[ad_1] Describe a cyber-attack Maybe you’ll give me a technical description of how websites or systems were hacked. Perhaps you’d share the way in which vulnerabilities were exposed, or how victims had to pay the ransom in an untraceable cryptocurrency. It can be easy to forget the human being behind the attack, and the many […]