A poorly configured file opens users up to site takeover. …read more

Source:: Threatpost