top | item 42966226

(no title)

mr_person | 1 year ago

Does anyone else notice how similar that is in spirit to what a malicious actor would look to do after gaining access to your network?

discuss

order

Xelynega|1 year ago

Or how a malicious actor inside your network would follow exactly this plan to do malicious things without your knowledge...