GDC 2026: Next generation of Xbox designed to play console and PC games

As Xbox celebrates its 25th anniversary this year, it comes to the Game Developers Conference with more details about its next generation console, Project Helix, which is designed to play console and PC games.

“As games increasingly span devices,

The post GDC 2026: Next generation of Xbox designed to play console and PC games appeared first on Windows Experience Blog.

Continue reading GDC 2026: Next generation of Xbox designed to play console and PC games

GDC 2026: Announcing new tools and platform updates for Windows PC game developers

Our focus is clear: making Windows 11 the best place for game developers to create, experiment, ship and scale. Windows is an open, flexible platform that supports choice across engines, tools, hardware and distribution models. That commitment is roo

The post GDC 2026: Announcing new tools and platform updates for Windows PC game developers appeared first on Windows Blog.

Continue reading GDC 2026: Announcing new tools and platform updates for Windows PC game developers

CVE-2025-69644 An issue was discovered in Binutils before 2.46. The objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed debug information. A logic flaw in the handling of DWARF location list headers can cause objdump to enter an unbounded loop and produce endless output until manually interrupted. This issue affects versions prior to the upstream fix and allows a local attacker to cause excessive resource consumption by supplying a malicious input file.

Information published. Continue reading CVE-2025-69644 An issue was discovered in Binutils before 2.46. The objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed debug information. A logic flaw in the handling of DWARF location list headers can cause objdump to enter an unbounded loop and produce endless output until manually interrupted. This issue affects versions prior to the upstream fix and allows a local attacker to cause excessive resource consumption by supplying a malicious input file.