Inside an investigation: compromised AWS access keys Hear how we caught an attacker that used a developer’s machine to gain access to AWS.