This article has been indexed from Security Affairs
Researchers devised a new attack method called ‘Trojan Source’ that allows hide vulnerabilities into the source code of a software project. Trojan Source is a new attack technique demonstrated by a group of Cambridge researchers that can allow threat actors to hide vulnerabilities in the source code of a software project. The technique could be […]
The post Trojan Source attack method allows hiding flaws in source code appeared first on Security Affairs.
Read the original article: Trojan Source attack method allows hiding flaws in source code