Info is scant, but such breaches can reveal where a security product's controls are located and how detections are designed, giving attackers a leg up.
Summary + source link. No paywalls, no tracking.
Info is scant, but such breaches can reveal where a security product's controls are located and how detections are designed, giving attackers a leg up.