<img width="578" height="388" src="https://venturebeat.com/wp-content/uploads/2021/06/GettyImages-1273354471.jpg?fit=578%2C388&strip=all" alt="Illustration, 3D red padlock on blue, red binary code on screen background." loading="lazy" srcset="https://venturebeat.com/wp-content/uploads/2021/06/GettyImages-1273354471.jpg?w=2113&strip=all 2113w, https://venturebeat.com/wp-content/uploads/2021/06/GettyImages-1273354471.jpg?w=300&strip=all 300w, https://venturebeat.com/wp-content/uploads/2021/06/GettyImages-1273354471.jpg?w=768&strip=all 768w, https://venturebeat.com/wp-content/uploads/2021/06/GettyImages-1273354471.jpg?w=800&strip=all 800w, https://venturebeat.com/wp-content/uploads/2021/06/GettyImages-1273354471.jpg?w=1536&strip=all 1536w, https://venturebeat.com/wp-content/uploads/2021/06/GettyImages-1273354471.jpg?w=2048&strip=all 2048w, https://venturebeat.com/wp-content/uploads/2021/06/GettyImages-1273354471.jpg?w=400&strip=all 400w, https://venturebeat.com/wp-content/uploads/2021/06/GettyImages-1273354471.jpg?w=780&strip=all 780w, https://venturebeat.com/wp-content/uploads/2021/06/GettyImages-1273354471.jpg?w=578&strip=all 578w, https://venturebeat.com/wp-content/uploads/2021/06/GettyImages-1273354471.jpg?w=930&strip=all 930w" sizes="(max-width: 578px) 100vw, 578px">Why did the Colonial Pipeline hackers allow themselves to be traced?<a href="https://venturebeat.com/2021/06/13/a-question-no-one-is-asking-about-the-colonial-pipeline-ransom-attack/" target="_blank">Read More</a><img src="http://feeds.feedburner.com/~r/venturebeat/SZYF/~4/Mb-EFBWkdQc" height="1" width="1" alt="">