top | item 45913357

(no title)

arbll | 3 months ago

> The attackers gained access to a legacy, third-party cloud file storage system.

I think the answer is ok but the "third-party" bit reads like trying to deflect part of the blame on the cloud storage provider.

discuss

order

zwnow|3 months ago

The whole codebase & tools at whatever company I ever worked at was using 99% legacy stuff. Its wild...

Often times it would have been easier to rebuild the whole project over trying to upgrade 5-6 year old dependencies.

Ultimately the companies do not care about these kinda incidents. They say sorry, everyone laughs at them for a week and then after its business as usual, with that one thing fixed and still rolling legacy stuff for everything else.

bearjaws|3 months ago

All stuff is legacy the moment you deploy it.

All work created by a company decays, it's legacy code within months.

weird-eye-issue|3 months ago

> Often times it would have been easier to rebuild the whole project

Sure buddy, sure

ryukoposting|3 months ago

For all their boasting, I can't help but wonder how their response would have been different if the attackers actually had gotten their hands on sensitive data.