Understanding The TFS Vulnerability Cortex EDR
We found that it was possible to access sensitive log files before they were encrypted. This situation points to a potential security gap, allowing critical data to be accessed without the usual decryption steps.