Info is scant, but such breaches can reveal where a security product’s controls are located and how detections are designed, giving attackers a leg up. – Read More