Security researchers discovered a malicious Go module, differing by one letter from a legitimate package, that has been secretly deploying a DNS-based backdoor since 2017. This threat is significant because it can go undetected for long periods and allows attackers to control infected machines via DNS requests, bypassing many security systems. Developers should immediately audit their projects for the compromised module and update dependencies accordingly.
Read the full article at Cyber Security News
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.





