Open Databases a Juicy Extortion Target

A sudden wave of attacks against insecure databases resulting in ransom demands points to wave of data hijacking attacks.

About author:

Comments are closed here.