to a breach of financial or corporate serversleadsto a breach of financial or corporate servers
to breach of financial or corporate serversleadsto breach of financial or corporate servers
yethas ... been discoveredyet
in remote code executioncould resultin remote code execution
in the loss of customer confidencewould resultin the loss of customer confidence
system compromise(passive) caused bysystem compromise
to full compromise of the servercan leadto full compromise of the server
to the data leakledto the data leak
a vulnerability on a perimeter serverdiscoversa vulnerability on a perimeter server
The problem(passive) is caused byThe problem
in a loss of sensitive dataresultsin a loss of sensitive data
a potential danger(passive) caused bya potential danger
in the loss of credit card numbersresultedin the loss of credit card numbers
a possible danger(passive) caused bya possible danger
to corruptionmight leadto corruption
to exploitwas designedto exploit
to malwarecan leadto malware
threatcausesthreat
the harm of viruses(passive) resulted bythe harm of viruses
to the hackledto the hack
viruses(passive) resulted byviruses
viruses(passive) resulted byviruses
a lot of fraud and cashresultsa lot of fraud and cash
security breach(passive) caused bysecurity breach
after the infrastructure components have been released on the marketare discoveredafter the infrastructure components have been released on the market
after the infrastructure components are released in the marketare discoveredafter the infrastructure components are released in the market
adware , viruses , and more other potentially unwanted programscausingadware , viruses , and more other potentially unwanted programs
a lot of fraud and cash losingresultsa lot of fraud and cash losing
security events(passive) caused bysecurity events
much more malware problemsmay causemuch more malware problems
to damage posed to property and human lifemay also leadto damage posed to property and human life
to future breachesmay leadto future breaches
in operational testingdiscoveredin operational testing
to back doors , security breaches , information and data theft , and other potential damages to files and computing systemsleadingto back doors , security breaches , information and data theft , and other potential damages to files and computing systems
to their access and control of those systemsledto their access and control of those systems
to back doors , security breaches , informationleadingto back doors , security breaches , information
in user domain to contain any data breaches within Googlediscoveredin user domain to contain any data breaches within Google