Toulouse
Météo 9°C peu nuageux

Space & Security News

This is a fix for option –yarastrings. pdf-parser_V0_7_14.zip (http)MD5: EB3808ACE5497B428138594AFDC5205FSHA256: 6A60223D52B75F8AFF8C8CF19A58699A20829AC758C251B405B08EC734EF6A4A

Apple announcement: …iPhone and iPad are the first and only consumer devices in compliance with the information assurance requirements of NATO nations. This enables iPhone and iPad to be used with classified information up to the NATO restricted...

This update adds option forcedecompress when using options -f and -s. More info: Analyzing “Zombie Zip” Files (CVE-2026-0866). zipdump_v0_0_35.zip (http)MD5: F4A48AE14C1B258D688BF61D9ACF5E54SHA256:...

Canada has a choice to make about its artificial intelligence future. The Carney administration is investing $2-billion over five years in its Sovereign AI Compute Strategy. Will any value generated by “sovereign AI” be captured in Canada, making...

This is a fix for option –yarastrings. zipdump_v0_0_34.zip (http)MD5: F2BB1DF9A4E1BA323D85C3F8F71B5E69SHA256: 2455A026DB2BE1678AD8F1AAC2D148D40A7AB7412CCE180C3E9E1FC4B39B9378

This is a fix for option –yarastrings. pecheck-v0_7_20.zip (http)MD5: DB34684DA9A5DEC0E94746328318FFE1SHA256: F6B702206E4DAE3971778263F4B234F7E77BA91A3A1F59419D12CA312316CA96

Introduction In this article, we will explore how a relatively old CVE can be exploited using PageJack, a modern kernel exploitation technique introduced in 2024 by Zhiyun Qian at Black Hat USA. You can find a link to the full exploit at the end...

Microsoft today released patches for 93 vulnerabilities, including 9 vulnerabilities in Chromium affecting Microsoft Edge. 8 of the vulnerabilities are rated critical. 2 were disclosed prior to today but have not yet been exploited. This update...

Countries around the world are becoming increasingly concerned about their dependencies on the US. If you’ve purchase US-made F-35 fighter jets, you are dependent on the US for software maintenance. The Dutch Defense Secretary recently said that...

It’s called AirSnitch: Unlike previous Wi-Fi attacks, AirSnitch exploits core features in Layers 1 and 2 and the failure to bind and synchronize a client across these and higher layers, other nodes, and other network names such as SSIDs (Service...

Aucun article de sécurité disponible