Research Briefing 11.2.21
Ep 90 | 11.2.21

"Trojan Source" technique can conceal vulnerabilities in code. BlackMatter affiliate uses custom tool for data exfiltration. Android malware gains root access.

Show Notes

"Trojan Source" technique can conceal vulnerabilities in code. BlackMatter affiliate uses custom tool for data exfiltration. Android malware gains root access.