June 2025 was marked by the publication of numerous vulnerabilities. The information is presented as a breakdown by category, highlighting various types of flaws such as injections, authorization issues, and other critical vulnerabilities.
In addition, the data is broken down according to the CVSS score.
May 2025 was marked by the publication of numerous vulnerabilities. The information is presented as a breakdown by category, highlighting various types of flaws such as injections, authorization issues, and other critical vulnerabilities.
In addition, the data is broken down according to the CVSS score.
April 2025 was marked by the publication of numerous vulnerabilities. The information is presented as a breakdown by category, highlighting various types of flaws such as injections, authorization issues, and other critical vulnerabilities.
In addition, the data is broken down according to the CVSS score.
March 2025 was marked by the publication of numerous vulnerabilities. The information is presented as a breakdown by category, highlighting various types of flaws such as injections, authorization issues, and other critical vulnerabilities.
In addition, the data is broken down according to the CVSS score.
Small and medium-sized enterprises (SMEs) represent 99.8% of the European economic fabric, but are also the target of 43% of global cyberattacks (Verizon Data Breach Investigations Report, 2024). Under-equipped and often with low awareness, they remain exposed to increasing risks. Discover why SMEs are particularly vulnerable to cyber threats and what concrete measures can be taken to strengthen their IT security.
February 2025 was marked by the publication of numerous vulnerabilities. The information is presented as a breakdown by category, highlighting various types of flaws such as injections, authorization issues, and other critical vulnerabilities.
In addition, the data is broken down according to the CVSS score.
In an era of accelerating digitization, businesses face a growing risk: cyberattacks. According to the Hiscox 2023 report, 53% of French companies experienced at least one cyberattack in the past year. In this context, actively monitoring security vulnerabilities has become an essential strategic priority to protect your systems, data, and reputation.
January 2025 was marked by the publication of numerous vulnerabilities. The information is presented as a breakdown by category, highlighting various types of flaws such as injections, authorization issues, and other critical vulnerabilities.
In addition, the data is broken down according to the CVSS score.
Regular updating of IT systems is the security practice of applying patches published by vendors as soon as they are available, in order to close known vulnerabilities before they are exploited. According to the Verizon Data Breach Investigations Report 2024, 32% of data breaches exploit vulnerabilities for which a patch already existed—making unapplied updates one of the most avoidable attack vectors.
December 2024 was marked by the publication of numerous vulnerabilities. The information is presented as a breakdown by category, highlighting various types of flaws such as injections, authorization issues, and other critical vulnerabilities.
In addition, the data is broken down according to the CVSS score.
November 2024 was marked by the publication of numerous vulnerabilities. The information is presented as a breakdown by category, highlighting various types of flaws such as injections, authorization issues, and other critical vulnerabilities.
In addition, the data is broken down according to the CVSS score.
October 2024 was marked by the publication of numerous vulnerabilities. The information is presented as a breakdown by category, highlighting various types of flaws such as injections, authorization issues, and other critical vulnerabilities.
In addition, the data is broken down according to the CVSS score.
September 2024 was marked by the publication of numerous vulnerabilities. The information is presented as a breakdown by category, highlighting various types of flaws such as injections, authorization issues, and other critical vulnerabilities.
In addition, the data is broken down according to the CVSS score.
August 2024 saw the publication of numerous vulnerabilities. The information is presented as a breakdown by category, highlighting various types of flaws such as injections, authorization issues, and other critical vulnerabilities.
In addition, the data is broken down according to the CVSS score.
July 2024 was marked by the publication of numerous vulnerabilities. The information is presented as a breakdown by category, highlighting various types of flaws such as injections, authorization issues, and other critical vulnerabilities.
In addition, the data is broken down according to the CVSS score.