This article has been indexed from Dark Reading
Researchers discover a new technique attackers could use to encode vulnerabilities into software while evading detection.
Read the original article: New ‘Trojan Source’ Method Lets Attackers Hide Vulns in Source Code