Threat actors exploit leaked env files to compromise cloud environments and conduct ransom operations, targeting over 230 million unique targets and leveraging AWS resources for privilege escalation.
View full story…