Background: This is a new ransomware attack technique that does not use a phishing e-mail or malvertising as the vector of attack. Instead, the bad actors exploit a known vulnerability in JBoss in the customer’s environment. The compromised server is...