Well-liked recording software program utilized in courtrooms contaminated by password-stealing backdoor

Well-liked recording software program utilized in courtrooms contaminated by password-stealing backdoor

In context: Provide chain assaults are normally conceived to focus on a particular firm by infecting a single component concerned within the manufacturing or distribution of a software program product. As soon as the availability chain is compromised, all downstream customers and clients of the affected firm will be simply focused as nicely. Justice AV…