Employee Arrested for Locking Windows Admins Out of 254 Servers in Extortion Plot

The FBI investigation revealed that the suspect, Daniel Rhyne, had accessed the company’s systems without authorization and changed passwords for various accounts. Rhyne’s actions were intended to deny the company access to its systems and data.

This article has been indexed from Cyware News – Latest Cyber News

Read the original article: