They’re usually always propping up their whole operation on a series of open source wooden carts they picked up off the Internet. Those carts are the foundation that makes everything work.
As we saw a couple months ago, a core part of how Internet security works had a giant hole in it, and it was all because one dude had some kind of mental breakdown and handed off development to an attacker.
They’re usually always propping up their whole operation on a series of open source wooden carts they picked up off the Internet. Those carts are the foundation that makes everything work.
As we saw a couple months ago, a core part of how Internet security works had a giant hole in it, and it was all because one dude had some kind of mental breakdown and handed off development to an attacker.
Which vuln was this?
https://theintercept.com/2024/04/03/linux-hack-xz-utils-backdoor/
Ty