Too nasty for piefed.social@crazypeople.online to Technology@lemmy.ml · 24 hours agoNotepad++ Hijacked by State-Sponsored Hackers | Notepad++notepad-plus-plus.orgexternal-linkmessage-square5fedilinkarrow-up141arrow-down11cross-posted to: [email protected][email protected][email protected][email protected][email protected][email protected][email protected]
arrow-up140arrow-down1external-linkNotepad++ Hijacked by State-Sponsored Hackers | Notepad++notepad-plus-plus.orgToo nasty for piefed.social@crazypeople.online to Technology@lemmy.ml · 24 hours agomessage-square5fedilinkcross-posted to: [email protected][email protected][email protected][email protected][email protected][email protected][email protected]
minus-squarecatdog@lemmy.mllinkfedilinkarrow-up11·23 hours agoI can think of several ways: log analysis, methodology analysis, analysis of code comments writing style/errors, keeping the vulnerability in and finding home calls, human intelligence.
I can think of several ways: log analysis, methodology analysis, analysis of code comments writing style/errors, keeping the vulnerability in and finding home calls, human intelligence.