@[email protected] to Comic [email protected] • 2 months agoI'm in!lemmy.worldimagemessage-square74fedilinkarrow-up11.3Karrow-down118file-text
arrow-up11.28Karrow-down1imageI'm in!lemmy.world@[email protected] to Comic [email protected] • 2 months agomessage-square74fedilinkfile-text
minus-square@[email protected]linkfedilink4•2 months agoI feel like most companies wouldn’t bother with all that. They’d probably just nuke the workstation and call it a day.
minus-square@[email protected]linkfedilink2•2 months agoYeah no. You gotta do due diligence. Getting one system compromised isn’t enough. The whole point is to pivot, elevate, repeat.
I feel like most companies wouldn’t bother with all that. They’d probably just nuke the workstation and call it a day.
And then get ransomwared a bit later.
Oh yeah probably
Yeah no. You gotta do due diligence. Getting one system compromised isn’t enough. The whole point is to pivot, elevate, repeat.