📜 Assessing the Y, and How, of the XZ Utils incident

📜 Assessing the Y, and How, of the XZ Utils incident

· json · rss
Subscribe:

About

Date: 2024-04-24T10:10:31
Source: Securelist
Read more: https://securelist.com/xz-backdoor-story-part-2-social-engineering/112476/?utm_source=dstif.io