$ 0 0 Guest Post: Researchers investigate the methods and frequency with which attackers target poorly secured cloud storage buckets.