A honeypot experiment shows just how quickly cybercriminals will move to compromise vulnerable cloud infrastructure.
Source: Threadpost