Mes méthodes de veille sur l’informatique
J’ai adoptée une approche proactive en utilisant plusieurs méthodes : effectuer des recherches actives sur internet à l’aide de moteurs de recherche (requêtes avancées) pour cibler des sujets spécifiques, utilisation de LinkedIn (mon réseau professionnel) et utiliser des outils de récupération RSS comme feedly.
Un exemple de requête avancée de recherche :
site:medium.com OR site:dev.to OR site:hackernoon.com « constructeur » « Angular »
Implémentation d’un flux RSS pour suivre les mises à jour de sécurité Microsoft
- Chromium: CVE-2024-12695 Out of bounds write in V8le 19 décembre 2024 à 21h59
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-12694 Use after free in Compositingle 19 décembre 2024 à 21h59
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-12693 Out of bounds memory access in V8le 19 décembre 2024 à 21h59
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-12692 Type Confusion in V8le 19 décembre 2024 à 21h59
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- CVE-2024-43594 Microsoft System Center Elevation of Privilege Vulnerabilityle 18 décembre 2024 à 8h00
Corrected CVE title and Vulnerability Family to specify System Center as the affected product line. Corrected Fixed Build Numbers and Download links in the Security Updates table. Added FAQs explaining which customers are affected and the mitigation actions required. This is an informational change only.