Security researchers discussed vulnerabilities in Infrastructure-as-code (IaC)There are a number of different ways crooks ...