From T-Mobile to Facebook, examples of information breaches are usually not hard to seek out lately. A lot of these attacks are successful due to a server misconfiguration or compromised user login credentials. Some attacks are the results of social engineering or brute force. And others, still, result from improperly-configured web application firewalls (WAFs) and […]