- cross-posted to:
- pulse_of_truth@infosec.pub
You must log in or # to comment.
Seems that if the uninvited code never tried doing network scans, it may not have been detected for quite a while. Good thing the hacker was a bit greedy.
Seems that if the uninvited code never tried doing network scans, it may not have been detected for quite a while. Good thing the hacker was a bit greedy.