In this live hacking session we’ll exploit an application as an attacker would to show threats, vulnerabilities, and misconfigurations that are most common in cloud native apps - and show how you can protect it through best practices for each attack scenario.


PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed). Link: https://www.youtube.com/watch?v=5VHgsSsIudA