[ad_1] <br><a href="https://news.google.com/rss/articles/CBMioAFBVV95cUxONGJWQ2twTlh0U2VBaVRFbnoyeWViZ0tZUXRYNzR1aXpiT21VaGk1cUl3ODlIcHVjWThnNzlDLVkzT1FRVlphOWJQNm1mRWF5c3RPVXZGdDR5ckF3b0d4dHZTMHRKTzNrT0Z5b2tYLTV6NldKa3hDY0EzaGxYZ1RwM3BwMS02blFTQVIzemdKdWx1TUFsUjhScjZwZHpyeUUy?oc=5" target="_blank">Babuk2 and the dark art of ransomware data commoditisation</a> <font color="#6f6f6f">Cyber Day by day</font> <br>[ad_2] <br><a href="https://news.google.com/rss/articles/CBMioAFBVV95cUxONGJWQ2twTlh0U2VBaVRFbnoyeWViZ0tZUXRYNzR1aXpiT21VaGk1cUl3ODlIcHVjWThnNzlDLVkzT1FRVlphOWJQNm1mRWF5c3RPVXZGdDR5ckF3b0d4dHZTMHRKTzNrT0Z5b2tYLTV6NldKa3hDY0EzaGxYZ1RwM3BwMS02blFTQVIzemdKdWx1TUFsUjhScjZwZHpyeUUy?oc=5">Source link </a>