New ‘Trojan Source’ Method Lets Attackers Hide Vulns in Source Code

Researchers discover a new technique attackers could use to encode vulnerabilities into software while evading detection.

from Dark Reading https://ift.tt/2ZHVMWc
via IFTTT