JupyterLab 4.0 #software [ https://blog.jupyter.org/jupyterlab-4-0-is-here-388d05e03442 ] #informatique
« This announcement marks an important milestone in two major cryptocurrency investigations. » ( Assistant Attorney General Kenneth A. Polite, Jr. of the Justice Department's Criminal Division. ) #justice [ https://www.justice.gov/opa/pr/russian-nationals-charged-hacking-one-cryptocurrency-exchange-and-illicitly-operating-another ] #informatique
Two models of AI oversight - and how things could go deeply wrong : « It's good that governments are stepping up, but some of the signals are deeply worrisome » ( @garymarcus ) #government #technologies #ai [ https://garymarcus.substack.com/p/two-models-of-ai-oversight-and-how ] #informatique
« La guerre en Ukraine a mis en lumière les vulnérabilités des constellations de satellites » #europe #space #telecom #threats #france #technologies [ https://www.linforme.com/tech-telecom/article/thales-va-proteger-les-satellites-de-galileo-le-gps-europeen_714.html ] #informatique
« Nous surveillons notamment les cyberattaques exploitant les vulnérabilités informatiques des systèmes au sol pour ensuite remonter jusqu'au système spatial » #space #threats ( Lionel Salmon ) #informatique
« Il faut prendre conscience que les satellites sont vulnérables aux attaques cyber » #space #threats ( Lionel Salmo ) #informatique
How to Hack Shannon #Baseband from a #Phone ( Natalie Silvanovich ) #offensivecon #informatique
Reverse Engineering & Customization of #Intel Microcode ( Pietro Borrello ) #offensivecon #informatique
Inside #Apple's Lightning : JTAGging the #iPhone for Fuzzing & Profit ( Stacksmashing
) #offensivecon #informatique
Advancements in #JavaScript Engine #Fuzzing ( Samuel Groß & Carl Smith ) #offensivecon #informatique
What's in a Name ? ( Mark Brand ) #offensivecon #informatique
Unearthing #Vulnerabilities in the #Apple Ecosystem : The Art of KidFuzzerV2.0
( Pan Zhenpeng ) #offensivecon #informatique
Embedded Threats : A Deep Dive into the Attack Surface & Security Implications of eSIM Technology( Markus Vervier ) #offensivecon #informatique
Your Mitigations Are My Opportunities ( Yarden Shafir ) #offensivecon #informatique
Changing & Unchanged Things in #Vulnerability Research ( Hao Xu ) #offensivecon #informatique
A Journey of Exploiting #ASN.1 Parsers in the Baseband ( Amat Cama ) #offensivecon #informatique
A Dark Side of #UEFI : Cross-Silicon Exploitation ( Alex Matrosov & Alex Ermolov ) #offensivecon #informatique
Attacking the #Linux Kernel ( Alex Plaskett & Cedric Halbronn ) #offensivecon #informatique
Auditing & Exploiting #XNU Virtual Memory ( Ian Beer ) #offensivecon #informatique
Exploiting Spinlock #UAF in the #Android Kernel ( Moshe Kol ) #offensivecon #informatique
Hello, I'm chirp, your virtual parrot.
Just another node. feedback loop?