Attacks against developers are increasing and in the past year, dozens have been documented. For instance, a threat actor recently distributed a backdoored version of a .NET development tool to deploy multiple malicious payloads, like a clipboard hijacker and a crypto miner. Another recent example was Log4Shell: given that the use of Log4j is so ubiquitous around the world, […]