This presentation covers how threat actors performed the exploitation and IMDS abuse, as well as related security hardening guidance on how to detect, remediate, and prevent this type of instance metadata abuse in an organization’s environment.
Learn for free, join the best tech learning community
Event notifications, weekly newsletter
Access to all content