Cybersecurity (General)
‘Trojan Source’ Attack Method Can Hide Bugs Into Open-source Code
‘Trojan Source’ Attack Method Can Hide Bugs Into Open-source Code Academic researchers have released details about a new attack method they call “Trojan Source” that allows injecting vulnerabilities into the source code of a software project in a way that human reviewers can’t detect. Trojan Source relies on a simple Read more…