Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

When they say "The episode occurred when threat actors gained access to this third party legacy system which was not decommissioned properly. " for me it sounds like a not properly wiped disk that got into the the bad guys hands. It would be interesting to know more to be prepared for proper decommissioning of hardware.


sounds like an S3 bucket that wasn't deleted


Or a cloud server which was never turned off.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: