Mert Coskuner
Mert Coskuner

Oct 29, 2022

·
2 min read
·

Cyber Research #59

Photo by Daniel Jensen on Unsplash

The newsletter will be on a break next week.

Articles

Stranger Strings: An exploitable flaw in SQLite

By Andreas Kellas Trail of Bits is publicly disclosing CVE-2022-35737, which affects applications that use the SQLite…

blog.trailofbits.com

--

--

More from Mert Coskuner

Making tech safer. You can support the newsletter at https://www.buymeacoffee.com/mertcoskuner.

Recommended from Medium

Fu2x2000

Fu2x2000

Log4shell (Knock Knock)

Joydeepmahata

Joydeepmahata

Completely encrypted. Untraceable (unless you tell someone). Free for anyone to use.

Ilya Smut

Ilya Smut

Physical security in Cyber Security

Areeb

Areeb

Should You Add Two Factor Authentication at Your Website?

t2krfqc578

t2krfqc578

CYBER SECURITY & COMPLIANCE

Terrye Mihe

Terrye Mihe

{UPDATE} Where’s Tappy? Juego de Buscar Objetos Ocultos Hack Free Resources Generator

Sandie Peggy

Sandie Peggy

{UPDATE} Worldly - Countries Quiz! Hack Free Resources Generator

Lanu Pitan

Lanu Pitan

in

ILLUMINATION

Beware Of Authorised Push Payment (APP)

AboutHelpTermsPrivacy


Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Get unlimited access
Mert Coskuner

Mert Coskuner

534 Followers

Making tech safer. You can support the newsletter at https://www.buymeacoffee.com/mertcoskuner.

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech