Whether compromising misconfigured cloud infrastructure or taking advantage of free-tier cloud development platforms, attackers see a vast pool of workloads to use for cryptomining.
Go to Source of this post
Author Of this post: Robert Lemos, Contributing Writer