📜 Assessing the Y, and How, of the XZ Utils incident
📜 Assessing the Y, and How, of the XZ Utils incident
About
Date: 2024-04-24T10:10:31
Source: Securelist
Read more: https://securelist.com/xz-backdoor-story-part-2-social-engineering/112476/?utm_source=dstif.io
Source: Securelist
Read more: https://securelist.com/xz-backdoor-story-part-2-social-engineering/112476/?utm_source=dstif.io