Scott Charney
![Scott Charney](/assets/img/authors/unknown.jpg)
Scott Charney
customers exploiting install knew possible secure
It was a vulnerability. We knew about it, but someone is exploiting it. We want our customers to be as secure as possible and install the patches.
attack break chain hackers information sites source straight strips throws weave
Sophisticated hackers don't attack in a straight line, ... They weave between sites. If one of these sites strips off the source information and throws it away, there can be a break in the chain for investigators.