The exposure of millions of firewall configuration files and credentials creates a broad attack surface that could enable downstream compromises across many enterprises, underscoring the heightened risk posed by state‑sponsored actors targeting cloud backup services. It forces organizations to reevaluate backup security and credential management practices.
Comments
Want to join the conversation?
Loading comments...