Related-Which Is The Best Programming Language For IoT?
The investigation uncovered that an actor had used these devices to gain initial access to corporate networks.
Using those devices as a starting point, the hackers established a base and looked for further access.
Source:MSRC Blog
Read More
source: www.techworm.net