For the last few days, the backdoor in xz-utils[1] has been among the main topics of conversation in the global cyber security community.
Article Link: https://isc.sans.edu/diary/rss/30800
For the last few days, the backdoor in xz-utils[1] has been among the main topics of conversation in the global cyber security community.
Article Link: https://isc.sans.edu/diary/rss/30800