The author's work laptop was compromised by a foreign actor. This post details how their company's security tools caught the attack and prevented a disaster.
No pages have linked to this URL yet.
Log in or sign up to submit feeds.