Too nasty for piefed.social@crazypeople.online to Technology@lemmy.ml · 1 day agoNotepad++ Hijacked by State-Sponsored Hackers | Notepad++notepad-plus-plus.orgexternal-linkmessage-square5fedilinkarrow-up142arrow-down11cross-posted to: technology@lemmy.world
arrow-up141arrow-down1external-linkNotepad++ Hijacked by State-Sponsored Hackers | Notepad++notepad-plus-plus.orgToo nasty for piefed.social@crazypeople.online to Technology@lemmy.ml · 1 day agomessage-square5fedilinkcross-posted to: technology@lemmy.world
minus-squarecatdog@lemmy.mllinkfedilinkarrow-up12·1 day agoI can think of several ways: log analysis, methodology analysis, analysis of code comments writing style/errors, keeping the vulnerability in and finding home calls, human intelligence.
I can think of several ways: log analysis, methodology analysis, analysis of code comments writing style/errors, keeping the vulnerability in and finding home calls, human intelligence.