• @Emerald
    link
    48 months ago

    I feel like most companies wouldn’t bother with all that. They’d probably just nuke the workstation and call it a day.

    • @[email protected]
      link
      fedilink
      28 months ago

      Yeah no. You gotta do due diligence. Getting one system compromised isn’t enough. The whole point is to pivot, elevate, repeat.