Hi,

A friend working the Security Team at a former employer of mine shared [1].
In that same type of attacks, I also came across [2].

Thought to share here.

[1]
https://snyk.io/blog/how-to-detect-mitigate-trojan-source-attacks-javascript-eslint/
[2]
https://www.zdnet.com/article/this-sneaky-trick-could-allow-attackers-to-hide-invisible-vulnerabilities-in-code/

-- 
Thanks
- Mohammad Noureldin
----
"Life is like riding a bicycle. To keep your balance you must keep moving"
- Albert Einstein

Reply via email to