repostbot33@lemmy.worldB to netsec@lemmy.worldEnglish · 1 year agoResults of Major Technical Investigations for Storm-0558 Key Acquisition (How a threat actor acquired and used a Microsoft signing key to access customer emails)msrc.microsoft.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10cross-posted to: cybersecurity@lemmy.capebreton.socialreverseengineering@zerobytes.monsternetsec@links.hackliberty.orginfosecpub@infosec.pubhackernews@lemmy.smeargle.fanshackernews@derp.footechnews@radiation.party
arrow-up13arrow-down1external-linkResults of Major Technical Investigations for Storm-0558 Key Acquisition (How a threat actor acquired and used a Microsoft signing key to access customer emails)msrc.microsoft.comrepostbot33@lemmy.worldB to netsec@lemmy.worldEnglish · 1 year agomessage-square0fedilinkcross-posted to: cybersecurity@lemmy.capebreton.socialreverseengineering@zerobytes.monsternetsec@links.hackliberty.orginfosecpub@infosec.pubhackernews@lemmy.smeargle.fanshackernews@derp.footechnews@radiation.party