56
I was expecting some exploit of the ancient underlying OS but that looked relatively simple.
The fact the exploit was able to infect config backups to persist is interesting too.
I was expecting some exploit of the ancient underlying OS but that looked relatively simple.
The fact the exploit was able to infect config backups to persist is interesting too.
This is a most excellent place for technology news and articles.