Tech »  How Attack, Ransom, Breach Trends Are Evolving