LSLogin Sécuritéinblog.login-securite.comGestion des risques en cybersécurité : méthodologies et bonnes pratiquesDans un environnement numérique de plus en plus complexe et connecté, la gestion des risques en cybersécurité est devenue essentielle pour protéger les actifs critiques des entreprises. Que ce soit fa4h ago·7 min read
AVAndrei Vasiliuinandreivasiliu.comStop Outsourcing Identity: A Production Guide to Keycloak on KubernetesIntroduction: Take Back Control of Your Identity Over the last few months, we've built a platform that rivals small enterprise setups. We have established a resilient networking layer with automated T12h ago·6 min read
ABAlon Baradincvereports.hashnode.devCVE-2026-27495: Breaking Out of the Box: n8n JavaScript Sandbox Escape (CVE-2026-27495)Breaking Out of the Box: n8n JavaScript Sandbox Escape (CVE-2026-27495) Vulnerability ID: CVE-2026-27495 CVSS Score: 9.4 Published: 2026-02-25 A critical sandbox escape vulnerability in the n8n workflow automation platform allowing authenticated us...3h ago·2 min read
TFThe Financial Standardinthefinancialstandard.hashnode.devTransformative UK Power Grid DealMajor ripples are being felt in the energy sector as Engie's stock price skyrockets following their massive $14.21 billion acquisition of UK Power Networks. This move isn't just another business deal; it represents a fundamental shift in Engie's stra...13m ago·1 min read
ABAlon Baradincvereports.hashnode.devCVE-2026-27497: SQLi-ception: Breaking n8n's Merge Node via AlaSQL RCESQLi-ception: Breaking n8n's Merge Node via AlaSQL RCE Vulnerability ID: CVE-2026-27497 CVSS Score: 9.4 Published: 2026-02-25 n8n, the popular workflow automation tool that connects everything to everything, recently discovered it had connected its...4h ago·2 min read
DDeepSeaXindeepseax.hashnode.devHottest Open-Source Cybersecurity Tools in 2026: February RoundupHottest Open-Source Cybersecurity Tools in 2026: February Roundup This month, we delve into the latest open-source cybersecurity tools that are revolutionizing security practices across various environments. These tools are gaining traction for their...2h ago·3 min read
RRridesh raju bijweinrideshcyber.hashnode.devSOC169 – Possible IDOR Attack Detected Walkthrough (EventID:119)Today, we’ll be investigating another LetsDefend SOC alert: SOC169 — Possible IDOR Attack Detected In this walkthrough, we’ll analyze how repeated web requests exposed a serious web application vulner3h ago·4 min read
ABAlon Baradincvereports.hashnode.devCVE-2026-27498: n8n Automation RCE: When 'GitOps' Becomes 'GitPwned'n8n Automation RCE: When 'GitOps' Becomes 'GitPwned' Vulnerability ID: CVE-2026-27498 CVSS Score: 9.0 Published: 2026-02-25 A critical Remote Code Execution (RCE) vulnerability exists in n8n, the popular workflow automation tool. By design, n8n all...4h ago·2 min read
ABAlon Baradincvereports.hashnode.devCVE-2026-27116: Vikunja HTML Injection: When a 'Filter' Becomes a Phishing HookVikunja HTML Injection: When a 'Filter' Becomes a Phishing Hook Vulnerability ID: CVE-2026-27116 CVSS Score: 6.1 Published: 2026-02-25 A Reflected HTML Injection vulnerability in the Vikunja task management platform allows attackers to inject arbit...5h ago·2 min read
ABAlon Baradincvereports.hashnode.devCVE-2026-20408: Airborne Toxic Event: The MediaTek WLAN Heap Overflow (CVE-2026-20408)Airborne Toxic Event: The MediaTek WLAN Heap Overflow (CVE-2026-20408) Vulnerability ID: CVE-2026-20408 CVSS Score: 8.8 Published: 2026-02-02 CVE-2026-20408 is a critical heap-based buffer overflow in the MediaTek WLAN SDK that allows adjacent atta...5h ago·2 min read