Brute-Force Attack Wave Uses Legacy Protocols, Credential Dumps to Compromise Cloud Accounts
2 min read - A massive brute-force attack campaign used both legacy protocols and credential dumps to compromise cloud user accounts, according to security researchers.