
Invisible implants in source code
Researchers from Cambridge describe the Trojan Source method for inserting hidden implants in source code.
3 articles
Researchers from Cambridge describe the Trojan Source method for inserting hidden implants in source code.
Supply-chain attacks through public repositories have become more frequent of late. Here’s how to deal with them.
Why working in Kaspersky Lab has always been more than just business.