News
Researchers exploit a SQLite memory corruption issue outside of a browser. LAS VEGAS – Researchers at Check Point have identified a new class of vulnerabilities targeting SQLite, outside the context ...
The Open Network chief technology officer, Anatoly Makosov, said the solution to the attack is to switch to a safe version and reinstall clean code.
Researchers sifting through 400GB of data recently leaked from Hacking Team, an Italian company that sells computer surveillance software to government agencies from around the world, have already ...
A major JavaScript supply chain attack targeting crypto wallets through compromised GitHub packages has stolen only $1,043.
A security researcher claimed that zero-click WiFi exploit is one of the most notorious iPhone hacks right now. This iOS flaw, he said, enables cybercriminals to control and access nearby iPhones, ...
Yesterday, beginning at 18:24 UTC, someone or something exploited a security vulnerability on Wormhole, a tool that allows users to swap assets between Ethereum and a number of blockchains, resulting ...
Each year, the Zero Day Initiative hosts a "Pwn2Own" hacking contest where security researchers can earn money for finding serious vulnerabilities in major platforms like Windows and macOS. This 2021 ...
The new Gmail exploit might endanger your sensitive information following a recently discovered flaw in the app's authentication code. Millions of users worldwide have been warned of this security ...
Italian surveillance software maker Hacking Team recently claimed that it hasn’t lost any customers after the massive leak of its internal data two weeks ago. But it has lost at least one business ...
Researchers sifting through 400GB of data recently leaked from Hacking Team, an Italian company that sells computer surveillance software to government agencies from around the world, have already ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results