A chronological summary of how the attack on XZ Utils was carried out can be found in the article below. Timeline summary of backdoor attack on XZ Utils - GIGAZINE Cox said that this attack can be ...
Caught before it could do widespread damage, the sophisticated vulnerability could have been one of the highest-impact software supply chain breaches to date. A data compression library called XZ ...