- Revisiting Docker Hub Policies: Prioritizing Developer Experience | Docker
- The most critical job skill you need to thrive in the AI revolution
- Kickstart 2025 with the Top Five in Cisco U. Essentials
- Google Announces Quantum-Safe Digital Signatures in Cloud KMS
- Apple Breaks Silence on UK Probe, Removes Data Protection Tool From UK Users
XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor
A threat actor quietly spent the last two years integrating themself in the core team of maintainers of XZ Utils, a free software command-line data compressor widely used in Linux systems. The attacker slowly managed to integrate a backdoor in the software that was designed to interfere with SSHD and allow remote code execution via an SSH login certificate. The backdoor was discovered a few days before being released on several Linux systems worldwide. The…
Read More