More Attacks against Computer Automatic Update Systems
Schneier on Security
MAY 16, 2019
According to our researchers, the attackers either had access to the source code of the victims' projects or they injected malware at the time of project compilation, meaning they were in the networks of those companies. Studying this case, our experts found other samples that used similar algorithms. Me on supply chain security.
Let's personalize your content