Previously, threat actors took over misconfigured databases to demand ransom, but now there has been a change in their tactics. Hijacked S3 buckets or hosting sources have become a real threat, as adversaries can exploit them for “data theft and intrusion,” according to Checkmarx researcher and software engineer Guy Nachshon in his blog post published on June 15th.
Source: HackRead