- These mainline OnePlus earbuds are a great buy at full price - but now they're $30 off
- The new Outlook for Windows adds Copilot and other perks, but I still prefer the classic version
- I replaced my iPhone with an e-paper Android handset - here's my buying advice a month later
- #Infosec2025: Cybersecurity Support Networks Too Fragmented for SMBs
- Securing the algorithm: IT’s evolving role in governing AI access, identity, and risk
XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor
A threat actor quietly spent the last two years integrating themself in the core team of maintainers of XZ Utils, a free software command-line data compressor widely used in Linux systems. The attacker slowly managed to integrate a backdoor in the software that was designed to interfere with SSHD and allow remote code execution via an SSH login certificate. The backdoor was discovered a few days before being released on several Linux systems worldwide. The…
Read More