Attackers used a short list of passwords to knock on every digital door to find vulnerable systems in the vendor’s network. …read more

Source:: DarkReading