Researchers exploit a SQLite memory corruption issue outside of a browser. LAS VEGAS – Researchers at Check Point have identified a new class of vulnerabilities targeting SQLite, outside the context ...
Frightening exploits sold by the embattled Israeli spyware vendor have been used to hack people all over the world. Now researchers have unpacked how it works. Reading time 4 minutes For years, the ...
Researchers sifting through 400GB of data recently leaked from Hacking Team, an Italian company that sells computer surveillance software to government agencies from around the world, have already ...
Recently breached surveillance software maker Hacking Team had access to three different exploits for previously unknown vulnerabilities in Flash Player. All of them are now out in the open, putting ...
An infosec researcher who uses the online pseudonym of Capt. Meelo has modified an NSA hacking tool known as DoublePulsar to work on the Windows IoT operating system (formerly known as Windows ...
On the first day of Pwn2Own Automotive 2025, security researchers exploited 16 unique zero-days and collected $382,750 in cash awards. Fuzzware.io is leading the competition after hacking the Autel ...
For years, the iPhone was considered the most locked-down mainstream computing device in the world. Its popularity and layers of security protections made any technique to crack it vastly more ...
Maybe it's just me, but that line is confusing. When I read it, I take it to mean that someone tried to sell Hacking team that exploit, not the other way around. Edit: As had been pointed out to me, ...
Researchers sifting through 400GB of data recently leaked from Hacking Team, an Italian company that sells computer surveillance software to government agencies from around the world, have already ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results