☆ Researchers devised a new attack method called ‘Trojan Source’ that allows hide vulnerabilities into the source code of a software project.
● This logical vulnerability is tracked as CVE-2021-42574.
https://www.trojansource.codes/
Details: https://securityaffairs.co/wordpress/124081/hacking/trojan-source-attack.html
https://t.me/cKure/9921