Looks like it’s mostly information about their computer endpoints, but that can still give hackers info they can use to try to break in using known vulnerabilities. Especially targeting the endpoints that don’t have their security software installed.
Login to the community
No account yet? Create an account
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.