Comment by weinzierl
8 hours ago
" >proactive [...] security program Idk how proactive patching an exploited-in-the-wild unauth RCE is, but pr statements gonna pr i guess. "
If you follow their history, especially the jepsen analysis and the whole back and forth, you will find a pattern.
No comments yet
Contribute on Hacker News ↗