The joys of operating at the edge of the complexity envelope:
«the hackers moved rapidly from the initial intrusions through the corrupted software patches to collect and deploy authentic system credentials, making discovery and remediation far more difficult.»