Menu
Sign In Pricing Add Podcast

Darknet Diaries

147: Tornado

1804.926 - 1818.778 Jack Recider

Yeah, I mean, if you get malware onto a developer's computer and then take control of their computer, then you can assume the role of that developer in that company. You have their access keys, their logins, their privileged access to the network.

0
💬 0

Comments

There are no comments yet.

Log in to comment.