In this live hacking session we’ll exploit an application as an attacker would to show threats, vulnerabilities, and misconfigurations that are most common in cloud native apps - and show how you can protect it through best practices for each attack scenario.

Original video was published with the Creative Commons Attribution license (reuse allowed). Link: