Leaky Database How One Leaky Database Becomes an IoT Botnet: Inside the Mirai Attack Chain Orlaith Traynor 7 min read • July 10, 2025