Due to the increase in cloud-based attacks, we picked three devastating and evasive real-world scenarios to show how attackers can gain access and move laterally in SaaS applications to perform reconnaissance and steal sensitive data. This session will show how attackers can exploit API, administrative, and user session vectors to access data in SaaS applications.
DevSecOps & Application Security Hackers & Threats
application security cloud security data security exploit of vulnerability hackers & threats
Share With Your Community