Hackers Exploit Foundation Software, Exposing Sensitive Contractor Data

Foundation Software
Attacker commands enumerating machine details | Image: Huntress