(no title)
catalypso | 3 years ago
> some source code and technical information were stolen from our development environment and used to target another employee
catalypso | 3 years ago
> some source code and technical information were stolen from our development environment and used to target another employee
jfoster|3 years ago
How was the initial (src + docs) breach performed? How do they escalate that into a successful social engineering attack, particularly since the breach was known of?
Did the targeted employee have unfettered access to all this customer data?
Will be interesting to know the fuller story. I'm guessing that's only a matter of time.