Example https://en.wikipedia.org/wiki/2014_Sony_Pictures_hack
Maybe I misunderstood what a hacker can do, but why not rob someone’s credit card or bank account if they can do it to Sony?
Example https://en.wikipedia.org/wiki/2014_Sony_Pictures_hack
Maybe I misunderstood what a hacker can do, but why not rob someone’s credit card or bank account if they can do it to Sony?
Yeah, there is a whole playbook for it called pig butchering