
Our investigations are ongoing in close collaboration with our client.We can therefore confirm that our software is not responsible, but rather, a privileged account within the client’s infrastructure was compromised by an individual who exploited the standard functions of the solution. This hypothesis has been substantiated. It is therefore neither due to improper implementation of… Read more