Cloud Automation Black Hat Hacking (how they cover their tracks pt2)
Demonstrates how black hat hackers are using cloud services to automate everything from infrastructure, to attack servers using cloud services, while staying mostly anonymous
Previous
How an Attacker Can Take Over a Server with Stored XSS
Next