Information Security profile picture

Assessing the Y, and How, of the XZ Utils incident In this article we analyze social engineering aspects of the XZ backdoor incident. Namely pressuring the XZ maintainer to pass on the project to Jia Cheong Tan, and then urging major downstream maintainers to commit the backdoored code to their projects.
https://securelist.com/xz-back....door-story-part-2-so

image

Discover the world at Altruu, The Discovery Engine