
The consequences of a years-old SQLite vulnerability
An interesting bug in one of the most popular embedded DBMS.
4 articles
An interesting bug in one of the most popular embedded DBMS.
Researchers from Cambridge describe the Trojan Source method for inserting hidden implants in source code.
Supply-chain attacks through public repositories have become more frequent of late. Here’s how to deal with them.
It’s not easy to be successful even in advantageous time, and it is even more challenging to stay best in class for nearly two decades. This year our company turns