repostbot33@lemmy.worldB to netsec@lemmy.worldEnglish · 1 year agoResults of Major Technical Investigations for Storm-0558 Key Acquisition (How a threat actor acquired and used a Microsoft signing key to access customer emails)msrc.microsoft.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10cross-posted to: cybersecurity@lemmy.capebreton.socialnetsec@links.hackliberty.orginfosecpubhackernews@lemmy.smeargle.fanshackernews@derp.foo
arrow-up13arrow-down1external-linkResults of Major Technical Investigations for Storm-0558 Key Acquisition (How a threat actor acquired and used a Microsoft signing key to access customer emails)msrc.microsoft.comrepostbot33@lemmy.worldB to netsec@lemmy.worldEnglish · 1 year agomessage-square0fedilinkcross-posted to: cybersecurity@lemmy.capebreton.socialnetsec@links.hackliberty.orginfosecpubhackernews@lemmy.smeargle.fanshackernews@derp.foo