Search
In this webinar we present breaking research from the Unit 42 Threat Intelligence team and how one simple IAM misconfiguration allowed researchers to compromise an entire massively-scaled cloud environment and bypass just about every security control.