Snarky ironic subtitle that emulates xkcd's mouseover text| www.detectionengineering.net
Attackers gain access to AWS cloud storage containers by scanning for and leveraging exposed environment files (with cloud IAM keys inside).| Help Net Security