With limited confirmed information, a raft of theories and circumstantial evidence has come to light as to who was behind the attack and how they carried it out.
Go to Source
Author: Tara Seals
Cyber Security Expert
Go to Source
Author: Tara Seals