Information Security profile picture

Assessing the Y, and How, of the XZ Utils incident In this article we analyze social engineering aspects of the XZ backdoor incident. Namely pressuring the XZ maintainer to pass on the project to Jia Cheong Tan, and then urging major downstream maintainers to commit the backdoored code to their projects.
https://securelist.com/xz-back....door-story-part-2-so

image

الرجاء تسجيل الدخول إلى Altruu ، مشاركة والتعبير عن نفسك!