Cloud Automation Black Hat Hacking (how they cover their tracks pt 1)
Demonstrates how black hat hackers are using cloud services to automate everything from infrastructure, to attack servers using cloud services, while staying mostly anonymous.
Previous
Cloud Automation Black Hat Hacking (how they cover their tracks pt2)
Next