Port 22

Darktrace Artificial Intelligence Stops Cyberattack at Italian Electronics Distributor

Vulnerability allows attackers to run arbitrary commands, including the ability to delete, modify, and exfiltrate private source code.