"Security Researchers" should know better than to make news articles about data still being publicly exposed.
The irony of talking about the risks of this data being exposed publicly while helping others finding said data for the sake of more traffic to your website is something indeed.
It gets worse when you have no clue how your source of research, that you pay $25/month subscription for, finds said exposed data.
By simply mentioning a company name in this situation you're already giving away too much information for people to find said server.
But when you mention on the article the data is still exposed and then go ahead and show the partial link to where it is hosted, a simple query on the same service you pay for will give you all you need to know. That service is actively used by hacker groups to ransom companies.
This is not an isolated case either, multiple times now I've seen @cybernews pull this stunt.
For reference the post I'm talking about: cybernews.com/security/loop-leaks-personal-data-creatives-exposed/
This is 1 of multiple instances I've seen this happen, other times I had to intervene myself to get stuff closed: databreaches.net/2024/09/26/massive-french-citizens-data-leak-exposes-95-million-records/