Experimental honeypot set up by researchers reveals locations where most of the attacks come from
Names, addresses, passport numbers, Tax IDs - the whole lot - exposed on unsecured, unencrypted Elasticsearch cluster
Yet another trove of unsecured personal data uncovered - this time containing information from data brokers Pipl.com and LexisNexis
The database was hosted on Amazon AWS and exposed via the Shodan search engine
MongoDB database instance was left unsecured and accessible online without so much as a password to protect it