Attackers are scanning firewalls for critical flaws, bending vulnerable SQL servers into powerful command centers, and even ...