Re: The weakest link in the toolchain
its a uni, so probably done by script on the target.
Im more concerned about how they got there. Seems to be that personal devices were compromised to steal ssh keys.
they need to consider 2fa...
its a uni, so probably done by script on the target.
Im more concerned about how they got there. Seems to be that personal devices were compromised to steal ssh keys.
they need to consider 2fa...