• metoosalem@feddit.org
    link
    fedilink
    arrow-up
    2
    ·
    2 days ago

    The threat actor then demonstrated their ability to persist in target environments across equipment from multiple vendors for extended periods, maintaining access in one instance for over three years.

    Let that sink in