How recruitment fraud turned cloud IAM into a $2 billion attack surface
A developer gets a LinkedIn message from a recruiter. The role looks legitimate. The coding assessment requires installing a package. That package exfiltrates all cloud credentials from the developer�...
