Le 27 mai 2022, un chercheur a identifié un document Word piégé sur la plate-forme Virus Total....
Mois : mai 2022
Digital supply chains are more vulnerable than ever; here’s what you need to do to secure them.
Although most organizations are not required by law to comply with NIST standards, it is usually in...
Microsoft has shared mitigation measures to block attacks exploiting a newly discovered Microsoft Office zero-day flaw abused...
Vodafone is piloting a new advertising ID system called TrustPid, which will work as a persistent user tracker...
The Computer Security Incident Response Team in Italy issued an urgent alert yesterday to raise awareness about...
Falsehoods about the war in Ukraine come in all shapes and sizes – here are a few...
Google has quietly banned deepfake projects on its Colaboratory (Colab) service, putting an end to the large-scale...
Ce bulletin d’actualité propose une analyse d’une altération malveillante de code dans le module Python ctx disponible...
De multiples vulnérabilités ont été découvertes dans Google Chrome OS. Elles permettent à un attaquant de provoquer...