This presentation covers how threat actors performed the exploitation and IMDS abuse, as well as related security hardening guidance on how to detect, remediate, and prevent this type of instance metadata abuse in an organization’s environment.
Priority access to all content
Video hallway track
Community chat
Exclusive promotions and giveaways