Open Databases a Juicy Extortion Target

A sudden wave of attacks against insecure databases resulting in ransom demands points to wave of data hijacking attacks.

Source: Cloud Security Open Databases a Juicy Extortion Target