claim
Attackers will continue to exploit the lack of governance in Open Source Software by using a combination of social engineering, such as the XZ Utils incident, and technical attacks to compromise widely used components.

Authors

Sources

Referenced by nodes (1)