The cyber attack exploited the Network Time Protocol , a system for clock synchronisation between computer systems, by sending requests with fake source IP addresses to NTP servers.
Category Security
0 Comments
Latest Comments