Posts

A sudden wave of attacks against insecure databases resulting in ransom demands points to wave of data hijacking attacks. Source: Cloud Security Open Databases a Juicy Extortion Target