Palo Alto Networks Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments