Is there a database of these big corporate hacks anywhere?<p>Furthermore, is there any categorization of the method that was used? I am curious of the ratio: X% mix-configured cloud permissions, Y% bad defaults, Z% unpatched 9-year old vulnerability, N% most minimal social hacking, etc<p>Probably too much egg on everyone's face to get public post-mortems, but I would enjoy knowing more.