![]() ![]() At the time, the security team thought it was able to contain the incident, as there was no evidence that any customer data or encrypted password vaults were accessed. The bad actor’s activity lasted four days, and some of the software’s code and technical information were taken.
0 Comments
Leave a Reply. |