It gives the threat actors a chance to check on victim’s exploited vulnerabilities, see who pays when infected by ransomware and other useful bits of information if you plan to maximise your cyber criminal profits.
Clive Catton MSc (Cyber Security) – by-line and other articles
Please Note:
I am on leave so the news this week is “in brief”. You can still contact me via the contact page and Octagon Technology.