Cybersecurity Threats | Open Source VulnerabilitiesĀ | Software Supply Chain Risks Investigators have identified XZ Utils backdoor embedded in Docker Hub images
Remote Procedure Call Security | Spoofing AttacksĀ | Vulnerability Disclosure Researchers have outlined a Windows EPM poisoning exploit sequence that can result in escalated privileges within a domain.