New ‘Trojan Source’ Method Lets Attackers Hide Vulns in Source Code

Researchers discover a new technique attackers could use to encode vulnerabilities into software while evading detection.

Go to Source
Author: Dark Reading Staff, Dark Reading

You may also like...