Too Long; Didn't Read
<em>“Someone used the fish tank to get into the network, and once they were in the fish tank, they scanned and found other vulnerabilities and moved laterally to other places in the network.” — Justin Fier, director for cyber intelligence and analysis at security firm Darktrace.</em>