Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments

Cybercriminals are infiltrating organizations' cloud storage containers, stealing sensitive data, and sometimes being paid off by the victims to keep the data private. According to Palo Alto Networks, the attackers likely used automation techniques.

>>More