Check Point researchers have developed a new attack technique that takes advantage of memory safety issues in the widely used SQLite database engine. It allows attackers to execute commands in …
Continue Reading about Researchers Show How SQLite Can Be Modified to Attack Apps