a packed program of conferences, demonstrations, feedback sessions, round tables, workshops, technical presentations, and professional meetings.
The event also includes highly anticipated highlights, such as its nighttime Capture The Flag (CTF), a hacking challenge lasting several hours that brings together enthusiasts, student teams, and experienced technical professionals.

Before the opening, a half-day event called EDUCYCOM is entirely dedicated to schools, students, and people undergoing retraining. It offers orientation workshops, introductions to major certifications (CCT, CEH, CISSP, OSCP), and an educational β€œhackathon” on cybersecurity.

CYCOM has two main goals:

  1. To share a high level of technical expertise in an accessible and practical way.
  2. To encourage networking and discussion between different players in the digital sector, both public and private.

Held at Kiasma in Castelnau-le-Lez (Montpellier MΓ©tropole), CYCOM welcomes several hundred participants each year and continues to expand its format with new activities, more conferences, and a growing partner village.

The post Cycom Hacking Conference appeared first on CISO MAG | Cyber Security Magazine.

SEC Consult SA-20260212-0 :: Multiple Vulnerabilities in various Solax Power Pocket WiFi models

16 February 2026 at 22:10

Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Feb 16

SEC Consult Vulnerability Lab Security Advisory < 20260212-0 >
=======================================================================
title: Multiple Vulnerabilities
Β  Β  Β  Β  Β  Β  product: Various Solax Power Pocket WiFi models
Β vulnerable version: See section below
Β  Β  Β  fixed version: See section below
Β  Β  Β  Β  Β CVE number: CVE-2025-15573, CVE-2025-15574, CVE-2025-15575
Β  Β  Β  Β  Β  Β  Β impact: High...

[Full Disclosure] CVE-2025-69690 & CVE-2025-69691 β€” Authenticated RCE in Netgate pfSense CE 2.7.2 and 2.8.0

16 February 2026 at 22:08

Posted by privexploits via Fulldisclosure on Feb 16

Advisory: Authenticated Remote Code Execution in pfSense CECVEs: CVE-2025-69690, CVE-2025-69691
Researcher: Nelson Adhepeau (privexploits () protonmail com)
Date: February 2026

== RESPONSIBLE DISCLOSURE NOTICE ==

This advisory is published in accordance with responsible disclosure practices.Β 

The vendor was notified on December 2, 2025, acknowledged the reports, and indicated no patches would be issued.
Publication follows standard 90-day...

APPLE-SA-02-11-2026-9 Safari 26.3

16 February 2026 at 22:06

Posted by Apple Product Security via Fulldisclosure on Feb 16

APPLE-SA-02-11-2026-9 Safari 26.3

Safari 26.3 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/126354.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

CFNetwork
Available for: macOS Sonoma and macOS Sequoia
Impact: A remote user may be able to write arbitrary files
Description: A path...

APPLE-SA-02-11-2026-8 visionOS 26.3

16 February 2026 at 22:06

Posted by Apple Product Security via Fulldisclosure on Feb 16

APPLE-SA-02-11-2026-8 visionOS 26.3

visionOS 26.3 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/126353.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

AppleMobileFileIntegrity
Available for: Apple Vision Pro (all models)
Impact: An app may be able to access sensitive user data...

APPLE-SA-02-11-2026-7 watchOS 26.3

16 February 2026 at 22:06

Posted by Apple Product Security via Fulldisclosure on Feb 16

APPLE-SA-02-11-2026-7 watchOS 26.3

watchOS 26.3 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/126352.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

Bluetooth
Available for: Apple Watch Series 6 and later
Impact: An attacker in a privileged network position may be able to
perform...

APPLE-SA-02-11-2026-6 tvOS 26.3

16 February 2026 at 22:06

Posted by Apple Product Security via Fulldisclosure on Feb 16

APPLE-SA-02-11-2026-6 tvOS 26.3

tvOS 26.3 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/126351.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

Bluetooth
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: An attacker in a privileged network position may be able to...

APPLE-SA-02-11-2026-5 macOS Sonoma 14.8.4

16 February 2026 at 22:06

Posted by Apple Product Security via Fulldisclosure on Feb 16

APPLE-SA-02-11-2026-5 macOS Sonoma 14.8.4

macOS Sonoma 14.8.4 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/126350.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

AppleMobileFileIntegrity
Available for: macOS Sonoma
Impact: An app may be able to access sensitive user data...

APPLE-SA-02-11-2026-4 macOS Sequoia 15.7.4

16 February 2026 at 22:06

Posted by Apple Product Security via Fulldisclosure on Feb 16

APPLE-SA-02-11-2026-4 macOS Sequoia 15.7.4

macOS Sequoia 15.7.4 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/126349.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

AppleMobileFileIntegrity
Available for: macOS Sequoia
Impact: An app may be able to access sensitive user data...

APPLE-SA-02-11-2026-3 macOS Tahoe 26.3

16 February 2026 at 22:06

Posted by Apple Product Security via Fulldisclosure on Feb 16

APPLE-SA-02-11-2026-3 macOS Tahoe 26.3

macOS Tahoe 26.3 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/126348.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

Admin Framework
Available for: macOS Tahoe
Impact: An app may be able to access sensitive user data
Description: A parsing...

APPLE-SA-02-11-2026-2 iOS 18.7.5 and iPadOS 18.7.5

16 February 2026 at 22:06

Posted by Apple Product Security via Fulldisclosure on Feb 16

APPLE-SA-02-11-2026-2 iOS 18.7.5 and iPadOS 18.7.5

iOS 18.7.5 and iPadOS 18.7.5 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/126347.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

Accessibility
Available for: iPhone XS, iPhone XS Max, iPhone XR, iPad 7th generation
Impact: An...

APPLE-SA-02-11-2026-1 iOS 26.3 and iPadOS 26.3

16 February 2026 at 22:06

Posted by Apple Product Security via Fulldisclosure on Feb 16

APPLE-SA-02-11-2026-1 iOS 26.3 and iPadOS 26.3

iOS 26.3 and iPadOS 26.3 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/126346.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

Accessibility
Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation
and later, iPad Pro...

Blind XXE in Electronic Invoice online tools (validator.invoice-portal.de, xrechnung.rib.de)

16 February 2026 at 22:05

Posted by Hanno BΓΆck on Feb 16

During tests of electronic invoicing tools, I discovered multiple XXE
and Blind XXE vulnerabilities in online tools parsing electronic
invoices in XML formats.

While most of the affected tools have fixed these vulnerabilities, two
online tools remain vulnerable to Blind XXE attacks, allowing
exfiltration of files. Disclosure to the affected operators happened
more than 90 days ago.

Vulnerable tools:

https://validator.invoice-portal.de/...

🚨 Public Disclosure: Remote BitLocker Bypass via Intel AMT β€” SYSTEM Access Without Login

16 February 2026 at 22:05

Posted by Darsh Naik on Feb 16

πŸ”“ The Attack Path β€” No Login, SYSTEM Access

1. Boot into setup.exe (via USB, PXE, or OOBM like Intel vPro).
2. Click β€œRepair your computer” β†’ Enter WinRE.
3. Press Shift + F10 β†’ SYSTEM-level Command Prompt.
4. From there, attacker can:
- Run `net user` to create new admin accounts
- Use `diskpart` to wipe or reformat drives
- Use `manage-bde -off` or `bcdedit` to disable BitLocker
- Replace `utilman.exe` to bypass login...

Firedancer Solana Validator - QUIC Transport Parameter UB and Consensus-Splitting Cast Bug

16 February 2026 at 22:03

Posted by Agent Spooky's Fun Parade via Fulldisclosure on Feb 16

1. SUMMARY

Two independently confirmed vulnerabilities in Jump Crypto's Firedancer
Solana validator (https://github.com/firedancer-io/firedancer, commit
7cd3b6dce):

A) Three undefined behavior / logic bugs in QUIC transport parameter
processing, triggerable by a malicious QUIC server with zero
authentication. Enables remote connection kill or hang.

B) Incorrect Rust saturating cast emulation that returns ULONG_MAX...

[SYSS-2025-014] Linksys MX4200 - Improper Verification of Source of a Communication Channel

16 February 2026 at 22:00

Posted by Christian ZΓ€ske via Fulldisclosure on Feb 16

Advisory ID:Β  Β  Β  Β  Β  Β  Β  Β SYSS-2025-014
Product:Β  Β  Β  Β  Β  Β  Β  Β  Β  Β MX4200 (and potentially others)
Manufacturer:Β  Β  Β  Β  Β  Β  Β  Linksys
Affected Version(s):Β  Β  Β  Β 1.0.13.210200 (and potentially others)
Tested Version(s):Β  Β  Β  Β  Β 1.0.13.210200 MX4200
Vulnerability Type:Β  Β  Β  Β  Improper Verification of Source of a
Communication Channel (CWE-940)
Risk Level:Β  Β  Β  Β  Β  Β  Β  Β  Critical
Solution Status:Β  Β ...
❌