Mes méthodes de veille sur l’informatique
J’ai adoptée une approche proactive en utilisant plusieurs méthodes : effectuer des recherches actives sur internet à l’aide de moteurs de recherche (requêtes avancées) pour cibler des sujets spécifiques, utilisation de LinkedIn (mon réseau professionnel) et utiliser des outils de récupération RSS comme feedly.


Un exemple de requête avancée de recherche :
site:medium.com OR site:dev.to OR site:hackernoon.com « constructeur » « Angular »
Implémentation d’un flux RSS pour suivre les mises à jour de sécurité Microsoft
- Chromium: CVE-2025-9867 Inappropriate implementation in Downloadsle 5 septembre 2025 à 7h00
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202[SS9.1]5) for more information.
- Chromium: CVE-2025-9866 Inappropriate implementation in Extensionsle 5 septembre 2025 à 7h00
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202[SS9.1]5) for more information.
- Chromium: CVE-2025-9865 Inappropriate implementation in Toolbarle 5 septembre 2025 à 7h00
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202[SS9.1]5) for more information.
- Chromium: CVE-2025-9864 Use after free in V8le 5 septembre 2025 à 7h00
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202[SS9.1]5) for more information.
- CVE-2025-53791 Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerabilityle 5 septembre 2025 à 7h00
Improper access control in Microsoft Edge (Chromium-based) allows an unauthorized attacker to bypass a security feature over a network.