Cloud Security Data Breach Vulnerabilities5 Min Read May 13, 2025 Tales from the cloud trenches: The Attacker doth persist too much, methinks As a result of a recent threat hunt, we observed attacker activity originating from a leaked long-term AWS access key (AKIA*). Within a…