“The biggest indicators to legitimacy comes from these internal documents, much containing sensitive internal data relating to the server infrastructure, org charts, and more,” TrustedSec researcher Dave Kennedy wrote in a blog post. “This is much more problematic as it’s not just a database dump, this is a full scale compromise of the entire companies [sic] infrastructure including Windows domain and more.”

Ashley Madison hack is not only real, it’s worse than we thought
Dan Goodin, arstechnica.com

One clap, two clap, three clap, forty?

By clapping more or less, you can signal to us which stories really stand out.