ESET Research Podcast: Sextortion, digital usury and SQL brute-forceBy rooter / September 13, 2023 Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims