Discussion about this post

User's avatar
Neural Foundry's avatar

Strong write-up on the contractor angle. The fact that threat actors were posting support panel screenshots right after the breach sugests this type of insider access might be more coordinated than random. I've dealt with similiar situations where the first breach point was human, not technical, and the fallout always takes longer to contain than external attacks.

No posts

Ready for more?