The future of cybersecurity: Hacking the cloud

'A weak link can be leveraged to escalate privileges within an environment.'