Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Does anyone else notice how similar that is in spirit to what a malicious actor would look to do after gaining access to your network?


Or how a malicious actor inside your network would follow exactly this plan to do malicious things without your knowledge...




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: