Hacker News new | past | comments | ask | show | jobs | submit login

Are you saying that the attacker's skill with AD indicates that they were able to plant code in AD? Steal the source and learn vulnerabilities from it? Or just that, given that MS uses AD, they were vulnerable too?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: