Researchers exploit a SQLite memory corruption issue outside of a browser. LAS VEGAS – Researchers at Check Point have identified a new class of vulnerabilities targeting SQLite, outside the context ...
Frightening exploits sold by the embattled Israeli spyware vendor have been used to hack people all over the world. Now researchers have unpacked how it works. Reading time 4 minutes For years, the ...
Researchers sifting through 400GB of data recently leaked from Hacking Team, an Italian company that sells computer surveillance software to government agencies from around the world, have already ...
Hacking and cyber-espionage groups around the world are attempting to exploit recently disclosed zero-day vulnerabilities in Microsoft Exchange Server, before the window of opportunity closes as ...
Recently breached surveillance software maker Hacking Team had access to three different exploits for previously unknown vulnerabilities in Flash Player. All of them are now out in the open, putting ...
Each year, the Zero Day Initiative hosts a "Pwn2Own" hacking contest where security researchers can earn money for finding serious vulnerabilities in major platforms like Windows and macOS. This 2021 ...
Researchers sifting through 400GB of data recently leaked from Hacking Team, an Italian company that sells computer surveillance software to government agencies from around the world, have already ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results