Our research reveals that personal repositories often expose sensitive corporate data, leading to severe security breaches
Red Hat Information Risk and Security and Red Hat Product Security learned that the latest versions of the “xz” tools and libraries contain malicious code that appears to be intended to allow unauthorized access.