Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How can Zecops keep sufficient records to identify instances of this attack in the past without keeping a massive treasure trove of private data?

Surely you would need to keep the raw content of every email of every client to identify this?



Perhaps they provide their clients with a script to run that identifies suspicious emails.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: