Trojan Source attack method allows hiding flaws in source code

This article has been indexed from Security Affairs

Researchers devised a new attack method called ‘Trojan Source’ that allows hide vulnerabilities into the source code of a software project. Trojan Source is a new attack technique demonstrated by a group of Cambridge researchers that can allow threat actors to hide vulnerabilities in the source code of a software project. The technique could be […]

The post Trojan Source attack method allows hiding flaws in source code appeared first on Security Affairs.

Read the original article: Trojan Source attack method allows hiding flaws in source code