Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Access to the laptop could also be completely unrelated. The threat actor used a breached Thin client to access Okta...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: