This is a dedicated watch page for a single video.
Jack, a security professional, was tasked with monitoring web applications to identify any existing security flaws that can be exploited by attackers. While monitoring the application, Jack noticed that the application is downloading updates from unauthorized or untrusted sources without conducting sufficient security checks. Identify the type of application security risk noticed by Jack in the above scenario.