lahamotorcycle.blogg.se

Dropbox links list young
Dropbox links list young




dropbox links list young

"Our investigation has found that the code accessed by this threat actor contained some credentials, primarily API keys, used by Dropbox developers.

dropbox links list young

Importantly, it is confirmed that at no time did the threat actor have access to anyone’s Dropbox account, passwords or payment information. Access to those repositories is even more limited and strictly controlled." Importantly, they did not include code for our core apps or infrastructure. So, what did the threat actor get access to? The Dropbox security team says that "these repositories included our own copies of third-party libraries slightly modified for use by Dropbox, internal prototypes, and some tools and configuration files used by the security team.






Dropbox links list young