Skip links

Author: Kyle Benac, Security Researcher

Open Source Backdoors in the Wild Blog Banner Acronis SCS

Open Source Backdoors in the Wild

Open Source Backdoors in the Wild Malicious actors will take advantage of any opportunity to exploit an attack vector for money, personal gain, or fun. For years, hackers have used supply chains to deploy backdoors because trusted software provides a relatively easy entry point. This