claim
Attackers will continue to exploit the lack of governance in Open Source Software by using a combination of social engineering, such as the XZ Utils incident, and technical attacks to compromise widely used components.
Authors
Sources
- Cyber Insights 2025: Open Source and Software Supply Chain ... www.securityweek.com via serper
Referenced by nodes (1)
- social engineering concept